Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
0ab3152c860d718baeb432ee5c00f851_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ab3152c860d718baeb432ee5c00f851_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ab3152c860d718baeb432ee5c00f851_JaffaCakes118.html
-
Size
37KB
-
MD5
0ab3152c860d718baeb432ee5c00f851
-
SHA1
f15c1ed0ea3599948d1a179eea3fa57112c99d84
-
SHA256
e703ebf8f6d6ee6585a6fad32604bf5657b301c02c42ac0738b38476ea789727
-
SHA512
46aeffa9ce7d6264d283977689b4df3c8bfa6d8e0012eae36c1bdd6e5df885d53868c73fab4fa4c55a7ef8af62c9ee9a89814049f58f7205ad7333cdf5c34550
-
SSDEEP
768:a4z4hge9scwk7PrN1i7y5hYao4K48w3B1sUldbPZyxkrFuK:aEugfk73o5OdbPZyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f529f0589bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B8D22F1-074C-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000a404a82fb03e9443fff0ce9cf12fed6101f470305aa24b6f6c8777694b962356000000000e8000000002000020000000469d90051e1a79ec7aaa827781d0e2d17b689a05aa29b5a917f516b4dc11754e20000000ba69f69a456370e7df6c9b4a81cc933d582af8d800b90a5c97fcf69fc2c79a914000000012a5e5a3e8b143ce734e60b71f155365358861e7c58b865dd0248950759c683654d70497d6666d4455a2200d44efe96851be496b18fa94a835cd9a43db22537d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420682761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28 PID 2008 wrote to memory of 1712 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ab3152c860d718baeb432ee5c00f851_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572697138258c44031360298f927fa3ee
SHA11088873a25d697e0457d7b396d6dd88a905112b8
SHA256de93f40a4d2ee8e301d141c76a5494457055c79cd48607da1abda9219becd199
SHA512e5b0d6ab597950e817707b9b0a9dfbb0bf6cd0de9af93ab8e517c53e0b24fe9fc66019631cb84bb8cae3d426ba43a910c9b79b76b93846654b526d5a2f252d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56052a69f35823f7e123263242f1d384c
SHA16948d3853c950ed227ab18cae830795b6d858f06
SHA256d64cb3164f6de9c744f98f967cfc78135813bb44907cd10cc5ca453e9c9049b6
SHA512d1201607a371edc8b9eaf9e493bea188319f963126dec86b2ef0e6d965dd4896696bccf5a9603635af0afc8995ff54ada425f5118e6287027c57d544a8ec3f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e75ca7c73f5e3d1bda8450e9b0bcb58d
SHA11d590c197472594664f678df63e2bcca98271f3e
SHA256e5b300ba7762437a3e7136372c4d4d77c388aca1b29fdc3a6a88830bdabb245e
SHA512e131e45296bd84dce320eb8923552ab970fbef07844589511a731eb699034f975246b47ff2802e2e8d00e6e1e7957b600dab1360ce2100289d1455126d777f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f707deefb7850aa3bfbc72697f127f1
SHA1fadc19078e5538e27652bfcde1a8d4b860adf3bc
SHA256b36d58d8ea23ee32176f00c0bd74bbd7cde0472ddced53af3515ae22832675b7
SHA5128e9a6be58b0e4da24ed17d5bce4ef09d86ef68ebe4b68703b2b2bc71fc9967a6e4d76508d4e4d077eea1b49f7b253e1803cf4ad9b33587b4ddf2227241ff7bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb6758b21c0f91989d29ae1eb684d56c
SHA10a5bfd7d8a8496c42ee44aba406a5c2892c12040
SHA2569511cbb317c0f9d089de826a1873e05eb91d22d1fcf2e8435fabc034f97ce555
SHA5121d076041d5d08a2bfa225290e979989af996278b02316977e9f0d8727c98d8d8734bc436d308b6ef4928b3cf448e771b36d27593f902c34c60d06877ae502856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fe756660f3bc6b42dc150ff8cc98f2f
SHA164f74a0a36e784f545231b8f393e8745e0e05ab6
SHA25632d6a4cc6f3fe27de0f120604cf40fa924d57125c64535e2df2536fdef7d28f5
SHA512a3d79b515820153b6c97c48b11415264390727469253ba83a54317f7a5bf043fd4ab165f28b51903a1da4b6ea86b621ebe37bc4d6fc814948937c7dd1aa03be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5117b80a97377ffbee9709012e3364354
SHA1607cb6b516a5732f76385e978aeb6a393b6cebd1
SHA2560994bdb7e655fe3519329b0c860ff2039f870bf7d9324929df40b9dfe2581bb2
SHA5129afaf1594ab9f1ba6587e8d31033bbe97cc9ac05240211a0c9c7556a17f93c400644a86302272032294b301e3c9b3d0192fa2dfad66f0095c1b78389ce0a73c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c61931ee5d10cbfdebe6eddd5c0b671
SHA18f12e305dad7dccca3e4032171a8aa49d3efeab9
