Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
bd727a49d890bb831644218c9f45d329_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd727a49d890bb831644218c9f45d329_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
bd727a49d890bb831644218c9f45d329_JaffaCakes118.html
-
Size
124KB
-
MD5
bd727a49d890bb831644218c9f45d329
-
SHA1
250bb823ca27d604286cb8d445357ddc144baee9
-
SHA256
6c6b397f2a1d41095c4d6f43b4a018f58d796aca2804cc98618f4479d15b48f1
-
SHA512
4d1e729d11271a8f4e5d9cc60783409b04db72df426c43cebaad7cf73c60a86bb3122678f8282ce8a5dab107f8f408d1b15e4fd3a9e022e91ac7585e9210a4ac
-
SSDEEP
3072:p/xPvLFmE08Ety0wV0WSTIJVl4GJcfbJYKnseqM4tB3LSUE7Va81U1sTkromeMD/:lmE08EtyfVyMSGylApLSUE7Va81U1sT8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44D9A5E1-2E5F-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424979086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd727a49d890bb831644218c9f45d329_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f1cce9c4c16c020469f421b3fb367d0c
SHA10830a5aeb8e16a0ea5cd33cf6d297fd9ee9258e5
SHA256b019de36a94a5a05fb00a15d1df0ab4925e94688291b279ce591fe893fcb1d5c
SHA512ad6a42d52c1f22ccaf827fe6ba94fcf5648c851d022337d9d26dfe57427481fe04915c555ea25814498b53d10378d0375a5938b4f6907b2c4a87c54a85006fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8027591be4fbb49590ba955086edce
SHA17f38d0db7ae82d966be7efe823fd0eed67558d68
SHA256b38fd9cc7595871ef7dfb5a5fdb42fc5f63cc4a15d7be91566ebe035052c98ba
SHA5129d9d87369b3cbcff232f1160a04f33a93f81dc02428e13dd61dd94eca13e30449b9ef4bc3350d13f9592904ab694e25482e34d466cac4847f41f964a42bfec86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3de6ac1f2b7aebc56bd892acffed719
SHA1632982b271e3a5dd7614fb4ac80c752e546e6dbd
SHA256091f3b17306072e353d01760de760deceb22f8fa33dfb50b5f1aa2bfc824b0ef
SHA5128cf3b9e367468a47d6b924db6c29d0dd2ebc08c8ad2dd1e46ecc06466965fa5deff85a01e9eb09f27b99c548401bffd8cc040730798e8710962373091c7158dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759b124321d5684e58da0f65e0ff12fd
SHA1d9d52c5e07b60c9bbb591d0f3a4e491a8a2e0dce
SHA2563e3db992ae323496fc97992dbff7b441f65f7f0afcd8e71063074ced7468b099
SHA5123cc7fa5f142cf9040141dd5a41f19b261a84754b8750806fd7ce7cf668206f150f3a278b5d8fe8a74d700c61e9b19b186b70fabab9358efb1eb82e524fd45a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cd21206c6c47f14f50a0a8413c8597
SHA1b9b736299e683d93347c8816640ee0a7d45aa8c7
SHA2561fbff6dbd1fc89839401a23c06b11a7918c6d9e2f890b1de02246ae3e2d4d8e1
SHA5122b3f2edf27644e12d4958b881b505175005f8154f6d47fe3697d0c68515ff45bed30ed10a0367b7c7735dde86b348da6a91560bb5e2be400e3b377a4f9586b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081905103bc4e5a8006402ca0beefc43
SHA18f9008ff0ed721d20e1aa7375b73936e1574d1e5
SHA2567ed2e32417ebbbae47da881abcfda408ea469b366cad4ad2478bcdbd54f7a1ad
SHA51221291b3317a352565edc1a002ae992a6a194043c9f6be31c321f11469e8447d45aa562a3429bcdaecf9e07311416215f2e55a613d6f66917ce562c5630e53cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44044a728f5f94a6af360865a26f232
SHA10d743e09e2bb66d913fa7b7710474dc1d2d573c6
SHA2562016cf741235ee0a458713568f8ba1eea4775524fb16ca569801dfebb05574fd
SHA512482332c571a350a394c4fc53ea33f35f8f6d87d2d12e05e6410a1ca710f0ac7de0536c0a0bad8bd4c95f5be9813e39d452629053b9e80b822875b6418ea9ff7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca9392052f2163ffa50e5697f415eb9
SHA1137afc894fc949871279c0042ffdd7fc10049d06
SHA256ee1e0fc262f924877556701232622ccc9ff2d7092a53627f50110c301c6b1c8e
SHA512e391ec54ecabbb2b93ae133bac2a6ca3bb2cd0e7394cff2de7b27dbca6ef9553c5e67c44e0fcc7923d37cc3f1fcc5c9975147f615d03825503b58f77751e3e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551235958327be09a77e4f6cb8625f274
SHA1ca7bf454589d7cce50b33bb142e6f90a40947fbf
SHA256b5d35dfafbafc9d2ab3b7e42e0e58b3032fe9babcf51989aee487b082c05b5a1
SHA5122741f606abafb7925f46cf135d25f580ad77b955f7c9faaaf4474bc4113ee4705262c63a3f1d75cc4f12757677618548e77f91b4c376375ee146969deb04f23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb948f1d271591a8100dd1377c2ba96
SHA186a98de258d71a3a486845a80027ee2256c6d541
SHA2569d26a7483795c543c50a0afdf52ef7494ce819ae5a47b187d654d408190dad08
SHA51298dea1a3f83a0b3c5ecffc03ec04d4706bc254faf4c0857bd42b366443b7ebdde2cc3fb88a5c3a0a43e03d07686152e5aee8e07aee1927c50731566b72d417e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dab19e373b0316c04d9349bef5e7503
SHA119a12b300f694f5c4df937da2d1bd4e1c520b295
SHA256cd8c3643b3cd3dc69255c5fd0aabfee6252f1bccccb5e8e26d9d03742e213c5f
SHA5122aa80f29733251ac19868e3be4028e4c1a5846c52443a0059935ffa4e026efa20f84ea505da67f45958d999a29330cd772ece56626dd98934e533a5e7dd43ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c62763e4aadf7b7e6a5360a47699bb3
SHA132b3cf101fcc58bb8b586c9cbd0b40d951287c24
SHA2566321a3d689f915f9ef9424415c103ee8327c123a12b9a373858ce1df6801290c
SHA512ae7cb6d9a8a5a50618372fb913ad15d1827f4640a4c5084ec4ff6cd4cfa8525cb2d7c22f4e5b985f9ae2f47ed2c13f546d570dba25fe6302f94ee8f4bcc6772a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a437bd1376bf1e53ef2fb8910d8bb87
SHA184724807eb51d0561ec23ee78d9616809275e81d
SHA25632c972837db63d44969b62308d820587c6d7e1246196a1d8e34dd6af8a1c19f7
SHA51208c07bb7e2f59806b28b6a3b4e0554aae4106f3e674562a64c7aaa0921e0c13501b7c50829b8c748c60f274f85e14948b7d3401f77424b2991c9737057443b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a9f752edbc52fb44fbededdbb68fcfd8
SHA13fe93ca192b62045e171de3c053e09ad7de631a6
SHA2563671951a425d047d74ce16406aaa38f9b3f943b7cf4c17b1349a72eaeb02ed92
SHA51226a9808e9b034fe427a180847571aa9cd28e27aedcd0456a39b7f66b45b00cc5dbef7f968a3242da245e0c45eea7fb263225f2be612b02cb5f51861dff8510bd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b