Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
faf100a29ecc4f837c97525ae41708d9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
faf100a29ecc4f837c97525ae41708d9_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
faf100a29ecc4f837c97525ae41708d9_JaffaCakes118.html
-
Size
49KB
-
MD5
faf100a29ecc4f837c97525ae41708d9
-
SHA1
ba7e77815efc10c3fde8b4cb961c5f8c62d2b94e
-
SHA256
80c5ddc69500fb075d66c9727723bd34bc1256c8c43089e80a86d3a54dc767f2
-
SHA512
a70294e3c02be528fad49ebbfd968f17cf2381fbab63eddbcd090c2b6f417bbbfea532413470dbecc4c7bbb0c7511a300ff9632e87817b1d943625adb5bd22d3
-
SSDEEP
768:StkV65Wl9aVx4cQV3fsbQkw2y9Dq6LBfw887vCb296eeI1P05tP9SIg/MKlhA1x0:Swr9Y4cQV3fsbQkJyUVNllhA12
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c79b30e1f0850c44a660ee8ecd9a8c0a000000000200000000001066000000010000200000005ccdc0dc8d09ed249e1b1f924f1b5f04fa07a98758ec903d331b9e153029fff2000000000e80000000020000200000007ffcd6cc3796a08299963ff24bba8fe80df734436206a925f0a0bced05dafb7420000000640b53243f3f8f9d60495d90d7e81a2e61420aac1320a00cc474b7bd6015ffbd400000008be803bcbd3bd4257799d43813b8b8002e4462c1f48a1938031191d41e5f1935ac6bab646dcb15a96181f64347cf94ecf43c67582fcf90139f9a3fcb181425cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419714520" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a896a48a92da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC035471-FE7D-11EE-919D-C273E1627A77} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2384 1044 iexplore.exe 28 PID 1044 wrote to memory of 2384 1044 iexplore.exe 28 PID 1044 wrote to memory of 2384 1044 iexplore.exe 28 PID 1044 wrote to memory of 2384 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faf100a29ecc4f837c97525ae41708d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55c3dd3450f5b3d4e7d56ed93ad810eed
SHA1b0f4ee66f13095ce87fd3315fdf54f15e5116afe
SHA256fdcb12e8163af694834ecf7450f5fdab325b3a5f158404a36aaf6629bec13b51
SHA51208058b567c798c9ab258d60a28794fa4fcb038ffd2bb6ede534d49f963af6ede373e130e8c770b03af6557c2864060d6db02ec9ccaec71a0153b1b5398517195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef134d7ef2882cd697ce3d6e27e1407
SHA17701a1442d5c5e61b7f30cf7b31898db91502834
SHA2564a5f46093cf3541119ebea73d39df57f5ef32d6afc53206f3e95a14123231a4f
SHA5129389f0c05ddbbe9373c2adfcc9bc240768f5a385823d20dcacfe7e22a5c503a6a0dd9b57fb9bad3ab4325e9147fe23a8c5a23d4175a8ade231673ceff9be3980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b131416d96ad519f219d808f4ee40f6
SHA155fa44ee73f7e65aa5855ae395069e1327ec2ec2
SHA25684295e6a0f4ebaca6fb290febd9983dbed51c11e0a613f3d287162d08e4d85f6
SHA512c053bde179ed256b9604cb862d2fad31af61674a2c39116773ad7a2474a7d9dceae4cf553514a2d16efabddfb512ffdce5c0de63386ff56a38de6bbfb8b2df1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5915a3f0b85c8433981cfaec777bb3ab2
SHA1be2d5fa4f8d41a5d6c9cc99feec220b938e6cc10
SHA2562860732949101d27c28e8e2bdb9c526fc13c3c9fd7e9c02a716096004828cbb0
SHA5129f4d2d68433f75690e75d34885e9e6ae6a6881b1a57c72a112907003cf38817610762b7e36da63dd63b2bccc76483c20d100223c0aa1e6ce234fde177672e2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b38d282f3c404feaaa40e028bfa3b963
SHA1baaab5ebf162c5d9d9b5cec862daa37be9483602
SHA256c43e7e78fedcb6c38911f90ee70719633ec575466037e6044e6b563b5810246b
SHA5123243d86a49a68e98e734be29bc4c879bad6d0f7c1901e0890e443483e28be23b54b2d4695e1fa489de1a0989bd929bf78b1a2f8786462d2bea501f57ed897981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e170a766c994359abf76353c768a3d10
