Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
07dd7553b6fba1be941227d9d6fedf23_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07dd7553b6fba1be941227d9d6fedf23_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07dd7553b6fba1be941227d9d6fedf23_JaffaCakes118.html
-
Size
40KB
-
MD5
07dd7553b6fba1be941227d9d6fedf23
-
SHA1
73331eabc3bd364bc2f25c7fc6643d5a84ac8a5c
-
SHA256
38a5bfce7853cf8096a2e85fa3ffc39755d43e58fa7b5b050304df658e99917c
-
SHA512
31f9d8fbe07dd908b21e9106e7fe70fcbfa7889dc487ab87747b6182ad955700a6b5ae0ebc1a6f0c04f303f5db3e45af15089d9aae19b913d5700bbfa7354877
-
SSDEEP
384:XiTTTsNbOs/EleB65vttEt/lgDhwrHfjqxW7tU6Vl3TPb5gLc9Da7ZOdp/87+I/c:STTA65vnEtSDhwrHfmk7FVlhZ9IOz/HP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420562351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000d0fdc0a0685d45f880219db2fd845e9771cde0ce405f964b92539c2e7b31b1da000000000e8000000002000020000000c7cd192350a6e30d34494bc34f3ebe14dad29672c1cbb86b56ebe5d2007c789020000000d4517f3b2db4f98518221198b6d58f044c3539d3fa5e546de029fe66d85994ae40000000bf6f1e8d1e2eb0e5f888165f5c90a64b18d0f7f2e7cced71a5e85fb5acf608d8281b9a5a1505d1ed96b985dbf7d491e7cdadd66ee515fecdf2b41073962e7808 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2286261-0633-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ad9fb0409ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1376 2292 iexplore.exe 28 PID 2292 wrote to memory of 1376 2292 iexplore.exe 28 PID 2292 wrote to memory of 1376 2292 iexplore.exe 28 PID 2292 wrote to memory of 1376 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07dd7553b6fba1be941227d9d6fedf23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61384f97fc6c2502a615b5f00efea7c
SHA1b0fba4c112e4fc52ddf1c31f6c895441ada1121e
SHA256e687a2231f0e2ed8f15b5415c1c8cbc97b8667723dff3e2edaafd5aadd9228f8
SHA5126c999bace070e9266b6b08ab825a4c8e13364bbab3543f4726ac1e0fc86e0206afefcf6b82355d9e8081f8a8fa1c1ab1fe776d57f490c80d8a234191c3307cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cdb926d84206a5110a8bc0282c0978
SHA1a247c400f20ce3401daf1c0881fdc96d5723e6cc
SHA256433ea81e35a81717183d754f743f194cd4d4406fbaa3f2cdafe22841117ea78f
SHA512024c9408094767f024368d5ce7de8c5f9472f3c9a428e59090b2bf1763d0f9f587dab68530abe624c143e882a97662b5191d870b7d7bb2875abedb8cf37c0dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c00335ed7377777e6404e45c16f239
SHA1414e26197d892cbd84a37bc3546f7f896fb3bbcd
SHA2567e7397efaaee2c9dc6415949b3136eeb6e17a6de0cb62e7fd3f5c3fb37dfb041
SHA512a6822b947add4fe9dd8af508fcec823908a5741657d62b108052f59c605ce48eec92f43de615b1fc4327edb7ba5b66ddf1723d233b83b8db87f65c54c65d93f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12a81fc16a1dad2e92b8173d43c3144
SHA143aabc7a130b264df1c07e13adb9db45fc74f72b
SHA256de26f9b8cc720f44970abfd069128605cad2ddd9ba5c4de194b96fe06725f26f
SHA512fa6bf6b0773d686e9370461bfc5dd1b917a11f00c4b2c4d116664b35dda924656496640f2b086e8e12b292fbedf1bad6075fb34906ce845580702180c28d2222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d3d0a05d1a97898d912a4432e770ac
SHA1215d8805d5f0b6357120a0448f7fc1f7c02a1f9d
SHA256e9c90a17a9a5596b70cf14dbf80d3841dfc8643449c8a78f71851fdf1ad73f28
SHA512ff98f189c70fb246381d589382b3bf51723977b18e330829debe7d43ef207e7d89a6cf3cad6309ed604faf57a6b9152e7e16e2db35bdd8e331a86d120ddfc6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537caba57386e3f10a67179d3df9871dc
SHA15ad0563a94e6a02f6ed89fd4997aa6663124be31
SHA2564413973722cfb0fc69c45157407d1742c24a849c66e9dafc043be97aca040ee8
SHA512ea83a18fad5a3f1e709a6388c879d7573dbe12491ae001730875bb22ae9e252e5b4c48fba1d60b4f994502abb6efd98e70fbcfa11faacc3a424a79a9b31da346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a438677366d61cc9e223dc617fdb82d
SHA10eacb819f53967a276fdd53cb6c9ef8f698cc631
SHA2567c23fd7f2838f011a3788411a2259d959400d956b041d69e87b28bd3d831c4f5
SHA5125d9f84f75694ed80038f9f33426a94d58547777f6e45e29ab35ebcaa9ef08fbcff79117a197940575c6c5b0d6e0971599d67a11e7e722397fca59d557aa79d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb2de3fbfc16700e5a0caf5270326b2
