Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
05e4f46bbe43445c0b090738d6057d49_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05e4f46bbe43445c0b090738d6057d49_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05e4f46bbe43445c0b090738d6057d49_JaffaCakes118.html
-
Size
481B
-
MD5
05e4f46bbe43445c0b090738d6057d49
-
SHA1
c37be198f8bfef050bac223c5a2dd5aa8fb532d3
-
SHA256
ec2e50784d7691da44e775c6aad47b83c17a478a544cf5f1197d79ba8b7f9e18
-
SHA512
4c2d0cbae0794bd9022f4585e4aa8bf9dc409c58145fc518a1ea7d9c9dbc46437592dcc115c6316ac1318935a64e7061d1daa672582f7e45ea4ff6d7feaf286f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b0de07a199da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000005bb988b6a4b30205df69fa4252747fa7c60fc3f819e2681d79ea3fc02c5b1c56000000000e800000000200002000000020ecc0f005672061774fdd81b7c2246815be1e45052ccac2d0a50919a1ae7546200000000156da5e63aa91711a47d071c772de568d1087a133f85332dede3a0a55c6977e40000000f1cf04498c9cdfb8e3ca37570843cb1d98ee97e410d1d828c0c86e7cbfe7cb094d34dd66a58cdb0f8b667e9c2dafa066522e6c9f9d5b2fa040234edbd910e3a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{332842F1-0594-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420493822" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28 PID 2352 wrote to memory of 3020 2352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05e4f46bbe43445c0b090738d6057d49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533480968e37b86d2136b88e3b82d7f61
SHA13a72270aeecdfa7b523f8b114fe64b36e5857e82
SHA2565e873308203368e48576ade065ac85d74e28362efdacee03f363862e0d11e081
SHA512730d72414eca5cc466f28bc3003fc49a2319607aa04603419a35933e07ba1bf9301664e9b518878eb24c50540e5ed5f4e42f99f803ed79522367a65fb3705d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bd7e06855f907f3792f1934d967e7ff
SHA1c9f16ccec50631186b87086f16240f94570cd96a
SHA256cd31c2273ad677b82b4ddf786541983beb94d9902778afb594f863280987a63e
SHA51285f724644a3f695be15a099a209798e595b97799b0cb1772e7630928a97b22f49ac764114501f8b5773b3527eaeadd6ef711ed248249de82de5071f1978fcd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14b7754b49e7e8942ccc059421a79bb
SHA11f01e6b474eec302f019449d7dff2b40d5c2436b
SHA25671e3ce99754775cbbffc5264ae31ab0d9a2c22e95b3c854f40ba532359cc85cb
SHA512eefdf86adc6164e4e67b738c582f73e252a36d1b5de571c197d8cff69e4dcf736055d04892cb16ed3b11efafb5feae162c9bf720c93b072908f17c62364dfc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb68c70be9ad09ce839181d9617b8d88
SHA19e3ed04b99be07f7649418b102ac15a847e2254c
SHA25668b772792e8fa2ea991f10b9e34a5b5ab9979d73612c6d78a48099274e3fac85
SHA512cdd55c84527c2c7f49148c5b14ad759bf35021ecc59c84d711a014c4646d2eca3c918ee388e6248e176b0c08148c0cd1a14e9b0f6f530d72613d38705e6dd39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5933689a24fecc0376284b83d1cba23de
SHA1db15935eac1d3ac6ba538427c8b4ee1959c2ede1
SHA256c2decf8a27a6034842b5e034054c7cc042d57e1ead2e17e85d325ffa9c36bf14
SHA5120eaa029a78c5c462c4f8dc75f75a3aba3a3065d9bc5e21b543128ff088e410f0729b8bbf6fc9eb3441c39d0485c8baf69d59693746e75ba1ea42d2f9d4addab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde1e2cfdeb3d5aa5b80899498115c6d
SHA1a25d96835ee420b22b86d2d87004b5c370096b21
SHA25667f69a341b93359819dd66d003e6bdd8ca962cbf44938f992871216f2799f9ce
SHA5126013936d1471de134360374c7262e56bebb800bec2f48983d9d14969957c615cc6c86a930f535491108a7c446150051b58e788e9b12665d7033962dd15888b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ee1866af9ca0b3ad9ec73860df649e
SHA128ced619e325e34801bef383ae2bb375bf2ca6f5
SHA25697b62c6b7209299ab8747e394bad4e4fe1cbff41f48918edd58df5d5d8ba1f57
SHA512858dd87587c0c6489779d720272345bcb9fe4270fc2217fc2fc0331da78d3a0aa64e9c3114dc0fc55be6338feba7bed51d58c020b4659da783a8f5cc66a5c607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521feb4c984b7710ece882be1310cd486
