Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
b5cf226376bb80cbe5db8b77d9cd93dd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5cf226376bb80cbe5db8b77d9cd93dd_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5cf226376bb80cbe5db8b77d9cd93dd_JaffaCakes118.html
-
Size
34KB
-
MD5
b5cf226376bb80cbe5db8b77d9cd93dd
-
SHA1
3dbfac1efcf6203700feffeeeb23ac82e66114cf
-
SHA256
5e0c1871838e7df0f8c6263f9577a6b899c2e2ffc6eb2d93c299a1b9d3672fa3
-
SHA512
d2e1c7db5a4371dbc58772ce06ee1d7a324db25fe5260cb8624f2137fc0da04785e17a1b0ef67725eee44dea0c74b6686deb9576351bcdf0cd243a9a7c602f15
-
SSDEEP
192:ReYok1vRb5nGnQjLntQ/RnQiednZnQOkrntL4nQTbnKnQUhs0wVwwVlwVYwVjwVp:wYo25Q/DYo+6T
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424743401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{851628D1-2C3A-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2176 1704 iexplore.exe 28 PID 1704 wrote to memory of 2176 1704 iexplore.exe 28 PID 1704 wrote to memory of 2176 1704 iexplore.exe 28 PID 1704 wrote to memory of 2176 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5cf226376bb80cbe5db8b77d9cd93dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec91b5429e58780abe12512c9149abc
SHA1690257e01971ca5533d810cfa9982309223f7518
SHA2567feb1b9e585fa47741e5eb38a2d1e9bba658ae05e2b22e7bc7c32e627fe5e4da
SHA51214fe03329742208bb6a8f13217cbd4390b027e64adcd796576c73e878eab8385e84aa537740caf3f8baf1e9dcaf15f35709657865209d66dc3c624687c3bb638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f38c60ba565bc4000d5815b926b274e
SHA195cc06ae6320fca8260fc3c787c30e9fd89718f6
SHA2568664b3e2bcecbf0acc513d5182740b08bfcd7d365b3f3dd3673ff7cb84fb5089
SHA5124e1b8a50c6a89921708f1fe33fcbb706e855b1a2ee1e98691ed565a5412166a17c8b7f07c98a6e57b047da76e81a96ca0d42c950256856d908fbe33aa4ae9db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a05caf37497139a567027254166ad5
SHA1ba7cfdb7bb380129c06254fa115cc7f43f8b8b54
SHA256ad330c026f002122959d341004b76152a32a55c3f707c60385ec558afac8752c
SHA512d1df4bd9eca9210ad254a1c7b266ddd81c44d02eb9dde8e9f5ca82659f4cc0c6de4724536967b72aac3105ed8ce6a1611b3bcd654b6120b1159337dab9ece667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50893b0c89dccba8f8fdfcfe2fa2dd903
SHA1e55503d00bfb1502fb3bf56082e85ba2e3fa001e
SHA2564c48fad8a8aa28da5977458e4835bce137fb0b890aa9f1240648fe37cfdbc41b
SHA512fd6be6c8cbbca479f5833f1629c0434c696a80dd5ffbbaa6ea763639a342ec5bbb9f1edf05d11f3decab91359612457057f752652e84ccdfc5fef620699d1e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b5370e4fcf94fc2e7f576a4ce2c1f2
SHA1fec1102c751eb2ed8e4f2ad5f87d928de27a7899
SHA256bdfe96b743935504bc62951c17437c47a5cd84549fa1bf2371078aaf546d7407
SHA5127b99ceab5a03b95984807d491f550f96374ea215b3fd2a31674c153b7d0e98cfcff8262e1e246139ea3129289cc4c9e978cac102eab1e0b3b34f3f28fa8dd80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7508674ce35f243a331a58158cc33a7
SHA1991f68ee983b2a4bd353621621cf9bc3e8a6c897
SHA25615818d152e978dc61dec739acc27d8ed46c964f585f0e605577a66c83df79dd2
SHA5129033760ceb203f4e6b650986fb133d2b3c686f90d1f089a66083fa979db05960f040fce3ab12840e89c4c5ac95cca88a8d24f9c5cf5163b00c6cb7ce1c985827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d1fe74412c988c80be642f4cdbccf4
SHA190d438660713e073f809de504846b33191e4b7b6
SHA256a5126fbbcd7cc8113cefc3726fda4e9f960487a9ecfb8ce0668191916c28649c
SHA5120b26a1bb7e2bc7011944393cb6c7df37c182bea7397bfc4c11b3066f6ec5b56a9af2911b4b5d98c01c718cd4a7e68af392bf83de12b9e6965e891fc27fb34782
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b