Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
04f7ee62d0390a22509aef8b8d41f8cd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04f7ee62d0390a22509aef8b8d41f8cd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
04f7ee62d0390a22509aef8b8d41f8cd_JaffaCakes118.html
-
Size
21KB
-
MD5
04f7ee62d0390a22509aef8b8d41f8cd
-
SHA1
738c80aa11614e3ea8da7b684ef6bc2d158b7d61
-
SHA256
17867d220812e67edf5389c8bdd9a55b1dff1562a09572623ab087ab97bda088
-
SHA512
db5b12f4ded1ca57629ae1c4c65905e8ecbba0d1304fe1378a7659bad148145acfc5f7cfd7bbbcdbef8003d583ca21900553c6cea3ef2a50ad9ba2cb05440c40
-
SSDEEP
384:ziWKhgef7VBD8cG3RHo2yQImEfP4ycbp5rzVc5mDJZTO6uk:zixf7gcG3e2BImGP4y03JZTO6f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9CB7891-0548-11EF-8E71-FA8378BF1C4A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b8869e5599da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420461433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000006e31ba6c1b4a7c450d047ec43fed6ab35c57a8ce779996a1bedd4195a82bdad7000000000e800000000200002000000018e1e355b5647ef065c700998e44b63b52dda6fc803517e47133f676d3a20a5620000000863cb663232f69a18b6f3f5e349b15d63e191a3915e08e562411a2a09b5cdb9940000000336bbc39c46bb82d7678a9e36a5e4f0e6604ae285b2173fca7c2470134dde207bfbd46216ef5b0fd168eefee8106b82d134d0f8a647e65c28c8d790f297ac901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2532 2880 iexplore.exe 28 PID 2880 wrote to memory of 2532 2880 iexplore.exe 28 PID 2880 wrote to memory of 2532 2880 iexplore.exe 28 PID 2880 wrote to memory of 2532 2880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04f7ee62d0390a22509aef8b8d41f8cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a16cb6bcc670033a71dbcd3f612410
SHA15106ca241eed20400d43eb5a9386f0b219f2ff82
SHA256ab7351f23a1924ab4b7ecf83e27a84cb53be542563a70ba6e13685bb9d461bd4
SHA51204e4eed0bb8d74f2f300efb07b3246c86f99b7a346df424ed2d178f2b8620454b1dbf0ca27cae6a897c855aa015cb789041630e011ade824b2f5dee8cbe143a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b87326b97c0fb076a062aecce742bcf
SHA1189f58c089d3b44b7a91dc1f4ef4130d2cb4d9b5
SHA25604fc4aca8a13047cb472123499e6657e2532af09499ecccbe2558410d16b2de7
SHA51206990d1f535b414d57f80faca275fb99c46e4b1ec3838bd162331ac7c6c62ed90e08566d5619fdc4e3fae902a021e9d2310a468d52560a79972f726ad1843d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548317d3c3b143e6ce7fffd4f66fdfa6c
SHA18bc69d844f94aee9528805b12134619e54acd1be
SHA256e973f620a16d70fd8bd062a3225ef4796ca5dad692b5cccb3b10899da5766e08
SHA5124623f2a5e1cece1be39d857590a7c8b53e6578c8526160b17f68f0a883055d97110aab0b480a4116f5e651097de7ca23a592c774d342156e69cef77810d12272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f755b050888231fd5166e22a823b52f
SHA1e2dfb3b1ed3542ff86f929a9ee74d68c0a9f6032
SHA256856707e4433a5cccb66afdd9fb602182e71f3181e5230633e55cf3495e0927d8
SHA512631c82090d6d2ca14f8ede66289d4cbbbd4384ecce12d7d2520444e03108a3a95bd75b8f36769e475cc323b8cb552494c93f4faa1bff0fceae133969b91db0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513d475aae14d75e2f1a8ac7293b850de
SHA17984c2e88382dfe954d7b859b8d328532fd80532
SHA256c69528d000de3f203c4cfad9a6808555d7b13974da44b3d4b25effbfd57090f1
SHA512f16385942e55f1b986fa8731cc6ffa1caec53468a5138f001d703dd251e27ed26938e93a5829a2201f4781a7cd41de30a3c67c74ad1855b8dd93cd81d2787db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54940856260a291c8311ef682dc8e01bb
SHA1ec7ebcee5bc3f0e0c7d6e4e4c7b1b848e1745ef6
SHA2566d42908d64e451844ed8b462982d144aa73b78d0e0659427a60c60863198c81b
SHA512d4c57ff37b80a0bef6066a9dd8dea6d0719fca9a237570ad104fccd76e72679d550f31b74b9daee4ff2e3c256a73b5e205668a735ab874c3d0d7cf79a41003d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54444cc157136db50645c48f83fbc398b
SHA16e0486ffbda928c6ca0994feefe318cb77dfddc6
SHA2562329ad0620d4d954706428842c59ad944e3601e60e3a17be12cf430679bb5d51
SHA5127e6c18f0b487ed2bea1a506f4d9e3f4bd77488063728d53d370a115cc7a20b0b2f31447e836cd6199c48005cec4871ae2c82dd090e18bbeb48b97ddd31009a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5953ba20b3724e4928013cc6f446a9a04
