Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
b0a53f5bcc14ddf553ad162614e83ae0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b0a53f5bcc14ddf553ad162614e83ae0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b0a53f5bcc14ddf553ad162614e83ae0_JaffaCakes118.html
-
Size
27KB
-
MD5
b0a53f5bcc14ddf553ad162614e83ae0
-
SHA1
72e6266e724ac12fbff2e386e26e7278271fe9f4
-
SHA256
73210769202de49e41421aed060cd43762608ff140c740d1cc51df33d12c7c3a
-
SHA512
55def90a53c21487d04fa903c75c070d7319ea07d24a4d9a135a7dbac7d642872b33093a1fd423ce812ca20beca316012fe1f58f9bd0d01fe0fd9391d2dbab86
-
SSDEEP
192:uwL0b5n7SnQjxn5Q/CnQiexNnCnQOkEntqMnQTbnlnQ9e5Zm6uLrdQl7MBRqnYnK:6Q/IwTarMS3wQ+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{209129E1-2B6E-11EF-A30C-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424655614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0a53f5bcc14ddf553ad162614e83ae0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66feb3c53cabe254bd8b6b9bfed8271
SHA14e66068218bd00b2b68e725f2109698a52bba413
SHA256a1bfb25f3481514929682ce796841475760083316b8e158d69440c66e974e603
SHA5126a80335de38fa8281ea31d74c62dcd51fc494c8e626b2dd6407e92a4d0996428948a497ff73dfc96a23a574b7b978a64ed12f192af3d88dab3c21661a82990be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598efcc7261d74872bc2770dffd45f284
SHA1f552198625150b6b9c0a22a0a04a4706e508edcb
SHA256286b1aeb037dace1399da1080a1a8ea7324359d7ba70b7f086dba87f246f972a
SHA512b3574c2b1bcf88c57846c5b739bf514322d9595fab6a81a309f4583412afe7122978e1318a4dd7a368936a0b32eb34fe7518623bc0e22f46a3b8b6319b91d3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10645526410c89bc0847b8b1717e452
SHA141fd6dab6b9ec4301b8606cd45790dbcb4805511
SHA2567c60fa015895c3844a5ba408d867e7a629e247b0b6519b9de45f2b5b96a69e1f
SHA512bec3ce57fbd11d2f7f6c58f12283bab945d8acb1a55695287dd618251b87bec4350a744591046648ab3dd09cc93c444a488065e4cb2be0527a18c90d5fe8645e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da026eed2d7004864d69fbcd68d5825
SHA1c132e1fcd69a62f81b77e9e9d491fb2be94a27a2
SHA256d4d58ba681b6a21411cd2d6a9f46cf28ae72a177ccf380dc38487e8bf6ceab4e
SHA512b9bc2008b442d12448fa5037a248969992ff590fb9ff56642486c6720ae6a0588649d730a2aacd51e54385588cd3c230c7532ffbc1100866d2c12f4ee29798e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d89d1ce8aa230a0d24c3e462eb7b7c
SHA1b18d1214e5f0ce6fff3c3c2447985dd82fbf7462
SHA256cbcc38f7237668b2a21463d38eb7fd190448af4fbfc44fb2a97d1ffae551affe
SHA512465bab7370eeacc269e01c3e5a354b2a9be91204e62b5bc4a86dc4a570d021fa39f38b9ba592320b150ad54585dd9f10dfd3396ae0516c65c25eba2d7e0ed6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ef1bf3ce002f8c1afa6f43bdb0fc1b
SHA13248a5ff0ae5b7bab3bb0896d3ab9dd9f224d936
SHA256c709dbf65aba1afc78e8ab187a3284b59d657ac6332bad6d455b3d49cc8f35a1
SHA51213ca84571e6a7071ab246ce981a54b103c9823f866baf44408796dba57e65b8efcb041cbdd22678a123ae898860f009e9d8786d7cce6dadd33a6cda1425ab4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce1c4ca256b8ff26c0b3aac51b39dcf
SHA1b2f757892b1afa974e59c590a3ca83c09b325e9a
SHA25670fb81f86032f7d487d29a886f8bc74461a62a23f13283608b85c10790bd8101
SHA512e3646c16e98887950639df3ffa1368f8710fd934024becfcf2c44c6054e00c59f46ebbabfe3d492a24b11630cd9794d840c5772f22a7c7157526a2dfdc1d1ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53253ad65b00682d598d957f1489269c2
SHA12ce0bc5534191b20a232942210a88ba5c8837ec4
SHA256c0ef06a9987a3b120112acce0f494dc5307430095390efca903e7c871fe1951c
SHA5126ccc58753c915600f3a5ceda2af293f0b9ac1ef075a15cfb132748148b3ebd4bb96f5d48f4c411bafb2fd7afc02a670bb2c799c96acd6af49d713871ca0dddfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b