Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
181914742cf02feb19bb447147281fc0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
181914742cf02feb19bb447147281fc0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
181914742cf02feb19bb447147281fc0_JaffaCakes118.html
-
Size
33KB
-
MD5
181914742cf02feb19bb447147281fc0
-
SHA1
4bf50029bb08f5f177505f85b4e97a065542bdf1
-
SHA256
65da83127b676687277ada16eac0ab75c865b7eb226bf78d0b9ef686d0945c4a
-
SHA512
02636a377e5ae06cc65f49e9e5fef6ddf6ba8ba0e57e675aebe33cd67260f26c2f4ee4bae189457942ac4e1ce17420b46e784318c7ed965fb3cff4c48766c277
-
SSDEEP
384:SL2BRZrHOol4T+iSvoqftfTrYLD9oJOKjgD8mFZAZP/LXA2a6pBK5exN2D2tZv:SIWo0JilnKo3c8mFZoPD/aIBKKN2D2t5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{750D5AA1-34E4-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425695998" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\181914742cf02feb19bb447147281fc0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD552bcd42485b09d56d8934953c39cbda2
SHA1a154b76bd5feecc4051332d3765a79e0d2d7ab0a
SHA256a4f2252607fa9b8707140a69230f6d72e2725085020dd59e4a1a6cce0bf2bc5b
SHA5123373f3f00279b24e63607f6806003fd167d67e693aa393caf24c4d0f534fe030f3bc34a5b2f04c164ce3c6870bdf3abad7c59684d7baeb64683ccfbdc903a624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4351fda43f5358282db03b91e50090b
SHA15b739d51d3a344c742b7600386032dc902503b4d
SHA2568e77e699ebb652f0c54df6705af95ae1c7502bba391a87995df39a951d4863da
SHA5121e185fbdd240c48b355f168b8f6536f11d943182937b7213577edd0f7283dc7fbe8d78552e8faa084052f8a79da6ff64a62c4194070a8e949410195f00775fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab14eb9bfda7f56917e797b0f624ef99
SHA186def412185d82107963e74004611f353ac58b30
SHA256ef268b655ad71f722f98daf879a24380581290dbede9031d09d19d786c7f8419
SHA512b694a584f48b2b23cb47d90fe66d4f5585d1f5d2091faf768a1648d1323741db23666901116d96e6490173ef1680e63f5cf7ed65f143f5a21280490bec03481a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac9bf12c17bf229987beca0a08a8f22
SHA18f1ae4716de67f9583dbea000eb6ba35befb256e
SHA256136c04b14a2ad4d05f05feffd06d92e35cebe5972809e6bcdfd65400b66b7575
SHA512d61818de3542b2c7bf57f5cc8fa805f31248a2dbaa016b1220d2b88d80bbf75acdac46e7bdd9275a9350b63616145a5b566e524da9e07be09d1b49ce94ef9e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57385ce6ec44bb3ef59d33fa538f3603c
SHA13a4a6a8f0a21c0e5ec68eb5a762f85e799bcc07b
SHA256cbb995fd70965d577f5614011968080a8df262efa91763c9f764de69b920d829
SHA512c47b672fa0814e41907b480ee03274d96fbcebc4f71913a1f4bc1f149f043032d3fa8e23b8824186e734169dc2be2c3a5ca6485fe6e5b99268f2277c22efdc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532fa12e31e3e9ed02a4d62bd9c22235b
SHA15b93078d1438ddf070ee3e5a68019c41568580e1
SHA256bd469a03725a21dd738c2acd39293da1199a9ac529022a47d278617554331c09
SHA5127e5a624fe2b364592c41a0bb5d4970e753db303cb57a9ea90ef4292836baf9d64680a6dab1af19ef02326c69910848c532111f35a907c9942017288eff19a50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee5d557a5b76a0dfd7adc916bdab0c2
SHA19c9580bafb8bbb490c01a49efd1ff7adb06e6ccd
SHA2560ed0b46a30fca2f6d993878e0be716899df6a740b151b73264325f1a5c585467
SHA51296445624c52809268346320dda2f98db9d186a08b2272c6061ee34df2ec6e514a178597ee8996cc97e3ad9fb737d588a0a1846cc236fb6e92a8e16e2e547c536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53843098909d3e692ebbb793e3d4b1c22
SHA19eca77809d5d0c20d288784f92a55d9ed58ee232
SHA25635d5880b32af5b9da4a5f50494e13d95bb29e18258aa0c90601cb41ffe6e727a
SHA51241d7984799cf151d5e47109b46a6bf731164bfa7c601b993fc76973242716bc2570fa9a76079ffeaa53b0de10c18ec50d82481e5765eb371bc2dad657a888d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528d72d647bac8c8f400df3121d3d138
SHA1e8a4b932d0da8dca94cf4fd4bf8524b28b1cff2f
SHA25638155adef786da621a33c8c8c9178f093b7213d4b87467b5d2da47bedc6f6228
SHA512c4a05a03a06d71b32b4c72629ad904c55ec246ed7e7e7807458fb2b4db4702e6b98473ed57e10c642c432cdd3dfb448e89d7476a14bcdc2a0ad663df50afe17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51035362d00d7aae4a76b88d056245181
SHA1cf529791ae51694a35516076194ef48affb8bd52
SHA2561ac4a74e601225911496f43ff29e526052d48152154b83634f7afc13fb009280
SHA512fc02dd7550c47008b4252ef53aa324a052227f5cfc8fd2d9242ac2839497b3a6d8d8fd9e55e397afa4442fedfc4b548440a2fa7b4e635a6a909fa058b818cb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD5a4ff547403321006ce0b6135fbcec487
SHA183f7ce3606b16240e821c4cbc5990a16edc763ee
SHA256f504fd50d3a566136c2b08c6ebb654d4293e43b712d34e1ed1515678b24d23ae
SHA51289d84cd0ac3efd43cb251c877dfe35b80bb9104ac5cb34bfb9495b4dbd80435c1d122d59bcf9b228478741613df39ba8fbed2adc5fb3145fdf39c12bc4d298ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b221cfda97e77761f5fa67e3b7e5610c
SHA121e08c50fada4326717ebad15ccd4636c6b1173e
SHA256598b6da9ac8e1ecd7918b40840b8dc1c798db2f49f9d51656afad985ff4f23dd
SHA512e92710378f1c812bca96abbdb970227d80ba2ba7125c049afc64d9f1fd32929b3d1e2eaf664f2595811a99f2f7394314251cde97e7f9feba084385ccb35325dd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\cb=gapi[1].js
Filesize68KB
MD5498c0b3f1c4a4e203c582742bf620460
SHA1fdb865695b0bff53c3b685bb534dde4a554be36e
SHA256aa74c9cc296b2dd408c4bdce73bfad6bd1b9ca8268bad036dfdce271c9d21072
SHA512879244bd19218a8bcf5faa946b845480c0c44be71592310f3491a81b9db547b4abca073246235d08fe49ef6e99a02e988acccdfe7c15c27aaccd5f02321c4c17
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b