Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
061274942090249b62a8df5f42670e25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
061274942090249b62a8df5f42670e25_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
061274942090249b62a8df5f42670e25_JaffaCakes118.html
-
Size
461KB
-
MD5
061274942090249b62a8df5f42670e25
-
SHA1
b581404a4afcffd29cf4e855c3b2755009e9c0b0
-
SHA256
3f46b93024d2c9a8819d71524977c805ef165bd2af976137cfa83fd28209c618
-
SHA512
90c133d00182e39d605e94d0ef9dc17cb0eacf1cfac48f883cd0be39f19f28aff47a6012b4ec92e103edf8c70f4e5c6edbd99b9c9a57fb204d2d4dbdd861e4b8
-
SSDEEP
6144:SusMYod+X3oI+YvsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3F5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000876e5effaefeebfe40498b12c041779aa15d43ade649353872bb0780ad4743a000000000e80000000020000200000009ed09db45bd89b5be542d6eec249a792f966d0340a78b119c7c5d8fe831f345d20000000704d74621c88f5a0704a55d86d760da59114e2701d3eab2eaba38d12a555239840000000ef9d51b6cccd973827892535e831ee00bfbc002b9e1aa934aeee05cc28ccf43d5b90cf14ed942602e606a951b219705005e32f8f53896e49546d7b13de2c578b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51E18121-05A3-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a096642ab099da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420500315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2652 2784 iexplore.exe 28 PID 2784 wrote to memory of 2652 2784 iexplore.exe 28 PID 2784 wrote to memory of 2652 2784 iexplore.exe 28 PID 2784 wrote to memory of 2652 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\061274942090249b62a8df5f42670e25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4bacd983b0bda75e9e1df512f51a570
SHA14bfb01064e40d9057a539836aca7ac3ce9f1e147
SHA256aaf42ca90444eeebdd430094eec4d792dbb695f72e8091c798af50f92e26581e
SHA512a7416f8c8e10cf1ef467068b457e75c248a05448046df7c95bfef5f793867655c74a61c956c6dbffd0841075b790466819a512d128ac3caac45fad93ad12f1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6380fd421fad7ef002996d51a21b35
SHA198f3ea832654ad0a5c8b441d04ff747a0d1247e7
SHA25605fa9b4f94c35624ed7fe62f48e3b36ae07fb9f07f64c0efe50fc2b3d9cbb5f3
SHA5122ada983e805243d865c900891c20f472092cbf642e05c1d27851146bb97e707c080ff1574bb95168bd36f76c3f5a6bb82333475979c3a1b68017b3a989230cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d1d820dac08bb1b3c181c9edfcf4c1
SHA173049982084b57f2b755689cdb22bfd77036a27a
SHA256ab3e1c1272c0499f62e75dae117aeec992b0d3362061b9110bbe19ff47659cce
SHA5127547a5a3baad3772933c320f5cd3b80f0d6926740cf5e9765c111516df13ba030f09247d99e0347547523da569ff056108b2713f394e90f795843937abf05101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930931b845a12c59f673b62155483b71
SHA12e46bc59e19c867fc8e3fb899b6a217394fdb146
SHA25636acf8c78b8419439b4f1f2833ed274a11cbbd69951a23aa9b59cce7bf2c6c89
SHA512e69940b1e30408e39f606d47862bf0e91c904a2df1f04fd44c74ef5b85c86e0330a57a79f1df6ad3b1b974b5925d252e3988064a45452391f6e97bcde657c3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbe1a9e116ce6f65070b8c83b5f126af
SHA17bb8e2ff6fc680f3b0099132eef7fe1d239aad37
SHA256dea9b58ce815b9c89eddc0765b873f17bc6d31ec44f799d7868bc8b35ab11ad3
SHA512bde21a89c8ce992e3e5852bbe7faccb909d201b2b9ac26817012a7881713d7be0c6ff40207dda539e4baa2777a956c4a237e33d3f40aa102277ebb5408164e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5278e6f8f7086f486d1a4557e191e7ee5
SHA1c1ee3ea3ea79ef99c0218368dd126aa7e32e90de
SHA25633d860313d0e92d3f8f9b3d33c317ca710817944f7acabe3ef5ed80c6967edff
SHA512286d97ef7f3bf7654b02cbd56bbc1779992c61515bfba14e6dceb5b4c02f397286916c62c5fbefd11cb7cb395eaf042636c5e3f85987a59e82c757fdf6a7e7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842de888df4c786ccc8622800a82d6a2
SHA1f6c56470f5ef0073d2720dae1bad3d3ab235b7e2
SHA25625a796bca16401bf62303698727b76c7d20eb268e8babe297f8835b984bf9791
SHA51291fe6c22e211d93742dfc4c50f75262a80f2226274c75343a86fa67a2f8011ec059fffbdd5a06109ecd2137ce56b8ec2e8dfebfeddfa4188576041871bcf756e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad548920cb278d39edab0bbe913ca889