SHA14cf0b61210012b7acb455b2ef80ebd9e34289ab2
SHA256eafe55abba32feceac744804505a9f0b11146c7446bea87a4973bf687dbf34f7
SHA5120b5f1b3d948ce5cef89dc041cfb2ceee88c2868ade44931ccc084d6159fad6e9f5be2407104c8f76e61034c77f42ef3c9dff172ecf35d19573c32534228c6509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd4b7f3d2b35f67a37a033f2f8fb420
SHA16a932d5d653a797ef76464af69d20270e172b4e7
SHA256bc7e65c23f6bcc2adb0e2fe62fd3292cf73e47cbda9bd2c6f408846326fb9c8c
SHA51280ce1920058441f36e8bd38afd6ab92d4f9193d1a6f96bdb3a599cfd403565eed206a3db2dff3612d0d31ffb8ce321dd0875e2a94754e7185e0c123a09e2e747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc2ea8d5de2e051d55a38ebb05fefc55
SHA1c919c424c0b939f98639cf1bad374da81e5396a5
SHA256ec843d71f9637af1b54f950c0c2dd91f38394544b208bdaa7d05690558caa209
SHA5127e6356d0205125591b1c6322f21c5a7123bdb1f8a6931939845be5367369f9b294a330078c832c37b9d494fc044e16b1f25bed683564c7a0f4dbf00c99afb695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed818dff8e98a83ee15b3bbe278ff12e
SHA1cdbf88dd1b10cafb8a1f1df8ccff6f988a9372bc
SHA256b5962f974e980548944e5ac1ef7eed3d4b2960f2e9a4ad1784f03ef1b4d182d2
SHA512e40c53bf621bbe505ba72edecf9c67e5157ce8721bb1594a583e4f3493af8e15db09d4fbd78911d1e73099c3411d7815333f27a30ffcdbef42d5d680fc0a2cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57722cec8b615b894589a1113f8a062b7
SHA1d3936da391cdcbe964cbcbc1816ac1fd447fc689
SHA256d0d1e13c541ffff93b2acc32bdf8324bd19e0100f43e95b15af89ece7b1866bc
SHA512e69b9a783aab6d9a2f2d5586a09a4e140fbf120e02736bc6c473aec440894578406acd6b465fa826db836f4dc8ebae17674b138ee908161c11ffe81ecf04ea15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543751cc141cee5cc7b8e664587908810
SHA124f483fe370aa8c3a6cc95fea70415cf77423879
SHA2568dc2c9d375544921229480a3e1b48f629d2707c714d9eb8f69d9bd49f3b98e1d
SHA512c5550b055b78578239773666d9c7db69498c295f2dcb5d8b0881470b1ec884b72197a00f480acfe9a486117727122ea751549c756ba32fdd3a029fa90d729bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19bf96fcf05630664aaae71f8e2d3d5
SHA133cfe77dd3aebc48775e150ff279c5447e8d3da0
SHA25628a2664bc67a0b66de699d3b79e6fcbfa494c31ba9acafff9f37ae22cbbf8e30
SHA512d9150a078252bb248b42f8331c2b590bd9059acc7c4cd580ddb243293d61ddbdbaba69097177c98045371691a79e13b502daac717617a21c24ee943afb9dbcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa5961a40cd8bdb0eea26ed9fa5250c
SHA1c1185faa4f3faf11b134bf7755cef403aa17916d
SHA2563d8635e0be2aa19b2a58caf10427e8909efc14af364e6a5dbfda6b4d435b8b1d
SHA512c9e592ad338d568651de7fc044262a7fbf9627c286fe56cb8d33cb1d8219d20d880a1613776bae3112bc8be888faad215f927cf74dbf2ed741e8d31399686353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdf5aebaf6ff2b7ff7fdeef2228954a
SHA1d45c209ac3a359561544f3f4f687efb10ff806e2
SHA25604b9bc4e8d6e3686ee9bee874c321fcd097d12550d5807548860e83d854095f3
SHA51270de0703434f6ac6684096f0e86ba1fbf35f920de213b7c29ac768dba525b3d6d67f96958cfb94f8cc5a2d693d53cb50e403e495ed07a81707562a153900e781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b0ccf6783b4a9ed45fe42817982c0c12
SHA1c89ac2379475afd8a09ac0dfb5a85b035cadeac1
SHA2567587d344d41206301b3f28037f2a6040ed9dceb22bd5a196403f525414c17126
SHA5127793a105d6bbe6fe2a6a6ad286070b2f6f96e90086ce1fe8d0e0426521b13b7e1dfe3ec27df275e088624796e4f0a3dd12a2d5ae557574f5e6443d7b73b85023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a