Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
0817456412acbef94124894d538b6ce2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0817456412acbef94124894d538b6ce2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0817456412acbef94124894d538b6ce2_JaffaCakes118.html
-
Size
3KB
-
MD5
0817456412acbef94124894d538b6ce2
-
SHA1
db143886fe23e5504a4494d19727166890af34db
-
SHA256
ee2f3af1ed6e2ef5bb899db1b2de4f30dc6a9aa33967334a76012f85543055fa
-
SHA512
6d425ef166df7aca05b6626d2e23182b5ab5bf31327bb993717e02e6d5462d3f833d987fc209ce5d34f234ef353d1cc74a62e0257ff0575fe14ab85518144165
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420569628" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b0c183b0df93595782dc04c9c4badad3d83d22274900b2ceb5bd9ee459f72e7d000000000e800000000200002000000055befd3b1e6de9849c5bcf2d127eee731da7e9a60562f157ddfa23eae225cced2000000072b8372d1d12ded5ac526ccac9200989c076161313545a1f3d072f9af2e3644140000000adaf5fccb6bff39415759b075db3f4be82756c2edf16e3521da265ea785946a0d6cf29f53b573cb151beea2b51b6edecdf06e0a48363f6c637551ba022b4b121 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1070ad87519ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3141011-0644-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0817456412acbef94124894d538b6ce2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd98d50261c083982e564b21e7d1ec5
SHA178455445bcd57ebb674d10c7bc20263143f40c08
SHA256510169d47fac76c315f698f3633b01f29b3f7662684c35e5999c4c488f7134f5
SHA512fb518a9bf1dc4e1dca30a8b7e32bebd6321db68933ff87de4090ffb213a3576022e85829ed61bfe5566152dfb51c1a63985c5018aa56cf256425872c90130a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2ae55964649139ca5357e77329fff5
SHA1b1704aaf4cc5a71b62ffbd39dadf9c7e70cde8a8
SHA25641177f21b6bc81d00d7456fb2edae9c0cad0cee5b439976b7c36faf79e4441e6
SHA51278422b3fe4fb7d4212a7af5d322cef347c9f8bc0e3bbd927efa6abbe70486a5654b9c428e7f5a71abf4e2068d5f1ac50a3585f5604e0e80b0d5b5591f90f24d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff90658d409274a0cf9d0f70a65f2687
SHA148eac7639a04fefecef5a854967fe6651fd1e40b
SHA2561e57984290695f7e8086090867e3935d17ef02848032383cbc539987f5e19df0
SHA5129ec7408c8c054e261350c6e8e54f1e8bc71a2f98cef5abf8718e101789527c221e28a2dd7b11bf5fe2f49b78166abad0e619592b8a379fccaaaaffd72ef8a824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df5915c1c86646e73d752ad662d86f8
SHA1d588a82a958546c0f88e7d692e13616ede8ecc3b
SHA256f1b6e82c5d199d008a3a75a2260f4694ee25ac4a670462c18e09a77053b51c1c
SHA51205dae0078bb22cb1d936e468c8ed96ccb9ea816997f60b0a5a244fd79237528145f46585e97605d096fc9c36aac127147b1138edce81bae6eb4b0644ab026230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768746aab131a3ecae56ed6e336d8650
SHA14a218c2deb1336925221daf2ca9e405be4e38a37
SHA256c5d4d65a224152ae54243f49f0d3a34d8f68f6b9034449efa019953465d4637c
SHA512dfdb7bf3d40518a32506de35a0ef99f136103b55010b29e556894be22a000556dfa3861c79f6bda67399e240da5e3631da8a50e1a459b390f8fade1d42fcab86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590148ff5e1a62492c8bc0479f928a559
SHA1f4ab8f7028a740789fbb2eb770a5072c387088d6
SHA2563ed851f5191aad7db48ff170c560babda2f76150a6d2f071e3a57b646fb5d19f
SHA512e98c268267ad55ff8a031db7ff18141bc2db5eaa2ac4a20048571ed079629e236d14b652485634e5b576d41709c99f40ef800e094aef531dcda6a8c3fc045a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ab2a57ee71fc39befb06fa3b3be8c2c
SHA18bc423c5861e65bcd530567b63794cf30cf4f0a1
SHA2568c363172b59253e3cdd89b0f5d72a6ba33a57885ed9ce0da7732ae9e55df16b5
SHA512d64be898bc529fca935c6832ffe955b30f8ce4bb389ebf45aad5f2e6c494a89728f7e22479f1b6892c22263a530ae1021c06ddab74263b2519210ff9f64afd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1bf934a79bdd742479a5b331ecfd5c
SHA106238ff9416247cf3caead55ac0788c29f8da4a8
SHA256e65442a33cfd3385bda5269815eca97c922ee929bc2954ad615e2bfed01e2340
