Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
f04e61b06e0931b3224299fe1b70934f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f04e61b06e0931b3224299fe1b70934f_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f04e61b06e0931b3224299fe1b70934f_JaffaCakes118.html
-
Size
8KB
-
MD5
f04e61b06e0931b3224299fe1b70934f
-
SHA1
4bdce69a4589bf1bde02c3770074f49e2365d669
-
SHA256
698dff551e793db458b0987d1b9f4e67c8fe56ed4653d05663cdbdc66880539a
-
SHA512
d0abced7be62574e4988d1c9cee4468ea8504a95da94de15cd3f3285e2cfbd32f61b345be5a0c9f037d50b9a1bea99d087e6f6af26c3e744d657a1ee624cff59
-
SSDEEP
96:KHTvb7Wym27vFWyC27v0Eu9/+8ChyhqrdRUH07q2+h9HX+MYrzmWAWQUz:KHTvHl7vFZ7vdE5CYQErhp8zmWvQUz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d9da67ed8eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419317161" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000e25f9ce1af4b7ecb66d977e954cd9fcc15a54e94bc8cff189d96a7db8a5fa801000000000e8000000002000020000000d5bccd6cc444c83ff38bbc89e43bf14a4b23fac347c7e57df31deca5ff8d1ce62000000056452a153ebb996fb3612c108932a6b7e35b7be34607e86f0ab2ec758bd6cc1740000000b39e3ca0df7379d92319b139ca613457ad3cd778502ab015b14da3a58917475988efaca993eccdb56c1e62960f86eb21759fa437d9c58ae8222ffc786c20375a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{931E4971-FAE0-11EE-8E23-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2632 2864 iexplore.exe 28 PID 2864 wrote to memory of 2632 2864 iexplore.exe 28 PID 2864 wrote to memory of 2632 2864 iexplore.exe 28 PID 2864 wrote to memory of 2632 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f04e61b06e0931b3224299fe1b70934f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546002d6008f615764b3f84d35e6483e5
SHA1373672703cc4d572f85d9de93d95e5ea7fb93a44
SHA25669a55943ab1de9eb8ca2416db6209072d363bd2db90e0d35d821e86ca2c8eaed
SHA51223a68e28893cfa5f09ce0058566e5ebc959b3d14a4524538c7cb9445cbe4a772c742f03cc9eca6fb0824ff5ae68dfd555e1257cbb365eabd9f2d407244cd9348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f87591b0189ae21a0c751d2de61376d
SHA194b86168572ad660382720d58c44b37cdef724c4
SHA2562281ba776aaf2cd3c3d8245117ae54136af596d75cb7139a5da08f1bb7f63e29
SHA5123443be6a074246ae770a2e0983de3c0e1b19623ac438766c39f70f587209f5cb1a01a78c7b20a941a2017186396d3e6624b0599b31af00135e332c9267beb307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0bf15133892c750236a2001183e180
SHA18140a75c4e5e52d2f640ce3754cfa5bbd4c436d3
SHA25675c887d5f3ae23afe7db4ce70b61381f5a7469a1ed4aa10957e856c2f1a0462c
SHA51230fec0f84edb2c0588fe682f337d11268a6d92fb6ca5cdc7c30c992ab32c672c59aa0e1448e56cfafc7d15a51cadf574c5cc9caf731954ab0fdb94da7cb61331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2f6796db721a3bcbc22c99f223c441
SHA1826b1bad26aa894e74b86e1558e81c47e439f2a8
SHA2569561d9540ca3addaeb2f4a071d0bf675c44561adc4a8dd17bd7303af61c4d7dc
SHA512f2bb373c573923c81b75d21162a659ce957749237bf81ce09c266d4e2125f48b2a4a75321979c2ea1bcbbdb979d4ed050a9b323faaaf98b741eef72468727638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096c90629d1afaae9ecbda4908befa22
SHA120428f6f1cf09788ea628d846d66c5757b6a9c65
SHA2565a0e4a54ba618b6af54b6b37a5b945617c0ac9f4e8fd98950abeef3bbaf1d386
SHA5129d460b02a70dc76132567fe019e7b36d81756a57bcac7d7123924fa09b4fcd2b97fa42a85f9eaf180376608a36c5d19eb0f890a59bd40bdcf87b76f2ec551dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5320793dd4e8a279a389dffce7be5f1d6
SHA17376deba240dca8e8b73dbe261f39cfe5e05e1c6
SHA256a3eacc0db785f062756686364e06f241685e65efe8aeb98253d36764f24122b2
SHA512dadb75461dd11dbed17423054f37fd1f8228444da9528bb0b4517f8933bfa39e7002ab7cdef6a2e27bf3b5122c99ed9019f7db74182bafc931ff4ce6f5d4ffa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694f4bd5a43dbd81d8b89e66f2f24d5a
SHA1232235760f249b30890800e34c8a62e93c6eb072
SHA256d01a852c35680b995851bb4f4ec2519795401437ccf1ced63436a64b4feb9256
SHA51276cf6bd3701d69d482519cbd94f221cf8ec23cdd91c9c1e7139277c049e41fc2a014892cc48d5b25ea4695fa4929bd8eb980471b09635a675af7e122725bfab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514718a0eb0df33e9022ec7162b56bcf6
