Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
f149696a61ef0fce1d731d7d5b20f6ee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f149696a61ef0fce1d731d7d5b20f6ee_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f149696a61ef0fce1d731d7d5b20f6ee_JaffaCakes118.html
-
Size
12KB
-
MD5
f149696a61ef0fce1d731d7d5b20f6ee
-
SHA1
b16612ffbe8b9d601db6ff4924ac7ae93ba8444d
-
SHA256
300360616659e19891c1ba435cc36d4bc8bb9fdb0fdd9ac366845b296c779e91
-
SHA512
aa56794a10550840ecc07c676e649c04ffea6ce9f8dff8cccbefd6058811448aecf7c1b453621d44f129fcea0cab22e3758087e4e4064a8211340e167cd63937
-
SSDEEP
384:qt9eXmc5YA6OzPgz9mgZZuO/49bsZwWTB5+/mr0lhPRCzOvBMSxXbLt4a/VCyMMY:sZmI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BED8181-FB35-11EE-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002a8e611e9953acd278c1dd7ed5b2faaad0c05099db36173c9ee944a9b4f46104000000000e8000000002000020000000f4782788a978abf770d817d43dc32198306006205494cc2c9245780e36654ed220000000251ff79549943f147f8b8cdb32d2579125c7d53a877507f4c78da50e160bf21d40000000fa2d3929a3f0c44451225d66dafa455d6a216ed7b67787d2e6a471521aac9baafc00db3255bf6b72b17c37490a2c96852ef0ad39ccd4b27d7d02ae285c43dcc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b070bd19428fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419353496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28 PID 1996 wrote to memory of 2292 1996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f149696a61ef0fce1d731d7d5b20f6ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef838711697e485e889afebff1b4549a
SHA17bdb99ab9ecf8517dbab994f4fb503b0d1a3130a
SHA2565de1504e01ba49a119d2789700f5e0972e69d189dc733d34a157ced0c78e615e
SHA512ca3cb782b488e1f392ed034774be12ec7a24a96c2f8a90aa252d63a4fcad4f009686c5deb523231fcf6d482e3b692f5baab3741ad32b1b992d4766e45ec5bfd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5847212435fed433fecd73de598303cd8
SHA1c9d0a849782da4947d99442fc65fbdd1f0dda9e7
SHA25642ab149cc33591dcc7407a229febf60d45e6e0b0877866599cbf10b7e14074e5
SHA51231ef2cdb134d7141fbfa81ffc53d937573d3a324c038f85a13f1d4310a64d527a7501a4a94a8c8585639c0d32708797d22c3c979f7f5d551c1953ed55cc0606f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0837b3cc43f57ac5a07ffc82ab10d1
SHA148b62ecc0acaf66ccb13759e338d5f28c242206f
SHA25660eaec6044a8e12955a996642eff7e85fc8eaad358739d9b6959a41891f6ad14
SHA512b2b5c586aeb7b2113cd3224380112efd0468771d3593e40fe61d61704b946e7e13acf0caa66f1754b30a5eeac62d144495692bad2dc766fb245ef37a84a0840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f310a1be9549b78355358a671a29406
SHA15761c65c08db5222ce809f9dd741566416200e9f
SHA25666fbd647ccc81d26412c93deacd7c994efcaca7bb4577f5f13a6dd77a3089371
SHA512726d708df06744bc02af40a2651f49cbe8e18be85acc94872bf9512d2661f3a8aeaf2ae3f54cbe782356411b72852cf51e9580cf9171341c5d9c7dc9db5b411f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af845ab77bfa01cb0011cfef22ee6f30
SHA13217f8ecc819f6611beb9d7a1b76afc008fcc040
SHA256a730c101858cc1774a8b75416f4c7d1f0746e6f86176709727a778f881fb1899
SHA512169544ab813279b08cba967fc988342d323c370188ac8426684d35b2ea5eba54183b693524eadbd160357bd98332067dbab699073f158284d00d05ef4c793ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572aebbb552fd836d0377aad4ea82fb75
SHA1e10bbf8be7aa72ef8f88a97fe68debfc8c64ae5d
SHA256f575536dabf74c4e8084c5a4ec424c4206355ecadb797a109f20295e3bdf589a
SHA512303472442cd0dbdbfe4434508abb7cd550b5d418cc8eac1c2c285569650051d7eccf0e8806a2fd16bf6f93f5e317e5ca4c6c958d4f95cb82f89a4b9fc4826549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512170521eabcd14894acc0dfc6855ed9
SHA17366b4da64d8d5d811b232661e92598b0ef338a0
SHA256afb7d0106b6d746708c9dea627144cbc8df3d101fdafedea688a0c6bdd23bd85
SHA5124e49540a28a9e1b48555094c427fdc90057ac183229ad33c370e4436d64b856a0f9c5f1b94335922e1331e1f7a8e71129db735f83f6555a7c04a883fc1e2c3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8532cd0b563a8b5031911911efb1dd
SHA1dda9240003c75bd59139163ee0a290dc3bee08ad
