Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
182facd902db785ff18a87f43a966bfe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
182facd902db785ff18a87f43a966bfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
182facd902db785ff18a87f43a966bfe_JaffaCakes118.html
-
Size
356KB
-
MD5
182facd902db785ff18a87f43a966bfe
-
SHA1
ca6d4b2a19a4f82434a9f4f5e716ec2734b8ca35
-
SHA256
90000072dd6166e6e0f0ceb8d7dfce2562081548155b28e60f65c93f0dac31c9
-
SHA512
b1166f7d539512f686e2b8042692bfb330b7d784053812fbe60dfdac8040e87fbe45aeee5298356e4c056005d3dacb01dacc0babcffb346ac44a9827dccb5907
-
SSDEEP
6144:5sMYod+X3oI+YkksMYod+X3oI+YBsMYod+X3oI+YW:F5d+X3+y5d+X3z5d+X3c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e87a9570a7310581e9fc285d488f3300bed33b369f79957c0632cf9d5b8a2a60000000000e8000000002000020000000de378d12ef2eb6000328d6bc2e01237a30768c9397c02edf5dcea10996484967200000008cc195fbb593703a32b54970595af20a85f5a1601d91900a17fbd270a71b62d540000000a87dfc72e4a8c497c0892b8b816b39195a1748bf1c817845a1ff1dba2c790257aaa6ef6afbfd6c265154d756bb87af846f7c56bf448483174bd984bfb51f55e1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421082623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f56ff0fb9eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BE4AEC1-0AEF-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28 PID 2856 wrote to memory of 2340 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182facd902db785ff18a87f43a966bfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53faa7ab3da738dddce6e14f51e973ad0
SHA1ae05b872be96205c111a282e6fd9a97b61ab37b9
SHA256332331e628c6b1614b83d216516a8585ff77eeed2c43e142f0f1ee19af0acd59
SHA512917727252fe6e124c75a976fab2a0e897018e0dcf66ca981f568da549f2729281db5004ef04f988beb7cb37d5f466e2648524ab52471ce7814b47f8f021a92fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd23bf963679dcba8862ec04fc08b7cb
SHA189b545a271c1c0729f8ccf2f2364e6969fe51a48
SHA256a5e36678b751524b542c4bc42f3e0c5aa93703841820a4185d0898c5a9a06655
SHA512aae495174c6e7bf82d5875296709bf79789df1ec82384b3a71836c8031dfaf3f6b63d856d14e3ae4f6804e9c9c0a5bfc54e6f1056cd1ed00a66d5a5f4a6bb2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51705d941c04d5080efa26cdc375195a2
SHA1a81374573ec72e09593f7613820acc2fe34759f8
SHA256761f56000b3207231189c245239fd59d331e0c5a851e37687c233880a60ee84b
SHA512790dbc3dd5caec60aa457b57b21b661f89aa6636ca0f95f7e7f3545cd9987380a0abae92ac70c347a694c4eb1831e8376b1cf73836297ffb0c241cc567b60f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533289adf4b36389b66d3734bcca46a4a
SHA1d579df77a0d5ce6f328cbe9b21f65486ff351887
SHA25650cd695c3a11c1b0b2cae28b855c08cc7626e3a4ab2f4b9dee09ae0111d2d23e
SHA512a65439ca84bbeae9dbfd0e3268b50dd61348943d5d15e13442a85ee8952012cc5b07a78ee26179adcfe9ac31c198976ee9bd291e0484c5a17960c514228c0c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb67662a60a176c00326fa113bd9d20a
SHA1bf526bca6afdf2caca341c1ae226d01ab02bc76a
SHA256669b359bcb6043cce552190b45ee77fc15d43b469b860834f6e92eef46c25bb8
SHA51200ee103fc5629cba61fa879ac329acfd97930026d730be8c67582498860be9daafb2670e5aabb12725476483c057b79ce95a6a0a3afddd6a908cdc22674039e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2ddecf29da394ffc278a8c25fc7b59
SHA156f17696a43ab60058e72c4ac0a542f8dd86b049
SHA2566513f4aa9dd4b8ae8430dc23ff4119fdc8c0ec88f5be47f7223cb330b01335d5
SHA512ebc03fdceb1c7475c08e135d31aba63772b506620f8bf168b85bc3d105cc27b8f5efe5dac9dcd85d11cf2775fd3bda1dc0debd0743c2ac9508a1b98389c29834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee57470651641228022c58cbd81b4c9
SHA1b67b2706588ecfb005af3d77b3673283876ece29
SHA256884918957e89f6c6cdd4097c81a3e9bbc56b3b9eaa82b6fcb89ebb3711b429aa
SHA512767bc12d046cb9cbd41892e7fc75297e144a67d52407476b6b5db936bd657294c3fd704999a51ec7ecb3ecf3b252ffde3d8a6305c59ebd286156968aff19fbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53800a1bb5fed905d786e80d0853560cc
SHA10683ea4a7ef654f2727ecdfb6696a84a8aa2e490
