Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
f9f80cf6632b0e0b6788692a8dece0c4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9f80cf6632b0e0b6788692a8dece0c4_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f9f80cf6632b0e0b6788692a8dece0c4_JaffaCakes118.html
-
Size
6KB
-
MD5
f9f80cf6632b0e0b6788692a8dece0c4
-
SHA1
ee7ae7276b2d2a6a84be6c0f978e2b73a30ed8bc
-
SHA256
65ca94dcf5611a32b4cd01b51b965fe929b56d9c8b8bcafef67f140c3d8a853d
-
SHA512
61da772a35b1d9239aff0573a597c5f29ddff0ec40e49c0295c6fb8a4adbaab4f25191bad2de5032e37976905ccb65ae75c2d0fcb50bb4356df48927df416fd7
-
SSDEEP
96:aDHZT/fP7vQx/2VxNxbVxaeQgcaHmbb9oxWDyXxb9xJxjtyST0nXNJN9zMK3uAz:ezn73RT0nXPXMEuAz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419679328" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6efa23892da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000cdf08404a0551801cf0947b2e32581b7a6367146ff098379996dd24b7f98cf4b000000000e800000000200002000000060d24f8793687a5026a603740d2ca4e921ed193f05e67b2e19b9fb4239f1162e200000003e7a35b31cbf5e3a7d47e517ecb67b3dcfd10446af5333efd8b0d7acba81db3440000000f1cf3e3b5cbdcef87172c4f4814bbee4e7ad7383ddec20cac54c9fff8c90a9abec9ea5d31b71cf498cefa3f7e81b63069f562357ea897717fc8752e7e7753b5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1C6BD1-FE2B-11EE-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9f80cf6632b0e0b6788692a8dece0c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed0db5607b83ba1db16d2dd4fe21ea6f
SHA181ff37997262741224b1d7f625249e50491afe86
SHA2564d28e1e5a7eab198230bb50a5c96ca4ab32b8edd5385a1e601085dc23126cd3e
SHA5121e6762b7e7cd8bcace41f1ca397adfa4ec9d3c2bca8493bb706257b4ac5bb17999307e72bb48606b7228b60a935d1c84e93a4d277d381ab846674baff16bfa22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee848ca953c9de6769f5b18a4fc09a3
SHA10f2ae4681d1187f47f14dd8b3d273af58d09ac57
SHA256628b537653891e76eaa5bf9ad263af06db1d49041fb79976308492ead3ccf0d5
SHA5128ad8beb0b2563730ddba024ae76e361bac68be4ecbf648852233e9bd5bf822c2b6ef8da34b30e2b2b8e4485a29952b95f019a7cd10925f779b486f0c515ebda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462f0a8b9d8db86529fcecfbc98b34fc
SHA121db769ec8fe806133ac7a140c0b7dddf26f3c13
SHA2565e3d2d7362daeefe30bd68eb1fd75f3656b718aa2b38f679389df11f42473285
SHA5124cef3d9bd3a62cd83a2eb6eadc13ee2ab9d32954ef90dfc1e9bba2813eef2d43de4fa062ee2e70f8b872e1b665163811b15d1a111e935a1e38ba4d54a2bf8d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e89201bea1432a04727818f536783d
SHA1ff35e3670ccc0c611f307cc03c3764a6e336f5d6
SHA256048f9502c76947d3bd7a8413711cc90a3aa28c2fa29ca1f2df028043f5ac686f
SHA5127a2d06ba09a25a5e512d0dda034a93d51adc3bf3c9aed31643588b9a2adc898ca781eb9b8b0cd1d932b49ccc9cb96d608b9614003ad69396b4b5cdff1b4c7976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585edb8d4b652cf77d1790bdefda26532
SHA1669e71520abc12994b06563f596a49f9739513bd
SHA256f48871db7589b3dbbe4cab983b42712c43033bc1bcaea57fecd10ca23e1ddf98
SHA51262981f3c5aa02674f0f652670969dea833df1137f77aeba7d33ed6531d46df796b2f8d4b48816d4eb22a9735353b2d1624a700a22d65db3e758eb45443e28900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d56a215724f9e099df830f49eeffb39
SHA14412456af4ad2c837146b272e7e97a96caae1de5
SHA256f7339a4267fff6a783d2543f9583e106c3b7778b428233f73b27f9289fdb90c0
SHA5126c3b7477d8892aedab463437b9cf80ed404c28a528d1a51721b1dea94f79ad0f35f7f46758243c584ceedda90a9ec7b88c361333ddb73a2032e4ae67f65fd694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb4c61886fcd18aee5fe4af3b8a4aab
SHA1b90c916790eb1173cbe805662494fb566272327d
SHA2561ebdbb302ce497eab2d4daeafc2b187186b871e1e80d09f54fa706559b7b3aac
SHA512d64c854c1f2c70afaa93a4ac4cc3453adf16f8ad6d3290eb32898507910c0426b54f10155b825001ab7b3788fde52606312c52cd54f612dbd8953ac968533bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5333a5779c77ac1b4e61869412d99bf10
SHA1b3bf4991194f989941938b5b8a775687b8d8777e
SHA2564ad9fbb53282e43de49381e8bfcd446c7ce18475e709a91b282024da13aff6a8