SHA51281c4fa65532f5b599ac2717609081a88bcf7df62e75e8a68359b74031efa1b8937e6a1b02e38c64ac031e0bb225c83a5c46aded34491184e056c294db43fd7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52e86e30d058e5eb2f95118e1c8ee52
SHA15bbe4d543c6e1cd8e8bdf923cae61f22109ce2e2
SHA2565ff43e3a0ef90a36d47a4e5580cb4c4b6e5ff94a20fbd3cb529dffdadf44d77c
SHA512fe537b6bd8b2c61a6a594fa35772cc758aef0e81fbaa087e1d8064d8a5f55f8aa8cbf16c6f6bf0faa9072143393ddad47469acaeb52bc4608ec5daa363c7a97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491a4cf29dfcb406c2bf04cf2c71ddcf
SHA1879e354fbc5138d177c753fa008684ebe477557f
SHA25665411075e39792a875b43e040de67270246e8b4b557cb6c480e2b7b96e934278
SHA5123e664ccfa20494d6292cb0e66779cacfa17d8f48cd3e4a72595604281fc9a865a4dad30ee41a8ef8fdf55fc1375423618422d4c0bbb7e75800220b894c7ca1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518921a11365470ff01569878a2b22d4e
SHA186e1b43efb3e80128f1eeaed088c8229cd83c298
SHA256a12d44d724050c664b17e2402c89c4267a6865c7ef81da9d09d500282ec00be3
SHA5124d593700a66adcf1aee1204c98bc4f5fede8afaa533569dae7121566b214a3de512bc507f14f0c6c9a71863bbe6ef5bfecf97aee9c50e43cd1b406ca6f825c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59548886bbfb3a7106896864bb5b7b09f
SHA173da6cbd79bbdf97037c29ffcedc570f7f7558f6
SHA256fd005eac345196e6ce4b339665c290a8f7ca78f2ffae7172c2a980464b2080d9
SHA51285d2d908275f0ff7bdd54c96f88dccbbd17cfe717d35b7d9c7d55c0a817ddb77e253207cb40f82bfb12758118920fbd5d21170eb80915aa8744c9c9fa83e6c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc08a6983933eda4c0d5961df2e4cdb4
SHA12b33a10ffdbaee7ac09811b27493de38deb2e4d8
SHA2563049674c918d727418255f214636e5a9fa0b7b2249b0e9c6cd5555414fdd0b8b
SHA512785eb07f6c8cc734d693053fc84598f4cd2ac8adeac1441a0ea56f2c5de1e1d548c1c96dcc119b43baf3ad835148ee8a129fe017c987e6a3e7dc0f010219c230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349417e9de3a4c6ace244dff15c56311
SHA1f6f7ba1f9369714f2dbb2d03eb35b031f855b99e
SHA25665785041c338c0efa0bbbccfe2c4476a665d3378c9bc99c6f179acc1f933aca5
SHA512553bf1e5321ae608b7f94b5970a21574d573cbfb970733413cf51d8a0be55247edd7cc72c6b42f6af1cee02af727bc5244af7558f5fd16e983a87fe213f2b287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d7f843c23faf7fb3777bb692b107554
SHA1a7798934f42852c51006cff1623a820fc8d92c32
SHA256bbc7b078d4c061e7d94c007eadaaf3abb5fecb464ed25ae92dc913b1916f1520
SHA512dc7a4c1175e3335a99c4785234b149ef5b691292828cd48b08d277673c664f9b0459e1aa035fadece02ecd406f28d38559d7125496662b256a58c4e23d68c373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59246c11066327aea217b0bfc0cbf0536
SHA1bac36a3f6a6740e0acf96aa81222ebe4db6f8ebe
SHA2569eff0f1b623db8bd9510fd3e0c84ead9577cef4a65e65bfe719bf32fd5d6360d
SHA51211b2c25d36ab5c6e311421d0ccaaec2e1ad2e13ada243aa9ac9cdbd4969536e7c0e0b0ddeebd3b10e9c52dc68923b37c700862ad6013cd6ce298715068a1e139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d91bb8520e4e2171873420dc37ce068
SHA17f96a4805dc5d7d68cff883bd51d2128d248e0e3
SHA25697efce917607b846990e5b23efb0d17311f45f56261c9bf0c8e0193d6c59525b
SHA512a9dbd455c9206f62e00ce3ae421eeccfafa95cce4c8c1e1a93b7046a37558c8146e93ca2c2648d1a2a6865d312d96507967eedd2c1d9156b048d27ce4c489ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574bddaf2b7e7e851844a3fee3560b6b6
SHA1590482b88784aa8e1c4385a7969fd898b876128f
SHA256afc568a87d784b985a6c04b0a4299e0ac3b1cbfca3c527ccc8f500e6f06d6207
SHA512ec98bfc5b59de2f7ee87a4e16f49e58548f020efb9fa77361174e1bd456795f21340d3ce5727a9af7485d41b691f90f8d29fed82eb22dc9246293fd20f957d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfeba6b263126bbc9b1fa2b87611d0b5
SHA154b544cffbad4114ed82318d3459e98d6029b3f1
SHA256c8ded3c8d8f90068bd703352cc3786a30abf5b84fb636cbed0a9e2b187a0c664
SHA512312e25846b44b1c40a08ee6dfca889acaa140c24ff41a40ae4f79bbe3f531bbb886bad011ef43d85b70ccd322c21e963dd29c1f287257ab8cf92fa211268735e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a