Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
3ca66851621c6cfb68a2cd28d46008ce_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ca66851621c6cfb68a2cd28d46008ce_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ca66851621c6cfb68a2cd28d46008ce_JaffaCakes118.html
-
Size
139KB
-
MD5
3ca66851621c6cfb68a2cd28d46008ce
-
SHA1
4c2dc4cca62adaf49143aa8fcfa2d28f8d18af60
-
SHA256
4082e3d92f1e0a15d79608dfe489660417b8e8e36362afa26811cae880b2c240
-
SHA512
41e70b054938739802accc139b9ea8d839bd649ec9b7bc392f5ce1c5a01bedd59e4a0f8da2eb74b60990b7e2e9f0e976d520120e6b9c9bff6a5afa1c70ffe088
-
SSDEEP
1536:SVXUAyOiBbDl1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SV1iBb/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C901481-1170-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004010e4c8192e63f42771a045bd9ecd396c398e3336d31104a3cf0696ebc4ea00000000000e800000000200002000000010bdbc031842919a9850c0eeb757c772436cdb816a95aec3fff35413eff2409c200000000b6c8678375629b996bef9af80ffd0282834dfa3e058e027be0f05ab45c8aa1f40000000174d02dc46e12d19da023ac97eede41e4d13eca45a552471765f39373ec78cd1db1d3d87649a2a15cb6bfc05418c999d79bf2a44357ac5a9a6bfa0e11836f2b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421797762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a4d8427da5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2208 1788 iexplore.exe 28 PID 1788 wrote to memory of 2208 1788 iexplore.exe 28 PID 1788 wrote to memory of 2208 1788 iexplore.exe 28 PID 1788 wrote to memory of 2208 1788 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ca66851621c6cfb68a2cd28d46008ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f524cdb338195195c16d835a694abad
SHA1b39943528f5f3c0429cfc86ed008abba463ffdab
SHA256fe3ea51ba9a95b17d6a4a3c9df2db69ab6aa84c8698029ca7de15ac7c9eb719d
SHA512cab57a29bfe2586dc9554b7ab01ed46cabfd6b04a889378107c8f3dc404f5e8756297a9344c50aa12574a3bff7ff33c6befdc8bbd5c612de2ebad009dbb0608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9897c084fee85b7618271b98f5029e8
SHA1bddda1457207801b32ec7603de242cad9b7302de
SHA25694b7a314b05d1ecf7cd4b74b003a41937876948fcab5278d3ae755a15e327683
SHA51217b2443cf73d1616318c3152e58649246b564ebc405c7a5f5cc3d3956704b8b57cb40c41a3fad2ac6cb376da105290ded8c4edfc990622bc3f058b430ac03ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5055e7b529c494dbb8da02f710d29078d
SHA1b644f276248f21769476f5225878b1ce26d7c805
SHA2568d1647c584677e605356aa491296efbb0da4afbed151c9e2d6a718889abe91a1
SHA5128e2343b3b7ef3e4310c57b0596918500802fbf75eb8ca6ee043ce3c0067a1c481b048fe3be97b3f3caba45795838fc4d591cca6c9d7d0ecc6e879af1650528d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e053ed085491e4295100f84207d27d4
SHA1c2c5222f7de518194c9b34d07b1c8d4e305b0650
SHA256b1caf2816c368877345aacb80cfa0d8186b286829b76b1f97c240fcfb8fd9e94
SHA51213960df395a33f23311a0ed7c1c6b61d8f5d35ca51a6c10bf9f2b1cf06514578ae6393214a15d52e7346eb07be35b349a7ce705610c1a1a83c1722b1aba683a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946a4301494ac9710bf71beac683423a
SHA1c70fb531b8cc4295ed75c204bf6830982dc11521
SHA25690fb0d0d8c754e900669afcb0fcffb7131dc39583b2cab50686b0924a764c549
SHA512adb47e0ad645b6585f4cb9a3302b28c90f66df4f731ebd9c0422effdb02c955f979871d13bdab8fcf37ac3a38db8884b9b1a13b64561f4123476fefd4e991acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9849f78f5924b18724539ea8d9da0b0
SHA1ebaff5b097ff05a0404367a3b4aee4bcbb2abcbe
SHA2567c358703c429b4e15c1e25516b4cc192e64322394d242b9c3c6b13fd71fa11bf
SHA5124f0e834f8bf32cfb8b27ea90d6161da9906ce8361fe3ec6a87577b42120a4484d5abc2374948520e24dc3415f61f0a9a8b29a7778837ff28e33bd8e3701eabb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55930c65555243bde3eade110e9783f56
SHA182fd7a75636d34ad29d5d2bf82ffa7a629a3cc5f
SHA256c436d48bb9fe53dbd06d9d9ec957407f35aa1f6205fd94b82925016c292d824b
