Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
09481f3f9d8007cae992be45dde8b4b3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
09481f3f9d8007cae992be45dde8b4b3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
09481f3f9d8007cae992be45dde8b4b3_JaffaCakes118.html
-
Size
71KB
-
MD5
09481f3f9d8007cae992be45dde8b4b3
-
SHA1
b5e4808f5d3184d6fddd3ffa97cd14160ce3cf94
-
SHA256
56107411a499385e7710648dcd183089e3bd0ae853d07a1be2749e00a1e93f6b
-
SHA512
cc85d918cd91758e3e9523aef508ca199a9028cd908848a6465305b43ea0e61cab99b8827d741a70dcc992cbe74e6232253c3cbeb28bb1cf5b0617861edb6158
-
SSDEEP
768:JixgcMiR3sI2PDDnX0g6s36nsPS2ZvvoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J5W2eTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420622316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d52b345c814d7eefa19ad3e0eb8d8d077fb7c8a7008ba5e6b515f878c7375b53000000000e800000000200002000000075b88fc5872117aec901c40030b7381567ba7f5152ba9b582a46de1b892d402a20000000a7f73ae653bf13d615c62591768f35bc3944969704bd763eb56a64e0bf1de34b40000000505ac07a5f7ac5fa4fe264d2d89544544bdc02c0aa72a9c2a3cc6a33eb20e6462c897f1570260b8872902bfe99eac549f325f1bb73ffb08b466ca52b0d99cc20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F853BB1-06BF-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802b3234cc9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28 PID 2972 wrote to memory of 2204 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09481f3f9d8007cae992be45dde8b4b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548e361a04f8dca05e1107cd9f5c7122a
SHA1b9cf0bed13ea89224fca592c85d5232e2538bd1b
SHA2563f2615170fdb47511553385e0c6647e6e737a759073c986f56c8d891278d9d10
SHA5124249506e2dde437c71e4d9b605d3026c77a5128fe93740eb1314ba2d6bc48f10274042579ef6eef31345467f4d7d68d9c124b14527fe66165b2f33a4660ddd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6393df5237b53da8f0ec9e3fae403f1
SHA1dc1479323713027fa5a3851d4a84c03bb97e51ae
SHA2564452658a0efdd2d837b6d9242691ef511229b366fa8f9124541ad490bc4a7441
SHA512c870d2181a908ddf43285c5d926a665aea7b1d776095685fdd389d100d81a824f5c3f275e9ef2cdfc4158c14732b6fcb96b2c3aefb34a037b6d175c4bd088250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59076fa022c529a368c990f5eb6daeacf
SHA179c721bbe3d3158c14e4afe9a2da797e398b3bae
SHA256109f31dcf5177a4e8a0e863135b99bd03e9d0eb55ca1e89427a86c2dd7936de0
SHA512d8abcb0c8b1ec2790b95e488c730f4300ea677dc482f911c117ed64d2a9b1bc695d14d409c913275f70916fa8ee94753b152bbae1356d61af835c58f0d2c1b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd94ca16cb90082d8262cd289f3e6845
SHA185f6f153360185889c066aaacaf2f1118c77e5c1
SHA256c640bae72cc9d3a2a4459f44ef9e9d3708b42de010f4a7824be4179d3a9cadf6
SHA5128d4c98c4d328db089011b731160a85eb735fd498658c9710517bd1f60809ffbeeea58e7ce2c24e58292f37c2133200a41dd5b6edc7c4e71391f01865edae0626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb4181a046acb3069dbee27fc7ab15e
SHA1df7dc342e63b357ad133ba49408df1646c2c2a9d
SHA25643c79e35b7ce4e8e0af2b696595b96567dc9fd18433541d80d87fbd4297c75bb
SHA5127bf92206ba2e33826065e45814ab2953159b30da306c5984348bdc4f64b9c55b678ce9e355ee015cc374c4199cf7e8db0638a6539c4b1612884c9d93715208b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dabc999cd7041baf07951ca63f311b7
SHA1858ff96a3170be04ff69805d11a83b852aaf424b
SHA256a1b8d62840d5a0c1e49b2ab9fa4f3340a3545c6af02f3fa35501dbf20df3367a
SHA51280103d7fb20db6c4a190c88c9a6b96cf3dc0c1e5cf5ca4f445c7ae0b1a4e383ff99392d391dc9ad6fe050dde9fee4dcb200a5a6c99a0de5048ee3cd3bae53345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520436bcb9c41a6f24b74806f90e05a3a
SHA194f5f205ceedd4d87b0064523f428e0a08c6dd4c