SHA11e060fd63c36e849d13c507b7bb8fb88d6300b2c
SHA256de5e550a183e865855f80136dfa22c34c97dc1babbb5bab2cb25697b2dafba24
SHA5127142cbe78f30a0cb08db5f9e0fc1cd836b7df87013039704d015d2667a25ef7688cf91aca1468e7f8710cce723b5a9b73fd502fb91ca51bb984fb1c8da2d9a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf3009d482fc01110c85426a50b55cd4
SHA1da508f151a409d49055b228761d847866fdd903f
SHA2561d7ee6206de679132f6c94ff14b71842cb91e688ed9212508d0cb4b4f46d771d
SHA512d060e5f9b0bfe85bf7ce4d4abdd64e649049f38659d665830a5c0270baf30e4712a695cb44e1d1f4d1812c1ded0a7b5f766311e83ca5ba59c7c7483abb093903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb8f79b0fa3fd2b03e20d6ac235c9cc
SHA17d72cb86304244f2bebaf7e40e28aec167ab5ad7
SHA25602f06691cb5b63b0ad9b26a1ab22d81427ace7c1f3d3d5def289af3d286ecbea
SHA51222ff9cf8ee306f6498d6066074729ae2ce19ee35f1e86df7eba59b2de9a14d014b97ac0b133553c4b58b6dd49e882adc0b34ae740420331764be3b5c9108a137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c452ac52d635b74475f766c549ae744
SHA1a3106ea4e124c5e222b6df9c0f73d377d1a34779
SHA256ec509c204318974273d066997d9d47c821218434341a2f9399b4d0ace825b819
SHA5128c08d593443850c86d1d8fcd9fcc532d6fdf2140b111469f64a6eaf946a7a7a7857e0c449b11647db6e6974381a249c572532ad26cd6a1fe37c339ea78b87207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54823397b3aa9417502f2f0149ca3c073
SHA1cc02f94f5747a8cad150b732ad4b6405576993ad
SHA256d312c387dac598b5df51711454a5391bb947dbf157abad30bfa213e4752e62f3
SHA512ec0ad784c0a58664979f2e16eebe0481b6b2cf7907c7f26dd3076559da0ddfacd394d7cd18a35d2f448a1572e11c07e32261f9a3d237a95cdc3864486152c117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5915b659cda484503470d1ccd2666276a
SHA1b5f3c839ff554d375e41973c39e1a668a3e8526f
SHA2561455c99ec7e7fce5e32c2fe82a6c6e1685f4ad75880f4e11fae95d6f8de96af9
SHA5120784feacabb1a78657af73f07eef4e5672367214a04727a0d467d3fcb4abe5d83a3e44c939eed2943b98ed498a364a7ee4b36ed83096d2f5bb187865c0464120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adf6accdf44a6808f517abebd64bde53
SHA1b8542d2a12e52fb9243f8eef3bd4b6cf06a7981f
SHA25651cbce40d09598979ad0e1de8252857e0b3a902696e009a5e5d966d9c71adbd8
SHA5128b5e91e993bf761d961d1f390c0ca51a527220717c6b853cdf73490ac5df730a8e38f2a82b6a5da468e79a2fe4ac3fb1a2b361a99e859f6f3b1025f83ccf180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bea45e8238f5b93f6e2f431898327462
SHA1c0a48b72d7674f4485ec70b7e8e8acb24fa8f0a2
SHA256105fab6433caff68af912834c16bb86f634137f60d830d6343272baf8e3a949e
SHA51259d3529b6909cc9fcda8b929018b02523a2143faefe92a3ace1ef1d63722a46ca578f69b513367f7f01ccb42515755bb359486a010eddcdc0a9718f98f10daa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5315e9c1880dcdb96b603fc3ff22bbb7e
SHA196447178ae1f543d55662a0103d42fadf39a250f
SHA256bfefcac6722537faed2550af343c4b51065bee75be32f9b3b091d85b08012260
SHA512a1d0c0a7ba3e4a422172fc305e476931615cd928ae1596575d52e7ba22732cb1170e0fcae08ddaf8b08b6d7d690797708579d877107996d706deecf06c7c9ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a1d895b114eac7e0b21fbc951084fc
SHA135bdc41ac568a37d41ed99efd4c47c07ecb4d5d2
SHA25607300bb8163dd26ac3f8c14650303070de0ad5e00be772a3932983864a9859bc
SHA51277f4ef496d6a4594f874143b29b03363cc86b2463db1d161c4b53a6db8d3a55d0263aa779b25c1318137000625e35fefa93aaff2294007be5fba6284a162066f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13be823711330426248d4c159aef8b7
SHA15cd758c5723c928554da9aa3a654c27e6e3ec393
SHA256e80404d2b174d2c899d6a34d3a3fc21f0f9b2122fa238ee0d384cd8e1cf984c5
SHA512141873f5959721e3ac0178a6530d08caf2280bfe7381f77df8f46bb51d3cfd1a82009f22059d997e942c584c81b148fb3b0738db4d8099f9fec569da1842052d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a