SHA51288ddb5225eb4c3eef6fcba09ca04b9e096c9d0edd0d901ef668ed3496fa0bae619e48b7f6d619b17513c242b7b87499843425570f9e835f1648bc0655264e3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782ce9dd5a914ec6c9430d2f04d04e12
SHA1cf1868d468c172cb4a0f48b52472970cbd06301b
SHA256df9fa97599f30d789c9cdd89c7cb9af01062b4013b2381cd83591baf60244b64
SHA512dc2eb2a6d84b11202b59a00424fb748b8e4724ca62cfc9e10deb54abd9f14ac5bef93f77c1d434527634d7b7161e36b7c3bc85987a805591b1b025f0953fe5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e078cb3992a70e9e821a0380f27c4625
SHA14728a2c398c19fa97e39eb859026fe9b07b6580e
SHA2563514db52d4945323547929c5efe03baf7d1911f6c272f6b38e550058362119ce
SHA5123a72c97e4d7b0fbd620b1b8f714df822340fccb36fbd1ce371115950ffa6bd2192c9d6ab1a280b823e8df405727f35d10f5e243de9f96a6990329ab0aa8549ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524649ca640af747d4a20e1dd0ed1592c
SHA1d22443266f5a82c4430ee3b6fe831cf96d58dc9c
SHA25621fb37b52368eabdcfd43cfea99e1004c32f481f84b87e8d7f617f85ec9e0df5
SHA5125989269a5d1865766bb596e009079fbd2f08ac516a48cfbf5f11115a884cc40342afabe8248ae641cff06cb85b8d0d44484c9e2762807f887ac1e105e1cfbf28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d6e7bb2c5ab83048af95425580d746
SHA185c69838dfa8a5a4fa882446534c2c624aed6fe9
SHA256e8e87735d52b95abe66b9c2ee4b4228553e0fef220e7d6c6bf978dee1d56b688
SHA512ebb6e6bd1d7e0cd588abc22c93e7d07c078a5f52f11848e8d1f7005f46a80e51295f2e037965aae73063f6fcf9a5507cb98d7720b81ea978ea15ee565345ea09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537568628fba916c55cd618a8321e1c65
SHA17647104e54caa8c323a11531cd697383cd3fb08c
SHA2560ba27c7788dd8148639b47a1f6a26fab3a4dbc572eef969f1bf0e9e31deb9c81
SHA512f644fdb1d26775f142990b28efdd60c881de565f77c5de5cfa7ae0598fe72280a8712fbfa9651eafddbcfeeaf79bf3ce4b42b1d3b29f90a99e2d348313d524db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52000bf985e91d4f1b7057d4e18c8912d
SHA1a01c764602290d0788d70c3c89b9b4df9d96c63c
SHA256b5ea151b51557b67936d6e7690234c36923f1d56ae9238bb60e4b1456ccc1e6c
SHA512b05dde99e106a45a133c07dded140b04e16c0505da2656b052917a733ffaa2f4e8565c07850e89b92a80e9f2655f6bb492f51e6b2c688e793ac40cd14c28ec97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555dcb947c9b933a56eccce4b823e7cb9
SHA105553628093b17e006da145fc6bb01685a3c11ad
SHA25681941402ae552507b433b926e183cec3210bd1151bd8968ea0907f8277ad1700
SHA512df5d2e3c95e6106051a02c486246a7f2fce2d31355ee5883ec889c9f650136b6d8aa5afea166b14ba62d5f9496f3296e1e1ee1137fdb4c063d0599a518c2a1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ec0e61f811279709e6afb6dbd87a7f
SHA1dd80727f8e05479c4465c075ca8011e39bce4f7b
SHA25694dd4cb088ced1d8c00d28d1f113356cc2c3b2e2c7935a952083f3fed023e418
SHA512884d4f70ea9edecdba676735921c60fcc84d99e9217b7f31b0ea6be721b4c1971222cbb7f73678bf3af4a083f52f4773f77238e65c2d8948b6a75c9b5621762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5626d71380b1016fbc09fce88548a5fd9
SHA11945e0469b5bfa9de468901924d2e470144e953d
SHA256959be4cabc5a13cd626e9359349054efe85093bf3cf08632eb093e344c20165c
SHA512ac582a56018cc26dd88390325c3c047105e8a802fe4e51761097a0d51441c4eced12a47e6f8dd41050eb23445544ce61374a9c3be1266026a8869ec4031b82ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272dab5f5403c45a76f90c368dee14d2
SHA1d0e9d0a76948a266972ef003d05fca83d4873a25
SHA2569738b1db2f01e5888048083f311443c96a87c3c7f502216d9aa72ae365a0a5a7
SHA5123711f3fe06aef99a1067e07a1c8429db2fd0312bac72e5651d915d922b938d0adc890a68c446128346536ba4817ed194ab1ea4af5bf0b21fd59ce1f5d96dc612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c1e33c19aab4140e0b37aa1ad49bec
SHA19d0d2414008bbd1038c80912c89fc7be8f5b7498
SHA256706a2cb6f03c4bea4575c427e59e07963fc2d9abdbf26fe13fdf2c46d2fa0064
SHA512f715b6c7414452b781f4acdf938e46e0fc4fa6b37501ff3502d79b8051ec8c43e077671b4501437a8806680adfaa6541db735e812c7d4e07a3e2cdba7d52ba8f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a