Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
39c579089d83054d59ce5b628d7c5921_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39c579089d83054d59ce5b628d7c5921_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
39c579089d83054d59ce5b628d7c5921_JaffaCakes118.html
-
Size
461KB
-
MD5
39c579089d83054d59ce5b628d7c5921
-
SHA1
251945944edf690aa9748f0b6eae74ad1535ed5a
-
SHA256
c565d345aa2f49604292722891dcf01f616e88190a29748e2f2e2eb64eb7cbd7
-
SHA512
e3fb9c48c47d8d12dff3271ad761298d65d9e78ff0932f768b939773c34c1dca65b089682bc7880ec952969fadad4b4d1ec9475be2751c7aa9b8699ce6cb138b
-
SSDEEP
6144:SesMYod+X3oI+Y5sMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:15d+X3/5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421673713" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b026142e5ca4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{590A9021-104F-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000006b5d4629d7b275bac1d84762c936dafb0d0a133539ca80efa62cd64880cfeda9000000000e80000000020000200000000e8ef3b6df9d79f002da6db26ed7fefc4544f6284672e6dd43dcfa77c8192e3c20000000c08d6716dcfe6a4b93658311e5c35175f1e76333163630514fe01cf69425fb9c400000006a85a44820c8bd44c0a9538ac56d1210b6bc0ae7b60aff84ce5d034258856822bd221d5665de7879a29b688669966f84a5d2ad87d4746efccd987caf74ee2a0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28 PID 1688 wrote to memory of 2732 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39c579089d83054d59ce5b628d7c5921_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358032e9f374819c1f3b1468aee6e163
SHA1b5454430c0ec6156342367a46108d7fb97502cc6
SHA256369732f2a90501cdf3b2950e2bcc64971690a7b16131ed49d07d3985e65c56fa
SHA5122685719afa6482f71fb97a702c0b7b5657915e86c12d6d69e0012f0e6373a5eebe2b137481d5999f6feef7213c3d179c7509d3fe8baecfc98710d2d098f3aeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f352e6d749b997a41836d84522727268
SHA1e0c652c89d8787eb6df581136d8af20df40b8d32
SHA256c095d107ceeff2d870dd365b739b940dadf5a44fe7254e1572896b544a0d8ab2
SHA51221a261758b37c79c80e43b387472dc56fb43136bab30b37827ce44d26f8deca0c9f6b4c209f4780fc9c95546a7a8c178cbacfbf8fe4b55100958898eb74bbe84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94203c22ebd0adb4338b4934cdb273f
SHA12fa7c00a978977c4d15a08d36b39def59238f6a1
SHA256f4841b792a3784050b085a723c7b9ca81ad09e8d503362b36429b6738c800cdc
SHA512f6fe97e6836d12ee6149d55ba194422c0e3baa9b554f5d14928d63109c03cde38e6d39947b86c9f8704d435d23e0d5cac63ea78900a2c55dc21eb9c375ab7f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df23b28a9d047072cf908b7e641bddf2
SHA1877a288dfa1197c4b289fdcff7077f5d31f95936
SHA256bd0b5d9ec9de47c04a8e9ec7eba184e05333f7a3446e8a9f8598e30a8fe6c352
SHA512bf6d9446bb12840a365fb713ec826a67d84bf625b6e0dd2e36fcda606e0b58b6455113bac6cae607241aabe8e5f13a14b5556817f4d2bbbd89511e5f7b0d70b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fe71faa2a8b66912bd283a58e7cb834
SHA113ffa621f0fb1cadb8808fb04ffac7fce66e2e60
SHA256a7e0514989dd4da8c31dfb901eada6308f8cd705274320ec20a7efc4fcdf8e10
SHA512ee99ff8819ec90030ca98d20720bfe48d1d86eb8621d6a37d161523533af39909f375df55506ccfdb3c769663caf4d90ee221418a01b006816a0aae192988593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e86276d050fb2c8ad74b38988cb6e42
SHA155905bcb67e9b089e03f6e21a91961422562fb29
SHA256a36f2a2b2ee962ac337c852688dc59afa6f023d8f1ba93856389e62ae8a1f78a
SHA512c9414805f45d6c9a0c11457237ace36f08f20c18a36d86303c45daf1cef9a40d56ee69c85762875a29b7fe75c1a9ee0821bde13e59b5675d5a0b785df88d4100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49d842dfd62d1aab03ecd2a3d23123b
SHA1a3062ddb33fa60ae61ac2faf90a60aea1db58c86
SHA256aa1fd922485282cb19baac30bff669cedb40ad5e4adf080d387a3339dc719d0d
SHA512051fb4f9821481041aa7f923aacba9c6609259b67e2054fc135e925f3014172f2b566717e79107f3dee98a8a4902c9eaebea9b11bfedef0811ad446b4f672212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55453b01b73b56af83291a4224a6553f7
SHA1c2cad6d6004459cd0fc38703b39b0f746c17f8e6