SHA1e0cb797d149d33f642504a52a47edbf268d77685
SHA25669b8580bcf00eaf4345db7f99291bb62313f6253fb2eae07bf95339a4a91f8b2
SHA5121574c621ea711c0d3acad165e0d6841b0d5dca2738586fa0576c5b9bd32b2f987abafcb6c9d995a407b7c9302eef31505e0342e635b24c1900827a8af30bda27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354f4258a6aa34188e8571e35360c4b6
SHA1f82278feb47610fc6898842554caf97b691bd081
SHA2566931dac925796635f888a33a1fc9347403dd4de8fc10fb18818b4348f74dc3e6
SHA51220b3a4b731dcb7457ff528d0700d44b57ddf66a3b1e4e591d29d846a4ab4f495728f5ff81d756a93dcfe9df3ce14894f66f8d07c10406fdd63a09ee8c0da9454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6642d59de020f8e280ea5f24778462e
SHA19a42b11289d0e7823ba9f62ef3b7a8b9a0a46508
SHA256d857cb82286f8f0a5b70995a1e6b4fdd848f46b3c66282936be78afcbacb613c
SHA512f0387489a9d05b15c7fbedb46a04a3b3f773b47452e07a74f6b303711e14bd1156f287f63a0d3d86b850089e1810eab1d5254ed646058a9b8f24a86ee68e069d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f239f22eb7122c17410e24106f83b1c9
SHA1351b20674d06dd2d8266aca771dcdec68f8a4119
SHA256c3870bb1070992a84a89fdfd300b4640039debb49b76e0d659ccb993c4496611
SHA51213a336c14a1e35eb9a79f795f5db4627d68976be8d010fc9aa8c564d91fc6c5264c70ffde110e005fcb702c118b8feb24135b3e2e6e15770af4e281a66c6be09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a537ca2bc37a21d1c33d441a6a27be7d
SHA1c25f75d80a9794c0fa4e6ae94b360542686dbffc
SHA256bb347c58b6f6ef6677f8bf83c256cd7627f90399925d6be8aeb2a21866e118b8
SHA512939ace105d3b169e533392cb9d8bcafa8b4d8bd8ec53acd5008cdec06c5d826d35a294d83a2830a122532442df6fdf4891cbd88f900a6d13474b4235f6e7db85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c47713980fcae3c3ade787208b4cf8
SHA174224fb8d69ed7a3b59ab77ae159dd3fcef28786
SHA256c76f34658bd2c9b465a5a61afb9cd6f742ef079a772ffe9ccf5f6601b71543c9
SHA5123894e4b873fc01eba837fcbf396d833679fea1c939eb67bb3c0087772745a5fc8d0d1169a1be94b99cd0ee78ab7241b6128c3e6986e3edfab69e806a09ef3d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc82b5ba491af9958a61dd2897fa9b03
SHA12233fb832c2f3b506e8b3da77566ef38209227a0
SHA2564a7e8d86d95c36f9e26809e97efdd4d762d3b2e8110a3fd942e9a23398951c46
SHA51293ae3ed1b6ba5d5624104bb781eec45659bef2e8848eaa43157c6e79bdad430ebe9e567a96e38ebea735067e28a449f32010eea6d930a4a80d88a6a4c9c8f423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f612e646a959c50f4f3d5075f6cb3d
SHA136434591ed4ab9985806aa0cbc960f2194fdfbc6
SHA2564ceb8ea6c1485902dbfb9c39a119a1aa4a8a7f94db3b483ad8edc50cb8307942
SHA5129287b14002a3e3b483b7d5bc312db7d4d6398e3df099d910370156d679108ab6a7745a3214f27382fa63f92ea5e76429c749d0ac17f23c739247b068da53c00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a471c39efb04e5e147cc0cc4b488d27
SHA14679cbf922c2b177feef057a3948721b654b2b66
SHA25677d5dba9416549791d9d4ac970c8df015e7511dbce229aa37446c0369a9c0468
SHA512ce12a462ab11b96919d331dfbe54e4007d7efc74c057cbb309c296a18382c75405303d4286d9c33e85bb2d10f658af3da84d9d0e622065d7e2f44c9df30613b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281783de7d7817feb86a4e074e0c0732
SHA1ee31b84d69c31f11af0b0f5837a9e2b1ac0deeaf
SHA256de12ec5e0430032cae4f3f6dc2de2ee514b0b02617a11fa9d5e813d0fb07b563
SHA512f450f32ba2448d65521069d6066a7e7beb26bb8520ad8ec20f2fef2b61b50891c0ba3a7cd2e3c457f1c9bce1fc884b5a315e0d5c40f47c7547c285d1f92f614b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51223d5bfa9389f27b3e49ae30b3e030b
SHA11f979875761e6a8ab71c34189f3ff48077653500
SHA2564830641476698c65d38362e59a32879e168cd7a098453614754f780939632a88
SHA5125b79e61ac6d3977036c35e38a175bef5fcec7608580a5e69e44d74d1c41ca79e5d3b83ddc3056bf4baeedb9d5c851d107d7eebf197d00f623882f59bf30d3b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3fe6a0748b4e288054f6f144747c89
SHA14876033b498840d51d7332b6195455a0661f43b8
SHA25609c68a9b65e329d1356feb615509a536e74f1d59179fd5aa1fe8003668b3d24f
SHA51267539926bfda4f02cc24ad18e8ff2ff69a4258b75dc82954e83f3920cc04d99858ad5a91cf9af2dbb51754a3bbe4a8827b0c3ccbdfc45931616ce0b43fd6dcfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a