Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
13284df81ed11c7cba25fc8bbba9b1c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13284df81ed11c7cba25fc8bbba9b1c2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13284df81ed11c7cba25fc8bbba9b1c2_JaffaCakes118.html
-
Size
3KB
-
MD5
13284df81ed11c7cba25fc8bbba9b1c2
-
SHA1
5508e378961c6aa15d0230101bc368afffba5466
-
SHA256
3e86cc0c78fef0fc9fae3c4cc96e16288cf5f306ee08b2d0144ff1c95708d94d
-
SHA512
abc542205ee07793d0a60c50820f76d46a21dd79e5a7469739b573257f2aa91036f0df61f94e76c936d2d639b150d3ccb25f7772826498160f72704ff2b5728b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108bd5c0309eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420995354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000b8e79decff4b3d69efdaec9f9858a312e8e12b55dc99356bac3d01ba99c98acb000000000e80000000020000200000002dadd9f8c3901d9502b8b28ea68883f35172f3215daf07977e39a108ec8aadba200000008602d52e0c0dc51827fe177b68e54e27620b084a3faa4fd42ac27989a2e2799b40000000965c22150661d78938bf9c8bc7be891b50d2052c67917edc36eb5841d6112a2100b8806a6205578284b8e329817a63a4acc85f14862ecb089ebd4220a40e746f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC19FD11-0A23-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1624 1900 iexplore.exe 28 PID 1900 wrote to memory of 1624 1900 iexplore.exe 28 PID 1900 wrote to memory of 1624 1900 iexplore.exe 28 PID 1900 wrote to memory of 1624 1900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13284df81ed11c7cba25fc8bbba9b1c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ef3a1b778f8047408b390f6693ea0f
SHA16bf2bf62690c83e8996642245816eb70e6e21472
SHA25645f5f93730c82335229065871aeb332a0620f60628d35d023973a710882bbb54
SHA512adb1ce7da75726a13d9d280e35ca65366e6ca8f5e2740bbb48102bf75c593c10f9078f657891c2f2c56bee8d6984407f40ae3ed0448c1e9159016ae6481cce89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272e3a3ce89b6b9bed9444f39e8eb19a
SHA1c562c5a30506b13a9b3b10bd0813c6162ebfa70e
SHA2562cb42eb475b1ee80218c3fecaf444af872782ed26c4206ebf3d9341f0e4a47cf
SHA5124f0aa2764f3e2dbe5ecf049a4a5b6e739f4e37e6fa2fdea225528c6e0e624dcc70bbfac95f35054650ce1bc454b5b4775ddad7ef840f856c8bcc6e369236268f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6c453d423bc77187d3ed32daeaf8c79
SHA1b9af98cd1b066961b98ebed5beb76d099e96b6e8
SHA256fc45df9b09ee1d4718cd438c701ef7a3b43d2ec2e8856810c81ac5e074e1d35f
SHA5127a9995aceacf2f77f932d442444af622dd7c3353d77ffc387b8fa5fe324520f0fa3fdd8fec70a821b516d01a232067ed66a4ac88e1522a7f85e62e707a36f614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789603ae412afeb69e99a56b090ec690
SHA1ce0952ebb7a83fbfb2c7363f09826927fd2f0379
SHA256ea764554d1b5ac53537596d43bb22e08fcf8be8319715614cc3331a6838d9d85
SHA512e3a9cf64e53618677df33e5babd6c9fb0159e59fd321fd867727563c653087d653b29c60f39e7eb0264770e4c8455f1637083b7c95670ab7e0dc7efb5efda821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562083143ffed8059d0028d36c3423ae8
SHA15a0e04b7b454e62dba24a6ca1d92ed209b2cd64e
SHA2566317c3126c54698721438b1f833af64527954c0893180e8791e960e7132b551e
SHA512b6935788e8ea23457c9f877eb20e2711c54fddb177ed251af6e4e029f20344f6ddd9b603450258fefe5d839a621974f387fef6d47d9f4f055f525e7c37955101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a8c303a513ebd8be8b56c2aa72b9d9
SHA1fb848f7d6590f384b5c2681bb8f29ac051cfa59e
SHA2568de9100635d4558792876d97389bd2b90109e9a35b536af9e7645a7874de3c1c
SHA512c175753f41b7e2d4b36a3fab7174e00ed1714f1c1d1aa7bc1d78f545b5bde9fdc0c4dc15150953d7578ff0dee95cd6579532e70bc5e16710b254328b6b0f50a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51538b1ec31fdfe5a0c4b78e336001c6e
SHA132d470d694b8d7bf4e3012f4010373811d12c08d
SHA256b5cb6e72b479585e22d6e83200b4183f833264728ad4d870281d9405f4ce7aee
SHA51237764f9de8cc4f146b5e36b65c8f49d2a01fee3d0c5458828ca5d6d88b1c2c2eebfb900b39f73fa67e53791e55d5f6c0ae0ad39ff6a829fdf4b2122e79d35296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c46b16412e54db18f8a08ee9228292
SHA13baf90389d90bd99f7ec1d8a24d6c5e24992a156
