Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
3823c91875329b1869b627b7e530bc03_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3823c91875329b1869b627b7e530bc03_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3823c91875329b1869b627b7e530bc03_JaffaCakes118.html
-
Size
460KB
-
MD5
3823c91875329b1869b627b7e530bc03
-
SHA1
5c96bac4db3972eded602bd3d426c677a34ad72b
-
SHA256
1c787d567339dccf4f13f8b3e6a48cc11ff93118ea24079470be39714cc8ed26
-
SHA512
9467d3958adddfca55209e4c08de8eece72374bdf3f496e0f4ba63a23c33ed54e7fc5ae9f604d99dce8db7a803929ccdd392fa6c158d21813b8fa8dc8050faf8
-
SSDEEP
6144:SosMYod+X3oI+YdsMYod+X3oI+Y5sMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3D5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e463cf20a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6D85351-1013-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002206af4d97f514008ce73ddcb05ffdeb0d5a6051e30c2cb02f740e7433954a25000000000e80000000020000200000003a2b2cadbfee7016aea5b4c43f5bd05711b85a07dcccc576a1dc4375df6e8c6e20000000b42f28b501a605102ed7fedf7aab37f6936e4966ede467f2db939da20f85543140000000b0574911816b41277311ce16ea4e93996eb27df8364bd8bd8265ee62663c90c05ceaff76940ce7a62b8625d18a9d9266b9d4caa8e38c1789fcbf371319f33209 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421648207" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28 PID 2916 wrote to memory of 2716 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3823c91875329b1869b627b7e530bc03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f8374b4b54331543e352b307d593d3a
SHA12ed4473b25da053add85bfc4cd50fe503e6fe21b
SHA2566293378d5674b78b7ea79e72e2412e8e1ea7553c15920918ee7c4324f868c30a
SHA512fee0268ab8f64ec185f3b920bf344a32debb9beb6cd40d87a1f9fe3e1036b18cf3500f295a67d741388025db6848e7c54a157a6b45e50468115fda0730daeba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da8c036204d2821802a1387095f0a9d5
SHA18f520317e673798460df032cb371c60bdcc077d4
SHA25607effea14d8dacd12a50eea87a708ef166a97d485579b0ce871eddf52f982419
SHA512890426b9278fa5d60e05c549cfb7b85f7e8181c3f69c14d4872e09f81bed81b0dd9ccafdc749ffff7ee408163d8154eb94d3e1e0920ff25f7a8c6e90864e5b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4941426171bcdc3bd0a54b54dfeb418
SHA14193c1ab2ff946606a59906a76f6ef5040f3b6ac
SHA256ff2704fa4c3b3a697a2cca3cb7b92d2f91b7d4162161dadb13694b2701347419
SHA5129aa8f002761156a0f73bfd490198102cde6742b07e5b0315b13a9c378b705b8f4700a9742c346e97998eb30a719c443947717db87d8bf4e04cd837e5bb58b884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f40b4654cbcf211a1570e85921ef10
SHA16c6d0d9a511b5e7af9b666a065a2442dc7a35ffc
SHA25687e8a5cd2cae96783a2bf0ce373e8573fdc2e2df320836cc79b31724250bf4c1
SHA51247a85e663c1c7f707bbbdff99f011b94313fc9a01ac498b7056edf1e3bbf8e8640eae0c4ceb4ba6da3845d3f1d228d467a6ab97abd2e0cac8dd194ad80e70e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700f24a0b0b8567e8f460b2a4ad0f64e
SHA1814619a60defc7c2b82316b1fde5efd18f0d1bcf
SHA2561fcc62acdb3169d446bd5fc333d80a8d0b17a61d5a01fd63c962c920e6a7c5df
SHA512034f9751e7e18ab29ecf2fbdde21dd99ecadc6804d38094ae279b3bc8ff19fdb4324964913d735231eda1a14b236ea08def1115b925bf45e97f552ff985019b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a63c563aa055a0ddc9d1687c38aad1
SHA18e098bc24616ba99e4d6b7074fb680fb79de8cc5
SHA25656eb9331a2d29b16fa77f4881f95ca3f88de6015004b7dd993aaac6bddead342
SHA5121551debf0e727c52de052b938cc2777af0e1eaff36ad26e8f57c72e4731cef79433792ab61030fad4aa66bd6b169f2db59def9e754a3e89f9f637d0c42578e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f851262473acc62c9c1cdf9fa1d6ea4
SHA1cad63a1313f3e40c417a0c682337e03963d7733c
SHA2566b6c5aed0ccaa3aff4e4d4a08a7ab38718bea678bc3ca564fae9ab1a9d279b6b
SHA5125a2cf13e479b1146de61e6b852bd7bf6bc3b511e5028909f4a723503f274e8d42a55bab69ab7212c1d0829144ac9f8a445128b3bfd341484a583c1bd6b4893c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef42bf98055af147a68baa8318dc4fe
SHA1a763d55b1dc6be7078167017e9756db2a793d2d9
