Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
15ca72add245f14ea842d7762a00f78c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
15ca72add245f14ea842d7762a00f78c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
15ca72add245f14ea842d7762a00f78c_JaffaCakes118.html
-
Size
46KB
-
MD5
15ca72add245f14ea842d7762a00f78c
-
SHA1
60f38e874fe027631bb57a7dbf733c98350fc824
-
SHA256
e03ccff2b4d7819fff9267c13824fd9ca3eb63df09bfd46c20f12975a2d6cb53
-
SHA512
55d433320541f5db7f8d23c62403df2d039ee9988e8a66006e41fdad9e3e8aa6efd9a3e79ff868a0a112a58a42eb2e78394bc2f55c0130e3428f3e65d5a9cd8c
-
SSDEEP
768:SQjpU0dR/Z7qDA3ndYpGvaqkCW0aI6gLkR1ExJc3vsphOY6RdKeL/cCEGKvP1nVQ:SB0dR/Z7D3dYpGvaqk+40i1ExJO0phW7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007073bae62c03a260a4df9b5791585ab2caf3cd8c89e65d9fd5de31c755e0072c000000000e8000000002000020000000cecedf69a23df4e7acd65423d628ddf072bba8b89b955d1b6f689ce5e9e9d2b72000000039dd7d80e0e0d32c4653a33f61eb16e93b700184bd95d86ac573b32da57c4ee6400000001f946f868b97a248fdcb0fabe43516037c45655dcbc9d8f5d8eb73bdfa61039ddc0219291549dd98ca521aa041206b0d88ca6223d28981f0c4552ae929c43a7b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421041891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200ab61b9d9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45B588A1-0A90-11EF-8840-6600925E2846} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2724 2792 iexplore.exe 28 PID 2792 wrote to memory of 2724 2792 iexplore.exe 28 PID 2792 wrote to memory of 2724 2792 iexplore.exe 28 PID 2792 wrote to memory of 2724 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15ca72add245f14ea842d7762a00f78c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD533a7512dd2c11638da6fb5642f38143b
SHA1b616e40bb2c0d1160caa5e11d20a82112c11c06d
SHA256a3512abd493a6dd9f1b6e835d3c40fc0a950cafe7d23ed12f9ec689fac946fd5
SHA512f939cd4c51f90320d8a73638778c86550675c23a35d436fe2f6ad29b3a128cad9a7e3eee640a80589b336df9e6888f5ec3655137071e34006210ffdb2ca3a974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d98ac2691d43eba1584578d5f5c13a
SHA10a331d5a446036af4b1b3866670b12fdc6c0d28d
SHA256ec429dd9ee4837c799478d34983c81a950532bccead013899c8d5aae54894773
SHA512fed008fc85bf9e18fdcd436755e4b7f2c8eb416f1f51fb7559b080183111a8e3cfbd8fb36edc1471cd6d6840505f1ccf6c3e9fb3cdbcee4a106c8486c00f39ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb930923bf266438a80afaee07c53fb
SHA1fff848dbb515c45c08465519adbdb359ab09cee9
SHA256fa58c32a2a2ce39c71417376cbfedb8e2ef847f06d8fe96c131ae91d7600c804
SHA51289c8f2019b2b118422ecc4bdc0e2e5e719cd701c31742f8c09bbad8e917f607c4bc07699f5412b797debb7a763131bb4f92bee54fd49f33e8f3575ee1d1c8016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a05c956672fa84f828a3c60a128fb6d
SHA13c57e2cb3c43c5fef2a5662c1cf0cd569fdc60d9
SHA2560b8fe6d2f7f1caa90105f314b086d05fced72d56f048bf27a266e06ec28a6a51
SHA512345f08bb1c4c0b37bafbbb9044e7e9774d8f74e89a0a495ca7a95e969a3ebfd206d92312cc3d77a0c4060892e69b4c72d25828153e4be5894f88776f6acfce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5079ee6b79581d9c264c448971a2c802c
SHA179291b213e006e411d7b30b01e34699a4b5d02b6
SHA256df3527e5ee6fd5eeeebfd62f8b2641cce6d7094cdcf4c2fca41ce6b808885254