SHA15caf8c530d382827aeb8faa34aefe47448963819
SHA256e3fd442c4de3a04fe5b5d82a82c10cbbc2474bd21069f6c22ebc003de3454c77
SHA5129b0eb166fa626b8fdce1f7629071c3f301d511ae8dd2b5939c41a7597ef7d51bb9cfc01fb6ae691144f1f72500410755df9289ac99a81c04e81c99df64811409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfe47d0ef98cd0e466899129193f7c7
SHA16b5219b8ff9e13ba0675d8b3466fea589e480748
SHA256ae4faa898751f0377133836e33d3ca626972fd20735ff667a46a31cd6d277f98
SHA5127296c66366a630e9847671351519b79211c255f9a43d19318102c572462c179d3d391b318c10e417bfb25a5795b36d56c3e72aae93733b77fe14bbe559e3a734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b62861299aa894f893f4cef0ec4fceb
SHA1f6c7c8f2f236d1df070136f74c6853dd562aac5c
SHA25684e2d632557f23767bb20bc2caee453adc077e4bdc7ef225e49caed52860a43d
SHA51281dd188f27ed61edd36b4826b418a5dc051952eabe4d5278f87b5474a3efa681c8b51ec72c4aed9e1b4d7389aba901e9d429ce1142f2f660e0b9620a4c8240af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c83867bf91428db83b37481b272b03
SHA18c52b44df12e3f5a4b5b25af0308f57a300885e6
SHA2564cdd9dd45a2cd10c59a5989d3a65e5973dbc24d7e62451a4d86cd65ad7787f5b
SHA5121cd12fe78078e554c9433cc12b1e105a6357edccd059c3e49c616b4949c5eb0da612cac81bc92951ad4b34eb4b8e2b24a6adc6a1d9f8175ea2ea9d1f94d1ef2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3950264127236aae5a3a7808a54037
SHA166978c61aa6ca2abc875963df0727d119686536d
SHA25689c38d255f594daba33f788c9b2eaec3a2d775b58663566b742ac3ee4021c6e2
SHA51203b9eebd89e33274e678c1399d0fbfd7950fde05b984bd200aadb491990ffe5fcee4a8187ff925b81cbcb5de3d3d18e25cb61883d8d667ea36b3979f9931b925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e245776a85b0589add3d98b2ca1cc27
SHA17e7d98c1bcbcae7dd4948f3deff19c70c0ebfd4a
SHA25690e4e8eb31b60fc2d8d76132e529bf428591882e5bdfc68363827a62b0408c12
SHA51246b2f6e29cd17c048b2c1eb395ad8ea63ecc93c8e67a31ca5a20eca8999d6add649780ac076d073a1cabcdbe484012eabc8c53cb6ddf93f10aa008663e58141e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb8e550bf9bf888d3a98424c81deb90
SHA17c04c2b0b90c962a7daa9e4ccf47a11cfe335dd8
SHA2568c60443f106a7474597388b6caa3e5f612003b1d3682339d1915b4d50f605258
SHA512e2e0dfe449254f193e29b22773c63d4b3f236135d6910742ab2ec7a0fbf5d81473cc886a6e1cdaa6f05571134889f52e6b71f748f42fca957e607a159a18196c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9a1941b31a8f45d8daec9b6d2586f4
SHA10b6120869ffcca311f47e55397189c8d0e42ac9c
SHA256c7c93077736f19e4635468590cb287717579a4e33e89f46bf070aecde5aef4d2
SHA5120b565eb826fe6738101c69bb02331ea6044ccd9967b5b943f2e57f5cda4c764bd59811925ec950ba10d57a5eefa5bd7b7c58a81db521a56f1792414a1b065aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5988b3b4277da80b9ff750c39c4ffd
SHA1c41b328d184fc4baf81fb903b241c570d0d7f6e5
SHA2567fa3680b1703f5eb10a7bb256242f9b268b379149225511fa9e6d3ad7ad83bf2
SHA512662ec61dbf722fe8875bb91a60b1facee89c57897cb7146eb404326a1cac5c41cc7f0b09ef0f42fc896fe9486253008e187142242dd8686fc19238740badb8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bb3f00de4ce8b472dae31fe83bcd4fa
SHA1e54c70bbd78d5ad8d2b64c6b54d38de3a16c2f18
SHA256183ae43e6f8274aa98a5b762d70d16b9b3cc77b5341993c52228db1b47778619
SHA512d1d666287605b86c9878e472b3774da1f9a74df354eb8d2a6a2aba22946f4feca981cbc7c4da5dfd57642c5b8f7bddebe6809d839b347dd69b6808db5cd921df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599196bcaf7ae69e74a31527200613ca4
SHA15573bcc8364ac513c109b522596e14efe12b04c5
SHA2568f6f88ff60bb2bbc5a9714e2c20e1598ef51fd1cc8cecdc3c4d6fba1aa58692f
SHA5123b79cdd3c2c827a56b90b6a16d521f1b900da819357ccdaee561bbc014a53c7c7bf359a1ac1b718860e39d97c97125f38031abbb07f2f52741887484bbea96d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c22051e34eb19c63d2f990ade5585b
SHA1e102d928d389c1d2462b8bfc8e504aea841314df
SHA256a5a62f46fc9ea6080d82e016667564290ab35170a67e5cdbcc2e91589424db05
SHA5124132a739ba3d99f280525ad595118c973caff3d07a683bac10cb4956cc1d6e20fdaf4ac1e9a0657b13c4379821598823a09b47ac1279333aed24d311f12988c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a