Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
efeb8a3b626dcad4682911f8cf786d88_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
efeb8a3b626dcad4682911f8cf786d88_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
efeb8a3b626dcad4682911f8cf786d88_JaffaCakes118.html
-
Size
26KB
-
MD5
efeb8a3b626dcad4682911f8cf786d88
-
SHA1
a49e217accdff83101f4a37deeeaac433ae30850
-
SHA256
e9553d6909cdd12068d84594cc49be2c62caa1b90bf3dd57b3d88325a6c098b3
-
SHA512
263857aecb978b5219e0ab4e866c731801505ddc137b444157014317721edb78b74abdb6456d5c59f6d7c8c6462f3f62d1bc7bedf3fe7a47775a00e415906f2e
-
SSDEEP
384:4+QfPFd9QZBC7mOdMHHwjULN+ZKfpC5IgSnbmFe7Ac26RJ9SYA65EHvcdplcNsPx:Zcd9QZBC7mOdMwHipC5I9nC4VO4vdPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000098d01ea4add04588104011f7070bdccebb2ca04534e54d2cbf754a6eafc5ceb9000000000e8000000002000020000000d035d136574d89f9801a9945e35e17e4272eb4431f146e546288cad78145bd68200000001002871fe7bfa0b3cfa0af3a90bfcdfb903108e5a51839f408b6b5b3019132d840000000b06d327624cddd4dc30385edeb68f986189e8e35aa74fd1dce48123eede2436e211572f95741a440fe17dc413142971fb8e9088a88a7080390ae37b8b3fcfae8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419304399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC5C2DA1-FAC2-11EE-852B-6265250A2D3F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c8cfb1cf8eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2900 2732 iexplore.exe 28 PID 2732 wrote to memory of 2900 2732 iexplore.exe 28 PID 2732 wrote to memory of 2900 2732 iexplore.exe 28 PID 2732 wrote to memory of 2900 2732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efeb8a3b626dcad4682911f8cf786d88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349df31ef3c9db6cb6d49bd32b22a564
SHA11fa264b3b7167f7fd9c03908d16210d99a54c58c
SHA256b8402983de10a039fb5c0d58a04f41f3bf54ce5127be9e8501ca34cfbe8a7ff7
SHA51254e41f237350c86248e879ed643b01daa4296b3a4300eccf6fecb68c0a9680544a5a76aa548ec99d8b63b5ffe4fca08ea80d292db7de9f26af47546fa94b3475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dafa38dd9f61de9d1b835f3e4e4d99d6
SHA196bcd03dd0cf5da8a4f0356ef95567e19e471f53
SHA256dc0ac0967374de4fe34378760db94df68771aa954107d5cb5434d94d71e5deee
SHA51221cd0c60b982e90bf4251c3854d174103195dacdac96a95deba4f7b8c1c94a76f2fb98d9c14e40fa335dea11955c1e0b63a249df176bee88fceb88e44648cfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502002b9f00e0a31d21e104db5ff794cd
SHA1bf874018abeb124d56d08a646ca0368489da0da7
SHA25673a6640f376ce44dfb962e8727e6af1793173286b3bf19c2f861a0ecb1539fff
SHA51211a3a11982ae3c077a139937079669487e9e3676163a7e2bc101128064e22594b2a915ed6c0b903b38e47914910ee09e6a53f5aa818f1e9972905ba905ce9e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc0651e0064cf6948f4f07eb7f4f878
SHA146c5051cbcd1602b9a29abecf3313da0de416ce2
SHA25600ba8421039a5239e593f407bd2887c82da28bc455ddd8cdc02aa0d57ac490cd
SHA5122ce8c84bd1901454fee849d0c43ebeb6ac79f335d317019b5519558f8c3593ee19f8251090fcfd66bb3f91e473126522c6cad5dae803ad14431f7ca0a85867d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51293d0fd16d53485fed7f05a4e67ffc3
SHA19842cc9ca74e3b8930cb9871d70cc2ec5a2a3c96
SHA256514803530cb324d9160af4acd51d81ae76a4aa670245c2e241d3d45372734ae7
SHA5122556bd1443240be9f229defe737019ee99daf610ba451fee604ab0ef25a0b6fa041fc614d1e37524242ae0736d10b943e917882f792bbcf52a2c31c6bfbbc8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe0742a9c59fbbcc99eed504aef5f59
SHA1970e71252d428ffde33aa872806eae8b65ef269e
SHA2565e5d7c02eb096664f2431e70111731670aa4177fadfdc3d05ad155e07e19d74e
SHA512e52faabc2de68e04bb20c90f2a4d157b09e2dae7b7fe0c9ba3c3925f66d48b2e13ccc88231f8126b4d86bb5c40cff3f9d90f492317671e3cb8bcb8b92212c8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5bcc908123b4d757408d5c1f5da116
SHA10f63ba9a3a591e088164a39d6f51047280ab9c19
SHA2567161e86c6967a7a05ffd176f0751599c8a500ab23cde3439f5b9a6521927e3da
SHA512c449c65300b0205423b829c516ddb5d1dc680bde1374ca7333403d0487e3785d3c44c3529b58d6f072442577c7b49b56d8813bd064d607bcfcb3633008ac0e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4224757b833653c40df80f2cdac700f
