Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
fcecaa3e29b09ac0b0aa3abeaeb0d05d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fcecaa3e29b09ac0b0aa3abeaeb0d05d_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fcecaa3e29b09ac0b0aa3abeaeb0d05d_JaffaCakes118.html
-
Size
56KB
-
MD5
fcecaa3e29b09ac0b0aa3abeaeb0d05d
-
SHA1
24b08244511a663a1f38dbb63ada54527c867b0a
-
SHA256
153eba1505c9f4b20fbd01f79356795144229c24af35e8121a2e0836fccba141
-
SHA512
88c2edf83be3a7ec62c76bbdb0568830a89272052ccfa9e94f429aee341206b81818b639d97bc8b4a03339e1dc0c818e932684f853dbf21cfaedd4522fe07303
-
SSDEEP
1536:zenOarHv7o2KIr0Oo/UmnPmSreAa+NCR3T80hWxk:KnOarHTnJr0Oo/UmnPmSreAa+wR3T803
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419783693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701a7ba02b93da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7E23301-FF1E-11EE-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007a27ddf3ffea12be0981f4dbc7a443e25a0e16117b3757c687894cbbfd9ad206000000000e80000000020000200000009ade4c8e8f6150dbe93a8fbdec1190fc8816c0efb8737e00dd40800aa84a4fec200000006876dadd6e811fbb199e4dabf61f867d589eb3d4a4563ec25ba2b164b44669874000000006a7f7f42a9b1dc38a684bc17175049a3f025a2abc9878f240a9efbad52affe601aa77915e2fc4da2bb8e8b175dfd4e212fe770d0f6e7a7a4044744bb8b144d8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f0f5a52b3cf71ca1f54a1d56302ade00c3887c799d1f6ad3805b1fdb8d3f7b44000000000e8000000002000020000000d2ab55d48c46649352f483b26af9f97aae88733bb872abe0a210c8bf9ad3d70f9000000014107a08dc65cec1e050216be5bb6a8ccfead39885a31fe059b85cc094529d690ef2715e0d2d187acf994f897955f58c35a1848c8bbd235e24044782dd3a11173bd684327154a708a7054472d0136c0108f937429f57fef132323db194be922621b75f5fedd047a757fa9b6b5aea0f31d4ed5b32c78208db198ce411301496589774aaf18b5f61c202690703044e97444000000084d19de517900d78a415a7f820ec1e4504e3d3dc748cddcb93f5583cd286d2285d53894faf290a31f3c5a9ddc76c0c2b5465729c03b2bd346e3790904e0554b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2504 2172 iexplore.exe 28 PID 2172 wrote to memory of 2504 2172 iexplore.exe 28 PID 2172 wrote to memory of 2504 2172 iexplore.exe 28 PID 2172 wrote to memory of 2504 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcecaa3e29b09ac0b0aa3abeaeb0d05d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56ada88de67d49f8811c6f56bf93bc828
SHA10a5bc150634e7c2d4ca1000b30c56a3c0996ad73
SHA2567d2adfa80e21c1a7c6617f0c97ec71ceb2e7b4547749ee3ea40c12b76a413cda
SHA512354845f66a5971c9085e6389e7e473514b6649867938822b13938ccc8dd21aff597282f02d0fc53b58bc649317352a3fbe4c7a83e3ea21b170874334f48346b0
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d7a419fb5563339ab8bf00630fe299ab
SHA10fafcbb1834b531e094a8efbb2d2000edd5db5d0
SHA256c17d49a07235026da6db98a98c98ea29f7ee491fd756cf5127524d90bc696e08
SHA5127dd8b5fd6543cf0f9fea4dc7c80487d69c926c4628bfd34fdd2896acabd8f626a40c4013447b23375d749f75c16b2c482d60f34c3d3fdb3762fce98adda6573d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53acab1c28bb095955fc1fa853403f5e4
SHA17144810cca2a4763253467c300a1298c2930eccc
SHA2561d53085f1e1bc17cbf77c97f633485a2e6e7071de8c67ff3e270ed52339b537f
SHA51241c2893206c063f60d6c3e0623d046a53877f9be374d56ea9574ce605d0177e29af81f1f08e8ebf254a73f0c5b461e31022b5d96421eb91714a4f7c574ac4a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad30322da4d8c50759ba96c23014aae
SHA122d9eb50af2371627557560ff8a6deaeb1c9fbaf
SHA256fb73b39d2de294218eff28f4ebf773a637175666ea0e142983006407b7201fa5
SHA512c6cc0a5d7452c43c1d84764469b0a9b460d04f3ca2ba5f2c211d876fe462ab071e327b0787630f033136991fc3660acfd1d36b40afd4b0dbb7d9365b5f77f521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f429e4ca857c870086722d54c11857b8
SHA1a9986579713e057b4c888aa3299e4832674aa063
SHA256395977993f6cc95b7359dddd7c2e1bd606cc00fb3c072d8a0654260e05478801
