Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
ad4107ab94ff97b65210fb4c7becf719_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad4107ab94ff97b65210fb4c7becf719_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ad4107ab94ff97b65210fb4c7becf719_JaffaCakes118.html
-
Size
23KB
-
MD5
ad4107ab94ff97b65210fb4c7becf719
-
SHA1
2a3836d4f20a51c0acaecf6f4f77efe1bb159612
-
SHA256
bed0aa95e6d7e4713fd4a5b2cce7536af13535ea3187ceb9ad9113d160f07fe0
-
SHA512
a48f4f450bb4108f759bbc7a8706e2b86e678bcba719514e34ccf56199c7c8e462f1a87b06eed7d1e210d148449e1225b6dc9d2837659f13e7967d903b75b26e
-
SSDEEP
192:uwfEb5nlCnQjxn5Q/onQiezNnFnQOkEntMqnQTbnlnQKdjzvMBTqnYnQ7tnkYynW:0Q/68h0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57640201-2AE5-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424596871" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad4107ab94ff97b65210fb4c7becf719_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6ff0fddb6b0f2116c889fe699abd46
SHA147520e325d40e5da8ebef9db0837cbfcf73c9c28
SHA2562da1a054ae71cfbc815b909d5d23f998bf11753a9781a3f162a786a8c6f52c00
SHA51219d85577c2054e6bbfe77bc88274860e316824273b6b3bafbec2aa88efb42c0b52b9ad5a95e0d064119ed77700c94d0cd39f52036ab00adbd04edc57e6c09263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57839bcb2b9472cfc3883fd8aca0cfafc
SHA1e81f7c5750188e17eb904d8a91d68573b556d13e
SHA256995f820f50d0c1776aa0d29639e222d4726f4beba48e0fc9ec12ed7b82f2b922
SHA512f88051e96f19a85abc2ace046ac01b76a02041a58848c3c110eadd7388cd4e05e641fbe903d12a23a2afc897126be2327680bf4dd18b49f75efeb8cc0e50a0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f53aa6ffc6642cbf6112f11aac3c94
SHA149a46238e0764fca4fe3eb428dd544e3e0b375f5
SHA256f112d65154800f32df56497e3e0c8ec083c4f71cee6f9cad23072315bd897d23
SHA51205e8678efaeb10c33be0b57dc9f4b3fd9886c9e4b7e4fa8ea3b61dc9c1f305b479e637cfa026367441d46bcee3346427b13f213a93451cefa14ff2772a534dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543091ca3cea90d9e0228422d47d7959e
SHA1aeb96695e95b26ee26a6dcff64df9ee31ee0ca29
SHA2566a2cac73c6f8cc37994d2eb5f8258d0948678717bf211adb259d03f2fdd7264f
SHA512f591d6b2980dbeb2285074d4b16df7f28b93bf03973a34a4f9dcb297628a507a6df02c354f1e7a73e99ef82cbcd49bec5b4cfcf96f4c2b4e78dc00d2e8d7aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75668429377f10b41c94b9f641e4a37
SHA1f97ba2978fd37ff7a95782ef3c2337c78d309663
SHA256dadd8e40407b52bb5c137f6ba30fd16ce34b8662bfe6a81f5562671b290ade4a
SHA512cc7a8466c4793ca277b72df20d6eb52e35a49fa79b42bf31378b911f214d7ae013d58769fe2d26423c7fa4a11c343e17c243ce6fb78d14e035892d8560af30df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bcd1c72e37cfd4c0e47b67e0ddc34d
SHA1378c07f9901363cab34a5069eed63f698ae7b04a
SHA2566cbc35e4154300a9594fe1ad853ca1a720f73a3be82842cd65e9449337cbf78d
SHA5121cfe7d8dbd4d18e592784d18aaab932a6dc6f7feca9bfbf81a80e3b9a92e7408377bc3e5b364f2c634c02451993e0746a19146b60d5fc824669f781e9627c2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7b5da9ca707967ef8a8fd53012274d
SHA1bd655ada770a2c948500653e22efbceb4e8071a5
SHA2566ffd306acd1e7b1ae2250e1809b76af20f94216ba358594f69a1e1aa817e9c98
SHA512055063838e24064d64c1777dc894a6410c3cec441542917c3fae7170d1252ffd7b6f91ec43e5fee72237171b2346aa8405d4e760be243e0063f44ff5adeee94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa6822682187f7e877a2fa546d54783
SHA11ce5ad38237f0c7aa18ec3edfa1d47a6b8dff3ad
SHA2564e4593a51ac9e67ba937262d42c1d4e006c3e540d306994028a646bcd786a67d
SHA51272c5136cec17dfa02a84a3c89b332a26c103633b216f688a912c72aef366a4f1d1bddd336ac97377ce0fb99b3dd24939dbf8e76b71be385bfcde98bdb53646de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54238bd2c70af815d8e2806831419a731
SHA1769d37ef900c5cb93914bc2b7b65310eefa3095e
SHA256755b580e30536e7272f066788b6ac35e548608637a5170f9b18168cd55e422a8
SHA512d03a0419d69e4042956e8e3628553e3d7931fe37c6a1bd90da614e57ec628e0e4411e7a2a5bb54c19fd9f238886d6ebc16fa18cfeea825d9f3be225aa2e2a3f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b