SHA256b7a3450e628c13bf153bbd4199b56b3aa02428c0b8a77019db8b8dc40c336f3c
SHA512824f7663a82cc5a14819776590d5b4a7d7373d4a73ab0d2c4223db3ce4cb047a2ac67cc2fe181da9a4db2911f2bed18da3fe32f358970181cfd231c5e4b3682a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d894615aca4464045c75efda6a71fa8
SHA180325daf0d2d8b2adaf0b85eaad350727c43afe9
SHA256f30bbf6ea84b5acfaa9dc515d200f1ca2fc47b21d96d7200563ad80800de4730
SHA512e2e315f4e46f6a98969a88a9d077736c8c42bb3655420e490f4c5ae5a2848df23a352b611c93fda57da2e07b968e1438babc6d4dbb9605dd2fb37fbb2f046547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5581ad817d47b8355a8474756315546b8
SHA18b812499fd1293607cefce8ef9ff4e7fb8f93bad
SHA25697a3e0013bcd13a4575b3cdada853e0c2515449c48f2ba65bd9dad351aa266d7
SHA5123fad503c27fba37a47575ca98994e4c620343f66eaca7efb38c9a43bc6e6c8151c7de5113ddf8e9519088cf54a86fbf36bcf3f65e79d116191c50e7a46abb6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b6241154488d33a08b534b2903e36c7
SHA17f20b73d091c0098a4214e08526db3fa3e9cce46
SHA256d83edea2939db47c90d6f629b19ee86b162362c3fc74710e3bd0acaacf411fc0
SHA512c1f14d0412c918cd34c4c35d3f78ae4588fac181f54d6182457bf2072f12f8ac3fb24aab02776ad41fe81281714f7eaba09401cae79f07024307dd6f80d8ddf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fcdc478df03ebc83b3d5ee693ac667
SHA18f6406fd554a6ce422177d85f0ee1f1284144bcc
SHA2566d799cd8d56122cf18cccc868f83fbfa29f8c7d33975e567c465213240f2202f
SHA512533a45fe419538afb2f7aab27772c1980ca3afd7ce6116ee7004d4b6f2001cbbba053636cb7e42bd0048560c01f0d70deb612e403fdcdda51a8743d357210628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539abc7777763c23119d91c4f627203f7
SHA1b0986ceb9c6d27989cd3edc713d3a99c3a3fe34e
SHA2560f563610aeabdb9f848d646a2d038c6d91903cdb76ecf7c10f2d740c74094d39
SHA512a6a0d44e2c846fac8a95e93ca187d46071d06e677bc173f3cc263353ea96fff566fc15b0e04bf81b1250950665ef921fe3e5802f8f449b02304e5b138f66e40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36549f7b4c54759e69e8d1a3d98bddc
SHA1dfdcc53608d28130530dcb02a0de3b785e3630a0
SHA25640d51f77114564d4de8ff04a74753fdfbdb413a39a589309e3bb0c4171b23b28
SHA5122f929d9728cd68773a03ab79a65e5458f288c015de1981d61def22c18bb7986c32a5c11eff97881fde560ee9d9537220630e6480949adf04558b1231dced07cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59669f55f89b2696a1fb1938d90c587fa
SHA163a080788eeb8b2f53137a3b36d40f673dda4e5b
SHA25675e6143a5ecca03b4403580e4ae7cf5f288b75eb9547f2327cf632381dc2e89b
SHA512bbaddd54c668b877a02094398469f91b374286b7553561e136a6fad7cf1260d23741c30105be0b86a87150630b810adef4851494daba8e7dcb317a1ca950e717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c3d8408141deb86d0cd83bf4c0392e
SHA163ba79cab24c589afa6eed718f7fa68af5956bab
SHA256ddf007000e83c0287749fe201b3f3a69c35f6ea0491fabdbcf226fb4a08e3084
SHA5129f2dd058151d99d0507893a4aaf2c008113ca455d44481e2140aa340e7303e6f01b47988e914193e169a9de62041422f74099235b07960dff5e5e71756b5207e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae9d9550f3255c4760d208824dc5b45
SHA17c9be5746d2c9cc6b6a294d4bad39a5a31d47909
SHA25600a04dbe44a1faef065a584745435d4a5dbebb78ea3a0fc94e8b94ad0f3dcb97
SHA51271675d81eb26ffaa216c5bee2546735e540da40866c9d48628935f865ed207e7ac744bc152b3736bdd165b7c44f57da9f69d05b1963afe3237e639f5c96e3d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e89b5ccfd79c41ca302ea484f8351a92
SHA1b3c0515549b9259871283110ad93e33f3a833a5a
SHA2563d818df6a3fd509d4e3b2c1ce6304c6a51717ce2355c19948d63595bebf0c7c7
SHA5125bde4ded0a2848f4a446bacf93fd8c0d6a95ed56a8a9d44a4d2423c6b78a52120982a4070aa07017f35ea42c7790c636cd3d5712f8112671863643aa37c11d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced3940e708389799e2408f5f5a32ec2
SHA1aec6d4de276640e0b947e428d8e488d555655d22
SHA256a7b92309fe2982bf3b5a076c8fc367660f184dc571e5a85d040b7a8ff9392c29
SHA5128c29043695b036f924e87c95bb102a477b65076353e954a01dfcefcff19a390a4267d1cde29ee543bfb66ca2063c460ac194ffbd4b9de07d2b68fd64b8a8659a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a