SHA512bf55aa65782d92ec45ae374ddb56567b46a0a459979fab6d683cd8945f2f2413fb61f9071be14a195510172bb37c37b6e676100028011abe0ed5378677430348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee4aca540b5655f4a34cd49aeb3af87
SHA1daec8bdec021bb8ed416d895a43d45c1a2065cfe
SHA256e5fa2c649acf1360c0241b25b06e4d62e5aa53beb914174b9ba22a57a557d0aa
SHA512278f16edba71ecabc1fff0605dc132b39e55c95acf7cd301545a6a4b312fba55f058cc612a5ea697d3350ae025e5e732af0ec13d6aade2d90fb286b5d28bc29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f69faf5ef8fc33df353a5152e1f720e
SHA1bf5a0977c3540b9ac3eb8363e8f0f7fdda744ce3
SHA2560d1da76b15e34ba85a90716e2382d85a3fa17b9ae1cc074dabe3b06d69fac7f1
SHA512056207a6b28fae54f934f9a4b6f1027769f7c0e6172d6ca60eda95269fa3a4065196c4ff6cbd62ce62995a96f38d68560566677819b87d4fb4683cacc1ea5860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a07ebbf4c2e8384351781864daae04
SHA11d985147ad679fa2b65fe0aa1ca51be62d7e8acf
SHA25620eee754b4511e6bf30e64f47a5e1274d462de65e7455c37114b20e9b0f413bc
SHA51283c1e2be72ddd7698769970ce046afc63f511298d1afb9ce32afc0ceaf6a6fe14e75a26fd281d5e6201c6cf906b20746222378d352a94843da29e2848fcb5ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541bb0bcd76f70c093a3d05881f8a37ef
SHA1f3b900582997eb78fdac402240d0b6a840995fd3
SHA256e4d9ccf74150addc6f9f5bf2e5c9a31e16503dbc8067944003a37ec226900cd7
SHA512c449cf680dcdc4216cc17787725e128403f67ef64fdc0b2990709ef01b363a3d72d155b34e27d9dadddd076d68c7c3336bbdaeae8dfccc4413aa7554c0624a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5790f2394ddf26b015dc1d709984f13a0
SHA157efd0e1fc6cfd537bc38a5c15e4632c21adbd55
SHA256adbb8dbf75591e41e90f3efb716e6a456d8fb226074ca583fd84139e5a370c2c
SHA5125e6c3ad35e35b2ee3435c00377f7afc5b99baf2af4a412b873a4e2d2766a3674b3ad15ee55bc60a367ebb2bdfa680e3e24ea8ebdae611b48a1094114bdf77604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55859b829cd3199d2907101bf1688909f
SHA156c2355f0eff53f29ca545d29a6d3d47f9f8db29
SHA25692d62c90b45967356317ff397f8f337bebc94ab86c5aaac9fd1fd45a5e87eb1f
SHA512b17c08a3d50ba8db57f23d0c724fef3b6d45ad721b4e66386035743ad5451852f38d3b9f49b821ea7e13d2a4513a070b656ec01daa549ea995cbda58552a6bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57218f007e46d7b4b20dcad38e5514bd4
SHA181dabd01b9daaf9f37a0b8f21a933e7f42272bc3
SHA256fd3c665cae3e00be433e4f903ba16ac9b737dc4b90d0fa886d7030e328766cfd
SHA512d83e7fa522a364ee087387d1792ccf378930b383cf19a3817ac386b5dc9dd2fe76bf781e30aa1e40b33916fc717a6c39168843ca50942f7e7e30caee8caaf242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD596def950b248791f715090b3ab0c34e2
SHA10e87d5c4807c94c11b2834480bd0812c525c092f
SHA2566add873e73a818005ab445877fdff0167c5dbd2ac7a12d562c2d59bc5a493aff
SHA5127953008f2b46c0ff71f8623317b48ac136d8c9e62715467f8f82f971d1f76f882b5ab2b11a8d276ca304fa67872bafd89ca4312bf3a2b1721568f6ba6e6690ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5858c1e5f83530db5f31a94cff4661892
SHA192af871bc2a45d8143ecab375348e3578c302be9
SHA256b6a2e6963b1aab5044553d01e659c802cfe6d3a67d26f8569d294716d53042bf
SHA512f3dfdf68c1cc4880b55a3a9b406944345f082f522694f230f5630fa173cc3135b54672e0019926f0b62ed51d89a48ac645eea43d3a4309cf6f445ebdc2209c3c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\cb=gapi[3].js
Filesize133KB
MD5dbd627c28e97cc5bbe7be0c7a75e386e
SHA17bb367b5d18dd59a643a8bd4122b37a8a33bb9e9
SHA25697c5e5f7f3c5a1b36449b765e533eab96dd3ee4bb806d0c42d33b2d1457958f2
SHA512f09a05f7ea69e67124dc61acf324769c07e31bab781592988bce009e951480de0c7f310d4bdda3867f5900e91ffde031b48338552a47423d4e59622301bb354f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\platform_gapi.iframes.style.common[1].js
Filesize54KB
MD5f0d50a9a90ad59daa2f877eec130c234
SHA17d06b084efb04f3ab882d07f70bc2cf15a80aa43
SHA256533e36742f3669952d3d943143d569f1681c0329f746f36f4364e73e0d5db5dc
SHA512db48d8f4852f27f8f21fab0a3f6bc685099ef943e63c746a2ee3c470dbddae85f5e38f0f37e69f7eaf52839e697dc5e8082084bafe6a01eaf5864de795223517
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a