Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
f057370f6fe46e63a44f12b676e3669b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f057370f6fe46e63a44f12b676e3669b_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f057370f6fe46e63a44f12b676e3669b_JaffaCakes118.html
-
Size
2KB
-
MD5
f057370f6fe46e63a44f12b676e3669b
-
SHA1
2fd702cdb39774c94c9c8001f7eb39343838bc3b
-
SHA256
bfea3e967124389d6a86a32333d57b6d489459a67e7d1ae2a4b2034f1bc19278
-
SHA512
a2ee050ddc1b8dfe757b35a7d13832b9ab947a5ec5abf05a1a4ce43a7343225e3d61229cc962eeb4c120a720f16b1b44520c2514329a40b4a394f7ff22d4006d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000002808d9e2e1429e06ef5b3c2d146da0a35e9e46939fb951f6aa23b76dc4275a35000000000e8000000002000020000000a46c130d2c7388256100820a880438bb458ca0a076ad189c334e633353722edd20000000ba92bbdac22cf58f1657731c94935f50ddc597c91f11d9f9d3004ac98f4fbd69400000004eaf5629d12c6319371a50d41496134d0cabd5e51fad0217fdf3832a1e2d07c8a11653dc14ec3b75b51adcee73e9d303cc10205cc052b16701606366621629d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ddb6f9ef8eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24F87941-FAE3-11EE-A66F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419318267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2800 1444 iexplore.exe 28 PID 1444 wrote to memory of 2800 1444 iexplore.exe 28 PID 1444 wrote to memory of 2800 1444 iexplore.exe 28 PID 1444 wrote to memory of 2800 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f057370f6fe46e63a44f12b676e3669b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de3ac2c2006034ab99c92fb106b11bd
SHA13c59fde003dd4a6a18354cd765d9389c6ccc0599
SHA2564c11644794e540553b61bb030472eb8e3a2a34f18a58e1d69e404882dfd7f398
SHA5121f3ffffc7063dfd165a62c874f7afd07ccbfaca7f73a34aa1c6d7fa33eb471f2714a43d97776a630a6b3c1ccce375d9f3ef4c17a6765fb639daff51fa24229ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53baf7be6105d4611b09d812f44d6c8cc
SHA12359b9710ecba47ff457831954a78fc5f6874ac1
SHA2562fe12e3164202314b68b1884049e4b475b06149c88931e4bc7fa9493ce21e5c9
SHA5120e0f2029f778781e026fb8c65616156af42ce7caaf9dd8f8534a8f0ebe4427f94c9ad0b3567648d55ecfa3055e712c15ac031358535370e161a08d8ea11ff573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51706cdfd22717f606965e1270a1fa0e5
SHA1b419a11bdcb795f3dc44600578463c8bf3940940
SHA2560680996b8cf91152391935ba047d985b8a91c0c36f9f4f3b21efb0c0baf972c4
SHA5123fbd69b7a4b2bc0b8415b14fd160b677b0620c63e959ddeb953856ebb4a7948a2125ca179118363fe32ae478fe90988063eba67d4d91294ddec57bf4aadcaf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7e353891bbfe73961224b8b8dd1936a
SHA1f3dfcbfcc0653c4df87d3f0fcdbaad60c1e45acc
SHA256bb9761eda68676fbdd0a36a9208865b993fd336b8bddc00fbc98b98c7ad65124
SHA5123aa35a897460f284a46f8e079dbc61a97836afdd92b9be1bdb4d041ec7f9afd514532ab5cfa45296e9354470e8072e0ef70a9e1317d0f8f4cda1be843cfe9be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3aeb1103642fd0f432bbd78dd5ccbfe
SHA1466f3b62509c3e1847e9c413df04f5ee087e1dc1
SHA2563866b873bd6b97701360fd963d505506e5194d88d2cd75aeb08992c02e8c1228
SHA5121d32fe40ae5e10b0a1b99a87fc4b682760b1db0ffa5577a065b4865ff6f65e096fbe3a4e5211c8630f64d8b31eb7bf4e467a1a0b80306d6ee32438176cf9ff3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8bef54721900b0e9389f23bdbc1d40a
SHA1d0e03a603c5e56f36b72bd07841d1d0c97ee4ff1
SHA256332d6ae1f08c24d0821d48514db3cfdfb984a0e0ad2892f1b6b2bcd0163d6a89
SHA512ccef5478cda13a8c7d51f3aaa083b690ceb0486a8c746b5f58acccfe44d34aad8b702fe936a5d3c636c386f8cac658c74e9332df6b6c2e72a3560caeb82a6703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc3d47b7ee7278df1e000c00e94d6ecc
SHA19838d7b0a113468dcebf163d9b2e81604e7003ab
SHA256f54c8ace111d3e85da9d5299ff73a5c88d58b78a52cba9cc2cdb8e78cd2bdaa6
