Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
fa10dfade3ad5a265d5367fd81736d03_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa10dfade3ad5a265d5367fd81736d03_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fa10dfade3ad5a265d5367fd81736d03_JaffaCakes118.html
-
Size
6KB
-
MD5
fa10dfade3ad5a265d5367fd81736d03
-
SHA1
fe0bea767bc1f352ebee1058c5b6a6aee85359fe
-
SHA256
e5baa7cb7a98b01d45843700d5857142d956250dceff9959d5259a6ac10b1b6f
-
SHA512
d5bfa80f0e7b72daadf7304e4f0ce2d04c6fbde70e07a3e4df9673990910d398a9a32843547b80606f8ceafcc9d7ecbbb4237e531bc7f32a745e5ed435d05bff
-
SSDEEP
96:uzVs+ux7PiLLY1k9o84d12ef7CSTUSZcEZ7ru7f:csz7PiAYS/Rb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000f135f35a12eb304d0a06057ab1628e858369ed3794578c7f79818c5c04af7324000000000e800000000200002000000064255b3d2297705d23e5b3059ddb5af6c992faa3e450e9c84bbc108b25ee1c5120000000c68b251c3cffdd1d0f55473e5fd05dfcf100dc7a6e812e7517340cf5b323563b40000000056e7a0cb58174097ef5b9b5b656567e59f488e8ed17fe4300140b3b1c9a333f15eb1723d306f913f3696579c09ba5d55964a8bf8e2ed5a1b67be940a26d2e5b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C166EA1-FE34-11EE-8AD9-56D57A935C49} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419683029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900b46414192da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2568 2552 iexplore.exe 30 PID 2552 wrote to memory of 2568 2552 iexplore.exe 30 PID 2552 wrote to memory of 2568 2552 iexplore.exe 30 PID 2552 wrote to memory of 2568 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa10dfade3ad5a265d5367fd81736d03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f818a9684e59d038397d6727bb920f
SHA1b2dc857e0870a6d3975b537139874dfc68c0977d
SHA2566bb76272308dd8492027e0d6b43f2251db2ced3bd2416b5429790e06579504bb
SHA512963c3b90e152fa0d8f9b59ae12d6a7ed6e806fbb178c7b82dc71096619776faaf59a88ae59119505bf2f11e3f8f67dde9b4d9bc9a5f1e369522f46587d160944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca311725e4ccd951ae356acab09296d5
SHA18f47106e602ca142d3cf61289eaca801b2242a24
SHA256a151dd00e89dcee8c4450a07a818d0e8d3c013b56835bbeb18abac42740c8ee1
SHA51296c2ee3106159b78b3c820ade244f069c095bbeae4138d58556472401f4f0d7e19e938965eeba8df9cba9fa2dc389ad878c07529b8f8a7e7c3d139b90396ae07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b6842c06b724721cb24eceaaec2f34
SHA13bdf940567bf8752e4b21d9bb9ffb1fb9e5f5cdd
SHA256dcf9d73e9f54b2522bc1957e40b73e52c86b11994ee9cadaf18a3a6457c7f835
SHA512d12b534232df2f97a33dc0ef821f0a7202528ce60272942966bcb6c7d1efd6ee32460208c4f5814ac3abe3bdb354f13a7dcd9f100356a7cccf706c96b0aa0bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab5d3724cdfbd163b3e7c0f794daf6f
SHA11ab78c109567ae177eed72386e0b6db1d5e4cd5e
SHA256bb2bd22aa88deb8b82c4bc3c5a8af7664511f45e7d2aea311abc8017d9cc122f
SHA51293c10e4ae8663e8514ba9eab9e52c81fe8a7eda3da7c3b2796b7a868488223791dbd8e76eacc92ec4937b3433a0fcc3932e7ae4afda12af91a80f36d7e9a8395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd352b93892faed9d1919208c3a8a50
SHA15782f6e0bbea6c6e7dafb662fec7c7a7e74807b6
SHA2567ed80e04108d50957507f748f03c3fa648366e4446ba0d6d7067485b054c24a9
SHA512e3842edbf5eb8507bdbb90df6cdc939eb253a83e2bc8600bc25aea36dfa8516ea7f478cf0472e3031ada763ba0357f5d9983bd6df607f15905b2b9c20052992f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a09447652b37582a1ce594ec079fe22
SHA1ac31e795e20ff98efb3153c25ba6e35e07b5f58e
SHA256da883ae471d2551d4541118e26f12a1d8feedb5be2ad32d4d60ca1b6377c914c
SHA512837a36e1a5f33fec50a7e66ee4f519a4ff873428b3a11be7e095ffcb880d48b0a97de7f6fc24741549ab490b0f95157855864bfe5398ea73fa4050f23709a0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52044d018d367108100d26aff0b9fc5dc
SHA163bc8999bc07d325911e16467406a1e4f6e93f04
SHA256bbf96982ac6176c64b05f2bb226bab178d4a540bbe44641eacc29317ecf6a723
SHA512cb38b8fe0ba597090adeea6a2ac263102c17d5c58c25703651a5b5caca4f0d808d8a13bfbab59f564ae9133c6173ca50283cb8d65b3c3d87224637b3f688fef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6880d86428731bfad9d44b45ea7d76
