Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
0086a7c6b616de81d9556d5c9c338a07_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0086a7c6b616de81d9556d5c9c338a07_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
0086a7c6b616de81d9556d5c9c338a07_JaffaCakes118.html
-
Size
60KB
-
MD5
0086a7c6b616de81d9556d5c9c338a07
-
SHA1
f1bdf136087c255e6f63711ab1117a8c47531989
-
SHA256
1ab6702ef55ee0d71836890cadbb6727542003d2f6621455276d365e47a31d9f
-
SHA512
27cd1b5c0f1866b890020f9e0a3292d69b17018b3d4c47a0e5bb9f3b43186e02f8a43869a309376812dd7380f3e6f73f59041ad8bb01facc32324559057ffaae
-
SSDEEP
1536:SASPY8DgBCxkMG1mznz1QX3HvK1di/Hw3kiL53:SU8DgBCxU1mznzeHv+di/0kA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602ad64bc197da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000008d7e24f6fdb4da9ce51da70ea03d3c0ddead0e6cbcf7df7a9a6846a7822161ae000000000e80000000020000200000002822e6b5346c764005debf2527b1c6e34412e43ff7117c744fe84f8f875da36a20000000b22d574bfcddfacfe06ca87621e74ddbc23e7aca751e9bea0a5fab50dd68998b40000000b7d542bed8e41805d72705da0a686b7f242688c7944046647d8483b3dfe7e5288bf81b1a2cb837f3ce738b8cb9e5a974b6f2ea66688bd37c80bb653c1bdd101f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420287763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B704861-03B4-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004b396720b98da37b12874f15c024933ae9c608a97a69662c36020177388f37b1000000000e8000000002000020000000c7183eff2b1875aa32d2b93c87654f55dfc6a8a83a352d517df7a5f2abb332409000000061e66490a0b0a47f7b61b027515d1ce6d1ab77fed0361f49bf81842a3da283c71252e02a3eafe91f6f8ae4dd34925a22d20e85959e7ae1261d27b8100b5d9c8ae138018ccc04b9f853e9f77bcd5a50bca74816e46cd66e8293303368ff61027d29223ae8a65fec2bb9f124c59184077726c07645c32c22eb68de57b625422facaf58785c6d1d76b5af68805e7bb69d68400000008e1699dbfa73402c53558fb8ce2f1bc96192808fa3374026f706ed27c805b5da0132a8ab916412658339065f9ef4301664ce04447c75bf8d4f43fd50020c50af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3004 1712 iexplore.exe 28 PID 1712 wrote to memory of 3004 1712 iexplore.exe 28 PID 1712 wrote to memory of 3004 1712 iexplore.exe 28 PID 1712 wrote to memory of 3004 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0086a7c6b616de81d9556d5c9c338a07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d2f5703d6d699d0e3d8029da3af9b10d
SHA10357d13b890bd2765becfe64e4e4117a4c42490a
SHA256dde089e98bcf38ffd6a305f154ef26ee103c2b972ba7d5ee2ab21600c5140747
SHA512df0f9f770b359a55cdb5bd62cd2863062374cf781c1e0afa52f329614480aa3c081aed1392a6b2564b5b9518f0733f52ba07f8f47816282fc869bacbaf4282a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce9347590f64f9fb4cf38349faf7f20
SHA1384593d2ff182aefef4928d56c649cf3e3cce7e7
SHA2567f9a96d4de174502159fee5d6917f04fdabd8ff307aa18c5e4056254ae67765c
SHA5123c33f55820c4cc6ce68ea9b87f7775d1401c24081cfd49e5790be1cd9e8623f44cdb9b9c74e23d24c62e1643756896a3c996cf724cfbde507fdc3f67b3dcd0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f897882a864bb58416bba8aa4332e26b
SHA1a97f4e601349994091149c4c2ff1fb92c2b0ce37
SHA256027d9ae154dca658bc35ec68a12e34a007034b5927056072e57c64b4108d3710
SHA512759b5e6eccd3a9f385eaf9a0ffbb7f92ee99d6162667a5f24a170f584490a1c405a0bacbecdbd1d829201685b4ee00e74a63801f3bc4e51c293daed7004db260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0b363e9382482998b5f7f772cd59576
SHA1636fb9d420dba63f629e39700f7890e0a379decc
SHA256096db05a7b88d5081df6c473a59ede2535a980803afe2e9d5f58093eb9721261
SHA51211a26b1bb9317c5f4c5a0770355d8e9ec1eab2bd2c09493a8f4f15adc721b0981bb6f005556a3c0d3e3dd6f5836a2b00ccd6854be7df4a1f6f9756ca3481008d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398b53d7345e9927ed2716f6057070d7
SHA1f5283d8a4f7d1fd43320ffd7df8ce6bd2b3869d4
SHA256cfa17dc18273b77f5a63432f4b73b3b9d22dcfd58f12f7900613c5872c9bd599
SHA51260d42cde478db7a0982001b736287c4c8f247d6909b87faab7d64b5e66e6c15efe037b24fa2c06d32a47e012a6f52bb1a832a6b7c64f53d9f205e64c0350fe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c9d512e094f012de5d1ab2f49a01d4
SHA10a533c664e411c4d7313840e45225c71b597d7ee
SHA256b4d7b78a5dda72fb7e97b1318121aad68acb74d2f2c18f8b5ed46d59d75428c5
SHA512c3edeaf38288aa6667ce1c29bf2b87264f558d8fd5fd9d8f36d15a0b4589501f052c0cb23f6fbf6337b7051bd7ae36423754abb2c0effc8376c354c2dc28b441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c233c63091be5ddd77d33f7067c57bd
SHA1507b7b230184a85a2d59cc639b0a51a9c4eddd1c
SHA256f4699e29e903e9052912dc6b922ccb85a556755382ea3b1ecf7739315f8ec63f
SHA51255e2207ee058df08a9e9684edfd9e721e5feffa0178db58617a235d18ac4a1e60dc0d3d7ee1f8704c7ff6f2e705a19dfa7893ec7f0ff5cb02c7122cf5c09109e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD597e40c95e17d2f19e880a9082ebf4c41
SHA19f5db0173c1e23cd45ed68cada53ffa6d9f25717
SHA256665ea7e18a16d4f8ea1f610e02ef115102a31d7c10af1576059471b53c2cd4ec
SHA5128f46e044a4f44271a7d1e192a7766a09e8bb094ed3b9515a7157db73f668604d21bad369f01df58ba82dfcb64032d3b601756369dce02952c4194184d8cfc8f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\cb=gapi[1].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a