Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
3f9591ba086fb36c911a4f681297961e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3f9591ba086fb36c911a4f681297961e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f9591ba086fb36c911a4f681297961e_JaffaCakes118.html
-
Size
68KB
-
MD5
3f9591ba086fb36c911a4f681297961e
-
SHA1
ff93ffca61623ef8007571a19058da486597dc9d
-
SHA256
f29381e1dc7cb45aace0a235264fd80fd42d715b27c1c89630921637e6a68307
-
SHA512
8c7ae7433961cc5f375cb233ec8bd1a703986add729477d5aca15e24c2a0e4ba0d71b5877fe2cad35b1622c46553ffbdc6ead9b20e781597d682f6cb8a4c577c
-
SSDEEP
768:Ji+gcMiR3sI2PDDnX0g6lDS4mY4mKoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JMjKzTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19E8F421-1128-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000006535ccfb7f947b4ec37ee867c4c60553507a5e63d064331d4d4bdbc7bae58d61000000000e8000000002000020000000809d097daa582a48089c6666782f8b5b904486efdf5cc4ab3ead38850326a4d220000000999ddc641d20336d88e2c1e552cddaf87ae1c031da7460b93e8df59d34108d4f40000000624edc469938f4f74bfb3297776453c2c7eca34a54ba46ae7ed6a08355f1412d23bc96c3eff2a9b42bbae2e758ef772be4aa3d9fd7ac05dfd82b2d1db5cd5657 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308695ee34a5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421766807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9591ba086fb36c911a4f681297961e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967be0f422c63cde14bb2db60db0ac12
SHA14742c6a876c614bc1405210d7c4278d473ebf2b1
SHA2563ee160ec2cc741ebbdeeb89608f2458a4b312bdc4d414b2c84f0b2fa52590dd6
SHA512b71ce2853fd8358dd33a37840594d74b8af3eafafdcf5bfd648e479fa328bd9c0daf815d99377ed767319174ee988ed642229aee25e075cf023efc176176f70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a007e2802530611ae5f13b83cf956da
SHA17a20d68dbedac7a4f9feb91180edb10f68b374bb
SHA256a28d7f53bf957cb9b857965a40e6cdad7cd4cd3ee7d4adf2e452fc17fa49b3d2
SHA51287f7f1b679002301b4110d7d178bd0d44fe647ab1beaffa7cf94e1cf2c521990e0fb778001daed9b55cdff7f4b3d76d214278a3877654a01c7bc9893a1275125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2778c419322a8f1ea51c55c93b8bfc8
SHA1f64c824328cafb330ee95cc448843d07d28ffa87
SHA256134ac1c7c16a41767539ab1dc5a75925cae49a9927e449d39dca151b9266d27f
SHA512e66f0a691020a45f0f38d03a25d8dcd2fe284774041fe87c0215b91fd07588ac59cab9fbf323937c0d877cfeab8a58fa72c44d401b5788e1668f9a4f9ffcc547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d315e42e0416e24e38d3a9d7bd02b2a
SHA1c278ec6a11af3527c5f282396f8eae27307a8bce
SHA256a060ffead8440ecf3e7f1c631565a2442d6e0b98f09d7628ad15651763830307
SHA51237a4807cfb6d276b1344a5d4f2bffc5698735f569c1520a14c71a708b5aeed3f1a681f4dc41f164472b95985ee0132e062690b872bed32ae65443d7208031260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e21cf88420f8124c9c417f78eee4839
SHA1e9a47e606bc92f006b1477d0e7d64f86be53097a
SHA25636342357814c6384ccf187d5e11677f726b43008f703bff912253bf6b0212df3
SHA512026c12e9d2a24510f5aed540161ecd35081c24939a616a08ce871d4ff9a9a791f26107810545c244a9219dfc0b239d97ecdbaac996e5453dea0b7a0fdf47f6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6e3bf8f0e6bcd0c2bd66e7b33a7e4c
SHA1a6cc4d8d3d73496cc677da7c204cf650ab3722f3
SHA2569d5a92d3a013da80133c709da65345cfbe1edeb0d04757acad442cde435fe3b7
SHA512739479d28ea73653ef52b20f11d41eaf488c35d20f6aec9258ab0b8cb9342d792c3a66621ba6ae2b9b8f5a267354de54a9422cb7cc3b5c4745486509764a86d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc43eca8f0b4f7a19acca0ea3890b03
SHA101984ff76a4193f7e7d9e17e77065629d12ced7b
SHA256ffdd792c138ae0abd134cfe2e19595d366e35cb953bb36830209bdfc22c92997
SHA51227f24c9145d5a24fceb3ebe7fb5c1f59b570fe65c16d8f29d4084c96a3de73db0398a50a2dd9cdd1f9c5707bef307b62e4313c4581ccd0cd2b6135334d5c67bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a16f6bdcb60e88ef4ab74695e0dbff
SHA135ec17b71502abe34e7ca76c1a1e06ca9a3f3bdf
