Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
32962fb1dafb4f2989689f12f55ed30f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32962fb1dafb4f2989689f12f55ed30f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32962fb1dafb4f2989689f12f55ed30f_JaffaCakes118.html
-
Size
37KB
-
MD5
32962fb1dafb4f2989689f12f55ed30f
-
SHA1
0d2547c7e76b24798c5b8db0626018c9b951c599
-
SHA256
ea6d60af9718d17df7f366f1b1b2a47426962f608fcca29a475df297fcbd16d6
-
SHA512
5a839acf703f2bc33202a7ddf07025038478d3a4528bb2bde9ea45fe8a71abc7f2ed41480daa2d8cc095b5663c9eb15d06e8cfa2e7b77d84738ef21a55adf67d
-
SSDEEP
768:IsY/IpU5qk5gs9R+fb1NMaOaHBFrVchF70cStFJYs2SJDaa2Dp39nI3cqa2ariM2:IsY/IpU5qk5gs9R+fb1NMaOaHBFrVchS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A96D671-0F4A-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421561617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32962fb1dafb4f2989689f12f55ed30f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f7948be4dd99f99a9201e9dd802810f3
SHA11d87527a12a74ad985f780b9bf5c4cfe63758574
SHA256b922312400a73d8a80b802c5abd18ecfceae218632991d24e9af6a5ff2e167f1
SHA5128633b7ce51bb4f1656c1884595fccadf52fe527c80adac7a73c05f9abfd8387ec52618db4153155a8545ba9bf22594256d079a31668e62c493eceefd911b1944
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5be7a781e9cee8fff352ade279d539d3a
SHA1f8f925fe23cd7196d7e15bd0a0bb291dce5a6088
SHA25615a0d7a2396e5b3d1b218039f43953935da6bf4e109ab68c6fd63a0f469dbda7
SHA5126aaa1cf15117c1049193c1cf9330f5de370ef3bd2f4a758f84acab19645d3a57001467fe1d58eabb3dd8992ec26e1c36c42834197dd70c7e2fb58e2c33fa9e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e9ecfd730e22858a740f7f05f2cf676e
SHA155187feba595a79965bea4c47b0c0d09605d9a80
SHA2562bc2b2cab770da29db1de5ff53ac9d0d437baeb8c7c8a73ab7513ec7d3373459
SHA5127cbc674e55c01e9e3e3c987009b7d4cb38118215e3a2476189eb6950703f91384304a16a36d4175637244b9699a6654ff316b7cfbb64ad260c2647fa261f8ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c3345b8f46ad91a4a0e2b535396f795
SHA10867ad94ce1bb6686799b30598532c9ba06e8680
SHA256c491cda8f6625193d15080d16afb403393ca938a8fd4f165ee982ac4e4096c63
SHA51239e64f9d2fafe4be9cfb9453bcb20afeeb2277a7083e006b16326f510c55fce7e263468c5d8efeb594769d70f876b493cf29743cc828438fd9166dd80a7cf113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba7b4bb9b59f2c5bf7cac04d7b73460a
SHA101f4b6aa655a54d8cd85c7210a499c81605d557c
SHA256f6879a65bf0e52c4dc13b60be2c53eaab51e99dbdf71a85465f180531bbf2f61
SHA512ff0b13472a54af41abfc1c416e940438f6f0d92bc39ca9bb4da776c8c946bab7c431667a6e9df4628e618ef5dd88e9fce279f0d7eb51de7893b04973c0f50993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a76a24a1525c95b3a57fd23a963fdf68
SHA1661567436e8f3c693a29740d7b78c92a4b793247
SHA256dee6893cc18ecae28818810ece0961dd5d43ced04ec2486aa0d8b2983ea3d8b5
SHA512fd0dc771146241b7ad3e4d124fd78cb7e650eff8c1e5888518dc669defaab3a4760e8ed91e7500e6fe8f33b78adebc849628ba782db0dd6fca50ef1c58581351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fae94b848d4535249ed944c5a4da2710
SHA15379852b8bccdca89033c7ce721420473544f75f
SHA256798cb162afde37760b569cd48d8a0990669682de8efdfec2448ac23d3af39782
SHA512ba6f14876a8b7cf1596af2d44f285cf9f84b36d8b8c8d630988180c0158a38e7e08b07432cc4cf0dd03f4480b9bce5512152b2228d151f49d665909219c9de5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e065d57a779ad3b9fbae9bfd10268e
SHA1bc93775bef6ec19d3390b90e2db3389304f83847
SHA2560f0aab639aa93ba7f2bd961de304fd6889f420732121dc660a46f233c82995e6
SHA512728af1480fd6a87070a7b4f98986d1fbd802edd5391658ef95f6f663f7c9a7f2cf793bd6f703b821556f7124f14786ba94872c34be956f02097f621f2580ee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ddd6bba11ce38b4d55d4ab95b93b41
SHA10a748acf228f76142ae3166e9537becc47062425