SHA512b1692e95ab4fdec5388841d51ddf2a8dd460d3bba0fd6b9e42c97b43a0f14b6bacba242262c09b908d534adcf16603a4305060be4b04f4dd815794e10eb1d41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534c04e2ec70e77b5c83ef3b9371524c0
SHA1d28b98aad0b9540a89e398d3158b181678e68417
SHA2563847cc68dd6315d8e2f03562ae564280c97f2da9d0e989dbaa3ed78f39e1060a
SHA51216886830e8117ed76cfd1cc90ff22551d5eb5698fc02875c68bec30fe5b449a6784b805798fc332f0122eda80ad004f73dbe629f5a3068698e26b48c1ca6e1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f9e6b75ec265fc3d5808f719d06f45d
SHA1eb645ea72af2ee2655acfe69fac7aea7eb3b220e
SHA25638fc647e15d7a4421c16f312d25620d47e300a07287c297d499adf4f5113f2b4
SHA512029bcdcf46905414e3b888c1083463adaf4ebc2a774e5b1ce7700de415ecdc1d8c55b97fe278e1f96fcd48714f3017355b20201c67a375c16747f2bc7776ca6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526208068feed3c92250a7687c515f977
SHA1d597afdd88c555a5d80150bcb98c5a19d104ef25
SHA2569c6f5911798ce0fd7cb8516fd1bda83dba5b428e7843742db6666125af1baae7
SHA512f92ba106bba6eafd5dbc17cc9728eb626ba552a040ba9ce1c7065897d699fa96e00cb3e5f714557127b4832520a11194bb1f016d50cb695a2cb227362e680930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d346a487beecc9d19372b2c3fa906723
SHA1e2c9c4874748a065bd272c2ca02050331b886966
SHA25691d146d5045c1453b414776ee01f497660e0ed2c3d9094dc43cb025e9faf0117
SHA512734874736a7bca4fc4cb7fd8d43802e06c9f94a1cb45e86745a1452e0d7e00e073e0b991e3002be935fb5e949062fba95e5a55a91982da5186deb56d277c9f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d65b2b20a9e4963694b893b655fa772
SHA16516e681b184f5d7e74e9496f03b9950d6d4d6e1
SHA2564a9fa651fed8b5e6ac6ad2b8ce82be5efb3dcb331429eaeea765ceec63a43116
SHA512da137da6903c64672fb5d11a88fa8e33913ad816c005fd84d192c249944e3d9caf73de8804ebeab25da55109409316dc6a8c7e0f889e3a642bfceb2633a10b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc57862a78a98c438feff3f8ce2d505
SHA1322dac07fd92fb5583be698da4c6b26c99c647e0
SHA25641992defaf99f4d2f91cec2a57d6d943d6a71182aa867ce1356bcd935c5f66b4
SHA51217538bc6bddd60bf114e3a1611135ebb35d895bd2f62589e3f94ca4eeefe2ddf646f0955ce01ac31e21c1bd1eb6d9f658ed89b4d4cd4c3b7487dbae7fa73b5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7b6158347c38b870a073f2bba0ffbf
SHA1f01c9df8968cb1864ae2b035e5cfc1d888815ae6
SHA256e42bbd879046b240f4e4c645283547861ce62b69d61ca722eefa81cfea3d3997
SHA512d8723274f0662a8a1e55b633d23f523aa5cd0ebdfe771b5729c4c89b89d8cfb6c13967adde2481b5ee8442e100c54ffb917392b769589b2881c9632aeb7b8568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD501a71bd3f55aa0290f72530259582155
SHA16b6da3a7c5b4011fdd4a4f9616e887d10250d157
SHA256938b498305ec63a8c1df4a2b1726bce4df9360b11b3b25499dbd75fa77dd1c93
SHA512501696d903646db0ce24f59be2db55d4ea8173cc8f7edddb84868cc04ab7bfae17b1d52ad7e71b4396a779cec4913711ec62ada3e82cf01c3336c9913e3ef76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5548ec0b30c8748bca374021a20c67c7e
SHA194d7e50479c0c14ca928ee15f7ceed877c5d473c
SHA256e96573f59c67a731c900d6f39dd7d89d262ea35b2e5a982c3f88c516784242aa
SHA512f6cbe7324b677437071c59fa3776f3d638e8d47efe7439a811105dd99aaa6e2ce9241b08c47c568822770173d12c6f2c622d789da13a92ef89198f9affd801f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IFGNZ1XG\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\cb=gapi[3].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a