Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
161de28ea2137bb276edddf206f3bbe8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
161de28ea2137bb276edddf206f3bbe8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
161de28ea2137bb276edddf206f3bbe8_JaffaCakes118.html
-
Size
462KB
-
MD5
161de28ea2137bb276edddf206f3bbe8
-
SHA1
09248095a77132237f772dd3324246f3f74c5d89
-
SHA256
36cd306341f34172e82699233a4947db75125c9ca7820c1c788dc14f9b3c041b
-
SHA512
868bcbaba972c8ce5ae68394731a63298bd48fd176192a24381ecb848fd4aa54c8cd2374fb03154c33bfd79cebec083409841ce88054377e1d73be95fca7b17d
-
SSDEEP
6144:SbsMYod+X3oI+YsagLQsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3j5d+X3X5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000000c14345f6e70de270c0c11f270e13e8ba54cd535f31315225b47fdcac54793be000000000e80000000020000200000007e0c9268b4aaa1982764618c2bc3f0fc3bf874b82b2ec78989465d3bcf4137d4200000005ccdb4019ebd7610627f9958a4afc169807038ad4e427f206f8831c96db5251140000000dfcfb1c6e64bf7534284816e140ab16acd223f941da6239e7343e48ebd5dbf9a2c841c40f8f4f7c0e86452ce159c670244d8b32e85579f5de28464aebed4839e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c05c64aa9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BCC9B01-0A9D-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421047592" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28 PID 3048 wrote to memory of 2860 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\161de28ea2137bb276edddf206f3bbe8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4c600910bae05d164007af67316a67c
SHA14bea6bd427da06535e1b9c5d48315c0daeeceba7
SHA256df7a7783bec72eddc9e4d37e372596f00c090865d2fe7810c674c918b8dfff72
SHA512db917298061303ffa249dd17784f1d3116d240354193bb245a3ef3b176020cc099a3e021555cfa1fa8ca575518d633898a7d138f17a17336e96db699b21b352b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e065e5c09464c27a81fc9152d7a333ee
SHA12e4931634711a0e943f057a68b5b67d3985e16d7
SHA256e8f1d30e4ae37958f2684a4feb46e3814ff7d171c21225948efa0383088ab456
SHA512618dae85eaf1ff2236ce13cc7c3519b58203e7f8c3c1d159d6aea5ec757afcf562ae156faa0ee214224312e8399175a29ce40ad6fb0ddbb95cc58214bf513c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e291bce65e2ca5a3377c9da192723b
SHA130f93c0f42a39632a6f716ef34e512159263ff14
SHA2564183710f47548200e3cb2b5ffae8579d8cc9526216b3dbdee00fd95000c58111
SHA512d432971620ec970fd13f83d9b941cf27198d1a51413640672fb3924643dbd8e5d2f2b8a2dd74de64040fe7e8ad27f8aecdaa4738c3594ff35700ec33443f56f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f9c9efc930fc1730462e7fcbafdda8
SHA1a52b86259ba98079dd215d7d786296d962e4c29b
SHA25621da017710c448a04c65f1e4c35462268330a70a03d8b503fa5e88ee66c3b283
SHA512a74e4e1f8ed9c5be15402b858bf738bf2345667ec1e464527056e3e07e874e6682ae15c2784eaeb2474a81d32f2f486ba843ef5e210b24ada416a6f01e5df171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a0dd146c1a4f9dcb8c183c5cee81ff
SHA1083c7619d2bc6397085700540c3319dda85d94f3
SHA25683bf9f1d536d07c2e42b564f04127658c055771e6c8395efcbbfbb6765b6de6e
SHA512e120d90439e23223a3e9cad279274ad5779221fd156754aa40855f588e05f5ad7840952fd73080c62b8d75be5eb83ab830c8aa50b8b81f65601a6c6988d2f2c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567dfd7ab85e65385155878d19e1ac91a
SHA1c97c5394e65f62ef0d948f11e539eb81a637dc6c
SHA2567713a4fe4405f6138e45527fdc7a7baf4281a3b0881a511566cf13a6a7d5a492
SHA512b27a56c457cf55891a799867f983b71de4dd4aa12ac6fc1d2bc512270d52afe96eab0233147586c877b05e3b8948b3016a25a5eb326e4aa4e967eab00e283efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584e14cab0031fe10a160ad37b0e6ce3e
SHA12a19fb258b5e8c8a1f828222437a83096578784a
SHA256e9e9536b25ea24e701d7aed09a3cf74da85aaad6ac6ae860a2101784205b7a4f