SHA256ed6b683bd282f5942fb2ddd41d7152784bb05ccca6685cd5ae84cc7ff8bbccf9
SHA51218e28b91f2c0e515e19058bfac2c1a198f168c279b855414333df057a25ea077f8287a3d0ed2cf8316dcf193905dc55f2003265f6b6aad95be4c097b10464200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e366541bfe1aeb17c6f79ca6cf777a
SHA196fc4b3d142e946716b6f737e58c259103dc3d5b
SHA256cd70ebd4222487dc212feba02bf018f02d94a0cd67df6652e29630289bcc63d2
SHA5126c81e9c9ca6814861bb2b504ea77344341815d5dbfc15fa5ad8360e48595e3870afd27d3f9c9a530e4f76b4900ce9d3a0479d9cc09f17515ef226ebfaed77da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b767fa8aeea3bee3189406c0cfa4f1b
SHA1ce59bc30c32be33fc6d1b7a48809d5be53ddce7a
SHA2565388901b399377dbeddf6948143e89bba20dc5b5ddec653baf6721d6923e0a2c
SHA512dc9cbe536ca300986872253c8660e0a9495fc63e2006be480f6574bb289abc43f09ef3ca3e7e3afe1ed40f6f895f62a1835e9e4a1c78c9aedfeda7c6fca93550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510563d160274c5481e11e0e97b6f33d7
SHA1591c6efb0ff1221d4e317744bb983512d0f0748d
SHA2566e42dc17268b8419fd5c79830ae2ffd2838af7eff59a03f737a79b59ebb96a0f
SHA512638b768fd99ee155cd238a14ce17a8745233111c0222f5827cbd628598affcbf5af79590647b554d178710188a9c0696c447ed2d4fa1edb137205b23c2c23dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a3567a2405be21c4c0816d53af5e7e8
SHA182a719171bd921cd51774d65d9ddb1ef28091d18
SHA2564bc96296985f65ec677813cd01e7d9f8fd2dd77085eab5fd9e29ba85ffcd750a
SHA512f22e268c89a36ffafe5f4b8380daa138fc7fca6eeadd33f9d672661df7c6e323978c088be154b2963dfc35bc77b3ab1aa1ebbf10ccef3c848e772898e687fbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563eeb69c6e0a1fdf209380949b8f6f42
SHA1199013de7c8c6e1cf9673d351efaf5c742cb4947
SHA256f1529e885a9899f82c6f57a6e84ca9e3acbca66c095eadf97548581c212c313d
SHA512a8ffe3038c09a54a626ac2efa035380a2b0503a55cdbcf9190344cc878b4fd70baf059b72ac13b00e83367be298666978d79634e400d3bf4b3170b467ba58b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536fcc4da3631e86b90938fe18b8d56d4
SHA157af1cc96e336e30779fc0faf37df95f19f0eecb
SHA256dc08b66b85a2d853170e10548b61854b02887cb253e441aca20f1b675a79dbe6
SHA5125154d1e318e09aa2a4d59c7f08e80e11acd6ddc9145576b4a001cff680220a46b05185669c765d1a4c21c0b6e1b118160448c94be80b090899ee89f8ff30fec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cc65f0d32710a1612a17080ddcafd2c
SHA180d31e1b29c0ac3d6e0e971fef4ccca93e6c03a3
SHA25684f9aed19891c9daa6f8b403416deb09c20778bf843f75afbed73e5ba77b1264
SHA512eddeb66aacf4e87eacd9bb4933d4c29a2f07083adaa46590388ebd878d9bf93adf8974fea66f725e15c0f63f51d12bd6820bbfdbd5cbf7d6f6e7cb3164297d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c136ca0d22eda87e4174eff32762f1d9
SHA153240c5b5465f8bbad15e3605a175d251d0e1c01
SHA2562efd75ab8155f2d27020bc3d68576e39f403f057193378100650117c1bf00854
SHA512a2b36fb04329fad48dfee223e5a68c8152e59b58bef264af425213e68bba4269076dd4305bd4444b683485ba76467a8e5dcd200b6180f508aa9633e117668224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1b1a83b5b91cb71b74c1a1a072d559
SHA1f15e5d04dbef67b5b30b49da6bce912ef2fc6810
SHA25679bb28c5f30b63460d2f0b4bc27ede5b55f51ed0d778b087c4ec137e1d1ecc2e
SHA512021d0784933ea27010c0d6ba7f10fe05abb82cdf2b127841c1a4845097b35cbe91827d9d36f84a21d162e14cdf9e234985e885c16fcd7e44adfd2a39a682c17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143873c88d11a1c92be26ff06c85c6c4
SHA11a9678ef7a0e3dc47131ad5374c3a8b3c76cfac8
SHA25673ec765d8a95ec4e87a89e11a92378bbda5af833276a6dd83d4c8f08b4ce484c
SHA512d1cac74937d120682a84310d18de8b9fe2a42f32e1a65cf6e43ef7f91ac706d6a1d7cfa4f9ff1b89f316841221cc7771ca8cb4f173b89d69af8def3a19c5188f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a