Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
1313312c96cfee46a288dfcc69624d6a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1313312c96cfee46a288dfcc69624d6a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1313312c96cfee46a288dfcc69624d6a_JaffaCakes118.html
-
Size
429KB
-
MD5
1313312c96cfee46a288dfcc69624d6a
-
SHA1
3650c074ef7b6894ca213c3f46aa552dd4f25aca
-
SHA256
2a3512c620e5a086c12e19b7469fa41dc8eea35938ab0d6206190a4fe331b573
-
SHA512
1cc6385edb5e5f9a17ec5800ab9fe49484efae3e7aac648d315e2de6f5b8107aea6fdb1cfb83305f5638c04ad71d6ba51563cc71b72b1bb89a7dc13fc9b1045d
-
SSDEEP
6144:91hO2vuShQ71sRmYikbVMIKy1NFoM72rdA7yJUpV+Qz9KmlUGJiJszvh6P+gtKgY:numQWs2n5EVrzzvuiI7b94o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000005b626d687688d4fdd49c80439fafa3af5b3f5b43fca1b4018dfe19a9befc52d1000000000e800000000200002000000013dce1ce8d71b3bd29b075b7acfbd6b6481d803c25c3c7ae5cee4efb71cc112290000000062c0641ff8762e05032f5d205c80d1359a3b0b32a917a2d128c1ec57f6c504173da4dc3e254ba1dd125033d16deb71628522230c48237ff775825437b636202840867573fb2452d3861d1d760b24d4d08873e20a9e7a6c657b8b9446ab6c65d59609f922670a22173f1b46ea2df9eaeeb04cde1a236677cefc1b900f06ce4bf7f4d36e6c77f7ca0d6ddc96fa3212e2b40000000ca4d9e9dfd7e6d7fabc014785a2c58ca7c2d37fbd6f6393e0fa401fa684731e0a731e09c8e16b2e895c393fa2e17cb62a561387c4f6c3f0839e3677005a8d850 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420993763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c494509eda337262836b6bd6b38a24b26b9e469075c4301f539714c9f2c6db25000000000e80000000020000200000004d764d9c3099f607519047eac2b26cb05ebba31c3759b37ac25c3a5a9d228e192000000025adb12d5ddd0ba64397641c0660e0afa15b049880863da65b51a10fb544382940000000c845c41bac7e2d20d2ed2edad492adfca99c802c8b60e502d13b49c62d1c5b1b43a4f945dd5ec433390728e1a45f9fd73c816369a228c5f2736612dd0d3ca74b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d8f70b2d9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36042FD1-0A20-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28 PID 2872 wrote to memory of 2796 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1313312c96cfee46a288dfcc69624d6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
Filesize471B
MD566f3541d1076bb58663f4913dcc8000c
SHA174c1511759fb6ad6de2b4b89accd26f36ec14610
SHA256bc52b3fdeeb23e98503d678f178dc8fe28f76329fb63f52b4dd0ae65e45b726a
SHA5126200a25979e94a26c0bc5913e973e7755acba50d463b440ca421f13fc668915a129feff4720f91363d2b4c32926a6a9eda9db042e477e03ceae338eda660330d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD512c22e3da37a53b5d88f98e8fb9dab4a
SHA16727cd57181de4b97ae4cacc00d56558a20cbdc2
SHA256f2d2793656c3e6080b67ee3b483c1bc06cc17fd970c6957f3b39d1beeaecb6fa
SHA512a4551bca3f1c4105f56869031f900f851d657671a2edb36a3dc9d48d3f492de032b10c4bc8f28551694b868984ee6ee85b682e72fcf5aa9558dc7642dfedf3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92536a4ecefd300013d33a7b7e839dd
SHA1687ef35e5aaaf0375687fb6af4c63c80b0444a1f
SHA2564a397245feaa231a744d13ea993772913bd356795e273be50ab55c7391a441b4
SHA512d950cd773d658a8a50cb341251e9aab3312380599407d2cdb9ed0ab84c9343d750c57f7705abbbac5f5f23b2b54211e65e2081f8792a589a46a39c1b7126842c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f9bb08ac89081112c454e801f241d0
SHA1651127fde0b8aee1536427602c1d5189c11e8a03
SHA256014ea9884887f7ac8fe1697f7dded98355a42bd9b18e451ce413df8bdd27bb46
