Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
0753bab56ec97352bb86e43e946448fe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0753bab56ec97352bb86e43e946448fe_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0753bab56ec97352bb86e43e946448fe_JaffaCakes118.html
-
Size
460KB
-
MD5
0753bab56ec97352bb86e43e946448fe
-
SHA1
ad9afbfe5a6c997029590359fec818e3a1dcb63f
-
SHA256
4c3bedcde28325a950e44cc41829f981c2c44825bb87525640b578c1b6f1afac
-
SHA512
27c3b03fdbcdc0690ea5e79933fc631dd67bfb4ac25da270d8aeec9c54cdce950ea63cef2b0bf0b7b96834056805afe220b86a017e39e78e59056911fc424335
-
SSDEEP
6144:SvsMYod+X3oI+YKsMYod+X3oI+YDsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X325d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420544361" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000008c6ea1d6e96d1a483e731cedf6fec4a3298696974665aa115b1d2ac02dbd3e0000000000e8000000002000020000000a8f75763667986e0229c0818f2bbf0ff8ca1d2c0396ee78863810cd15b2e18b8200000003451e315c11663c7e62d2133d43055499214db17eb2d97ba87eeac5d0de70c2b40000000ed01ecfc92ab49d8f3c6a6ece9ef0ada9b6a37135f18551e999818bcd5dbd6f6d9dabab480894e1f4b3b6bff7cbed8d895c3e0644fcfba018b6ca57df61e3f45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF51E021-0609-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2028d7b7169ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2496 2324 iexplore.exe 28 PID 2324 wrote to memory of 2496 2324 iexplore.exe 28 PID 2324 wrote to memory of 2496 2324 iexplore.exe 28 PID 2324 wrote to memory of 2496 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0753bab56ec97352bb86e43e946448fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fbcc8e38ba0dba09d6c2cac1568248
SHA1cd9941d492db97c39c21f2c02ed16a431456faa7
SHA2563ab84539e0ad184778c7b1ad56878e49e931c5b8d40610a445df67d9b72e2229
SHA512f2a62512e3c0591f31bce8fc20572cc90a79a1e9ea8fdf2deba3b4e43d8f803fc6ae4ea0d6e172c75d95a7ffdac642fc0289d4025c9c8148924e0d526321d176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a196f75f45834250174608a037211b
SHA185719efb6234e9cdd81aff526ff705929b79d3d1
SHA256d90e082d0221f878115929d990ba14c2653b2fe5d59fe16606fc0fc4587f7369
SHA5128c14bf77995f9eb804d5384b704cee118a23c62b363509b1a89e6c0a8f039d923c92ca37acc2e54eef38d479fad99e08b0df42d7a258b4e4bdc30511fc669e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593f9f1d0942f7de294a90c2a3b74a31e
SHA141aaa4279b92ca25e6d8f9c5894632371d9aea0e
SHA256441a11c530487869e94a8a522e9154c6eff1eb56cc8c6283ca85290b38c49f72
SHA51250f91622dc7f832e2ec5c7066fb2c173174f887660be1429cd69ab7c3ae39427d34c770f4a5067c229f427fe1b96006d429f948751c1735c766ea64779ba269b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee0d44e963123d6a986f1be2b7306a51
SHA13b5c19eed5e04944a31513f985c3ce48cb6a8258
SHA2562e5044fad1e7d2197e0b1ba03dca89cff735c8b2194affd15355471ef071b005
SHA5123c2be9e17b1c936affdd8acdbd0226f3b56d655761a6e914b9e869f3cae4975b3b552d6e8ed3ff2b30cc3047276a75009c01638f78e59819a47eef427465e924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bdeb8f8c259d8e4c02dc4ec39b2bdc0
SHA18d972f539cb791d38347fcb3bd7316a226568c98
SHA25628e5501d49c29bf35c9ca74ac4b193861c7b953425bfe36b484987773ff55a3d
SHA51223a293c66f5265936058208b6c0e0d19a4953f20c252daed36a37efe5a116abc91b915e066ee30e68f60cf442a2b59d925f1be392e9de6b4f0bf2a1aea1e4c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4bdbc1639380f2cc237ad4f93bb82a
SHA16473b4251ce455232351e8f3ae0ce6e3822ba21b
SHA2567992b46053c6d928b709c7011b0b2dec1007e0740701c788036c85a33954c7ea
SHA51251fb39f82c405651f8caabe54514c42392e03164a4b2add52bcc61ebef945ccbb7dd3372261274f65896db9076f823fa7d1dfa32ebd9df1a68e8abc66aacd520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50595c1958db9b3253c9859b5ab555662
SHA140d698416a01d24aea8135f6dede2c198013da4a
SHA2561fc70bacafc13184d7fb830e327b8834e2b85c6c16d12244eed5bbe95a365141