SHA5129e495ad37d6804ab719b4e0eaad4b347a9e94912c1c7fad4d1296c08fc769aeb243160aa60ac72747f3d1bb124533f192ba7ed4f33fff429cd7d0990e7a735a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9297c399e8b471858af92ee4081b613
SHA1347daa4fa3cc84cffa0df7c65f9327f191135f71
SHA256da207d39cb0b45d18faa068397950262f973ffc5d6ad32a86ca59223f86c878c
SHA51239ad9274a05106b4f864d4843e8c2e56eeaf1ba1cbdb166db08baa51cb91923fc4bd9794e95ffe2f35f0a3775af8eeee346e42eb6c29beb75a4f2a73bffca49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53997c12613ea7c93df1f16d826af13c8
SHA1a7c7349e39eacb0fbe926b13f60383126573da5d
SHA256e24b0423a4dccaa4b01af8895b0acc9da0eaea54736e724225e73b80d53c4a12
SHA512a1b1a241a98f94ed51f5d2e238d7bdaedd2a0c693b6aad2471f8079f27f0df0cd240285858dbe39f5093716944288405dd94d01030ea67fdc46722d855e1f128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5133548957f34bfad2e6656ee7d00f
SHA1754127ef7c9441eda2a58783f53d43fc6747d3b5
SHA2567f91e7d770b38964ba3db92fa090206075078b2a8b00e02e0bbbd29be2a47f6a
SHA5122149dab29f8a0a9318eb14be0818ab5709144d69135624de97acacfa5090b152b524ff1e71c9dee7ac1ac901d12842399ddd5528504ed61202d7545930710793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ddc5882960b8e35e3d417d19150081
SHA10bb6c65330b087971b0f8e150fe7bace9fc56548
SHA256d1d2eeaea1a3f1cb5dea9aa0979bb721d8d5b63b238a6bf4bc9826c7da946501
SHA512295e3ae8a13bde6adb53a275aac1092ee66ccd8015d99277d92c934c4f1c4deecc96174f3a2c7e7f9ccfcff5fc37fec06bf97b58af1ff1abdda7b3ed24dbeec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5cea6f126c0e07656af69e730eb2a60
SHA17b73cb00b4e62a60fd5e74ad9eeebaccdd97d430
SHA2560444a9ed1e41db7adfc6918a70fefa9e753b3d01ebf5f189ee03dd0b0c695c9c
SHA5127d7304c8e8bc1189570eb7898aba8c554c3f94d20a49be0c3615996e994dd5e924f8621a69f010fd6851fb2d39a5a41e71ad09ce563047a6ed09e7527b6add3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941bd7f44cad208a893ac43f5bdbd170
SHA103b8839bd5f12ea07681ed5532ada83048939e4f
SHA256dfeabae31e5ae9aa395882c65cf14619997ef50ec8e310ab14190f0682d25421
SHA5121cf41cf9bf6bb17519b96605891b692f354664a67dba17a73dedfa3e89600b3a526591532292001fc46756d81ec6f6952bfbab000b3a8ec8ad4fdb29366466f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f69dedaccd0c76d7dbd54a08edd29f
SHA1ac2bb9b3c5626bb369c376d00919f41c92692677
SHA2567299f3f57371fc84abac9742425f5f971acf116cd980315d42c3fb8b04fe649d
SHA51275d5c7e356d56ea454edb4b1dd378255d69b2e7af13229e6f558f03a8a90f70ed35c7621248b8b05fcc8a608a6da191fad2776d5d646af21f31d681fe7aaa4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df61756e57173738d601111a30a58a1
SHA1ddb800a8a80cfdeefeb46b7f33a88043f03196e2
SHA2564de1f3721a502dff792aff5e2aedd5a239ebff238da88e0ba92c356c3c927f72
SHA5126cf312ec8e066d311f97659749a42a7a99e56187de668a1779cfae6a5d8763b5bdc2dcc969c9104714bc09f9523963c8396011a280db41d285f71f69206cac6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512bb6faf62e56270a79be5379ecb16b1
SHA171c2b0f064f89e8fe99d38aebaca756268f88f13
SHA256c0d8c72aab823450593df1a046f223e54b24c67a96f17c2709e0d480c540d2f3
SHA512042d27980f71d6afa60346a017ff43c1ea34dfa935feb2c7026463687317fa50b572238c1150547231352c685e4441504dcabdeebe16bf45b5da1bd8e4838bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c6fcba382226b11847db34e44d6a44
SHA1576f472aa15b2358ed9a6745004099ab3db35ca5
SHA256bf0280de694b4aeeebd91036eca887ba7693c48a09d3706858d9b715ecdf026c
SHA512db62d25f954392a53a05e0dd7af2af30550ba07fc28ca2dc1d7a366caf06b7b9501d8a0c5186cdf0822129bdb72de1ad4e0e382ad152c90531d08e2e3abd4ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665b046424877913f7f34fac3c10f575
SHA13af3e136029e8cc81ec93ca66dbb1e1900c249ae
SHA2563df4b637bc6fde80b22c10b218a72b53b9bcdf05fba59c2e673c360e24faf63a
SHA51233763bb2360cd979a16459a50623fdf69f30c2fd351e34e8c567ea1609424bee3535741e1c07b0f9c7674c7bec38759abbd05e32bc28e773fff4ee6f02976e99
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a