SHA5127da961d072b14478bb4cad8b9f6658a4f187b2f40b0035824e47a02676855f86848056654813e89df365260a492eee98ef5f4b81e0ac0be2569bdcf6587debd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a39d6d7bfcff71a825ad19d44858ff68
SHA1f46eee77b8a9e517e8db7f518347ece262fb196e
SHA256c01e4697637e5cb4ba32e5ecae3b1cebcfe0a49c33bdd6623c2d8081db991425
SHA512d00caf9b6830cb537938f2fdebccf56fff07146f2f30c04de3a1aef63b0d06f4520175a6b369d56baa419142c9522fa2a329071a54a39867084bdf3f4ef9a1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552530cbf508cb0fe7d903ad7240a1d42
SHA1b294a3bd19accc009c95abdbaedcd4874b99c2d0
SHA256689af96e078395343dcb2c25be546b4f1afa3ca4f22406fdddc47ea5ffc6e548
SHA512b8f20195efd4c68ef5a2c1d97b0fbf24f5c35a2c0f857ba267918a5702003069eb800c4450ee6122ab5a39106020417e0182285d856b8ce66b30ac7607a8b717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c2ed0f48632e2a9f79714a4763a44e
SHA1eeb18d111d368cb792ccaa217a28fc8921fa9df6
SHA256cc0109eb7c56a52565a6417abc2afb915ba2d86f83bba6c9502c87dcff04795c
SHA51291a88d59909800e947f542d5691c76df0ad29bac7205b74672a1bcbb4e90f352a08a2aa7af2ae756df788f009be720b4c58aaec28eeeadd6927ed8b361f9805a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db95034a2ad6e7a3a2005db9ad5deb47
SHA1684bb35ce13d2fa1933be16452dfad4244a118d7
SHA2567b14d8f79ee07490dfe2e30ad0fa7a6b114a701e1cc5cc6c4e7b38f225b39e8e
SHA512124e47d8301562312a8ccf07d7df773f83a372b42c4e82079417f9bb2aa83944230c20f0eaa164df28945b6874ff3cdf9c98ac61882cb7b98d3aa531233bc448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8c15a42a1156bf88f8fa4b355faec5
SHA1e80eafbbb69db2983e91b57a56ec0e88d14f01e0
SHA256d0fc0ab5fa7d1f16240d99f18eac678c5cbddc7e2a4f0770e0e6f8c6a80b2d88
SHA512431f1f08cea92f5cdab4496361fe591df3a687c21007839f822dbf47edeba296a98e89173b8b4708a98ad2ffa56ad0396041e70cf7bc014c57e3c8f862ad52d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d4652b481b1acea6d2fb52200b864d
SHA1597ac73a326d924f6e0c10a0c0366ae4ff32d8d5
SHA2568d8488de379a9d49e927063894bec76742fd06d4844dac742799697bf8ebc442
SHA51281be2b6d8bc4a91508b10e56f147d4beee7e20fa59123e4f07110030127d54340811d99e9022c7148331705f1cb800ed0c0d34116568a17d8224d673f0bca11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50afad15519ca17bb9cf7955f7fbdab93
SHA10b3804ec0999db532a4c6185f4ac9182b472fc39
SHA256877aa70b0ee5b1bde0a19e50455c67673e29435e94691a3f1117682021ff6a2b
SHA51224083957a6e5ceba5c343d878cd61c44ae8a96402426083d66042292d5d7d25eaf044e671bdba1070143786dad3b34f0f70671dc2b55a8efbed0dcba33e8bf79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f11d198080f013417ea3470806eab54
SHA12c2cd40528a200e6a54dbd6f434b570e6fe9fece
SHA2568e3e5dd257fddc074f80e663f0d9d3d681217fc1800dab97e167569f643740e6
SHA5127ac44639a0a0975448f565355368e1022094f5590737376944d5a8c324d0e05e1af7a278ebb2796603497371fc38f807b9f9c2fc87030d28d997291252a9ad53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555633b496e29305cf988a09d61f14681
SHA1878b33162028c66cd18051e7265900086522eda8
SHA256a055643857ff025ad92c2a8725514b1d66c2fd2c0f463e0c5be7e72df5c0b03f
SHA5121bfa72e6c9850de545606c8c76a62852bd33d900306efa27ebe1950587a7ff8cd72d222344722f9fb531a5c680359f3d2f6b99b1697a9a3d727d98f5f5464767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb7b32d67b711747d17120ee310248c
SHA1275d7a96d72c0af439e4a9e9bc664155c3a62e2b
SHA256066fd453776c19e481e65034ec2a6d76e8314e7a3e34bda8a504290dfa6942ef
SHA5122a9c4309a8c7ea5cb769fde254135d217603304ae73e4b3076717df04a15f01eaa6a05767d9cac9086a07fa31a768f331372f0c38738f9819d17dbfa90ec0170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d346bbae5ee8462862bd19d0622ba8e9
SHA1f20399fd3f9ee43f0b3aa554fe2e4c15a475637c
SHA25606a5141f4f37d31660a4940058437bdcf2b8fa10f71394081dcf08cda0a4d81b
SHA5128315868c94931ae26633219f58ae7a1877a1689d87191c343071ecfc4fe45d006acfcf08778a794aa3e5e4b18f7f7e2e0372fffd069ec3cd9278c912570e1c82
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a