Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
00c13628d699ff37bb6bc8bc0845774b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00c13628d699ff37bb6bc8bc0845774b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
00c13628d699ff37bb6bc8bc0845774b_JaffaCakes118.html
-
Size
15KB
-
MD5
00c13628d699ff37bb6bc8bc0845774b
-
SHA1
6deb5734244ce0e48414713a7de63254ee412b0e
-
SHA256
f57f53985650f713a9ef642b52516fba861350b9b9902507f68c8ff138f367d7
-
SHA512
cd3285c578ac76d46f7b52d69681b0761409b13f72cf30f2ca99648932cd007aaeca89c8acdd611a76ceacdc2a0f882295b05d0b59567779097dbab4330019bd
-
SSDEEP
192:mAjSZpoBt5tStCugDYqHaR/0/bwc5ca/a7YHEuF/6avBVepbY4W3ecbeGe7Rw11n:dFt54IDN/bwWk0fBV6RIbeGCwT6XF9xa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D9BFCC1-03C7-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420295789" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000bc60f6cf88c6b2ceffa713bcd6e4d45a8cb4366850fb2dd440cad716a48ce691000000000e8000000002000020000000c3f1e4da8881dd28745effc0f3359a882fd2b113d9e59f4f93d0e9fca7a2cef320000000a047f8375c4bf015580b8bed74967d38eee4e8f5a86f2df1f9a7752da6e37ed040000000e6f39e126fe7762244cb1e592bf7de6e03c78497d492c546b48593a4ef08317d50eb55f9bf099a7b5e4aeb72e90d7c828770f26f2fc0b14fe848c46e7f56f541 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000d80f3d397da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28 PID 2888 wrote to memory of 1744 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00c13628d699ff37bb6bc8bc0845774b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7cc3ab7485396d04e6bbb52dc2de319
SHA1ded6139ece584c503801940a3d85c4708ff8a654
SHA25673cf1febc0b4eaeb11b5cf38c9b8142dcbb231c4c5c4331fe67ebc6b28a27d62
SHA512e3e754a97af8d4f3e34b59c0e74f669aecc9bb940e044b986f992efd7e54a3bb8e313b826ef30b79103cea330e07ca828855ed174901a4d49b8933de36c0656b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b38d96dd91c182b2b41ead514af3bf8
SHA10f0d9f8a2a54792398844293110a885bd7fecc10
SHA256519415705600e191bf5c48d229fc4768a317439a325e5ef61b75f3014249f391
SHA512fafb3e8ea222fde19dbb76fcc05a25497d537c550e2ae6bb9b8e0f3e13bd985ecb5a2f6b6e08a2e63603f1384a29210c15c9800da4a80faad6e1381865ac3408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a688ecdbbbc60cfeacd5d5ae38f33d3c
SHA15a282ba4376368c299d69b0efb778dd82a95c04a
SHA256625733b55e85aea0c4a70407220009fd787198290f49eb11ca5426c97758413e
SHA5120915803e3c4459d81fd727750e58a97497f1e29dedf751eb913fe01e37fdfa57fccc9b91c0b145d78c2868283f217ef6686407cda10258c804c512b259068077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff32008170e26d08e61fa62664eb76e
SHA1d5a9a3cb3c4433257097de007659b8d9adec2f95
SHA256ee10652a5e98761fcd53abdeb1b66e87e72c9711fd672140754574b2b668f88e
SHA51224b9d75ac34dc75ea940c34375364ec212bfa9d12693acb17bead0a4be0e6d175403ff28d4b99ba7c1fe508f3894b8186a6fd81c5f38ce4f064e93c5d5898043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd1c51240512e052c56d11a7e59173dd
SHA114e5881016bb0288cc9233bab7022d7a4a906b07
SHA256f4a4bc5b530caca53b013014007073d28bcafeb7784e0a09ccab9035deea4207
SHA512cf5d73fa2e38c07b8eb6cd4fe28053c6dcf20545cde4237f2b73de62daaa82dc7102873500a443215d7065a797d54b7092210012fa232e0cec1c3d422cb9a528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b978c780ddd68d3835cfcd369bb4228c
SHA1ea97ba83ebb36e63170a5795052e6d3251f643e6
SHA256ff3a2cc6e6e5f972e88035230c538c597191363b0c936885037c2797dadb0c57
SHA51293898e0c0c5cd8eb4d824702cce898d2ff5055832954e0e2481ee3fe231827a91b02dc16981e86dd3647d19590221c1cf1c97eb69bfe6a74e2fbeb4c729d8e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2da4cba4aae37bf772210077b37e238
SHA1cc9dc45b997649a3c26910616af156cfdfb18c08
SHA2568cf930bc4cd55eb81d79ecc9fb08a591bc79d9f508da309a9b13d2d66abb36ac
SHA512a0024d3665db9f36106b412ee34fc7fb765c63a0a3fb73f5b74e19d20bcc5b9cc5244a84215a662a32e4520f9463c21c66a244f23994764e2912355ff6531cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af77d9373291c6a5e0e78beb239a1e22
SHA1189b34579f87d30d858128bf829c8c4e4f27d837
