Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
077221433b65c3db0dd541ef74209dd6_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
077221433b65c3db0dd541ef74209dd6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
077221433b65c3db0dd541ef74209dd6_JaffaCakes118.html
-
Size
461KB
-
MD5
077221433b65c3db0dd541ef74209dd6
-
SHA1
fa72edd763ea9591fe38ba672a9d548221efb6a0
-
SHA256
3f7d680c25ffcc6748b7f6e58d4df800dd6c44a695ed693e3a070e334a7fd3e3
-
SHA512
00a4d2f11279aa7b8e63921f7491070f6b8eaa7fa243e8e2ea6ae86c115668e2e97ac448b73c6bce48f742684233346eb91ba856f577da232233769b7504866a
-
SSDEEP
6144:S8sMYod+X3oI+YcRThsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3A5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000002092acfab3ec3b86137c71f700f6d31d8517bcba77aad80f3d3bd2be5aef0d25000000000e8000000002000020000000dbc09205f04dd9e51a9e2ae09ebb54bee969a3c999e73f3e8be58d12ea76c62920000000926cf13d398a84be24a45721025b2ac95c0aa6e6188aefca6bb2c256c827a2cb400000004a56a67d75b5d733a935c01b459ad2368951fd36f3bc5d56d20e107d3bff312da8c66461f0f6145e6df26c1cdb637509ed17bc613b88a15ec08b1288a7764232 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420548431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59397611-0613-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bcbd31209ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\077221433b65c3db0dd541ef74209dd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c491ed19d8e5359a0559308ad6a40d
SHA1d501009b2a59e6261d4b4d9705eb5bb85c78a8f0
SHA256e2c116152e75578aa6e605258bb96eae6cd61f322e15fb85230ae646ac8d716e
SHA512d516ac698ad1fbc96922c9cd2db91e2bd96c52e6a63e7fcd701a0ee568859fcebc0ed161818bb26ef51b03fac396f6395b49f256bb3b2fb5c5315562fdd3c76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66923f9d6adb7bd63b9fcb42e029117
SHA19dd408bd5125c543e29eccb74557d862372f16dd
SHA256cadbfe2b2247501b515264532bd41f15e8130d006b69c5239045bd438f9e6459
SHA512938f7f95ecac55cec1ca2273c030df79df7215710b343b9e52a6b63bf8cf19ab99f48ef7861593e92b44a61f3e1936239fca616141f8f368ee48f6b7a8fcbd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535048220d7b5c55590c8aa34c482eed7
SHA1cff2e280506528dba016e7a107ecca5bcc82c227
SHA256be1389167c881308552971ab6c43bf1799ea4f6af83a9aed20781ea10bfc6792
SHA512993f75f0afde888afd149888c9388dbd26555645c9698938a64e1a363899accd388ae437bf80bcc23a5e8816ab09b8b91383ad2d9d30545b7209a7a390c007d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e6320282e02678276a260e6ce02f39
SHA170afaa86fc16d13168e379a6321f324e47a5ebbc
SHA256ed70910c97c4dd7e823bf6de160fe7953714d765f0c7c091e38263f9e9ac33d3
SHA512455bf2c8c7cf20866080d694364ae36f444564aaa10c83716b1c58471da498206c1c5dd7617201e44581a77079a659ab88530db3748b499806b22b866c7c5356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862f05f7ff080efd6418af2d88c5ccb4
SHA194c1f5e710b8b73bf06ca807b4d893a8d2a13c30
SHA256129abcf316c6f56dd1b83fb0758a21eb7811aee04c99c0a06bd6243d2bcc7576
SHA512b9f232397e7f279cb86371f659e2aa6e957491ed747158a6b51f82044b00e042e578c2dd2879814cdef868c248c1ed3317a0c693c2ec5fe3081685d0a1ce2e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb547196747d102c05a7930e90c4d1d
SHA1b06e750f93da514ef1c5b170c9cb6a22dadd90ad
SHA25656509b8abfeedb688f9497052e8abe6782a7b1f9fd4b369bd03d64617b289459
SHA5124af87a37183c0829e22661f1ebed504a13e43aa9536a97a8ea07a4a275bd042461c19f054cf55cc9185032733d68295d23242548e4ff9cc723893b50758e9c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fbf4da0ebdc9c6d7d88d7f082aca0f8
SHA1a92cd70e787e41c36584fd79c29aa52e67d03307
SHA25626636705c8b4a0ab1481aed71ddb3d12e8260dbf134af0487d560f7e16dfe291
SHA5128473218e076587b9727fb4867f4a646639635ffbb5bf806978ca794c9fe3058f55af3146ba292a1ccdf534b706b7192c03d520c9521868898087eada513bd113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f9c06e35474e49e8d97b623c303c84
SHA17280d05fe84c13d2a5eb892790a5bf8152fb1a38
SHA25692e00b4fe27fe308bf292b1c0a937bb27d2f696b852eeed1ad07ec375b77da14