SHA512325d8a5748539d5021f7e77bd9ccde269bea0f6bd44ad73eb6c4728b5303c34b747bdc2451002514e45a94cee81caaca1728728dc64fa3e584e37508aee7c00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a7bc55cff95d119db86a2cee93debb
SHA1a9ddf9dfebf7007e91970677afca690591f2d09a
SHA2561e28c1cb6209626d43f70d4c4bda4e82baf7b17daeb1d198c3675a9b914937d3
SHA512bb5abc0f8c9c742bcc23523bfd9db15eeddad6935111d051b8a2fd4cdd0e6d449af531d05782785813b39a1a8230800b72e8c113577c48c118aab1cef5cd712d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9d83c0139fdf56a5283428ad324f32
SHA1c72e1b39a02c6d69005e2013840ff237f82cd4e8
SHA25617ba1b590b44c95471ce6084399fe78e7bc451b13cd497a0b05d3238675c05f0
SHA512dec9cdfbf3034765dcaf311133eab798c12070ed130b6ea2025a5d371c3735504c73b314a578e413721aa76db0f11aaf52d5edff5603926b514910c1d1adb104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d5f7bb880b3a44b9ea581cb97ef7358
SHA18f0fccad5e27485e5b1980531b96ae276cd0f901
SHA256fc32f80f3c8e1aa4fbfebe76febb7e9940f9707a64516b3e37391d4a0981d157
SHA51229f36c4d44b25cfe0eb100a8ddb8d3ad6489bc4eee9d4e5e1f4f058c9abdb7535a917bbcb8d58b035ca60cf5150436d693d004e380e89a6f7b6eeb63162fc17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba1369a8bf07dc6a5e3fd9bc855b777
SHA171377f57b21aaade606cb5fd4be5a6931b35defd
SHA256e653c03d0f1ca5a5d26301239c08f27eb6f28f8da9e9570877414142d8bceed9
SHA512db0f966a353db6c9fb8b475f8f09f9188e9299b9974229db99f900301d8c5fabd54941b46d22f9448a3d38dad5861b3b44b451774ff70f891f1b577f75419009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fa6ad9fd5bcd13b8affc53d03a9e2a
SHA183fda9baa0f817daa97042870b0be16aa2b6f1b5
SHA256c17dbac6bb052ec2201f450afff2ee007cb60f9fdbdf0e3dfe0a69dbc870ce24
SHA5123f520b50ab35a32e6f6974241bd4b2085befb7d5f7a4093507c9449020f156f6d00e7c8945171ec47ac49b78d6354a692f8ff850b326d11e62f3150b1444836c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540cef2de59288129c9c768a8542bf8ba
SHA1b29391b2aa2c6e3d1df496d93651656bd3207095
SHA256dd88e7baa4f7ac1ddd5e824976da5e28826f562066e2de6edfd650d7d08447c3
SHA51270c0c46b7ed81b2702cde7de91bc309e6c76c60aaa74b87f1be7f1a5f9adbc9f92c2b74e5cd9da1ec0a789a2786615a7e6a5ee98299cc8458b4e5f299591fd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac3d3c1f21e09971af34729a095a160
SHA1802b87fe7f4fbc1e2f0d2fa7e30a5d9aa3f8074b
SHA2560c4c651588ec744f6be0fe69974bfbbdf529bcb77213be07190c48c4ae31a638
SHA51214b3a59ad533c7d23959b1f830aeb6e73ea30578c51100ddfca772b1bd5cb06d72e47da5de631bc0973c69eff5677f005d9d5b067006cddd373b5a48bf5d7b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f370e6fc839a174c246ec7b2c8e771
SHA19e262a6a9c036eef08657e5337633ae2a78859d8
SHA256f094f3eb8452fbbe67edbb955cd6fe3aae32f757a9efb3d34447fddcf9aeb752
SHA512e129717ed72206c756c6dbb67b5cd25ca6e7740fc88f197fa44344cdaa0c50923c936c28670bf565926a0ce74b3d914a2bfdd6aeae1bbbb19fa75b806cda9591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a937f242f3a246039c528ccc2e84d184
SHA17d36a8d7d28283a71800e8c2b191b97a0204ec6c
SHA2563d0608caa77d6c9801761ae65f0ca18064eb72ed6048d8222779e7ac3b8ee8f5
SHA512494e6d16df6adc5409f93a7b2d3c2bc9dc706bf5fa4ed1a1c83ee20f4ff796a82eca01aa68884d1baeeed359a4eb72950b8af2fe4a22b6394cedc74ddbffe6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a23a200dd951fee4095363164badd55
SHA16c4fdc679b05d1cbe9501a87a09e1b9f3b938c48
SHA256277859833d6406d53880b7eef3f4c220d3da275a331a1bacc00e63e3c3b02f9a
SHA51244d6822061dd45d859cc09a5209c6eb7779a080d3cbc491d54b3727153a1d4fe527236239fdeebe1f5d52584212389ed417bc213dbcc6930b405f9c6ad054b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec07e81702a6d684203c68dcb3c4c16
SHA100ea5a63312c2c962e99b442202d5fb28fe6e4ee
SHA256fe4b0c05f8788d16524ae30d1293a62a2fc9824bda8691191f715fd17176e843
SHA51248920b5d20f43be9e0c314c3c4973722437112324130cb3e3f4176160c7d89cb178cd8b394e1e7ab33bedf6f396c58c87f3dab6e0c773171becd53379bd00af0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a