SHA2568b2a422954e641d820b0f7f9c372316cce142c3a7f4adcd50cbd8c100d8a6c36
SHA512dcdabbef36639cf1310b507d35e7482c3ae23d48875ba167fb07304212319d63cb11720457613dc77514c9cd4e77f9d9b0d0b6f47e8ac62a05edd3464792e2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52595d424a10966b314ca0fc0a019ffa6
SHA14074aae9c067620ca60e2f242b95015ace238571
SHA256a325af584730aef83407c9a46f22c56cd16f8e79d4edd2fb89b66ee5fcc2e4ec
SHA512088a19ab4dfff639a97c4b1e870d192eff04f8ec5e67422f233e911162f5061107fdc0581d2df9ed53a618f92076c4dc72df895f7014170dd6247fee195310ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a856cc19ef5098f40a57d8580ec1fe84
SHA1e05311cfdc67f7604ec7ab4d8a9d3d664286bbec
SHA256b8169698e31a69107f3366cc18380389c263b16d11da47306ecff56b8bec2fca
SHA5127fd0afa0cec9ee82ce96bcd5806a03c8acc74acf9e5adbe678585c6bccf7bdfe14e7a7601caa4f4db47ec20e84f5163e753b58daa2ec8e6f3bd293da8416ffd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de384c76e2d5c6096630a6bc7d2f0efb
SHA19d92920c1ee001e59d3f98e19fd632f002143f2c
SHA256f8b8830db8ba3e9bcb8a6d633209ead370406d3154149ebf004c0747b6b00d0c
SHA51241a1f21fde7aafd6c2b304201195fc585c5b1525eadfcbf17b94e25b423f5e5e32add7dc3c21c2ffe1b5d0f39f90df1b0d16ee3d403ced68e40951ed76b2d0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df071b1f2cbf2d3bf8885f372ac95e2
SHA1a0ba5f8ef1a94e0566ca5b21641dc1d886dc53ac
SHA25663a4193b8044591591dd1a93c82cf7caf98d3825b3ef792b2157dec2faaf7460
SHA51276d23d492361c9b452cdf05cd80420c9f160bf08c6aacbe2adb77a56b2dab6d5b109874a5b15b0119cb5fa8e8b8816fd582e355ef8c23a76a8f045fa1b73eb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e002cb1b48c5daf0721e5f5e58b09b9
SHA1fae689fd7cc8ef14b8bf448fe832ced380ed9104
SHA2569000a558c445fc0c92a4953f544d701e23b02b388983d06e8def8d59eae9562d
SHA5124cb7009454edab95ebbfee0f603a29fd27557fb1004b5fd3e9842f2cb7e0cfe2a4b6fced79b37a6b4ae7978ba15e4149bbad9658c50a51f0358f393c055ffd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a3551138d4551341a09923a7a41145
SHA1b91815f0408331f9e3d4f11aa48080dc39afc505
SHA256919e3fb311b1696daa9a2d523374ff3235a39ab677389d0c5b24984c748fbf98
SHA5123d60ecfcea66df905743255364f8662f3c73e3ebcb52e0c412b69838b7de97e28ff736f89a84172c37ff068b4f0c3aa2a520d888ebf3100ec2ea0ac3cb2a5318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d9a0f48b2d04cc90866c555dcdf980
SHA1573718eebc958308b0eed958df982400514cdffd
SHA256273c256952b4e21a90d11dbb4c85d68f2a295bf1b43186e9a15705249b27b195
SHA512c713f091d57da01ed7118df19d5c158887b6be13e6143a4a502cd1a93617b624a03cfcc4130646560f0d0e1e046a53cfc4f3d7f13e3d65c912ff9b6154e38a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577f6583bbfddeea9883443760da6a710
SHA12f52d28020cebff13a1be28c62881f362edb7642
SHA256e5fca248c9156f4d3bf3a6417ace13ddcef5b3a44e94b36c9044613fe73e9da2
SHA5129067320b6b098ea3dc1e384dc75ccdb22cffe5bb95c72a6d2333bea35ef691b5ff71484536c68adafb0a98f434a4bb9aa0ca312defc26da90a414028fa256482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c367c7762ad0614b9399e0a9bb1d20
SHA129ac25920b86cbc625b7d84b20944ffd9b2c2173
SHA25680aebeeec3abeac326aaae77a598f2c4d204464a88783a0388b4517d6c54f13b
SHA512cae423b3face0bb3b551eef4f98deda04b428000e84166d09cb2bc84fc4cbe16894c8ffdcb7d4f1a03cf9d0876ac19b1e3d4040206553035632a679f699d6b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca5876a4739cbfbf3a682d3c3bbb7b31
SHA10f08cff0ea2acacbf384520b6bff758ea5c53c52
SHA25674768c626ea4b9be120c57652fecbcb4f967172c3975c214338d69f7e22a710f
SHA512cd72b0af4c6c65794f181d8cf89bad05cd275b852518212b51f55eeefbd31fcf4ae4dc826b1d80342e8d963b25d7b7b7028f83dbe48c02dc512df5e26830946f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc9bcad5a9044b3aba7af02988d0825
SHA1743ef800b54830a93da84a651110f4ceaa93f40c
SHA2568bc9986e59d4145f525632f223f9de329ac173785b6a842a8a210cbf4ffa0cb5
SHA512dc71ae2808eec5ce018c92cbe41f1c973c1fef9526d31889dd99a804857c59fe1c96b4c34019399d39ce97aaddb36e83afaf744432cff6095e3a492cef3e9bf3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a