SHA512283ce7f53e04760e6d1d848ff59b9f82ffb13f50637b9931c7d5ef537868caf8db4e3b770c2466a4f25f6e291af5e3317e074b9c7c6b2f10f46e34d1c432ecb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5505e02be45c1a2f11644381511da50ea
SHA1ecd45560e00cf1842c08cd2bb7ead527ddf7b203
SHA25603b78b8445f0374683a53c1ad760ec575c6b036ab025adabaae6a435004e34aa
SHA512f49c435a9d7d3c9c39e9fca3e1a2e9af3f08f7101c9069f193cf2a46585d9138f081b8ec4e0eb47792650a00637a7bcc7b9a047611f86790ae433a85f079a6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5271f175f626a517524a2d7a9edbd1951
SHA1585cb0f83c37c97da6af7379915b239cabed77b7
SHA25625ae0aaa773d6d868cf5b7771319ce42d03e01f29c03b103bb49e4b816446e08
SHA5127d6a6cbd89f41ece664ab8260e26591a67fbf2e09ed5b7442cba306520ebd587170fdac3a6038bd04124c9f066aa6b9c0180c0da912e0f1f62c9b2b6d208929d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b8485eab700eaa9aa7f6d03084ea92c
SHA1f5883f30cceec1a4bc8b5cc80a601ff5ef0c8c33
SHA25621f69f6733928809af32a89d5ba8950483c688aa2baf5c29615a27fcf4682c48
SHA512410267bedf4f268bb3c183f1f7ec472db19c662b3741cb44af85d65546798b85965a1ed4066642d9f63b4f01181361fc4662b5531d99c4f062a7998ee397b4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e457ee6e415eba240ff9a36362d3c52d
SHA145e9ac388bcfa86c633d2d8fe71698bc1acec176
SHA256232bc2d6f3f5fbcab0531567a584ce9c177b2851754a7372e61d7f7f4815f009
SHA5120f5899c36d8e63418673edf53dbb8b2ef60d9301ddbc275f6891e68810fb9ab40c2bdbf46d9c2afb30230df45948c09e0135d21cfed71e025b5dcbbf27e3e07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fb2298d4222b231faf0ef2a740cafac
SHA102b954b0083dfc62ab677f23f9caae05c24ac0eb
SHA2569ebf7bd181b055db90ffe07a65a2fd3488a9a10945c3a39718640afcd7856b66
SHA5124cc078401e462219b7129f499a00bce4e6cdcc3fbfbcb60f063ea6adaa29d6aa7fcf923ca8b1eb83dc06facbb2dfa0f580000daa6a61fec4a9d42ad29dc960b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b4a2b0ec809de5836977e021a67616
SHA15c180b28d7dc382539e49f8b5736c314efab930f
SHA25684688d8a015da720d2008f4248fd234f173fad44b963a308ad2cca483e52b185
SHA512d280707ca1b7f01569cb2f02290df700edbe258eb75f9f8300fc5a8ea78f31b101f0da8101f36486439e663efad58d5ca4cc4f02e9c51ca5e5b067c536fd2505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e876989fcc152ddeba01fa3237c17d4a
SHA1eeb6762583b30cbefc666ed7c7d6cb6fc8ec289b
SHA256439b907bc19fbeb37bede71aac82a9c9ffa0857c548a211e2b75310dca1753f5
SHA512f1be25b9370adc93129e2bf0b633c7d08eec1197d9ccc96ffe4e47670376e44f891dd7720c839b2861aefc669ef5a11c4cacb2b207698c7418988f25c6e9951f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502a46bed618bafb45385caaf5a3af4b
SHA1dca9854f099fcf3f2c4813d42c8a390b36197fba
SHA2567daed70d5f0c30291be82f9ecc94401f6195c1026e0b00e449beeed757c3a0a9
SHA512abee1ed6f6d69f1f3b093b84d633bbbb4e070a788b7645ee2e7362192e1bdb8abd49b576573fe700d9223e9d516a6db371002bdb7a356be5c4d66d1a6c17ebc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50faf64df92be7019bb61a1cd28f08349
SHA132542c0e53e274ee7c440f4bbdee030dffd3779d
SHA256f3abc42583da17f57e30ef6e0c87ce2d43188e267d581e71d7ccf490658b0cec
SHA512c3446d02bf3df3d179f9a043a6fb5f3354b11810caddb06138946fcbef6ecdf70dabcc05705b38358134195536b176691632d6cc0b0d1bf18b0f5ce495428f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501bd1aa92ce4ce0773bc870ed8c0efad
SHA17965542b1213e5c58af6f53c166251791b7d2307
SHA25695f6f9dbcf711442109fd4078b715ac855d496054316ba6afaa25a04136232f2
SHA512dbfa85cd1b3b2123f7525d10d812a69eb05570f0935517e2accb5aaf9e4cd095a1d0449d2b23fe6f77b98c6591df283f94b44712e1bc135ef5a6d3fb64268175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581d1f170bf8fd500f1f0453b4066356b
SHA1450858392a6671596cbb2e738c1705b03b93f67d
SHA256453de4021699ff755cdacb34ead5d8bafddfd3d6bc87329a77db91d6925dbb2f
SHA5122d461b8a51aea54f6e296a6419dd6711afddf2bd47bcce6a386a4c5668b118d0f40f629f6026848fd82ca70cfe2fbbc34302059e2f9d548c3dfff37f8f8bb8e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a