SHA2569807889a728433ef32ac128795659ed43a596cf4381436c32520b3812186c260
SHA5121676f48445d876c2c7c739784b244c596de20e67161b4d47989b75ef239ee26cac3bdb104ff28b424a96488843430462ca992a982b8addcf4b6d43d85a98961a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd6e515598432e4ac5550b5c7849cdb0
SHA139f98d5be4464acef27b1dfeb5ba58ad8225bebb
SHA256a4c9550833358a9d9c3000ed2e4477259e656aba72ca229f8585141a7c32530b
SHA51277bc93a9f370ffd08442ff5cf0e063e1a9cae5eb39a3a3745d9526b552b4a0aed2b0eace549014332d025531cba1f9e00ec421f4080615134ba947d84378725d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b060b5148113dd7eee6bb904c7b8b5
SHA17731e099cf3231e6ebb51dfb780e64320b38b37a
SHA256e5633a6d5ad5e4a93b68d94286cdcbdb6c39ba1b1563363b52aa528ceb64b399
SHA5124251c028a8015819aa4b29c919e9d56ef99d597879d0f5172c1105a7e695dd32066020305579e98d4cce64b7e5ad3b5b9a838c2c714546404c3755fe4c08ff57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cb219e948881a369469bff3698c891
SHA17f019c943c1d9648dc93622c529342adc1083627
SHA256fd782dacdd17162bf08ce2f9ccfb17af9125911fdc1ed02d950699656da18ce8
SHA5121669594ba5c3dd454a82bf0094687a7a825698731c920155b4965da575a56b499646b97b8169c6b4bb8bdd663a65e52e64470b166af98cbbc4c42dce41a872cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516415a09935273d8676bb5a6ffbfdf1b
SHA110dbe273d1a8c8c92e31302091390fbab2952fef
SHA256394d00e1443007223219cce01c8af8a31eb708fd6ce2464478afbb7aa52560e7
SHA5120cead2a2594ac0fc6e70c594e47601f9e9c354773674c90536e8389527f97dc612deb3960cfeede33da19d1e72842dc3e3afb258266eb7ceb2aa72cd8177e114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513461b85e8c71b8f25f1ebf26c27504e
SHA1aba9bdefaae9f53611a4ef9eb703e7dfec2e91dd
SHA2568f1a0b4992669a9a7d6512d347f283f959b052cf98a78c930d9bac3d6a456157
SHA51287298b11e489014144939d94324afba1421fd66fe008354c22ce1ad4dd15187b143b6b2e39e958eef1c94e0579e68a49f7c61fc6e56af1b9b45c5e2f016cfb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522952170ae5629e554f0e35c176b1357
SHA16283e209cebcc8b54d7e6e01c8b093873334982d
SHA2564e5b1fc1fdbc98cc78f0de3e3cbca7239ca2b4bf64ef8ba93113e2ce97ff00d2
SHA51277dec796e541fa78716f50eea24c09a8bbb0c3af2edabd15a2191b66848c5e1e907e3047966d7fad93c96e8a1131315fbce6263cb852fadd4d667c5e3d07a179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5119324c71a6d85e865f8eb11c04c931a
SHA184fdaf793052166e7b0c3b10e313459f8a566bf7
SHA256266031daf8780578e962cff554d4e93878ea37e959c8ec08a18d8a58b44721ca
SHA512af60396e113409d1fa49af740f827c11427d1138436f1fa7f23ea05b8334b3a4b7aa5d1abd0f1fb8de1951f5bd718f3486d27bbdbc829e7d9267a6b0cce282e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e757484401c56186fa8f286b8532de9
SHA1b09db6d8d349e4a4f701db8c8b941aee0f2f6137
SHA256796f3355b6924f57a609a9e54614573b07f8801221c50e450cd06016fefa89e5
SHA512222b1ed5d7fed7bff635e07747e1ba44e288701dacc363f97d0bccd04bbf09a3b76b0a5d88e6d6b90badbe77751011e8dd8acf94b5740bb001219effcac5bf27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5884be23867f47d710b18848f6adb21a7
SHA1e4deb3e27b428f2e29eda5c1abe6e4823174cf86
SHA256543e00cc2d75a54eb6e4b59c8d41a73516981935d2bdbf03ccb383fa848c0013
SHA512c0646fae742b092a02de8ddf45938bc160993fb447b2f01f5da6394ba052d5b6e75d35623fb662ce155ae3f3292d51a3d995337d5c8b78536cd149fb26a0f474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56007e77feb1d1aecc89bd5640c5c3007
SHA17d7ae3aceea3d0e2bab8b5b8c3277cdd68a9e833
SHA2564e1255ba352d74b81a3168415973b802b9b92ae76725aec7153a12f25ba91609
SHA512607de13b8a1dfc0222fcfab416c069a248d2bcea7806dda3e5e5e164efe702cbe403a2c103b11efa1eb181219c5e7de9ef5031bb412dd1c6114eb12c37d1643e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac52a13349fc6288826ee77f0a9be1d
SHA1cb99f5b8cc3213de86706aeb73126bdc6fcf9d82
SHA2562bbd12f17bab83e01d048830be2bc8ce8a6a8c7fe609641e6a0fe6efb595967e
SHA5127c425346ee4cc6b4e662595a260ce8c3dc7ee745824739261b8bc4dbccd3aae8be77eb4aea1ec57daee8b0bd0d506206f8f8cf57a3270dc322da91296698761a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a