Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
ac88267b805df976640eeebbe2571a00_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac88267b805df976640eeebbe2571a00_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac88267b805df976640eeebbe2571a00_JaffaCakes118.html
-
Size
27KB
-
MD5
ac88267b805df976640eeebbe2571a00
-
SHA1
1cf45cfe4214e8d062d7164cf640bfe4f26d1bea
-
SHA256
04074de9ea2bf2a59ea6f7229e77066ef551ec6a666996effada45762a84e8d3
-
SHA512
f3479f1dd7ef63fd5db1cdcbd5bdf5a2f9ffd328aef10b505e243500c000132f6385ca2bd17f45564cf1140f1d368d4f1286625bac1eadb323d25893a56f76d5
-
SSDEEP
192:uwzMb5noOnQjxn5Q/bnQieaNn4nQOkEntBdnQTbnBnQ9e4Km60huIQl7MB6qnYnx:tQ/whi2ubSsj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424578892" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DE47D81-2ABB-11EF-8A4F-62EADBC3072C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2252 2372 iexplore.exe 28 PID 2372 wrote to memory of 2252 2372 iexplore.exe 28 PID 2372 wrote to memory of 2252 2372 iexplore.exe 28 PID 2372 wrote to memory of 2252 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac88267b805df976640eeebbe2571a00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cda6ca7b1c8e9c9e1bd8607ce307e0b
SHA1cd1aac31c6febd8c2262283df04457b3fc9329b4
SHA25664ef58b16e4941f5a8727849aab77751998e5a566972defc7a8d6c585793fe1b
SHA512558a85036ac7c885ab4face645364ca8076ee8faf67fa40b3eba91445a7d444ee51b06ed127103a5751c0dcfb7b102effdedc771145c57455f17dad57b39da68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae81333efb555313da4b54bbb06fa4e
SHA1baa2c606dcd0b0b335c7a5715557e7e3816dc0e3
SHA2562467b45d5919b1c56b885c30030cc6109e6d90223e459948dfcfe94f641ff3a6
SHA512b680146ce198028be2157f9c4929815d0b8706b57c819e0e1c219dc15580070814098650e3f4d4ded0352fb6797018fe712fedf43b46c2af2a248403224f1ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b69e93e6a79e57a785bf90d9993601
SHA1145dc306b2de63d34cf7534cb8cc5a4a29372e70
SHA256b3cb700543a9ad0c742ecd0abb1e198596695103197228c43df7578fc4bfc923
SHA512a623791798d0b8b67f9f671a0830d361620623258699122d2a82ed6a1d68f91c203f96c5cb258c795a8dca71521a309808b8ba4c8d09a8fc43e50173f5d6953c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1f777d70b752a576f41cdd32901cb4
SHA103bb90fd0ee7baa52e1f2174abdbf67e9d223951
SHA25646f359d0520e2c4948e05e66369b61101ab707416092a3725f43c9b9c57be7c9
SHA512c631d30103fda2ca9ae6711ddeb6f815ccfc232a8b0c52acc94ab8715b79d8dadbfac5e20adbeb5104f4ec2cf387d05d52a78a2a96e05ee0f3999e049e536db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a44515f4cef50f8159544bc8459c31
SHA1684bfb33df220d62c18862e7368d19ce8e528f7c
SHA2564d578d21e181eeec18a39989d88be22f919a6b5d85c95da1d8d8971f59627f18
SHA5124a65bd94714cc75fb2f1195a3b2340a24bc7047d9f6e1a6c9174a607728d5384d5e11f73de2553f360a2785c0c206e77d8da7e36dc7c2dbd0569db47639c0ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd643c26336921a48b821a70a4eda52
SHA1ebf7650bb43e13963444b211d0f80c73cb3a6548
SHA256833b371066b3210984c5fbe84323f23f8253f849c322242f06cfe174304bc8b1
SHA51271ace6423d6c0f745d45e1bb2a6bc03ee222316f685e7e3d348d37c36331124156bba24767f8ce493c67ec3e018d1b09a36eaf1519808ba3ca44540aa4466a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2b4f0e45a82a877d1b1c39ba150537
SHA18c2a2af55ba47d441dfa02e9813337696970744d
SHA256512e89c2a66e4b8b84d4f00b70e30cc35b051acdb3a5fb88c2aef6ca5f58dad3
SHA51243f6445016504c3ed020b0002a809ccfb3b6d2d3734239fba1a022a34bef0a0e18ff7c273e94e39826e24b701f55fc2569e8e22c89588f3817fb1b8e24756a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7013140c61b013ee12e1126d0e7e000
SHA13d4c5ad9b5ee202b74abf38dda52f340c7065db0
SHA25689c32d73538094944f7fe0333134cff5feb972a848a6cd7353b73372020cba71
SHA5123875bf96e099ea95846a13ce288ca6f1b18338cecbff899d6928194d4fd9e51c041758d53dd6adf21307219b46fa0d929adc8e1b4938cc0bd940a14840c7193d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b