SHA25666c17e6dcb5fa7733e6a34089f00c2dc4c3b4346d7ac33b07dcfd72e8b4b7e5f
SHA5121b7a55c6c8ca8bea73523c69e3095c86e8b6488eb8c45a7021da1636cbc195fc668dd2cfa51c9bcc2d5c5b36b690760580e849845f40198ffb8be646c5293190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccfc55450a7f41bd9cb3e0a229a76c8
SHA1c33049bab644fb76bf9b535b54822a49b33facf3
SHA25612ee3e91a67890ad6ab1e5553bf7fadf934b4ceb53d3f882792fde60d6725463
SHA512a5c6e3e5a1d06f75aaa4cc54836a74abaebc9b9196796bf7ce0e92234e91717fa3364b46d752c50df1857f2b078362056e26919db7acd84db0db752cdf4ebc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef097540eabc41dadbaa762ebbbf9433
SHA13eb972020abbe5470cbe1d3fdf9865f76d7c6942
SHA2561ebbaa9350f807f8f40a51d0fadb1c83302f8813e971643d276906e25708cd72
SHA5121e506c53c052e7fe9ad3f0ca38246e8bb78d2a432726ad08e39a14887c377766fed0399b9e7675ee0e13de78c6af01a77a63ace431e1f1c2b6bda8156a2f6539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529896b890ddfc9fcf08c8906f30e4446
SHA16b4388488d955734ecc5f2d39722f4f52d1aa3cc
SHA2562b06bb77fd14e0efbbb52561aed79ae7e944527f13836a76030328fa6f3fc976
SHA512388e5e642f2f77f88fb946ca0979a5dc0203d2e0dcf58841d9e1aa64cdb895e23b9f5613a4a325d49d75b723616529950e52c494ce4329c09a3e70da51d40ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d6d0eb3974fe9e10b302a1973d3069
SHA16276a4b06b39bfac9e2ae641867e818220626c2b
SHA25625a3a295b351f8ed720a5acee2852d3e6229f10f3be344e605785c902ac77e53
SHA5124537b910c6e9b595b5f933ec28d6df030f12263054ab62bee38eba0a1bcdef4c30d7f37c8789b7711531c91332b0db31b6a49cb793d9d6d9d8bc50fbdc771488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588384d5f948479e20130b2e570d71dd4
SHA1c777b0f08518a7843205a8276e88e3af3abb2bce
SHA256cfa6e29beb9abfc9747f085f251faa073aa9126800441340b1fcee6e5644793c
SHA512742008d98dfdbc1ebe4d0187292b2ce2937c9a44a7fab3d0d34f64b2d3a335b1a39bf7d461a17765871351b2b2a17fffa3cb04f1105551f798fdcf6057208874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591cc18eda1f2422ae3d970b4edd23022
SHA14c0a106ed89b8653d9b3cdf67f51c8942a4e3f0f
SHA256a964d0e02d8f9f0947450e33793c562d5d7138e70b3ea8bf8ec7f335945def2f
SHA51294a8be9a5fc5a32929076b69b9c845a82c5bc6faafe75524101ba43fa81002cd2a77a10a0508f7a1d53a5cbf18d437cd5eb340b752801bd4c9597a6c200b70c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be27f1fd4a3a0158e513b0e5e42a8689
SHA19cb934630a0cf1ba37e58d206a228a493136d757
SHA256fdcf4d63705f502a50885a9a38c93235e37fe62396acc583970889ee6e1587b0
SHA5125a8926bc541bb67291c60240a41639c53fb9411dd6d3d3257916cffc486d8580981ff55460a6b00bc0937636c66cecc4ef8aa4533fd37b7662dfb8ab35f5fa97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c287eb020e48a9880732c9939bb1c69
SHA125eb617ab14659b809a733549193f6946d33be27
SHA25636b4c319afb0dc04c48df689315ec9a082bdd357023b2aae4dab709c0c1da972
SHA51202c19388baccd69a67bc47d3c75accdc31c267bd762b7c147afeda084fb4d307becd317df715b4346e9e2455c11e44eb3e5740c56ffbd87a36c846a1fd87e0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a538bb975fbb5997d1a1f4b93c5cd136
SHA1415ed8e9129d91218ee089fb8f71d4fdc1d65b70
SHA2569c057de9faefef86ef1e2a29b9ff27f755036ff98aee762622ee8dc3af5b4847
SHA5123dfb486292d9a7d188f251017f9cd7b12c59d8ac0fe38263b240991369084c9c5c266ca93cb05c7cfcf6deeb92b088496f9e9689724284340572fd62e14b99db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5183dab1934ddf0298a00b7d22d7591e6
SHA16e10b4d03dacc2f715744a0dcb97e14f2f4b1aaa
SHA2564ac9704c9f0c38fdce5748ca4e2689a2de10f2dc343c8f7fa3fe574c9b5cc036
SHA51294100a83935c2a4c1cd43546c73309fe8976f4c4baa0d790884b297ffc11d3b587a03660f4de5e99a93fa04f3336c31c50c9b785ac30439fc49007f047cefe21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bea4fd05af5d446535135ec6d3d1489
SHA1511aee848f5e13b77fcd88c5f7e9874910fc354e
SHA256738de8b58d63d1959a77d681f454ee01a389333706fd48207faabfca3805adc3
SHA51275874ef6e6f0d7f7113f57e70094dc925bdd23a1d1593356f732d76ce088ced5a80fcaf0322206eb1898e238d18642005d3cbd54bb1f3651543ca148648a7e0d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a