Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
f5731f3dbfba040f74ab36fb936ef676_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5731f3dbfba040f74ab36fb936ef676_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
f5731f3dbfba040f74ab36fb936ef676_JaffaCakes118.html
-
Size
14KB
-
MD5
f5731f3dbfba040f74ab36fb936ef676
-
SHA1
ebb0b269af6d15dfbaeff5051a068ed5ca1a0c9f
-
SHA256
3a513a6e0aaa3e3ae32a48c6efaa14eddb5500f7ad1533b4e3866664f8661141
-
SHA512
a7320351281319fa83504a42d30e8b072837a47d51ba36a2f87a7ac634896ac15d6324b7b4bea021d26948e1a81011703746c752371ae620e9acf30f0aaa7dc9
-
SSDEEP
192:4GAnzQsWLFCAAnzQsWLFCWLuvjap5X8RrK5s:41a2Ky
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419507255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b084a2ffa790da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000964a59b978dde95e039a9efc5e77c90f40b24ccb0240a039457e2c9ca4530e3a000000000e8000000002000020000000a9658cd53cd6afad0508a2bb070f1dcbde3bcc5c95e9e78a110e1e80ae999bf320000000ae799fabd2ad4940aaf4a6ef54ce50f5315bd605cf951c634565a2e9231e424a40000000cfdd9d765d69e296b573f9223dd533ab0b1ff753bdcc3ebace589f98574c0d886745d0c92e3c36e00305747e61d93d03ba96bcdbcb3cbc34ad43c48ba4ad3e10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AADFCC1-FC9B-11EE-A49B-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3004 2928 iexplore.exe 28 PID 2928 wrote to memory of 3004 2928 iexplore.exe 28 PID 2928 wrote to memory of 3004 2928 iexplore.exe 28 PID 2928 wrote to memory of 3004 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5731f3dbfba040f74ab36fb936ef676_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21ab364a6e1dfe0368f6fe1321c43bd
SHA1648274e4b1204670f5c3812060906201aaef6ff1
SHA25697ee2e18509eb5e87346f015c3165b4224138385bee4d6a8e9917946d91c5c79
SHA5122b6696bc3ba1de58288406f299c8307b1b65df94d818727047d0846d7f5650845787e10390f5a9dcfe4c3f866bcaeedc98db2297b899f153e8ffcd890aed27a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b236df3ec885870e4d6b114679df2c
SHA1ffa86dd27c0f1875d313c1e1e0b4eaef56ea2b46
SHA2567d72b488fd370e88c72b392bc1c886d7508a8fb873f9e9855895c933f1eed157
SHA51218c8d14f656abb6fb0055f9bb00aa1da2bdcdf022961dfdcb5ab3cb7c87ae9005e78ed09b59c1bdcca17e0d3ef76433d295879ebeade82489159693165f6077b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58775fc2d3a95040db03a615886aff429
SHA111cd0b71f5b6816c138c5c9eb6c92e87732638e0
SHA256d04909b26a84c21e1b41cbc677e78946b8f1f17dd7cd5a051bbd06e318e3eeb6
SHA5126439aceb251ab976bdc2de3fd6b920bd422b9bacf3725575a1bfc0d7021d1db351f6f8c0a069b71592d160fa509a455c72682b6aad2550806e1a2bbddf1ea0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66dbf24c725fbb8bbcb6800b5c8539f
SHA15b89b9711e8d6e0eda5c2002887b89ed107197ad
SHA256fd8feb0892096be8b8d4370d0ac1c237d02dc1ece1b8c9bec31eb000fb63ebd3
SHA5129bb195c5e65523325a03fd44e19884b3d24ed64cdf6b3d5d416f9dee8b16bd55b6e6ec9be272bce58b7bcd41528e13ab483cc249e4708d5d7db5a24e6f89eec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6cdba7e153858e21c8c4a8412fab59
SHA1ed4dcfe6d350b86f2bf8b268dce494405c213c63
SHA2567977cc18df1a3fe7f7d1938ce19acaed32dc9e072eccd1b92c65029edd9b84ac
SHA512eb500dd60633d81bd06b161d31c11060b1939b683e42f456e14c38bac97c1c6ec679e1ac82cba0871ba6e3ad788ed1422fa540713a8a49dfe16b306a1bea1910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162ee204896b5a4fb65e1839cd527257
SHA14190d6ada9f9f06644995d7bd4b824863ff18216
SHA256a60ad231f786a525c5323215b3ce854b2bf732538ec69d2752e12edc2c12ec3d
SHA5122f50244c2df142f4fc2752965a7e6fe3a8252393742e785021e30d0085134c1cddfabdc0304462441c56980243666ed4e342f999d0d3f1f65b10adc4f17c99e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30916a754ac2ef7091e0da8322759aa
SHA17f3e297117faa25f3539a6d95d0c063f7ff95064
SHA256bbb1f511c2cc97ae96f0a2247a4ac38ea21c30212962c353e32ee3e489ba0341
