Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
b053548a1fb076d0f0197415fc6bc902_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b053548a1fb076d0f0197415fc6bc902_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b053548a1fb076d0f0197415fc6bc902_JaffaCakes118.html
-
Size
23KB
-
MD5
b053548a1fb076d0f0197415fc6bc902
-
SHA1
e1606d05729e1a0647324f066a5e96a9f2fc50d8
-
SHA256
b23ba63f77f3db379e701db10755e9908b82a2d4385a0a22fb086a7017b6cd3d
-
SHA512
8bd013c246e8e452b6b51d1766ee340e1b41ce3b9e76866b8bfe4daced50628178255b261d3084030058ca69333a0a26d0ccfaf69f91bdbb7b6bdc71b0d177e4
-
SSDEEP
192:uWbIb5nNWnQjxn5Q/QnQiejNnXnQOkEnt0enQTbnBnQdCnQtLwMBDqnYnQ7tngYc:wQ/51v
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424651001" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62E76FD1-2B63-11EF-87B3-6E1D43634CD3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3052 2344 iexplore.exe 28 PID 2344 wrote to memory of 3052 2344 iexplore.exe 28 PID 2344 wrote to memory of 3052 2344 iexplore.exe 28 PID 2344 wrote to memory of 3052 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b053548a1fb076d0f0197415fc6bc902_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5564ea461e53e04c631422c4ba69c0d5b
SHA122213a64e7de6af9df554d719392b5a9bf57ede9
SHA256c9ce9fffb2a0741b190130f4f2481ba1e6015bb051fee504a6df7d3208fd6718
SHA512bd41be343409f994444383c463cab84df6a6cb81341dfeea1306113048c774c0cab4a5435897303fd8fe555bf1cef897b78dbe600d1932b091007a57d3cc4384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562490dcab73e2ea4c374313ad2dd6ef5
SHA1b76585ff4210cd62a5aecf2fe5c1537473dc86b3
SHA256fc72c51bda2e9ce98b35700cc693036a47489dff26a66a0ef4adfb4916011466
SHA51226583e4e77acecdaadbbaef8a2b85ccac16471a003ef0d7e84f08b01b9399dc269bf24357790435e25209d853b4e0516a30a7b337b53e27f7320bbe4e49992b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe198edee36b7f61a477501d30a339be
SHA19e68c641e69ea4f13c4aea1d18e4c45d2df902f8
SHA2569844f06d5d37353c7382ef6a790545134c70cdf5329badee0243e5bc9908473d
SHA5128a65b35b73869dc7b3dfc12bc6d6df44d992b2cc1e54cdc01d077d147616a34185d50a8aba994a0e4daf0280137b82d7a309ba8639592cafdc55f0ffe0117613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b2887016020ad10e45d2618b8b92cf
SHA1784d7c98782fbd34c1ca77df15a057382bf143b6
SHA2562f092ef9f783c47192be0ea2128ce6a602a8280a5bb3bfb4ef1b1e6becaa5f07
SHA512099b0e81fdbd346835df92e660422e9ed1b7c9b900ca336b727abab16d52c9e1ac8e90c9f63133e3a7ae4ed3b61835580d4d3798f87427f33b5bfc111463c408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef9128b5fea78b0fc5f068f0e3dc72d
SHA13c556b175c6b2048eb46d88d060d36348eca8ebf
SHA2565906e17572287350fce4994b47bbdc382b789c68bef23fb81baf247bb249c282
SHA512cf078d07c0e421530094c0636683682d63bf58da970d1d19290fe06a5161d83ff29671bf94e190df35bef426c6e49f11671ac27945a7a17b893a9c0b96d10a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32c0628cf1674250146e4822acc8d54
SHA1cc257f50308e5cec623831789cd9a3d940e72b81
SHA256b1d4808687111b5ad7f999772bb342debf5995d4d53912855a7a6ef134575824
SHA51273728641ffc7cc966226722960784f9371c92c6005dfa519f53d01a614d9a4851ffed2b891712d6da87cde4f2b85d687146bb52186689d816831c719edcc84d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bf0c260b96fc953ded099e4b2536d7
SHA16708fb37fba335e97fe0ab9e5da23992a1dcc902
SHA25643be5e83c0b5668c1d296609d980522d049877dd62a42fd107ce1a9878f2fff9
SHA512e639f12eb6d33001c7d94b49cf6b52fda96af966796c3d74a73d5da7687ea4c3f4c45d04ea27f691d422a3ca53426976db241401808eb07309a95d47ed972156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4c482c6466e2e1ac960ddf74800814
SHA1918214b6163f42621cc85873590de9528bf46ae9
SHA2560cd4d53730c7c62f68964b93ef215871dd18bcdec0074483752efe3d5f0da7b2
SHA51269c708e9774d1431f4a97e177f3cd4069a4f92cd1166d14db8e9338ce7e66f2fe36919bb42aaba389f1e85d2f42a3a86fbc7e500ce154b4de1477c91ba8d065f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb36d750110bbbb60a082be71e982be
SHA16320a23734dab3b81213dc421f96396a7a6b84b4
SHA2560cc6bfab2d3621dbc5f5d1b5172cf84fbd000ad62e842a6c34741b50395a39cf
SHA51201ade617fd153a9dad9683ff771c1e24988690913975674afbf09f43262d2a747b1d2e3c8a042bf20c4ba94228bd9d420f3972c425342b38fea87155e73d549a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529259fc518571f53ce2d86e955a8ec1
SHA120ec4f0a1ac66000a7eed269e9409de2aab3e156
SHA2567d542d3a1a8d47621ae865001ac73b732ab4e4fa9ae4d68a1a7d47fce478ac22
SHA512cfc3e827ec7afe8d8e6dfe788e8e37f8ac85f100b364b7656ced57c55bbe903fcb66745d0451a6055c8315d278abc6320fa1267b7e7056e9e92b881e5f7dfe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50175d195cd41ea7b954f1819da704474
SHA159e367c84bfb7bc1e89e659cebee7de34ab592f8
SHA256d02a522e770ec12194eb0a3599b232f85960d8400e367c5059269a1df782286e
SHA512a7d847d8989621d73143de561f67684ad97e8786b3ec450a63d30a3e866046f00070f8f1ab9ae8f72f45a9ebaba66cddbb4aa9489df60e2b24dd7faafa9ca1cf
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b