Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
3f828014e5e30a0dc3f49cd86fbc6999_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f828014e5e30a0dc3f49cd86fbc6999_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f828014e5e30a0dc3f49cd86fbc6999_JaffaCakes118.html
-
Size
3KB
-
MD5
3f828014e5e30a0dc3f49cd86fbc6999
-
SHA1
468ebab56f35f3a39eb0c71ced4dad634068d2af
-
SHA256
01f652cbd53b2c1a07ae4cc767df3c041b17882ef5b9e45ca8339fb8197aacbc
-
SHA512
210d0659282b5738d3d8c6e58ff3387496b30d80e247eb42f87e7f79412cd5c8a0ea42d8c1628c535820d103be1de6f4feb68dbf5b9ec6c3b493dca7b6a1e46a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000006f4461dbc316dc5f8eeb9a220453afda70558479538adcf0f338f53a9bcc8c7000000000e800000000200002000000057e1a1da242583db9232ec3ec8562f8b32851521a7c55a035b94155d611858fb20000000f6824ca1597b2f145a2ab624c27171cb6b0df6f49689592266e2f28d1373aaf5400000002ec4ae203fe5b128bfcb6ed7807084fb2fc2c9780ad22f0f635d436d16d38211ad624d01e509f8e8d490e1d7e4f93dff98dc7a5e91af885d88f7cad16914184d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DA4DB51-1125-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20db783232a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421765633" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3024 2864 iexplore.exe 28 PID 2864 wrote to memory of 3024 2864 iexplore.exe 28 PID 2864 wrote to memory of 3024 2864 iexplore.exe 28 PID 2864 wrote to memory of 3024 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f828014e5e30a0dc3f49cd86fbc6999_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532ae13d89e9bea9996175d95155ffba4
SHA165086bd2e62cc72789fcc0a087a8de97af0e2626
SHA2565ca205382fa562a2a57a34fbdb4f93bf26368d5910915ab9424a3e8943d1036e
SHA512aedfbf9307080caa72c8cc13ce80a0ddc16bbcc47f046896134cd6166fd8dd89711302cdd9e741830a894eea1d1dfcd02f3d0bd9d778850a66415330d9e74085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5f95c1479ba430d962390b0a0f6ffb
SHA1b45bafbc50ccfac996a533be49c2a5e89cc4ec0e
SHA2562d3806565f15878dbb0ed2a634cccaa0d1eb4ac93541ebca9987410a40d430a9
SHA51227b676c3002d67542c602a046aa01aa8311d3e40b74fbaf5f46b589167a4187ea5ce77ee145bc66986d300c6cf422eabf172bb56ed298f625fdce6284d5af9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56586eb3d50755999c050ca089f0a1faf
SHA1d1fb04d0a3743220e652ae13cf72c19626cea248
SHA2561e29e03600f2e469a39c62475c9d2eba11b7e4c1e2842f4b10f0c7bfa96a8d0f
SHA512ce95c8ae1ba84bf0f9a0bff54b20b9b561a7c9558cd612b6a12ae77ab4c63cb8fffa0f14edb5886ef06d906c4b118ff37ccfae06f9edf57d63a5453eee231888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f684925fb9e0a9e533829a9de67ad52
SHA17de5175836b74bc32d74c2c54f12d2b2e08a8a48
SHA25605286ce3778078359c39e7b03c9257176abe0b2bca4ddee935d397a91bcf9924
SHA512e8d29d6591f119116ce4e282f3c2650be8d62e0fab5dc87dfb133ba25389d1821e19c0a3de8f456924c6de68cbb74899e7b112c0b52330f972fec82f3b0b2aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0c04815955787553319682a4f425f8
SHA1c9e53a68d7928cf9c3fa8802899f533c10f06b6d
SHA2569ee0db495afcebcc7215c7bb2ff3a33e11bb5a4cbeb9670efcbc55d71ca39daf
SHA51216ad950c23810eca86249e9c6e178d627bb19e263cca76c33dad7436728578588d66c83b02c760095f74acbe1b9603778df6438a7d5a0e7ca4f1226c251f5892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570143164829d80065067e5eb04cfe139
SHA1de7a3501807a2ecc99c89224c864c9096fce5e0a
SHA256f4c19b506e9552c23a42b7753eb13fd6ea77a7694d07d162fdaf15b5aed67425
SHA5122f7c7bc1841fd225c2fd082eaaffeab33751e42a7432167efa855fbb1ccb06da2727a61d40a346f54b9493fa695afd698feed8820a71743c73b1e4931e10eba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5886698a29d0c25e65127750b4eb34c31
SHA1957bc9d543d4e47f6797e4a49358843ba1286a1b
SHA256f76dbf9dca5a53de8d37e07e429ed860aba106ff59a415efd53827c69143d7e8
SHA512ccf9d3a050d07831a6c9da8346930a4b80f379d3e05df3cac2e6efead8f80298d6b0e5a57c23b17a6c569aa2a8d96c41abae22672626d4ba164c4e9886268780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511b514e602189c7e84af264b9fffc55b
