Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
639f5e8fcf518944d02d413f992ce3c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
639f5e8fcf518944d02d413f992ce3c1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
639f5e8fcf518944d02d413f992ce3c1_JaffaCakes118.html
-
Size
23KB
-
MD5
639f5e8fcf518944d02d413f992ce3c1
-
SHA1
57635174c0305d91626febce2e091812b9e6bc3a
-
SHA256
404880d561689e6ecab1229e6d9dce1386a5b23f1085a887695e3de83dfb3925
-
SHA512
0ef5f167b3e9418c4d05dd53280964cdc5c4136fff4007fa7bd59d4bb72da177e534241f436dccf7e80fe1fb66147b0b05ceb81afa70ce6e3df29fb98229ff8e
-
SSDEEP
192:uWDUb5nO2nQjxn5Q/BnQiekNnDnQOkEntXznQTbnBnQuCnQtuwMBEqnYnQ7tneYX:fQ/n+wR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{238A3341-483C-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427822729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 iexplore.exe 760 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 1484 760 iexplore.exe 29 PID 760 wrote to memory of 1484 760 iexplore.exe 29 PID 760 wrote to memory of 1484 760 iexplore.exe 29 PID 760 wrote to memory of 1484 760 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\639f5e8fcf518944d02d413f992ce3c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca35d9e30356b7bd7e8524417952a03
SHA19bf4d65f8914256b98dc69b245b58fd5212b5cd4
SHA2565073ea594b1130ece9262aa8bf8cac04ef2652d61b4a6ff6b2703ff57df9f08f
SHA51266798165d21812b599cd1d8cf08d82cc84d3028173efcdb899ee11188dcb992f164ad8f375f6267b14370594a0694e8970a4d4957a803ca072a96deb96a7947b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0119a5a59fcc69f15e6a6ef57670b26
SHA12543447eec5c60318b76f9e3b5d766dd34d6a8e7
SHA2563250029d1271022c69fb490c9f66a74ef8270f4bbbe71d0827e5df49f95e9972
SHA512d7e9e856f60fb77fb6cd4c6c26b5f9e9fac9fee29528057ad691dc9c8d3ac2b074e3f99d14cdb9f2de86e10f7c0a4dde816e28e269c855346396b7dab439da88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7cc5ef4598978e9b0bd83bd70d6c84
SHA1a6bff6150bd47912e7472280aa83747715fe3004
SHA25671b2c94ceed225b6f8729686247f7cfc846d1196ac126b7a8f974fbf2debc47b
SHA5126c79b26eac37b0a1b450774f7fb8d6f3ecefed41b6e6e40bc5e31e45418b0b596a26741a3d80599329bcb812c613f0b3d3af58f607555e3f771ba02bbbdcbbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e831984486e63edf5e71c1b9a765b9e
SHA1a73a90ac32aaa97313bf5c38e454c7577a225d00
SHA256779b5e66e034e932299a9830f3d82f3bda524679f2db664b0b09a818d9dd886e
SHA5123e93e8354467f49814d775a744b292597a8870b0d75cdf1cac62aeeccc72543a57d224db0d7f3402c9417fea90d552303a74de42df8bef88dc4a8ae4442594a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b11de479619bad880f6ac1c79b8998
SHA1e988297b63fafb5d0ff2dedabce163c47b529730
SHA2569b2e51fd6e1c5d2a07f0cb657578efd9cc531ef64050fdf5cbd9e7f997f43ea8
SHA5126ccb85ddc8ee7a8f9d911b71ffa9e8e586576739f1422a88f352c53d966c9ac6cc3a47ed7b2ad860d16ff414fb68e2fe636b32e148c079770007d4e119e8f13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae809938f41418b56f0b63f23d374b3f
SHA1667b5be796d410dbf14ce2df2d133314eac7b4b8
SHA2568ae520f4388618a1dc7186f79bb78dbb40dedff3d55193c135e7c16bddab46b6
SHA5120b9e5a0a2fa454297e8c97a30901e88be7a516d5b8aa3622579009f20bf0946f51e26de79b9922640ad010e3036623fd96cbe9eb556653844b029b5e09e4d628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f12e6786de2c8e29e58a983d45559f
SHA14f4cbffd7e7586e79d05a683ff1a865d74ad57db
SHA256ebc4a5ea215283281471d2d9e23da8909687cc2f77a3b6d913552d80a170ed28
SHA512b3ead9274ccaa57c65c86fc3f3e46acc7dd9c56defdb636d86d318ed5a97ea0cf9eb065d79b42a61c51e8925c1f526e8216240130bb3581c4297cd2af55a78b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babb3de3a386cfcbe63559fde66869bf
SHA1c7a579eb95560c521642394c0446ffafcb878917
SHA256f904ad6abeb949329bc336216c06e744d86cd1bc9feb1781e0bbd63e8b2bbfea
SHA51248d1abee31753901357abc9be08b2a351124f39497847230bb1651d475f2548cc7efdab4d0caccd1ce3762215229c99b1ea9a50e099d4c6f7be9e7c518c2773d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0b2fbfbdbd56c3f798e96d8cf05f61
SHA11e25b4f684fe3c0bbaae6ebdcdc7d436d3ecd383
SHA256d090e40d6d88ca4afde4b240d7a306ec5a6a9e47c04dd472e59364974a1c7893
SHA51257fb475805ce6108d2605ce1ddbd572c2d543616fa46a9ac276bd1a62baa04f2e561c8eb0c059f808fdd8b893d98438bbc7d95d7295363b1d2da2cf5d8ca30fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f74461a132737621ff5d48484ff1d8
SHA1844bd9af6a11272ff6bd02c2315da039ebdeca18
SHA2566b9a01a3fcd88f7c253bbdcc70b33ff40c903fd6ff848803cd490c1a188b4928
SHA512baf7e1b66afac8ee44aab69de87d0cf63a32dbda21ab5ad3e5b3f417f63260ebb8ffc08a401eecb1dade7d5cc965f964b0ccc4ffacd384ce13f3369681b79327
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b