Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
48f8f874e33bdb3788bdbc2e3f673bac_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48f8f874e33bdb3788bdbc2e3f673bac_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48f8f874e33bdb3788bdbc2e3f673bac_JaffaCakes118.html
-
Size
53KB
-
MD5
48f8f874e33bdb3788bdbc2e3f673bac
-
SHA1
f10a41c4f209aef94d0c14baf1f1f6cd50f84501
-
SHA256
48a57a83fe696dd680da043eabc43d961d73095487359f7721b996d65fe5b51a
-
SHA512
27c60764c229ac9a17265cc53c0f83f596cb47032ab1e536de7fb4af5778c9ab4d04444925f1047fee00afe6ae3ff03225509fbebe6359640cc1743854979ef4
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYt63Nj+q5VyvR0w2AzTICbbjoq/t9M/dNwIUTDmD3:CkgUiIakTqGivi+PyU4runlYt63Nj+qz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427193520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25B98941-4283-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000000deb1753bdf99e566b334c200a4c882e13cde67911552a4df358c4325277a49b000000000e80000000020000200000007f3f8ea722d4e11dbb017b9bac60590d3396486c109acd843ab7ef8ab30d7f6320000000adb5a91d5a0fb28a1c796be62d8e791aa9c306857542a08b28806a89df7e2f0b40000000d5598491782d7876dfd825037e67b2bd7379dfee64329d6515af23168e362a858de40259a9e06ed643516de670753bd8521fd30c08c5471bef683c56ab611a37 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7055450790d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2296 2504 iexplore.exe 30 PID 2504 wrote to memory of 2296 2504 iexplore.exe 30 PID 2504 wrote to memory of 2296 2504 iexplore.exe 30 PID 2504 wrote to memory of 2296 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48f8f874e33bdb3788bdbc2e3f673bac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb96116dc08a83e1fe2a3bec9848376
SHA1fee0c8d62f7c772d546c97d908091f4a84dde6dc
SHA25655990f84694bc521cdeb512ec5d30f21dc3e39c84eb7b7d6c7a69186234cbf24
SHA5122ab5303f995718bbf5c782e62bc06bd03064c86db4508d601381309b31cab601db5d62b294a382dacea7d02079158d9b69445a0bb53bc99cb0a0c8d3223f5efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93e890e3fcf83f61f9c53a0882b4c25
SHA118901fcde9d52947dc17b2b6d89b4accf0d82231
SHA256e45189d0303939f157218ea306882355a8a2c0477ee7d1b31f51d0d0ca478d19
SHA5125dae166e6d87bf2fe1c47ce40c4c7fb26575da4a7b0322b73b8615f7adb22df2340b2c8e4845b3f307a48cbef8f8d3912fd936886ba8ca6d94b68f9af01c57db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e63ac74ec12dcb99ae59f060206421f
SHA1a400bb686104cee9f8ebee6766240edd0b56d45e
SHA2561009455bbbd598c560d4f5b5b5356925b88a692ff4a161e2c7569dfde1bc1b81
SHA51280e681c9bab2ea25927c48df125ae026a520f43a5a048a6cf46887a6d3017bed13e4e09c60757735361124157bf5f1385cad6856f59bc36fb593d16da5c2d6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fccf8116cc2bc31e5f9f9a97717d79
SHA1eab08749f3b36279b0ae2493b078e76b909b58e8
SHA25625cd09a2e3ae60635ce71183dec36b98ee19291d8e26177c655686c96c4029db
SHA512793881ba1482a2351c965ef713fe43c54e61d5c4e80a5056caa78f721a70124eab4116e603e043520bb35cc67062a4f137f04f6036dc4b6f8260bf2a1f27c916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b363e0bbe0aa6085e24b156260b3b8e0
SHA16601843d9d4beb8a87450a5cb14802cd9fb177e1
SHA2566f64a03a6c2aafd9fc3526e4ea533c71e7c8b018b0e2081ad3ecfc967ddb3a47
SHA512ea8c003f6c1b9e1ba15ce68256620ee222bb5d5431adf8b7bd29de1c567d761412b72a2cf72e5118edc9ea5a22086622c9fd95dc9afd73c428584c63bdf578ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f5145f23687fa569b3d0ce8b8217eed
SHA1bbbb945f5834335b98360f748695d85005158c7c
SHA2563ef62f5e51afd6c8408f453a97cf7e1b1e245bfd655b7b7b6ac0560ec57c69c1
SHA51293f90e8bac114e732f404339283840bf522e1ab3e85fc5de98dd3c6b49d30f6c8518b7b06991e060052ae5bd7eef9f682821fb1e398540fada5c4b456414e633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51963c1fea9d875678532a356a2feed26
SHA1f0a9e1ea186fc2728b07f6dfed2bcbbb30f413d8
SHA256f2f2df5bcb7df89d613568433cc7c50531dbd12076d221c15fd3693e2cd1c6be
SHA512ce1ace4ed1f8a5a90e2aa1311c9b1f6ba03646eccf6ba0625b01043c3357b70fabf1f65e36cf1b6b00c5fc91b518261c38275414c29b8ff6ec76164f98f4ead9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\star[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b