Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
-
Size
171KB
-
MD5
02705210045a4c895f5f2d558da892be
-
SHA1
40d9b405c1b4719b65493a2f2d1732f57db88031
-
SHA256
6dc870adb5ea161ce2322721233a2d433946fa4ea76cfa2ed7ca2fde31ed4554
-
SHA512
7d97c9c1475c8553207b55cfe46dad28172173768a246bbfc13ad7b0c5932dc747775258363b3ae895ad92ab647c63f9c558bdd44a992581570bc5e7a40b86d2
-
SSDEEP
3072:y4u0ibI/78C30k2QF0QuGwAosUumR3P6YTfD8C4:XibIT8CEk2QW8wN28T7c
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000089e8cabb8262b41a90c0906e86fe4c2feee44750924da5b1cd6f3547fbbcd36a000000000e8000000002000020000000e64cf9ce1c7f073135aaf45d836b6594a8d48240bcbc917cd3de72621f1cab7620000000fe4679634bafd8e3c149f3e475744afaf64d82f283ec10dee4ba83bf5dab6bce400000009d1b7e308db11c3260a2e0b8629ad02950ec1c4348615587553d959483692d6c9ed35edba103d856d000f87064d28e76d443a19ade82d1a8a175b98e076e50a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605073d85c98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000444da6b257291a166085c386833912064e2fe748f6db0f8bc577bacd36f2e625000000000e8000000002000020000000c819831c3c2c6999a19305b51b4b33df7667195c6f1730d14c1fbed4a260976a90000000adbb4646291f19c3aa5d8d0f48e0622ba912f0ea1b1ae96a32bf326e64a717d464a5c1f006065a995c2915ec22a842e9b56524754c2151683ecb602ce4dffca334958fed587076086146cffb6cf5d9e2720ff811342f39d89d04295adc6457f8ce46d0a93ec8df89ad38fbefb8000113d9be2d98060e845c0b05c60b02d0073f8d01bc2ac81d59b8479bfa482e58055d4000000023fe79bacc479068f3680da54ef33ac39ff10ef9af7f04fc53cc2c9d78cbad7c2e5a389c95c378922f2466b68bded12ffb644d5b1c1aa4b45deea6222b9b4a1f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420354572" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC464D81-044F-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2540 2872 iexplore.exe 28 PID 2872 wrote to memory of 2540 2872 iexplore.exe 28 PID 2872 wrote to memory of 2540 2872 iexplore.exe 28 PID 2872 wrote to memory of 2540 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02705210045a4c895f5f2d558da892be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1305dfce63667dad18f7b2630825414
SHA15ba706602599e19a3371bad6a303ccaf4fb1ede7
SHA25697a533286c3252b0321cf171ca53f91f62b33579be9aefcc6f9829d7c34e3379
SHA51208d1a9440b187693748d29d32c3102a1a260cd9541ad6388a902aa16da98e0e7f62be102c33632bd647f81bf24bbe0d6a4ac7c26dfdbb9193ffd95ad974ae113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9ce4038c74b7c67790f393be8e9d1e
SHA1eec1dd3077f1d63bba2d8a1fb138c57136ea998f
SHA256e398044225b8ca17988225fdf9c2f5251f1980226c2fb50a3fb751844350407e
SHA5124da17de10c52881d002c7d42f189da2e9f6b6112ff6eb99e5fb0b149160cac7c0c523579a8d648bc12b305244c77e50dc80a06fa8f928f30d37eceb5f0e50b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b21d97fd779dd847ee98dcc6ece8318
SHA1676a25ee979fec82de8eecd28a0652539090b4e5
SHA25606046a83140bd097b655f15c0b09842bd42fff1ed510c36475786151004bbfff
SHA51207a8cebb71537863fd2a252d546d3ad0a1f2b23cdc0f998dac05654464f248dbba61296edfd7443f742cab64c6999f545ee4a8a0d187af73a32244599f2de992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a412c3054bc27f7cb1f42b1309a2959b
SHA175926ccbb46928a829d3d9793b0822e57c0a98e3
SHA2566cf1e13a2fa6491e56960417c5c56b9195497692e3df1c401b8872058247df6c
SHA512001ad8a617ef61fe3642dea739d74eef83c8a2a609c2c32ca134a6074826ad8fb56c7947d04e1c75e9578497932e8b20de3c3e4eebfc868a1c9d3d653af59be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564e289071a3cc21a2dbcc566d48c2efe
SHA1574c813efaa6363191d04b1b6ae9e43ab8e1311e
SHA256b3cbb51a14b636e379897a414b9b70885b4ebafeb17d53547248598d3cd9eddf
SHA512a7ccf8af5d6118df44fed4a243dca53515ad648cc7b665d7ddadccbcf275cc3d503a5c8a9a54e7422c003d1a598705f3333441b0a1bd9a31617603861b4239fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a9683c1402d61cb9a1f36d88070f73
SHA13af7cd5dbef900710779d4dee7753b0808007fe0
SHA256c5eb3babbb9e4325ebef77f9f6aaf8d9154eb4c7570ecd11b89c03cbe757998d