SHA14579952e6371e6f9565ac8acc267cef56c981fee
SHA2563731b0dad52f37a8f0ae215c8bce88c2e80e0baa3ed2f546b5c18a5a03c497cd
SHA512058cb0c5b4e3a36bab8a4176c74690648b81f520af2894fa392fe6b9463278edcac971651fbbab6c29f523084fd33d21a0005241e8ab965687184a7c86dabc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc3904e42a072ad4f7e5399722fdbd9b
SHA1a8f2094456eabc3b8a46bedcffa6f419d56b67f2
SHA256c7bd7e4c69c18baebdc67cf2e8fded1985d150925d619c649651486b664f2f8f
SHA512275639c2b6f159d0c533d52d5169c4a6c7146610c0ec5a53f61d5253359ad8287477de9caebde40996d9cf5c94b2afe5ecd5ceec6a76af7da9db42501cb45981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fee150cb915268591eb57e45b262c92
SHA101cf282f308f703325c12b8fde5157965cb537f8
SHA2566f0fdd18b2af0cde1cf0c9460687f24e669d237d9bc19232c48620068261f981
SHA512b0c7598d31bbba8bfddcefd6ef1fbcadf5f5b41fb409ce978d9f9d4f3555cbe0389c5d9d978cbcef38d094f8be62dbcb9024112812c01be6f5d6930b7a3b7336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e0bc50113a76dbc88583c39b766ef3
SHA1fae722df082ff4f186293506743d0640cf29438e
SHA25604334244c07d132c0759f7fa33ac50451e28d5fa115d7f54caeb2d11acdfaca9
SHA512a725f22aba73a3c0b981e394796fbbed0a90f2b7b2e7aa62e41bcfa717292eb6f64dda9116106a90e3659b2a937a0fff1016566079dc93aa83072fcaef386455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6bf6eadfc6f99e2b39cf420c8470627
SHA1d53167c7e7487817fe859529a41a3a8934a61a6b
SHA25679bdcfa31fdd47580d7b148ab4c3ae4105ef6926dc62a09aa9d17d089453a765
SHA512b2d287c1d8fdd50d536a92de742fe1ff35fd2fcfdde619905dd57d0549e644ede56cf8346d94f739c5e1a18745e5cd11fa4f75bb7be761d5ff9d0a2d6d9aa490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505084236949b191e0a4f99e0d9cb81ec
SHA15a9e4464527ad18a9b2580992564203dbcd820bd
SHA2567a4a385bb391917032ec41113a4129aca156fd4053362e0c5eb747a6edec1c5e
SHA5123aa4dc2d4bdeb7807687b5c8fc01d40968ba0eb4bb28d745bc073c1cb3b0dd6b3a7414e2e676c7976ec66b18018cc4d14de1efeca447d77ba3e2d2c0895d9e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5683e2b3e588d4853f63b958c90f6960d
SHA13e254043a42c0aad754a9574a4e548b768881f41
SHA256e8836abd3af72687219ef32c97cde8960d31b9e971da69ea877ba86df97dd354
SHA51256f0f33c28fc58425d03dc58a7bea7b55816e69cd7d82e16ecd0512c15328e80ee6886cdc7018cdf1571161a7ea78fdd7e8916608b8f77a92b27c9f5a807e590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124ec9c50bc070a9f685e760eb8cd23b
SHA1c531c9c4efaae930d7512d6830a95570843edaad
SHA256604d64adc704f6b118a71fcf1bea813fbb048c0a1bd2205ababe8f184da87fb0
SHA512ee00a45b5533766ddda06684e835745fa0650a7cfc83f6176e1f2c9be23e19c5e7a3c5642067732881e5cc53f06464561063520fe000c3d485e03daec4d5c25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d138afbc61453354acf31710b0050531
SHA19acfb35f2e539c225f67e8324f775d3ddd50098b
SHA2566e51e1cb764b225b1f247a264a86c840a5b5a2d5a48222c1a1470d10bbd7cb1a
SHA512f2d221192e5554f2d42aeea5d3a1f4d2e3bfcea996a02559225d471a9c4b3f73eb729ebe472984034b77051363e6ac22b0dfa2a3e837c6d448d2a49cf4e61ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59974f9e8f8cd04962329232a57ea39d5
SHA1bea64a9d7ea694295ef5240b93693c45afc02859
SHA256d3a5444cb218fbecadf6b0ba0753f1d8b025a1e11853570e93c3a3c13afc99d9
SHA512615bf81d854ddf108b82828aae08ccc17978edd7fb6d588da48c51438b96593d64dc1700be153159f14cea46d7c99c8b1bae43af68a958162a36ad4588146861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff4f6c4b6ba853408e67d9dc0575d38
SHA13ba5b3bdc9837ee8e42a640742f805ca7caa5ac2
SHA256af7afe4bf11c583252fbb6bb7afb597cdb052572068a73f2f00a30b30543172f
SHA512d5aa4fdb5a56e8bf677ee2480dd07b06fc10a9db441cf113e33467b8bbc4eec07cd78272ee0da60c80dcc3f1c526b0548d84d2a64cb70007a93df3997b355d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8ea6b08c232eaf51f178d84a0eb23d6
SHA1275db06841dd15727029e2127e7ee5255b995214
SHA25676f98b789a5f36070c92f1df185488841de1aa8918b8f5abcddabdaaa646cfe7
SHA5125200d7626795997845eed1c5c41aa5bbf89a60b6e24c61f38a306a77f027f891ed72d06495126679b8dec2b57d8018e294f57830eb871630073746aaafdee19c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a