SHA256014a1681166c4d6ab7c4ba5d4980a66d004cc74d6b56842e9ae0e6273e6612df
SHA512fdfb233a86d42830c5264377bff3e68c91f2488b5061620ef121125b548eef00eecc175e3c1b51fa9ddfef450cb322018c1185c30e70046523d8ee9a504ce46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed302a52f425c3fc9124937fd31c6793
SHA16f707e52c7a6a496586b7c6db1df260a39191403
SHA256dcff8127d521060f15339903e8bfa7b7a5bda699898e3eecae65b93346ed9442
SHA51271b332218b1da9c946d29825185a08638646724ddfb1286a50716c9fb0ea0054857e31b675f2ad05e2ffba87dd4f26827b611f80568373410d9aef6cca7a5138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56423dab4490a8e289f1ab29fb5bb0160
SHA18585e908f6401557f20dbf5cd8f06a9f7c7a925b
SHA25673737e2111ec5c1dbb8c28768b9553e92d4ea8976e46f305eed1be22994f2b72
SHA512c06c52a8cb8ff0739233943d4859021c612dbee702e0fee3cd55eaba0a8e56f1e89884c4d807b3aa7abce397fd6e645a3b53037fa2e33011696fc2deb9de5cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b52f575d49de3c75f822ded6a6cdc2
SHA197c4edc5eb5d2fabd19532be3962a2eeb3b0a4da
SHA256dc05cd53c8cd85fef514074c573f20cf63193056b9565c9e69db8135c2717808
SHA51208dc3e48367f65d9961afc2a38dba0c3497c0abbe44c20e672c00b17b2e70e04e688b00d43c7e85b78f68e19e9a9cd584d0bd62e72259b2a26badd4aa7dcadba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5846ac6fa7a88e2fe3a588a7d40b40f04
SHA15b2aab2a436c57ad6869ce76d47bce4742011a94
SHA256a792fda3e0632d9da02faf2543dd2304b295c70ed74475b5d4ade23f6867c077
SHA51252fe3d77ad2421e27872b815356b74358ce8b9d33400b3a3024e209f63a6f5dbc1c845af0eab153b5c61f3e6bee4ba3912a0464b6fe12635327acc92ccf007cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f75a5f1099f6827045b233777842a52b
SHA1d218f881c23d549dc07e77e0b2cfa1a48dcb7e1e
SHA256425229f3610a1f04bf3f314b0f08185b97212ab054b7ce4388dc157a03bbc8b6
SHA5122001c80b35fa306cff6a495a8fff91057a82e06460471fea0b06dc2055651079d932bbae429ceebf3293329b22f6497b968936ea5872d09a46bf51f6deadb86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5947d30631929f12d8da38402d125560c
SHA1cdc2eb7017fb59204e9a242dcd43dba067ebeaf7
SHA256166da02e411b397b0c931f6198930c38c2137e0c1a0c8f233089b9c4cf47a478
SHA51283ee2838ed7f57176091ec17ba0f4d32c8cd00435ce2dba93d613eb30867a687f85cbc30556a910e352c4f3dec21e3f6263e00d9a28333d32ada887c9b323a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD524b30e774e2c611af73ca704c0cffc34
SHA13d2ca4ad182e2aa74bf2a7b013e0d79d6967ad1f
SHA2566b52c6d580c1bd0052e659c2c5de7975a74519405c03939e41eb882ae8eb6f75
SHA5123b0b11fb63d495a6fab6f3e780267a878b22e26f20e2f5e65e404ae5d8454921a559952f0d3f93c41280a7f4069cd857297fd1742456cbaaea2adb00145a34a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e8b862ecdb2a1112ee4f5faa7b9a3401
SHA1ced829b343c2653deba89c341a07566c15659e26
SHA256483fd5f8c7ed578725d8a826552b5c966cd9e1fe2cdb8e1347c0a545ada3bb86
SHA5126db4074acc65ed5bd55db8e24d1068cf3fbdf24575c67a955f367c44003ed30fd0ebd839b42fbf89769d082da2a2f007246a53b214bcea2f296d12e9763dcd41
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\jquery-1.10.2.min[1].htm
Filesize180B
MD5db7ddeafe575a43bc41ffe03690dc9a7
SHA1b8c903b22ac47591ec362a9c754b45ee3857cdee
SHA25679b3afb8e4de31cddf19e557d79038fd90c5e619406d0c7a34c90bfe095547a7
SHA512a05e1abf52934e33b85716c11425034851e07c9d890a4da962dea347b4f43484195650b82d8189a02206a2e015ab89934e2d673c218519e2c6811d3d6117d8fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\owl.carousel[1].htm
Filesize173B
MD5b3c734b2bed9d8ef86b14d66972ae704
SHA1540b62e624fa32fd1ec0d22a0f16fe50c731fb18
SHA256ceb00c6e158b4069ee17003a26b55ba7cd421af4ab8822d03f020e91d74c4e9c
SHA5122dd9ba105be5351988945151b67aab8db04be0f06653f5639a7c058deca9ed1ac8f4732d2e872e26853142d73b8bea69139fba82374ed076e07706c502ff049a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\jquery.fancybox[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a