SHA1326dac9e534c3a8818f2e2994addb67fc66b91d3
SHA2569a3c712c7f6c32bf621a9e67773d1f90b2b5b498ddff3651ef5e99d9fdab887f
SHA51254b74fa65551c4d7275c22b63d758013b0db3d84f556368a881bbc43e006f706cfa8ad87c8e8b9001e087c788b4b4128fd21a20ea2b8551f04c2e973fdc91a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af90cefefadbd0369799c91e13712ca
SHA1584c2552e393469417373bf4fe661660ad2897d8
SHA2561ef1ddc92f7444a2784a09ee59ee1d0fd58b12a8d85ee415643440d19f7e85c1
SHA5120e3e3ae8ec40d1489d1eaecb433e7a0ca484092a634414666d31e93f8a6669ec2f8439a7b03b0a9139f9e9212743584064eb44cc8ffac07bfcf213722d6df991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f335fa5cf6cc0c2369db546a3b54b9
SHA1e08b47a3b0487da39aad46cd5c691b10f3dbba5a
SHA256b029b43046b470e557f1222bbb5725499cb02366d63fa2b1c7d009f46d98e6d7
SHA512bb3a3d14f324548974e6b30de8560af45d454cab330b7d08ef1537788ffe909c1475264d0b7d698a4aa0264ff044fc61808cb71b1b5708f648214bb94a82cf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3e1fc19a2b2a51df190ca9e30976c0
SHA1a1b0ef4eb04a87d29c85961b31f42bc4f642b658
SHA256828ae9ebd2d290d0896d59c618dcc7143ee94bcc4c0a9930a516df161ae3cf63
SHA51276cf8a63c1a39e630eb0cfd339e9a14508efee8a32d9e74457674e3c9b7ce30aff6a864f9bcf184fea3c4db0a904987a530a81ffb059b4f993feca5902fd0d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e898aeef67941e87628f232bec5f50
SHA158ceeca7d13970f7197814b9ce8638b2c4d4cf75
SHA2565d9feea0d794348bfcd57e92ba5a8f5145f954576094ce6485ac0fa4374b3393
SHA51275fb263b4f1dbe4731b3bec096f5b8b9eef6de90d29173a2df22056f38dfce125b7e8b8b00ce55ed0b4722dab75b895741d8e380b123732b2d1d311c05442e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537c6621394c90fbcc21a44edb582952f
SHA1577cc61d6372b05b2908bed07be342b0adcfab9a
SHA256251c9a7929c2ef7d110c4b76fe2be1b130969c97beb0bfb7c27542d34f1c80e3
SHA5127b395e44d61fa8861ac97975d1e756fe4f4d3a7e593c79c160f562a2ddd2a739b7c645afcfcf96f4af5acab969a848f555e894b27c05e76242287d56ac582fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c1cea910494a112c348cd1520440d8
SHA19bf743f87ef8da97a0a9a593e497a9897224c366
SHA256c912edc099740619af5ab86ca1a582dada02088b095b1804ff91f50c9448fccf
SHA512b42b88bffab1c8dd926d0af9575a0d09def9e0641c8a62d8b3b10edad01035982462b31c5b7066bb227352a9b839deef5b5727a554efd11860dd981d86511261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573f74af53dd9f26e6923b82367b3ece
SHA18a7f4bc26675cffc18fc8395a1bddb93e304b83d
SHA256bd0cd8ac3f97ccb98b43253ae141b79ee46ebde2e4c978f2319fd724fb1b0ba3
SHA51285656c6bcb5c4e36f301df9a51de7bdb937a257afa650c0f461a81f1a8d088a34f6c742fdf846fb1810ca4b0004466b7f4db6079a529db381dfb17377e6e06e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e90fccc9806b3bf34170eb6c0ac73638
SHA1c877042d4ede9e220c4e059a158a45a770257ccf
SHA2561cda9bfadbf8b517c20f563dfbf0b1bc9e76daaf1bf4834fbf273e5d63aa0119
SHA5126c40eac08207e0308d36a46cde89af65f59fd26c0362bee217a25700c3f5837fd1da907242a45135f0e42d100634017d9d868611ac08ca110e69bbf0839acbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de6b9a0fb6ae131cefeea822b9d458c7
SHA125941598dc2521cc6be17d05be69fdbe499861a0
SHA256b225182a54bf7287fa1b0c5a31260577cdfd1251f3cfb6c3a13950b254c42167
SHA51226cf1c9b1219d62db8a8bddb8268bc075029a937e3f28315d05f69ec5bd985c02ae6eb3732687744615064cbe635b46805bac61ac4362227ee6ab920f43a6100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bef0ead1f894c0bfab6288acba7442
SHA1822cfd4e4db77eb5c8857c4e523957ca9ff64019
SHA256383065b4d34d598d50a2f58db39684885c34835798fb781f947c731bb582ba69
SHA512183640dbcc5c6b886e23b98283f6da787c88c740ce962c96aa4d95bb67ba12c0e746624b74eb7de9f788f72c72f382ad2f4f3519528740d0f89e443689cfb45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57560bc1d47836c9616f0832d48071717
SHA1367ecd7a6112df6c9b4614fcbdaefda720d0bfdc
SHA2565b54674fcb2b5c4f3fc71fd9028501c856963b55b18fdd00b47701c95368c840
SHA512ddc50d6cb3d95c77f942d57bb64fc44f649111bcec6868b3e3395ebd79c7b47644e3045a3542a4ce4b4fa072e4548e7c387eed220460ca052df29bf7ab066c51
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a