SHA256865f8f4ad857ccb9b4d6b30c877e7da3333060a18ccdde0558b4d8eefac78551
SHA512130eca7b81995da94ebc7f12460a2b5b1c0635593beb1e2fca05c1fd665309e5e9cdaae3cc854ae1ea670e7278ad0ca36bb79d49d8e89e3cec720dc1939c4f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d088db23898083d61a4d293148b896d
SHA1463658debd663471995da62c9af037493db8dfea
SHA256cc6ec25535d0bca3be768e4e684d87f0d9e216dcf92dcfb203191c84c2c2b331
SHA512652deb8595f9d5bf4eac87202655dd7ffbe3e857c9ffb19d2dd6235e5de71edfad40701bab2c60406a6a7fee91a4d46b994493dff800f49154688543bf49ea0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f357e30c923d5d51c6006d4f93fb063
SHA121fa77d8da58cba5b6daba731bdcb42b0ace8d18
SHA25626ff0e3082932ae7554b22e8eb56d4f68332a8728839a3741b9654d1d0fc6812
SHA512a2ffa94b5beabd0be2ab25d77a12de4c35d5de38acc51864d7a2074e4a81d51b97e5f9953b4eae00f43cad7395a7763f34acd7f8caeae566173b8f88f0bacd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd4849fea615a122fb97948a7e0bb0d
SHA1d1194afccf6b89812719629bc9c5cbf16e22466b
SHA256efd80d3873b54e9a62e8266522360e04f34547b7ed6c33d514cca7be4086261f
SHA51209c337189c0914fda91b1f72e9aae634ae34c0f44d7e61f412498ac8223b1fb2cdf22ccceafa6fb8232b36263fa61776273ebcddba5db656a15b3a69be96950e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51315b2614960b4b5ed504a92df6d77e1
SHA10995369bbbba2ad956e72d9d5237bef3fe673df8
SHA256ef5b5238287121a2a571fba1513894e87019a7fab8ef7e2453d7a0fe7aa48be9
SHA5128f8770e31fa6d4c7026e053dd5c783a131b462aa1e6ca865011667c4961ae6c89f7e34ef6151c663b0e2c84be03a724482e6606188be7ceeae07fd7dec413a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eaa87650add3df269ad5658b5b5837e
SHA1e34a139056da81bc64151cb905d93dd3091385b8
SHA2563c30dd84e2d35d1794d9724f33cddaef8ec4abaae00bb2f1c031fe421d910846
SHA512d29b8ee82c31e2a11c0c90bd45c8d650455360b32b2d3e09aa61be914e082b958b2556ff8a9f89d355427f0cf29d4d28ca642276512b35fec561a64bb30cbaa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56060c5526698e9f96358cfdd64d1f7e9
SHA1935472550e2f1d7d6b32246629c38fe14dfd61a4
SHA256b843461a6183259d163e973ab6d90cd5897556f0918f301329fa32f5580fcda7
SHA5123b1e3ddabf9507a1eadf16233e2daea29250405866648088cc23a916c652ef9f9272b1f89a302b840e391fd4681234f5ec4c5c833f2317dce98b7bbbdd178ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac059f79adf71907fd3f523a4e4b79d3
SHA1074c6fea8af72108f5ec79d64c3cfd9ceb2cc2f5
SHA2560dabced13cc41a19f32f302c94b91147e16722f7aa0f03272526c83faef08d7d
SHA512bc7dd04cf146ff01cabc4f22d06fd09a73f7215294976ca32ac42e8a01942061c2af88987c390bbf555482037764801146e29d2efcaf9befaf9cd4f886e8804a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daf4fef1e59f3391e9e30eadd0bc039b
SHA13a0669a81efd249ff88bc2529c94d5c8b00c828c
SHA256ad4fa41f390c981d52e717756128e25f05f9e6d7148a8774eb419e696317a3d5
SHA5128aafd5a6963c317318bab95b4068cc6d0504a584665bb62d0bb1588319317190ecc5ca4c912d19b6729885c5b626c006d02fd7bcb3a94185f9879ea5a264093f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50596544fd5e604545886ee48163b3638
SHA13ea4669cde7b51cd3bc98e209dd2d638dc0775c8
SHA256cac3d684409bc00961ced54dbed00567ddc15dbf89957b6fc7b930ff36a5dd5e
SHA51297454539bdd75f9db9705a52a56c2a2c2ae2fa82eff738ca16db592084ec4dd090f44539b05add9de59071dff632a06e8b64167baa6add6a39c49cfd064851eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a496311073ee0cf471ea25d82b83e063
SHA1068a81d21f5a1dd18fded36d8f6a44dd92689546
SHA256330726ee0ff45139559b9ee0adeda070ba772b823960f0ed1fea86f0dd835c81
SHA5124183a3c407f6b83bffc908fd2ce4eb452c1570098a6c010d730a58788c84e9b89afeeb919c1ce6f69ad8528aa2a414870e21cc294cb43ba5e89cb5bcc8a30a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ee685c692e75f5fba0fb3855956e51
SHA18d9802ef75ba1749437e8249598345d9bd5b0fc0
SHA256830732772b865615e0fa7cc7dfa89fa04032bc4ffbe5fc14f487429bd30579cd
SHA5128ff85833f7dd9eb4d9fb06518dde39c7e6df2a95b8fb28ef7817f1e5f780e8678cab67f58d13efa6a4114e17ea1ad2124c7eb1dab333483a0dbd27460da1a58f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a