SHA512af5338a133b30a54764b08125d8581087486e6e1f43ab0f6ca23756072b5d29c3bde7daf3cfc67e81c765b79fd4d23570e597e27321f93db40565c3e45a7c934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8cc306461eeef7764fea633aa8abe9b
SHA12a657c23e0bcf22ffe689eb059d500d3168794cd
SHA256d1e39b9cfea8198b543850dfbb8cfa0da344553bb2f36ee903d44590d91871db
SHA512b098c63d46709a488e849a833e57bc902037360c18d25f415e925dd56f8ab1ef1b84fd2e72147ac2a6eb2023ca637149debd1138f05ee9072cb5012d0d7082bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e67d1b714a7b0c9e8794857f0bb3e3
SHA13b1fc442491c64f775cf38867f8dd908680710e5
SHA256a1ab8af5d209d460ef4136adb890d73928f4c9e981cfe7d3a3e963582223b094
SHA512887e2863ebf5b1f657ce9c749e7362170ce75944b118bb7e7884393e48e179537220b7779876f617624a13c22e2a0a15fe07f96e8569a2819c2c6c8c4634f350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d11341fa2a973d73b2e777a885bc272
SHA1e8d860690fc71deaecbf6288ab34e8c53de8a8f3
SHA25616bb4bdedc037bc67cf6c32c73dd6705549da80bde7f1676df79570579576ee0
SHA51233154f2a19c465815e150f2e1efe945715196c33c260f5766169adda88d0fb4f12786aa52c1f83789d11ad538fb6e380ca3cb0ddb0d8bb4fa8649e13ac301450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3da9551dfd84a30bf65c55ca70f7928
SHA11fb6e50b4c423d84c905d41855bd98feaf67a49f
SHA256c08eb889e8b450f8d7044ec71f49fccee61fb0a3e126376562cb5e1b5893ac14
SHA512fcee043a70d6fd8ccb02f4dab50cc0c5cfd88012cba1f49e630a23ef9e3ba13e7196088a2eb764058ea70caf2838366d4396a14b9c2a7ed0bcf7027b887f39eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503d285fe474d7f28cc7054ed93c19fcb
SHA1343dfba0cfae548cc7c5e3937b2a6318797e96d9
SHA2565881a5bca1766fa72792f3b0b34179a60e90cb6efab93214cffae932c005c4dd
SHA51211919995c9632c51c382c1a21c05b30dbcc82d235ade5fffb46bc42005e7bf02e372bdfacfd187584d303c0fe8683e7bfe3156d8b068dbb0e4c21278d7bf36bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a8d6d9274e74762df59d59394210f2
SHA128a7c0891d1b3055eb020ac705da0b0dd73a3ca8
SHA256e8d8928507de921e30fb4a0e6aeb66bce069171dddfa4646ee4c8c8dd2b9db72
SHA512a7ca3e7d3c9fd4d10c5e06141e735b9b4c0d877ca64225d7606a962ad36b5ccdfaa0922501df10e937abcb8b564548cd6000febd197855eab734c1eb6cdc664d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c7c38c78ce410f4cd3207f4cef143f
SHA149383ee3e54b69dac39f993482705a593754fe8a
SHA2564193f7273ea753fc6881ed88e5e3d764c2c4ac250b524396311c6381206a590c
SHA512f5e97d5f231c1711b79908642e9bb92f5cd343e68ccde55814e53791dcd2173401f4b45e7c900ee45e1435462799e24c7ba80bcc9f21f9290bebf8cd0363630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f97a7d365577863cfa7bfb1fcb9f1c7
SHA1c55fb8ce9ac7f3c3a822c3ab52cbbcbc81991276
SHA256bd48db43183b07ce865b5ca45bf974fd246bf3e21f91953b828007c0f35a0bac
SHA512e4ef17e8b923d64a1dad3f4c26a29d00b489597b2981874bda6549e43821e2d8e7d0a6ae9a9017ddf086c67d0b405e7534221a46bc01e2a1500a940a87e00d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880188b7bc9ad87ca5d75fee730e9eea
SHA1d868a7b6b35c6ac6d7fa15e5edb59e7a823b99e4
SHA25672fbd65443c5b182c88dcaa6b729557c07f17b5c57b7fee4a7c73d03c37601e8
SHA51234afc80573583812801f274055208e381265436012ae09c55d2e7eacfba7e5a4fde8e7bf4baf47615e26e7c9dec4455a513b467984936010f023c8b4b1c9d848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a3e14648c489e06f5420f98a0e840b
SHA169fb4df6f29e7650774a0ec466844abcd2474205
SHA256c359a6f79befafff43c3cf4015138800b975af1004873bcec78d7b2ffff011a9
SHA5127fc9e1a9fcc45e30fbb5d0a76476af3e97e2b93b827378138abb066f452c3f38a4b0ab486df166c437a200ca53fa6cb2bf02eb45f4bb80bafbfab8469a5238ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c5fed1d6b75a879864a5fda44f161a
SHA154dd33457433e1bbd845376aa74e252e7acd4065
SHA256955f68a365303ecaf4c232ec74bc84feba1e3b9b5e1d8256ec0c29921818ead0
SHA51254e2e065dbe7efbf243e219c1f3aaf306c00b604b1fb3a1b3af3d14601ad55002d595014c9933112059ded89386f1f87e5c78f0ff43daf597011d444d7b35a27
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a