Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
0fb5e38f7d476396f66c8766635ddd4b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fb5e38f7d476396f66c8766635ddd4b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0fb5e38f7d476396f66c8766635ddd4b_JaffaCakes118.html
-
Size
12KB
-
MD5
0fb5e38f7d476396f66c8766635ddd4b
-
SHA1
e44c24ed2376c7d0d01b996d47e9a2981fb10f1b
-
SHA256
6e6cabfdc04008c4a5cb2b6787e78718f3d1d97b93f8f410ccdc1340362a0df1
-
SHA512
32812dd91c87d9dde0c78a626400dd992bfd04bfda3e93d626307bfe30bd0989399b6e72ee8bc9609f778656c4f0acec33be9cf84d191ed092610aafed33575c
-
SSDEEP
192:cwavtQgB6SDZUaBVjB/jSe3EnBkuL25k+oi:HBy6ELd0kuq5kni
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000e8ead344354718a8fb281f03206253c521b5abd9e667fbae7d0068d720376a7d000000000e8000000002000020000000b8ab6ddd3a7076f9f741ec5defab9fb2f4d64fa8afd840d83e4dc063a7ab79e82000000047ca5576329a2b5d7aedfa7139dab3de4a75f311cdd9abc56ab3f92b802c369140000000124e2b002982df0b09233d029fb45fbf81b8c8401f0b4df069ed28c9ff8f7dad954ff283bbbc4ea2b82585af5af74d88bb3ec8ba94d8c8b52401874779555e94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80369bec159dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16C40EF1-0909-11EF-805C-EAAAC4CFEF2E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420873879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2804 2084 iexplore.exe 28 PID 2084 wrote to memory of 2804 2084 iexplore.exe 28 PID 2084 wrote to memory of 2804 2084 iexplore.exe 28 PID 2084 wrote to memory of 2804 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fb5e38f7d476396f66c8766635ddd4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529adc56f202b73900a22df42d5093e6a
SHA11953d646c7b70ca8e8ec0eb7765028e4f0621c69
SHA256807b2444e0ac527032d3e918d1c82dd9fdc11c8fe47c9627a5e25b141a0cc8a4
SHA512acb25a3fd1087ee620d0ef4048f036d991e8ec51bad4caf274c0873447fe518d6f5202ed7dae355e68b4f47b6162396a5d27edcefe998f6d3c85715bcb35d4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5245f7eda84ab3c28187603550544d691
SHA1df143f9df8f347dae3fcf09ef308ae10abef4922
SHA256c9c8cb7cbe8b023832f29cad3ed4d99379f8e85a8663e41b227694796b1fcbdc
SHA51261e5114264e95c93e9ce477599c2ab79d3550f95ad6ab89ff6c2a2e50b95d577bdf280b8136a3c5f88fbace874db5aab2c0be8e305d53535ec99f59395bf8ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b359aef4dafe727b47d166091d56f844
SHA156ed75e4f7e7006f44cd78938b794024f161bd78
SHA256d584d301750e962743b39300b0c2a389075401a4894956085afa20cd26926f9a
SHA5123e1b877906696bc5979b4efec022cef36efa21511be2c355acfc26740c793bccade1f0319bd09215ecf095cfeec5fc1fe4ebd0330e4250e5e8db1082a7cb7e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2939d269da94a007f8cc582443aedb5
SHA18081cacf971d030c362fa699b05e0d227636eb4c
SHA25615fbeb5b6336e60f4e4baaf396aaef507997cef1cf651775096b916eba09b3a7
SHA512d43098c330c179720c766daffcfaa1e1c86cdf70996e4c7433ee2b4bea3dd1af7cf8f47813b4413d0fbb94e711447a22fd8e6549156e47a7bfc6e2a370d9e8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee825967d8ecf7db3528bfad90117c41
SHA1f854687258a8dee9d65cf38bf7719601ef81d5dc
SHA256d7c34259838ec8f8cb609267572a61fc831200e6a10a98d984a058eb29536b4f
SHA51252d6d784634b71b5bf4bd322368101efd596daaff20630ed162265f5ea388338d59a3a2760115fb1a1c8e553a30506e4ccfc32490b0d6ac44f88855f8062f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9aa1ce5355b222d1eba86854718a61
SHA16812747d399ad8c8327f9057a76f7273659e9e83
SHA25693e777d61c77d33d5e335c29a19d359dd6fbc6469db65caee50fe9351eb70b8b
SHA51288e0003004ef78b163a46e310b462be0dbecb51adcd2be62d7464e5f9116604aa9f0c7b1cd2402b785db9fdcb6a3a03c43c38c8137cc7c21a7025122eb3af161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ba3a4e625597408fa357dc90a3dd9f
SHA16757d9d9e3f87de712f45f1f78c4f33cbff22a95
SHA256ef1726ceccf6bce351c7a71050d83d70758df80e69b02ee7cfb0948796920d6f