SHA13268cd8234d560a2025e41c8f0bd10d742a6e511
SHA2566b10eb8d38d49e33dd96c1c7c78b2ab2ca01cab3f3d5573550a3e5e82d0eb1d2
SHA5127d8f2d68903f9ea798ee6753bbfb354ba4644e53d1d14a616ba026d8c04dce95e28206970aa88c63a245fd6510a854bbaca60de7fd806f9d51fd655b023c68cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8ad959b78c914537dbaa9b29b51b4b
SHA10d44fdcd4fb571bdc2710820b48a5f87763a5768
SHA2567a3e828693bd50d54918f105c5d772916b5b3506cc8f27b3b0afc588fd91ed1b
SHA5120c82f97bd5a59867102dc496aae195b20fff5bfb0f63bec7a22774757e9c0fe3f3449bacd54dbb97dcf713dd4f0081604b27ca7dc32d0b6ccdc4dff4c2d431fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593334d66de2caec2d976355cd4d8f497
SHA1d4a16178371073647c00451507e51bdd7c525410
SHA256d5aba526e393f6889b3bcc903c3141762aecb77c29b193a6e89a60bab8fae30d
SHA5122613882f3c260350e819985488aea702efff0f4811e6a05753c6e2438e3589e7d51a12dfad628bada351cf4cd0fa1ee3acddaaa1612f4a5a35451e09e5df58cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ba1ce46fcc96cfc5e2429e1160ff6d
SHA14e08623433934cba1a8679ce744a707c54cd8890
SHA256278790a10d40f8b86dfde838f5c9af107c74f93803cf0b3e49615e4872ed8c16
SHA51248372bc7255657ca3d67522fe08445e9419937379fc23d3e02892fbc9621544b8bf6de2fbd728e76466647609a7e7fa594328b36939cf358958d2669a2173747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f18fd63a3caa60809d140f29b85ea3b9
SHA1c4b9707b6bbf15b39e67f546b0766601fd0e68ca
SHA2566cbd1d629ad940ec7d6ebe6b3bee38433844798b6b047e403de94ea83e359b8e
SHA512f017b11418123e89bde5202986f239dbbc0d2cce9789acb05b0dfacfa219ec63f7ded68f1ab5823821675b7a596a65cb45deb25f97f419f64933225a9f495b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d5d6f1290bea1c7de0937de76547ca
SHA118223095de62a0948233dd857701f333cfd49d31
SHA25645b88926cda750d05004e3581e9bdcc1a2e6c68d0a7c33d2f0cf4ffc3637ab96
SHA512364f6a3121185dc0f002ad7f1a488dbde0d2d27b0701891f24e991d95bcceee088e09743ee8bfe53df07fe8ab4cd66fa0c619699efd444f7d3cc65736da04a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3a3366114d3c2ba643d248693a5cdfd
SHA1629bf2c6819ac2348225235fe706ff7ae7415edc
SHA256903c87fd87f1b15bc0e9a804f98e77f309c123da7f0f205372ec033a0006dd1a
SHA512de90737b7f193ac8816fd7481a114208dc2e72c1666176ba53474a042a839fb50c46c69794d7e94b12ec44b1ca85fdd0b9d4b5891e1aa461ad4312ece608aa08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d86da4ac05ce16ff239776531c92f095
SHA1e54a70bb78d872f071026f3ebf03dde48bb5f0b8
SHA2566b39957dc208cd26a494d7a0a83edb0aea4473e0c744bd56d45bfadf7d9600b0
SHA512e67ee54ba2a2165d1b7e15b3832972d2d06b4281a1fd3f45e27c510494d590d6f73fdf2f0aeba2232c133b25ac557cfcabfdf7fbcf4fd46eed425c7d89a850e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906b4c182053afef4f76f6d563f6bbff
SHA1aeafb6b8c4ce31d9bbd1c7a2ec90936330adff0e
SHA2568f701d25d7dab3566ca3a6e61ae83b6bca75bb1620aa21171ab66c8da01663f7
SHA5123c1667b65f7c99b71270ea45118e903f6bb974c0ea24ca1ab1fcd842db9bc84549455de115db1b3a6c071ba79b1ace759da1dc48c0d1ba01ef7873f5e7cd530a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f208ea3e8a59e210b8af825cd808aaac
SHA104e97de485f446042b628cc821b44b8ce23c2ec0
SHA25647c5d29773cc1541df2bdd696b4fe1b73e540b52672e94ca0e1434a1edf1d0ac
SHA512e9cdcfd7c8887b17c72b04f53cdaba2ff8ca757cc5020ea8482bd48f1e5c50cc2917f2b3184305093f25f06b0b1583fb0be13be0bcf5ff1024f3465c6ad482ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52122e1e3065e8a36b420a764a18d317b
SHA1998ad4e708f9220b29ff234f70328b6a04d74a7f
SHA256e623a659e48a1a916e8e22292e7ca8c88ea8c22e715263a927c2f328e9c50f92
SHA512689aa6beef6e943c4f03e207d6b46758a51855dbca0c7fdb0131d5745482f748e64de560044feaa84fce247e7972d6200f02b9cc4f116a9443cfd4d65ff5fd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e1cd525545c361d63d2758426de137
SHA12e641d38ea15ee522c6202410b3035ea137f9819
SHA2561cd15df3fb8d952e8906c0e59f0f65ee601f404cc7c0b68a70b9ae490aa53288
SHA512b872758f21d5ceabdc1ea17f61425ee0c17175e7723cdf54ea944f6e8b48303945e732dee4b8f67384a6ad6c082a0a30261606173018271088642d13ceb83649
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a