SHA512ec7d8150f050649485e5fcbe8eef0e8c96e1617f67b4bb13479aaf1fefff48caffecdd8fb636901dbeb14806130368dca669a8c9421335f96e1c2a3f58b26166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de75eb391f7cff41dd6fd296f3257a12
SHA15db977949eea878028f28f0e7ad7e5471a9a9f89
SHA256bc26c553890c9ca4817e450af2a44924845351e859fe58eafc3b8707d87923b5
SHA512f5ab7e3c5cc451b8634ec77014ea9404ea9679e35b57a2c0894302cfc4c870eecfce33ecba7926f163f2d993bccb99ed4db36c2c4d6da517fa678371b8b1d687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af03b1e2a40d1b62359c6c7682c6a666
SHA1bf7048d99d2585cf3ad6002fcceb7869ddfc3a87
SHA25613c9f6570e7837585f9752867f0f1baa2bab1d6333eda434534ede0fcc4a5cac
SHA512a5966a21d8138f90a1ef9c2cd529e70e04d81bec5eb8b99ea215cb31d5dfcb6de87d742e5331ce46c90270953ce7c7037582446c3d79493171a55d86e44d3965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51971e9656b5b6ff131edc2a280b4f70d
SHA1a9d6e0d9b1c73948f8e6d78f968be4343ff1d011
SHA2568debf179bb9bfbf08b2498ecf717164c4709375ff25705f6ef89004c6baf3087
SHA51254b76c607e03943d0a7a47f74e811f857c4f8ec91c7b1ab3129921ef6b7cd830a976518bc92c88441ef340ea312e634ffec674ea0a2bfd21bb190cf8ac039772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c8b34d7c50c30dc0bdae126d73faf7c
SHA1fc342a2e1753e1533e7bcee1a5ace55be27491cc
SHA256979ee7605f4286c66dc2fc40419b15c87759e8e771a3b387e3b19ce3eb5a1f84
SHA512d6c2827a9c9fe79d81a0d4015c3d2ec229329545e585bc5bfdfbb368d13b408b9a8afffe47f83f430791dea6f1b2b415790bb41967fbe139462052e82e13b503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8ab641f258dc06f500471318c7ee92
SHA14b0547495949143d1b55266e9ddf9049bbd69336
SHA256b23244e561cd3a7f45eefce29feb641fa159d165609b445aa929700148d1d8cb
SHA5128ba519d76d671c8454e65d3d22dbdcdcee9ae9995955c0fe5639073d1b326000b768caba3070f2b301f35bb25d65f4092e2c9f11b63acc58d72ea062ff3fafe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097979eac76eb926746c8c7c12213b4c
SHA1dfce2fd0bc6d357b4e7170688883cd56ecce849a
SHA256df1601cbb0a06a7646ca3a7d26a1435f526ca396b096380963d7253f1c510560
SHA512f5928004b3778a6ab8f033b7a47460b405af476010e6e8466710d23f9116daafb538384c15828ff5d90d6d88f6eeca084fb1c6b065bc95d3d794036dbca2673b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583bca711ce2ee5780513931d1c26db0d
SHA14694a09dd122c57958dfd8331f6354a5294c0371
SHA256e3e5d30fa86031565ddd7da6e5ed291f02449cb339b9b725e0dfebc067a92529
SHA5122ec61f207fe81f61f646c80dd61f7f68a7c951b4b3ea99719156b0cc80ab5d520dd396cf6fc9e590b751b5fcf8d1954420fd79356587253d670b2097d6cc63ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd580970b973790b7809ac3e7ada38c0
SHA104a586f92249de54cfe63d939b8eac0beb8ba17c
SHA25625e861ef673f008063e63080515ac8157aba5ba45c8c1a227edd58c651699216
SHA512333e17b299e5dbb056d41a3aa106894d6a230aed5650085c45595f37e2171c63c9af03f8030613ff3f122a09df0913293cf87c45821ab88b2719f5ec0269b250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e90de2e9b30e4fba1e117dd47612817
SHA1220e54906bdbaa1b1d659d702cb7f1c370eff48e
SHA2564451ba52e3bd3335c25af5c8fbecc6b83d48af408d5b2a655132587cae3ab763
SHA51283b9c48f8884394971f7a5ae7f0a1a2235cdf4dd650e0e8c1397d2dea7a9767e148ce46896c907ca7ce27c1e82d48d533b66cafede79fdc0faf7882e8541a548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0462cc81000854e228dc10e6fee349c
SHA1d6969ef08424d04b19505520492a650e5c1891c1
SHA25600bd7971e3d1e97b2049517cf855ddd2a522c60f6b34fa5d57827901e045fe5e
SHA5124272b93c7ceb559637b078d46f797ad9d3b45e3eba5802b11ce85e4610b9d033007f9624ab98616c538d20e0d33af5cd5518204208b3c656c6d7d25ad8fc9b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b976c3c96d1484acc994f2cd52a3e5dd
SHA1e98346642300b47d6b8a35fb30047b6822a2495c
SHA256d82584b1c53e37903afaff60e5770cd26b6a993eb6f084bea5b251b3cae8718c
SHA512c0014879a280b9c41a8215f5d273c535a1c9f0f1af6856024dd46eef9547dcf7c6a1bc72fd969cff7cb906f2c9070f7911a758188f19b8f18c3ade08c2693f5d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a