SHA256cb7a2229cb340be551e6babb1a1fea3a1f25f9774ff00615525e29bc51864e8f
SHA512be803b45a929b9a81fee307eba96c26f22b46d46e7a5be12af09468f5fa7d1f9b4cabf403fa01b54cb8e304f6788e0f8d2bab14d34ad9a8df55983ae9ed083a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55556e8a66fe2c2bcfb1e95aebde39530
SHA14747ceefb7fd5d3623400caca332c07632ff8a18
SHA256fca2c8fa73556535961227a5d356dbbb00ca6822f0c616f8d33e5f9e086fb89b
SHA512a3b264df3b11b6dc13ceea94c2c66975018dfae1efccb4c70c13eedd3653bdf2b006190a949c743b479a055d1d5567ea8aae4e8e75375168510cea4a4aa562e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6336c8354b537987f33fad9bb4079be
SHA1d482e4d48de8e6cb539760ade6a4c7f835594f53
SHA256c93c220d88b443393295a10c2dfe212d0d1af7f19d92b7a0bdf6c51da9556b13
SHA512c1d61e46c933022d94898d57b16a3803582fde5a947970b525bbb9138689f02a3338b6dc4e61c6daf69695a485f57c2e44bed089daa6e9c1c994ba99b98efbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566df2a25bec7e1b31de7bdbfd30b0c99
SHA1d3d5531227741ff33a52c8a89c84d3f2b1077d7f
SHA2561f39c1b9d2fda3cfd04c5195d3f218abdee7a37c7835540f1497f8c5087c0fe9
SHA5125a1536d912188c42859d92c97043969c91a3e28bb2f2d185686b22fd7fe5dbbd386929c27ac38076bd2ce76173cf291b3ad4c9721f67193e248c4571bc4fdce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a89da6249e4909bd4f74f6b54d9f6ca9
SHA12dd6751509b88accaa084fe343053bfc40eedb15
SHA256bee688133a6fd585177f533960cfbb21b18157ab9b91267f6d0c94b60e3998ce
SHA51299ea2d1c22b08f5cff2c24714fccba7e0a08585be597fad0adc9584162fb6b2e95044403a320d88f72affc14bfb11ce1e92a2363366686b9f382c95c740aee39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f76a5efbe0e4da6365fc6ace9644b379
SHA121fc521287352d63dd2021f7bf658c82441859ea
SHA256cb1f61341bfbe15617a6888eb2fa2d526353bf64b9dbdfb082df78d08c46d847
SHA51205a5c5ff769c4df189bd5abd450a8b061dd84814eb5d24ea4bd0d6449a483124870dd21da1716be0d9e3cd1d79f6544bb8d2723fe655cff7fd0542d5cd72b273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f31e0fb416d8008e3951b5e3c88e1562
SHA15edbef87411aef979674d68b311538b679e4df17
SHA2569c9ff7858cbd494c63c71cafb988f56d7cb18b2f66d5b08bac9a0c0d1357a5e2
SHA512b2e374029757d54f7283833c97d11bfc0a97c5debddaf5050e94382f462476c81487885e24b2c8c135f588f0b86d2cb507a3965f0e37862ae7daad8da64d3fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58192346412aae47f49259afb6aeddae6
SHA1feb3b734a4f3241182f5bdb8805a9cbda18e819b
SHA256342db1337dbf7b1c41359480385e9f1fbadb3c083c08479ce8d3bca13306b28c
SHA51245f8d04547c017ec0ae345be7b7ffb0a9b660bc50c7b34a0ade060cd057850b45d2b6e652b672b6755fcb917e3020a23dac5a2e57fb8f2966509ae1fe96eb31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c429aa9cddfe2ad7af8b49da793364c
SHA176aa501aa188595eddea153f35726108e724190c
SHA25648e04e0e06502cf58fe46842e832efd5a87aa961055b2db4576b6298d1fc44dc
SHA512955671752a418c0045fe45cc105bd7a72bfa050848675dc8726b16037e4753e22f101279de540b83495c37dc5640686add854a0504db0af093cbe2fa404e1e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53289f1b60e0f8126de90dc6b1833b9c0
SHA1a6200a5ad34dc0e13d9220cb9ca0f55109de6296
SHA2561655694f40441e3893e136e31060afe0bd8f8a5cd3ed0a7afbb780480daf0716
SHA5125c597d310328fca0d302dd6670ab443ee57d0022049c324a47eb15d48664211152b0a81896733b9b891570a484e4b2ea25c0ad056b830c9eb64db95a4e3a5aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554f648692b8e3bc1d4ca94fa58c458ad
SHA1515b270e1b5cd194e33d35360a518ecd8d1b0fac
SHA2569031bdb331271ca8ad9c743f42597919a704052ffce2abed6fa226884153898a
SHA512b978275066c07300e441ef11091e00902b9fddc5abc40e7025c62b08ae3ce3d457a0607e1c8792381a23ae2b9dec63d3522eba6ea0163eb5e9248e2ce5860ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ab2ca8ce583bdf30e2362d9d56eb5a1
SHA1fcf78748c0e8eb4a7df496d1f5591bb78fe4c3ad
SHA256246c42e3833a254ffd2d84a005896d22c91aeeafb82b3fa3004437e4275250fc
SHA51235828984311c38a050b054f5f60dcec4ecb00c763b1b1c9dd2c3d4a02bf2d968d4b0e5a5cb82b81e57544a845de18fd63d339fd16abb3d0e17d49de9701c8452
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a