Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html
-
Size
18KB
-
MD5
b06148994e38074e803f7e16501bfa8c
-
SHA1
660305cee468bb0838de9c54b53b44d07333b26f
-
SHA256
dabb916ba37a0685a87884f9a8814f2c1a0544cdaaac31e94c84d85145efbf01
-
SHA512
086606b1539584c7aea769ad1b3453d790235c0a46fecaef52c7759894d8a8b61bb8d4dab2d772c9a855020d9010271d90e1105a4f3b7a90f4fdb53e8ca2d00c
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIa4QzUnjBhMm82qDB8:SIMd0I5nvHrsvMlxDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3FA9971-2B64-11EF-A3F8-62949D229D16} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424651647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b06148994e38074e803f7e16501bfa8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecab0876eaa36db63a5581bc9478d61
SHA13c0b2ab239b39373afb279753be0931a9c4231be
SHA2567988e6c50f9432f0acd6851a5964cf800909ad09b9858dfe6a4fb4b4a2359f5a
SHA512024cf84f1562b40a2a85a49bd2ccba661e14b2b8e19a2e65dfd6b989e2615c04d788ebb4f7d1ca0e44fc7d548fa47b19130da0973fdddb02406bc2ab595963dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d54c2548135ac91b277f8ac098e92eb
SHA10b31cef772e9fc55b14ea09318b4f9d324b929e6
SHA2561a5efcf0bfadc93c18c970a08f1d7f919f6104578d214568aa0728b45f83e9e0
SHA512ec61189315c15e6c8ba2fde0cbe18926f2e25a44d1e1f3e9256703a2eae86a8636d2f7b230f672e76b9629e18fa27d0a06e62fbe12c3d242e0a8c3ebcf859790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe6d4445939890384fd4a56ed91c7a1
SHA1f019522bebef6bfc4b1f44ad978e34ded8db6c2e
SHA256c744ec65810d254f2078f18790ab64300d0f9e1a0376e96654f101e7973adfb9
SHA512ae5d9ed7c0924e3d0a89e5804d6463b2fae2688000f5518caea49e70e005b008c7c40918b5c11e40b0223cfb145423e95177c79dc7f3a428186bcb26b9befc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdc3db5c69cfa6c06f94d54a516d857
SHA15263cec8363d7b120f2b27fd546dbe61aa01d508
SHA25698d88cb67ba06b423802c14432cfd697ed2c874704a1c885ec7a33029b0919f0
SHA512613cb2d35f3c9c3bee88185bb2f09697faa1fe0a91fe898e6708dbcdff0ce2bf1947555e8a5ef33b280823d284fd9da14059b9cadcfb59b2fee4bf303538571f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170c3abc88b7c7dda1a5e79de04dfdbb
SHA1b6544d97525c36500a1494ca475edbdcfeff3232
SHA25661c987fc1ae6d107db8609c4d09075cba7b71441c9133ba40a94feeb203ae641
SHA512c3835eb32d89382c4ea3a0a7247c794003dd34088283ce802d595fe2a5ffac85d30c00d3d5aef12a35d78b8adc09b7f68d5f2be6e8c488c29424b12d73ef5436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355ba3b46f3dbcc3facef63a2d52517f
SHA1289a26bd77d91cd25239bd754e4dabddd26def7c
SHA2566a74b73fd5a864c762b58b041a8d82ad5b6ef8d06ef8fca4a6d9133b8f66d499
SHA512de4b836879774e6322f58eb1709fba49a0b442fbb35eba5286bd809e349f9d22a1921c9b07f81155517d8899fb11bcb3b66100d90f38a2fc2a500856a174c167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3923d9f8d9f766394a3e8405180cd3
SHA12447d75681898b9507c1746bad1bfd34529a643c
SHA256efa45c4e13619d613b3f17c5529155628f9c761beb470e4f731aed216875fa51
SHA51294220096ab400d827bb58e9740fb41ca21b178e9d0564f88d3f7775149874e640ab92954fcf6c13362cb20179e488b739848fa809cfcc5744257665335b4a7cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2dda6917eb00f0a96b059073f6c94b
SHA120b967f7f80982edddbabeafee612d756e9e024b
SHA2564221321889a846fecd821f7e4cb93de65c04e0e24d00e7b15ecd885a788f0b69
SHA5128442ee82aedf87f4de3ea39fb8853003f31e33f53dba8bbaac9eae7f250062599c159e242b495d8e6a18c3b86c84f467c74385318c27b26c1b57f6d2aa966c71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b