SHA5127599404151fe7ff927e30a78c3691b5ea2d65e42ed1f42e053fe38be354e9c4f79a8ddd204d0bbb9ebc8e8f5f46706e424f5c063df7791b302b4eef5da95e710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd5e9408f4956353e58762b8b833e0e
SHA14e3681eb23d41d6cc6bf7b2be0ca704949890c2d
SHA2567e842fbd0f33ee47f497f1deb3f4c8c19fd24f68d3686a8eabff2cc809fb631f
SHA51250c05d5e26947ef78f644f9e6fbddd33cf1f218f0635f58c3f611ad5ae92b9e405ed6be600eb36f3f548934b73176fd8f87a3f7603f689dffd486ca1bf875975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b388a96acb89dc6c9a0ebc7d3247b762
SHA1ee60d4bda63c9bf61335041c1d7227369f260de3
SHA2563b13bf4cab0f2b59be49e1bdb1b225b10be27283011e8579fc402ea15a945469
SHA51248aa7ed84db0bb0169b58fe373b5e811b6cc4ccaa4d54d15d5513346a4d633d58e0052f50d53363cd0792c4578e05d46e321f27140719a4f7554e51f7eaa935f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b542d6e4073669d7c3701e097c7fb4
SHA16155cc915df98fb1501288fc3bfd55f6a1fa65b0
SHA2561ee2b2a580f782ae4bdbc8aa7531ab6c531113f4e8c8d6f9d261637f096121d0
SHA51260ff32dea1dcaad0f58b0a996faf659a21827bb8786c83f981813c2d009a17e903e2dace37dd919a8ddc7bf564cdc4b294cbe73fdf758fc203e0732b0e72e901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b121ae362d88bbf49ab1659437ced5b8
SHA1d9e24c2ce95abd22b636a52e62073584cb33c9e3
SHA2568e6529e8d09a7ac6ce2fb272b454b309754175bbaaaabd49a21fe7c52158dde5
SHA512ec82fd0332575d31979adae8d52fb60a8c637b13383b5caecc14d37e4686b188ee9fd8b2c92a179b1548fd02edb632f7e53596eee53af26f05119510afdc3092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a440c969eb5bc055ca1a652faf7a92b
SHA11b244cd12cccf8670c5047a272289f84c48c5196
SHA2565c5661a32c72894462331fc45f45f46b3474a5206136a31754196c32d825cf2d
SHA51206d1222fd01175b9a2d76507b39042394b21a949d6fc65f7612aaab904cf93f4779e226662256c468d29fa28bfb5257107eac66a63d4217d313b86b5955f31a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0235e7dbb72864d8fa9e78b6a9ecb1b
SHA1c78f9c980fee3b7d8f0d65b08091bcccdb392ba0
SHA256c951dee0ab81b5436237e27ace70b70b4d0f00962b93aa26e23c8f7279f17763
SHA51209d890082eddd759c9843f24159cc340f5d634bb1a568e91c72fd4c3a5d3f77d5aaf1b12e46284fe01923d73b0dab94e3bba9e9f048755397c59df6c5e2c1e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c21054e0cebc24e90afab03b7d9473d7
SHA1fb485b7987abbc18797be6fead6f47f791b90be7
SHA2566ef802e69725e66ee076783a0472f81083a9ac109e902f8557fc8aa0b0838a90
SHA51291c6f9e98eb9b36b9d15c7012f216feb45dc607177dd7a3aa32e07e73082e1bba41cd432650c424a4041968fb3f7164e3b316b9dc78539ab68abd1350b7ec1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503435668322978720cbfef7cd46b929c
SHA1157d3b7d08d9758cbad0212dcdb9f5324334742e
SHA256e629880fb0d7f74f220abe50ff99d253355a14c814df40d30b7c881b205ca4e7
SHA512718ad959b57b52ed65e2957b93d081488ff015d7b329d476d97633db0cf1e782a57ada56bbfd3c4f75679cd10cad78aac649222fdaa4b0dfd636b28490b16d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57914e30af527b45d1c34261054f9b3fe
SHA1fe3717ec25a80740367f15132edadc6f2ac965e9
SHA256f2c5b0b6c02a906ef908b6e0e99993f8ddeb7348e29249939b9ca3d2f881dcae
SHA51296fb1c5e4561697ddadbddaeaf3fecb4aef056c03e65c59df4917b89537c709e2c21174850779899e4f16369141428c52012f2f627a410326fc3c659e7d13b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6f672d4bffc0bc3c88647cb38159a83
SHA18068e6b2b7a0ff1d161646fbe4ea32fc24e5fca8
SHA256984415e331670097ef2bf0e2ad1e242e6851ea24af1302ea9b93a0845140c13d
SHA5129bdeaadafd024f475e0f3eab821a43f6cdcff8a45e597e31e3a44f8c518c95f7a8e33a5594852c4c68580e2bc96902160282bc49deb3a7587ab39b0a21564842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07da59eff603e78c3aa53e88d760ae9
SHA11cbd894238364c0161e6bed215aa6b16d26498fe
SHA256da00ebbf1a85a40c6aa3b78f45efeacc8774f0d19763b1cd0a2f10ce868a777b
SHA512163f53f8d183a5e137cb88bd06934c6e22796c84aa8ddb8a5c01efd269a09f702178886f20b756329f75d706fc5cdb010b51f8461cad4587605779e4d30960be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a