SHA512ef8ac6e02533f6bf539e33c940fd3ad1d4ead52466b42c4214fb2e45f27d9c9af9e8a76442fe668f394d6ed01eb02eb6036545c885896ce1ef307a4e68b85005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5414b77fc0fbbaa76b86f5adc82daa15f
SHA131a280b03495be9473408f695d8b407c4798e8e8
SHA25660b59bc80f47116ccfdee4fde67c97d6fc82a70b85e6f2406ae2275e25fad380
SHA5124a25da1951f8c93bb91ab5aa5713062f181abb686482c2fa9edc39df9fde1c8e9545edeb380304dce5bb802d65975dc1906a641d4d4f8db59cf117c0c4d83378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882a918ad696b9588ef89f9d4b44d73c
SHA1d3741d9d8e671112149c5a3061deec718b7aa4f6
SHA2565247ac708ae4375b89113113ca055e62782a35cdef35c584e023787391ac6d90
SHA51216efc26e0b53f5687dd60b7781196b4a58e935750416cc3d29b1e786efee3e1b216496b24053e71e2479479438b5c8f0542214645b1b31c906a3b08d4304b0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd90f12c0aaf934484b4b79c38f5f0ac
SHA1a2d8cd79ef5487e46b11f503cb26b3bbd3215d55
SHA256ddf4609c27ef7ee75fa802ae6ee6e251f9b7146bbb71cc8dea6ecc134341c066
SHA5127d71e22ffc07cb6e92758a28031cec8203adb1e35605156d900557436a1d4ca161fa03003289a694f3148620f13c500ea86ffa6cfa1a0613ff474911f8d6833c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523dc5c6e6b43d8595b00df8ad3678a98
SHA14ad95dfeb07ab7c3a5de1a6f22bcc5a2de719e5c
SHA25697ce1d3e1a2b32bf8a67be31b29f7e2e9dbf30c5cf84f20e20c0a42af7bcc673
SHA5123a56ced83f068e6256ce9d4642f0e794333e34876cf829e794c5bf3a6a7918c095eb1064c84ac7e154ce5bb9d0273d06ad8bcd60e516b42d7e71d7bb0db0c51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fd34c71b40961ab490aff6216dcec9
SHA1517b2963f89207c79865e5aeeee10e8ada38c4fb
SHA2564b2503e129c433c331c02e85595870e736d1bddc80bddc7d1d0407d1c732114e
SHA512492c591d6eff8034865fe6c445dc40835cfb7b9b74d6c350c60cded95ca17d8048a99d820528adf1d24e6cbfe2940e9a6dcc7183bb12ec1e1586ee015b5c2a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ce034da1d3f931944fd67171374ac84
SHA1dc83d389f117dd74b0f018f4e9006578bc0e5050
SHA256a648c866f8d34ff2754bb681c6e8821283bff010a018b7824d4ca33f122d5afa
SHA512595b0b26826ac1ea081d816e0c1b9069ab34c257c5ab94a4ae6385d657c7260338fc8bd79591bb7405657981ab9a0695b15367ef2cc4d87d7d44d304e5390673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e9d169eb325cf99af5cee9f231cba0
SHA154b3bf793a7e8238f8193e474bb2c11faa7f74ec
SHA25695a2d2758d84a1002f240232a7446af9f5d168201ac7519a70e9a8ce9a224907
SHA512ca518197e567408ded72227962bc482c1478bd3b8b73f93053d0c23e371c72a0181ccd8257bcc11f21daefc1ab17b837a234e29d3c01ef0d2d660d22ff57025d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ea70c52bfa37da5bb6e5ecb9fc98c8
SHA115dfa65f9202160c2215a54bd2922fe7deadf4dc
SHA256ad7e609897c98020e02b12f65ffaca566582113764ada290cc9dafa629cc1481
SHA512376d0eee70cc85a9f494895dba41c35e633ae9da61cac7e4eac6c08303f8a438afd3eb44bef4b0960f4b1b4679e21f6416ae0c7ad2752d25868406f9870503fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
Filesize396B
MD58a75330c60c738eb7db0a05fd61fc66e
SHA175e3e97e5030c267b3664fe29f328dbca169e6dd
SHA256bf5b71eb7f0a560fd5984c7b4ab4641974ed2b5fdf2f9e41d529998753fe74fb
SHA51204afaf1c8a11e69e73ce55a0fdbe8e28dbc945a49fcd9ad54d39dff2b6b81e7c9e7028a675c66a3f78ba72d36e581f9d16b22eb9f1a8396d2157a3171a6114da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c79a2a42c458d6791235e1ae580ef1f0
SHA1b40ea65475b83e71e9dcf92a95c3202df328127e
SHA2569f5c1cbc9e58607da05528c2483694d0be21dde767b9f16f9b162857cb4c22ac
SHA51284b342fa76cff1463ffb294ca41e53e33015ed0db8231975496c43c3dfbd789b894359363c2bfc0d104feaa41548c588890c07f39cc84c6e0e21f2e961fff62a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a