SHA1ad0e9dacd329fc405c1f73de465d5a86708211da
SHA256280c671a2201be359495bdc893de4f58386af7ef847029d05a5534e759e03457
SHA51266825f65c8ddb74ec9aee1c9972dff484fd591f3c24bfaf4a40ccac9946794be9bb6f97065e6bd342a2bc2f7ba362fa61a4cb2f7505d23928ea1ba66116c039b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6b03759c86ba68cf9284cb3cc233c4
SHA14baec84bafaf7a741c8ba073982696ea91d35754
SHA2563c85ca3c7d352046e2bb1bf25f4720d0aa7db013800d147f450d3b6bea97685c
SHA512c439a8c5513e552fc2a49bccd65d91bcca794dd7261cbfebe49fff5e5f20bda8c906bb50194e5e17b37203d47f5ab36217c41d7f3d48d78f636bd060c94f683e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ecf35a341fde61425d53cecfa6444cc
SHA1c7f77e4c4d7ac641295a4f888971ab3531e3d628
SHA2565535ece5cfc6a488daefbe535ab577c05e877d161d6c08695e77f7fb9c3dad48
SHA512e1162a89030fc94e3e525eec1be10df38a84c8f05c512d98888569af6d831a216c42a7ff0bd0012cc1f9114ce503e9821482b237844385a73a9a279bdd49736c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dddbb5d1c0327805b27fb075aa763556
SHA1599eb30a888e9b0c4a4bed59fc176af30a92c1eb
SHA256bb2d5be3ac7cc2e5510f05216df8c1ef56ab984d46752ebad7c36e2accce52ed
SHA512985ec719c873dba7d6da3602532189b1d363fbdffcb4de8e4887757b331dbf7a1814c28aa78e2f425f0465f03609543a4b44df39a15c562d2e3fb6323c4be0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80b061d2c2ee1c6e6b60ab1e89b7e94
SHA17297e9b2154bb3d947a678c059f1eb626d23d77f
SHA2564723e810854ebe4cfb870d1f0f6bdd26dce101e74e8812c1d44b18dfa4ce7e33
SHA51241e0999bdcccad78fc2128d34726d4a17a6bfedfc5cd1378366ec0e4d61dc954ac15610843a7bba71b2ea1b317d31d41b81062ebc1f5eafe6359362517c849ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d754537695bb2876a24618a4996eb3df
SHA1173ccec2f28bf33bf6f384eb83864d788cda15df
SHA256265fa14986c757978832edf618c198b8bf71c0e3bab697e2d1ab66874f5bef33
SHA5121d57143b85f6aec401fae36a022f10ac4065a14945e2d26c316a0e3d72563121132a1c3a91d8ae546f3aa77b3aacec447f10f662a6bb40794887941d37b2398d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5f7793b119c790a9acb79c85860b3b
SHA18c510049b70d33f5eaa6d3112b03a3007cb93403
SHA25613996ae8c3d00824d2182478e0c8fdd085b4c98ddf3688a8cdeae9a8ab795ebe
SHA512c5dc9f3870e6c79e6a9bd03406d2054db370c104f33b4b73664dbee3017bb034e88112eb7018856c66d9876ec16aceaa9f7373c26b92e7588d56593bd8a3911b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9599b1452a139a73f263d2553e6ac49
SHA14fa40e0ee83b7504a734d91af4ca203f92ba9de7
SHA256cba6b339d7a5abe8ac5ad8d15e6057a683e09b8449c16839f2200a73664c701d
SHA5124ff0befcf608802827fbb28012bb8ab6b1a9a309849664a2cb8e30d091f9a3030d48d946214b3079e925fc21dc19ac9e359d179e27358c52954d1fc1795c1958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d77bb375b43282254849f2ea4e05f7
SHA1e7631d5f7bd862f5ad758f1c590e793890d2e83e
SHA2562fef4520c77caed8aec4b2407ad2d0e44adf822879aecb2b5e9f4775bd59da48
SHA512c028f8df8d953f81aa5f3bbabf75b19470b65a91edb04f3df8254e113b90703e6307e527d28edc979f4440e90788345cde935b970f7b7b080fe6c825689892f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffedaef0a4511888acfa9a6fedfb7c3
SHA1754c19419c2c0c24cb16a3c9e09cc3f7b1e8125c
SHA256a3c8dcbb0817b65cbd57a623975a7169bfdccff379c965121afe39b785cf14f6
SHA5124ed43d6a9bb2af7d7739bd5f8612419988951cfe874661d10b0c8c6bc68907196bd5c2f8c9b3049aab4b3395d4aa2127ea59bf30ee4de5dda53c61d9e90d98c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58468157ff41514dea68354826fa6319a
SHA1975b180c48d1ac7763d9e23d8bb045927b4a9265
SHA2563503d3f246c3a189f652491aed6a9be58456b3de53fc5c5683e9579b447fe7ef
SHA5127a7ef96ebe3fc43cb40a3e57415a8b5fbf5f267eac2112c0b29cc725bc060b79d430b92f76ad0c39ddca793928e68e0efe4014cbea1c88664cb360a0738f1cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befbc3eaf4242329d310b4b6f387bd63
SHA10bbba655ac8e82697cb317ff94f42ddaded0d3bc
SHA256fd0d092d81d1f510110ae142ba53548f50d03dde83cd3b52aeca08ddf9c3f446
SHA5128c6517659a580838e63c83a53e88d4253ccaa7dd77078964bc029a0280d71e8dfbb4cae46d2edeabdd5fee0b8a40c708319c04817122ee53798b98550ca0606f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a