SHA256782869423dd1fda0e8eef381011cd88011151162e54656842e6daec4bf12fb5d
SHA5129e976b4eb768b2544be2fcecd3023cd3459704c1215316099e11e88a2aa5b5f696d56a1fa58777161cf47ab2a52d76499def22bf82662de9821243cada85c87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545670a0c0df75037ef04e45e98bd9e79
SHA17db4f72e1dd478fcc2d7eda81544b6fe0e39e875
SHA25626fd4d83a694a487460211d732a631a06fc48e608d79d7fb9965cd96312d294d
SHA512f4cccacc4ac94c3b55a5ceb2646799234448938e8ddeac15afe3e3574c4bd7f8f102fcaf7219ec524fd2107994cea263a6e83a064db2bd999529af74203889aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416ca21d4f17197da84af2300edd9942
SHA13c4005c5a9b67cac6ae17b1042b0e0e06d37142e
SHA25647e05e9dd08df303bce6efb65903b20d0715a8632bce6b3917d20b24531fdf1c
SHA512122527215b7f4c7b00a2f59b09dbd67a9fc1a49a30fa6fbbfa862b688924741528f122facb449a99d08e8619c92f6f13b7ec70a0ed3a6e728ffd556a92f96712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5306303127f7a7b3d68376091edbd675a
SHA1f65bffc1a01484d7074b656c39a80f6f02edb0b7
SHA256b50d02d97417e55dbbd233ae6684cfba5032e69f6023fae57848ad8351f105c0
SHA51251fe41bd0c5ff11ce175994c6ca047008509af53ab8ab7df744c327518590adeb37d8e30bcffb6e6e08218008127f83921eeb5954e3e001e40ef85850cc23fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0e9b843f51455d6599546c0d7f7d55
SHA11b6b7b5aae50bff137172bca641bab7afba7abc1
SHA256945da6fb941368b115bb7a45e77ad9f87a2344dc89372e2b5730e5f153ba83d8
SHA5128f4234cf5f1eb59c04f783cc14bc5429704f3e15e41d042d58644d400198df56ef502376d839dc0d5050b0440d0215a8ae3405c5caeca0a98fa0ff174555d9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fefccac6433f8d7fc4d3f0047f77db09
SHA184bfaed533e5c31e4d47bca290e3fa63861e61e9
SHA25676db36270d5c6c9ee4ea9644c4b4591b951898ffc4a77cc544a9d8c1e021b793
SHA512932f287eb839ef1b400c8573ba882193b23cdb8618553cfcd60505b4c270a5b9dddabcc6c99222aa27c2be570b6d9ac5d27305a38ce5c87b6e12e7147ed8908a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc61d8973a816b13d4f31e994809edc
SHA1b7f48b5af9b28a0b7fbf459aab97eeb0e44acffb
SHA256315840fdfc37a9c7f2cc3a5eafb2b2fa4a6a4c35227ebf0539f4605c6448ad02
SHA5121daa6cf75552f94f42e5eeda98046c69de09edd1cacf60cbcb5a1b7f4b9f6a2d9e57d1484e84eac27919086978e2a3b233c6c53546099e0469342067dd8540c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5896a1c067fb67aec16bbb5cc60caf738
SHA1e923f656ea42e3b4bfb3e2cc781c5edfe5ab2637
SHA2565b05a07afcc4e2525b9af69e811f072016822dd11e1636ff7cb9d4b8efd89092
SHA5122f42ca430b07c2ec0d11a89e790c2891c53e4429f6309d0babd3a95871afce681b46b0911fd5b1ae834b1bf5f5fd898c2140cb4645521461e6bf30e8172d36b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feea0179e1f51d8af283e2ab10a5e445
SHA1f59c98dcc1b0ad4f75bb75edd2b02ea681e41389
SHA2562739382eda4bea6edd5c792daa88403904c693235401bf2ae822114f2976a218
SHA512d7cd76f5c5d278088c5e39e17911c73bd7f446c75203b634bbd15ab217319fde84d5646eabca7ed978c248eb685e38ce043323c91efd3966c72390bb7c0b5e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb5952ec77ebd93ce2355a6dbf4667b1
SHA1a3a08a21ba2eb0962cc6273beeec4b41eaa49c8d
SHA25668c44c311ffe7e3d377872b5a8321be0d0b02b77a06208ce4e593074620a2c79
SHA51232c066f39fe77c389aa659309c0497ddc15c670b5caf8a3e7b7bde0f22a9cfd35298123c4f9e26c6494352f1cd6e018ece34f2f5f98ae8c0b54c0aabc23aaac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520bd2a47fc80d1a4967bbaba6362fd1d
SHA17a91c5f080e84d9c4264b5474f0ccb6017915f95
SHA256e8f0dd31aa817885ae3ce81f68ad4df0d723b0f48bafa2e8858672e0741e6c5b
SHA512deaba3fa5ed896fd8ea86fdf3e086a3cf53323f2b59fed8a40a1a99d5f6fed322029e61ed7de3a2550c971f3ea265459227da5e8204aa9068e1a3392abcc68fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a7a960fa049372697b90dbd7e30f41
SHA10662a90880b70d8abeed81e9989a5bbbf3e1b088
SHA256a1eee80a15f0ee13f91f0f8ac302971199a7d31dbc7fd3b4563ca49776a25525
SHA512100cff86cdd10cef2212c7c611d25e094389c12d8d0e02ec2a9556671702a7d8fda429d450d6154ada022c834183c9b294c9ee6656566a4fbfc4048a633b021c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a