SHA5123230ad0a3729b8946a87212c6b81afed720edee88f20f65d91b12529fb9eb7a3f21d5379df4781e7b5ab7a2ae6fb4c262bfa559948f30f698e3ee13a77083758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d07bdee87508c6e3c91763337263050
SHA1c4f38640592eca44fc2b7c505e6849071a5e26fb
SHA25654377783c2c9f12b8ae23a3ebad42e309ee1b6a8823bcfab57d896c23a903a9b
SHA512a404935b36b06927a1ea7406d923db66700f3fa17cd34e112dea4beb319fa79906f9dbc303acb3fe542d7cc78e1acacb880e0d1ee52266290d884b81eddf4a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951d3175b75fbf719e0a370d79c899b8
SHA1b53b0f82857208ac8ed783e35ce88e191a37aad2
SHA256f12ecf9413edec609c98781ae96a015acb2eaffba31c39c9f71abc4aba2e39ff
SHA512abd4b803de06f7aca914157dcd34f20094af193948228baa58f889d8839eafb0f275a51f586590a041104cbfc435b9f2d613396e0b7b66308ea1e378a0debd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53329d92909a12aedffdf65ecc3e7d673
SHA1de3d4fd84ca52f26c41e3f0e8d5d36568a7e131e
SHA256cf256bde476dfc27a624bf9fa7608974f709054aa2067107ea2cf482d96dc23c
SHA512c3166ba6dbcfbe785e58605c904638e08f0d74a5bf70bc21e9dddf5595dbc73c4029a8d997138f25df88b1d3a0e0d3bfe4553f522313b54066d32df50366201d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588cf28742076208a95d473f9cfced23
SHA1ca3740ecd97ffc5c3428142fb9aae04955dba4db
SHA2566f0dddbc5fbc470ba4321693cb9608da089581ec0da14512b69804bd7203fdd9
SHA512a241b3cad9d855a7ebe58259b981cee3412179a7c64c80e4bc8bb7182cb0bededd21d98924a394c29cc14c869a71e3ad82b930fefe7256a2281a0bc509ac5ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5bdfb8a2383aad161fca8b466cb69c
SHA17423f411c2ce928794ff8e3f76ca3e071f4bde96
SHA2562976ad968c01bb22e158438217fab934133ef3a7a8414ccd0cf1e5eef2033181
SHA51257441e09a51af1fed1796601c97528108ed500126bfc2cc549253e50f19e0c1d5f1e909fbcf8d22db0646f39a628bbe4344d13532b574d24030b5f3a20b3e615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc384adf03570655bf0c39ca24175e21
SHA12a0843fa33b9fadf48c7c5b5f96ca152bbaaac38
SHA2567342664b236d71a8b2ac6bc4fef2428e54724569d4d70c0d21d15bd245c2450a
SHA512311df9d2ee01c291042e49ce3e188e4b77be4d2dc2fbbfca6ea91ae4e0c135a2d7a15ac54cee6035f290f2de687a46b6c615d4357aa060f843a6a3b964b4cdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e85cca478ebf7ca9e5bc7dad5b1111
SHA195170bf38f34be0eb86406db621ae93a1b9f7f63
SHA2564ef04c55fac3b324b76d45ba490cd305121444c0a56753ce7fca6810a96315d9
SHA5129400c058553df41eefe7a88febac7a18a66f33c9062c48b6a3944cca39340a6a4f029b3524cc9ad5dfd49992e545b75bfe90cf95e3b8befb0fed87d6f0bea80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d66681c94ef330ede73f0d613472f0b9
SHA1dbaf0ada50e5c516ea55bd73f1ecb843bfbe7a4f
SHA256e1baff089c0b2c22d0191ecb2614b132cc2c324900f44fb399d35d3bf57eff5f
SHA512097316f761894a5d29b719b49d4978cb6c1068f0d86cb692f41b2263e7f80ccaa36649de8ad5ac0ac4ae117423e74598067bc90237b880961ce4a7e525d9aed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840f5c09e0605d26f3c036be6bf1765a
SHA1546f67f806768b454e0e83121bb0670566da7a19
SHA25628ced3971c7bec8b82745aaae7adb2a685b16807c2c93c1ab8e6d23c788b30a7
SHA5121569df9ce82d0188fee37d5f54dd80c48f778f242c14802eb57ebe181e44fbf63d5fc96d2498c4d29e6dcbc67e3c3862f23a1329269b700a4c08c9d9968112de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb743757bc0fd1184ec721360e17ab5
SHA17aa58370c403654da673f5bda29c6e63637a0c05
SHA256844e368f951330051c6c34059aef5f95c92b15eee1d97b33cea9bd4981349130
SHA5124142959893a7a2a9c65b2b91cdc8ab39ed68cf80ffaa087ff353bc13ac5b442fa12f9f167ab9d3f7d5e762815533cb437bffe0b6a49ac742aebaa10d19d2dbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3b12a1c969173173fcb0005450de7f
SHA12f4fb88eb6898aaf356c3c97aacff686819b2966
SHA2567f725221ea83fbf580e37ad2c2ea2d8a764a89e387b5271b0231778b3538f457
SHA5121e2867f92a1f744ef8569c2e90d982f3d71081fcaf4f38a834072f4d9e1f836ec439d927b501b6cbe7e52e7224dac794a2bb4dd9619b895543a9aa088780bffa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a