SHA256a2a16d67c8ca4c3e1f57a99292dcde9adc5616b081df3aaa2471ee920b089dd2
SHA5121dced7217ba1a4ced576f4eb0f295a97740c94f58ed95af657b49646f231245c40f3570970af5f4fd3895db685a8f804127f747f78dbde601e1b5ee61afad50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3552d0c95ebd360a42e447ed2c433b5
SHA130df1316730d5df0873a53e849aee85a6d92e0de
SHA25636fe4349623220462b1fd4c2d050acf96a4f499ae139ea43ad0b911515c9da76
SHA512290afb3f1b4dfec695a19a5bcbc19564f5ebddc9fb6aa11ad1d835d4f780c44b13a565370746a9e3570e6b836d3abb7f1e39d29da4647cb7195fa2daf8bba48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55217a2656f2a41f69a616de1085e84c2
SHA1b9cb6228b659ee05d3dcfb51e856454b6c7f80f9
SHA256ba06805df3da877c46bc0400bd8f1a777b3f5316fc3a3e59a27a285772198bc3
SHA51292f5010089d388556dde80b62b9371a8ad9acff9fc6d44fe9f034503ae82ae50c9a56992a68b0b1f79e97e890095431f62908e7c3b11d6df213e6118d1e1e34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c44dcfcae7cfa4d3963b7ba63424dd
SHA144f8f8a520f233c84e2905f959c61fc521caafe7
SHA256ce59c006e9c79bcdd0b741e57c67cb614064e6fee5decab88b2b664b07a2a524
SHA512f56b8cfcd291b84dfe5a6e4bd0a2be291f14b11e16d46c4d9ae55b57b69fc04748ee3ca43347674c3b595ba4996cd06b6a7ccd2ee8f74267e754982366f42f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8f63a0f76077c583b1cb7c97528e7f2
SHA19c7a8ba1723ad1f336a69d55ec67ee79169cc487
SHA25600c718b5595d44a9fe8ccfedf1dae1db9377ae9dbbb2023b3ddef6d09c71f0a3
SHA512b6a66aa46a383d38a1806a9b9a49cc0b5d0640f513acd8a5d51a979f1183f369848ef45f6664dbf16db3b746c16371ce4aa4e133c05c218a6f066842e3f8e5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464a32c428f694671805c21f44282aed
SHA1a8414d88c6c9b9c6092f70d2b310c57602328368
SHA256a96c06426d309dcfad9d409a0ef3745179a4cbe7085eef12d468e93ade8c730c
SHA512a6e6764116f1342500a9ea6e7ffa9033457d504ebcbb5d37a3d0f60135eeaa6b1276272ba8cd30a8d0d5a4a09f19c328cd0ce57655051aec2cca027f1d4d9d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef51abfd79c875eac5900230f31d3bf
SHA131357b171c73b5db885b5683f384686115af6341
SHA256ee808d83d8b0f945b770aa2ff86fee2f3f91e744a76578af0bca13960ddd6db5
SHA512fa6adb4683428ecf6b3f7f6c28581c8834dc924022727d6e10c704f0954b6b0b3b7d5a2666a0b9de10a93efcd6d755b49599f6edfd60fe0efff3c45e16b8bd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477c114db55748bf776641ac1a6eb4f1
SHA101652b58ed98f8c9e5846d3707b511950878d2c7
SHA25633c1a53623723925c34fe0bf31d8258bce04ac0db702ddc6aa8569f3f86c06a3
SHA5121ecdcb4082c06e0a14432e0213aa05b4fce895b542bef0e7a61d3cf14837f0176079d84cec707bb2e706e87993f416f82f9ec58103831e9800c6e5b96f472280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9cd493bf406897c7b3c0c1428ebc2a
SHA15d38df7d7d1ef7e0a5d593cdff3c5e930cb2edca
SHA2562d6d445834e7fbb049d37375004ef1c4fa99d29f57173531b91a95316e321d02
SHA512b570d3efe88567067c6d24f73d5ac974b04708bc9f325127e5899f63f5a171b051daf1570e55e5d2821af5db1b7c89e73ec354b40c7f54ff9a687c96bbbd2f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d4f5453259a297f5e194be6cd0fc8d
SHA115c8135e68a64e0941a9e162e5f977bda9d1c077
SHA256db7b6784cde6c0948e8ffe8af8f5a1b0ac1903c3f9bbcbd87b64b15cb41febfc
SHA51243560f2675122eb7b6f07f75d6eef868bc8f867c36613d72099b8c12f257bf0193366482be92805920eb459ed72c67b9efa502c75f1915c4e807d8e7da5402e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b625b30dc3a40ecab76948199f7fef26
SHA1675208284b493ac2af5c9102dd1bc90a26793fbf
SHA25690bec984186197e8db652eccbb67ca047c9e4fe9280eee785f3b34e7c75cb048
SHA512c5b96a592aff99c5ee64b1c3d64867dbccb7af090b5d7cb190af84516652cdc5f706ff2e5d6732ad4bdc495e11937781df446d781023c3aaf36a3982c3985d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e727d2d8446082e07cdf234923e13d
SHA154e5c7c2a3dbc4c384ff525d123a750f6566d977
SHA25690bbf6243316a58b35b583a945e0adac72c701107b46278f4271898920977708
SHA51210633f99e5119aef2e90939713c0c2cd5b69b0d108d7e00cefa7a7d5b786c41530799e79142e76043931610c73115fbd0ec59f300994b7199105a0dda8e2450c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a