SHA11dac690e90928f889f7cc74d11415b9316245ebf
SHA256cdf9a94e2634dbbf8c3daeb8860ca824d283f65c940e0404adfbf9b20ee50a2a
SHA512416a6fbce6488a5835c9a73b869c19f957d9690d621a4ca59f1b56b95ebf4de6ea7ca52c2540c3d98ec0564cca57c31df272c7f17fde991302013946a513861e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507be6c1bd8a5f96a76acb734f275ff08
SHA1633be0550f153d942ab42a0d6e4f0c4ab4da0b4d
SHA256e9c833340cec10e9a7734184497cdd1d9d26ac382c19e96a86831ae2f64b031e
SHA51262032bd4876fea48b4d9ba31f297f871890f3163dbb3e8035c0c72592c7f349c15e7e69a1424a3013bf1b5ab7e8a73aecb0bed4bbe6e8b138095128cc70b1e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aae26fae1cf47ece3de1dc63f7dc2b7
SHA1f50230ae51badb0c3921ade6b094f1dfa26e4e55
SHA256dba35f9aae079e96fa2163e07e08af374428070cb5c905a96cd36187c480dddd
SHA51236b5c67f62c03cfce49ae3505a12690d1deec335ba36ec5f97ba22ae7a289749d99b36b2e6ac685c5af786251b442623a94200606b5a13ddc1452caacce47e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55910eab5f79d91292172833eb88f4f65
SHA16dfe39a599be26110f14260820a157f1296ce987
SHA2563ba833da4f43211308398602cae0646c39ebd37c049ccf9b139c5cbf9a6d0b36
SHA5126dd791a17e789d685d1ccfe2fb90bd2f30330d9e56f1c8036ac581cfd013480b3da9496ee91dc9a4615ee89b0fe5f7410b50913747ca568b723cf42dc9d0d6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c516704c5ec5aa45c6ebbf6e4c0620
SHA15b68e454867ba5cbc1ab781cccd2dbc45f8130fb
SHA2562380be585d4b47af10f86fb57e00b25322a69d842c6410d9a8d6929c50c0fecf
SHA512fa3bf059d0e35a92808ef0c794a0229124bd0628aa24c7b188d0d596cc4bb3fd37c85174ad89602ea36cf892ef2c106d18cbabd701fed0461162020933b892e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906e29e32b1e7fadd3184a3ee1cf71d3
SHA1c679d5a2f1e2f93a288962ced4b6e964295cdfcc
SHA2564db346334ed77a2242e36f0fca4e8518ccc3eb5f0d37ab3ef58ba73431a604ac
SHA512eb359ff8a956af88cb45510fb55c70b5b11351486fd9cbab37eb3b874063c846b3af8735141bfaa210395411cf0db647522eaac359e56ada9824152e6160497f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550dfe1e238e042c86868edb477dd00ab
SHA17fbbb038dd64cb0f0b487b9d5f016677c2e14209
SHA256679d7388b3dec4b13859e714d8d66866350a2a85dcea0bd15706a8f1ed9f87ca
SHA51201ca9fa03763190050f241a0957b2fb8304d3520d1fc05596748c5d993a7b0bcbd00107bf859c5dc5d6567e913372856a1747fda60b44e91ba925175f5c35710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c943f9eab51a1380076c8d6124fc53
SHA124709fe9a01f34020a455fc2930bb2131086c36f
SHA256f5258253840e12d66126ea4651c36fde7336fb87b76ed034fae5548448d92a6c
SHA512ed07162c8f7dba55dc3936860a57ff38a9a0eb1375a23a9cff785ac06a3f0717d918c92fb1e5402328bb9d87acffb894dbca7c355b6767202159752602480734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51321bbad5ba423417e57c03192a745fb
SHA121ebcf5f46d332c4463bf608998f377e13344c23
SHA256559b022f29776e6c94f29b03c51892023520b0e5bd6099241f498631717d31f2
SHA5121ab4ffc32e69d798d4885bb59f1deb1dd19f89572278bd2195395c8a9bf7c14db961b27886ca4e4cfc7aeb70aa4dfe4bb3af3aa3e8fe03adda0897a42f7f7cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5785ce4e6a930f73e12c1f70cd00197a4
SHA1a170e694d69943e3975a1f896e35725d1d25ddaa
SHA25645943fe5208e7bc82d6e3c9f2c0cbf1d19a03b2e9d2fd283c6f8d58df21d8333
SHA51215ec9f0836a7c814ce4e5ae24e34e08b16e9d5816e07b20440a6487f341215258baf6f074bb5db54864fec8498b44ac7226e77150dcec5700b729123e23f0266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbc31e78d4782923bc951defb85ba86
SHA112147c1dfb728268d3120eeb5a12382df3c49e39
SHA2560ef82fcccde7e758971a5572c976a25e77e46643d456bba41323e1dc557148b8
SHA51220aa2ed57760c7ec25b6fe04f27462dcb657403092158d70f916606bce05cb11bad1b718435ef34cbc5b4dd3a73ac00a845a1d49f404158e9a133957d3f17ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1afac594c8f5c77b141ab317647f9a8
SHA1260bc2f288e18c2ee7d84ef9d8c950e630705742
SHA256cb0a5b6e2a392e0caa1dd83746202fe1fb53359563f731888aa023b83df15441
SHA51268adc45eb4471e411d209d9fdceb93129a50836e1514c123fdfac24bb3a7cee9a6d8d7d72ed99c20409757f215927c5442a910623b2f127bbfeb2d075f19b87e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a