Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
3fe56a77d1aa50fc64dd15522552e133_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3fe56a77d1aa50fc64dd15522552e133_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3fe56a77d1aa50fc64dd15522552e133_JaffaCakes118.html
-
Size
67KB
-
MD5
3fe56a77d1aa50fc64dd15522552e133
-
SHA1
90e46f457a623428389f05acabac5a903aedbdc5
-
SHA256
8f98030e66e510a2abbe6ace211bc50585f8348739116ecf88e30d13c278bd84
-
SHA512
8329c9780e47bd6e3d185ad0802542dc2521276d128c2cf90a9de4066bbde0f92a772bb177a35b1a532d0455feccba681d78fa6f13ff40ef820a8f446b263813
-
SSDEEP
768:JibgcMsSZ8tN99OIsUBqGcofJEi4aoTySqQCZkoTnMdtbBnfBgN8/oygcR/QFVGF:JRW7OwOTYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FD007B1-1134-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421771944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000052046f01d2b4234db73032f06ce46b43d00a217a81f3ab6fb34373c143897a87000000000e80000000020000200000009d157cae529fb7ed56f483a9bd875bf62ed8ada54d902e315c1f61c5590c34f420000000a00d93e0e8bce665f5fb5d3d49e1fe59cace77d237a3f72d5e559db7442dc6b240000000bb59b6a05a0439bf3de53c61929c76b4dc4e8aada6909632e044656427970139e7f37f41956f658a3102a1a55ad6e06921c8daecea5e16f28b964da5498f0f2f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209d64e440a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 492 iexplore.exe 492 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 492 wrote to memory of 1664 492 iexplore.exe 29 PID 492 wrote to memory of 1664 492 iexplore.exe 29 PID 492 wrote to memory of 1664 492 iexplore.exe 29 PID 492 wrote to memory of 1664 492 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fe56a77d1aa50fc64dd15522552e133_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54721a61d551b05e328e70a8c2676f385
SHA155c78a17b3a2eb8783f8d6577af76b126d6de3c6
SHA2567d807abb459d11b10466fc4271ffcbdcd5c5b487ca0b271f63a0bd6a5420ec48
SHA512cd0a0dee19d24b3ac9a6065e77e13255e157be7061acf6d0659db4264c68585fab4333c7c1c038a12937e7bf49a8fc0710a50d488e724dbba77dc11a02367c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9de82f445a5945a347ec8f477cfa568
SHA1b722f8344393ed54fe7dc93d7e658eef81180d53
SHA256a2678018c7ef1da6bd5b1a3cf5f5e06b567ef724d7baae6be43f269a9c386b10
SHA512b03f6024a7918cc1a4e0fe79ed61f47430eddbfa71cfd33c712799bff01ec942687af3b9a224b50e86fad87b7f7bc4141a4e05802a8d282cd06862da78f46422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5cc2f4508331268eced68229bd64eca
SHA1a42d778c4695e3068648f7f3517aa11535dd856e
SHA2569bb5c0b1d0d6eadda7c223aa097017d5ba1ec3ccc124f42cab3e4a2abc5f7544
SHA5128cb1e89af5cbc3ad55b401eea073cd661404aba2091466b556fd9e129f3aa51a4759a6032b5dad9f617a2565ad515f9c8ea099f35b20b5f3c688bc84ac774faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65bd7ddf000302e6dd34b0cfc325b4e
SHA1a46d47d89cf2280dbf5a999b89dff7cf72bc322c
SHA256618c6b5bd74c564f6e1c2f90b6d73db05e36e7b1b285006c0c7c3dc3abc843e8
SHA512d92daded829dd88da5f2c4fdc00c1180f3aa8abd86336e0a98acaf9892216bbcf034fe3951645bce4076c90927e524547b8e58ec09bd4951a8dcc789368f8fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e0a81fd06e436bfc30135a02482c6f
SHA1252ebdba02807c2b8a0d8d646f5a096ec2210eb1
SHA256362094832ed425d02e77e63c42114db78ac5a28081b21ffd4de595aad69700e1
SHA51226fd214dc168b7532ad38d2d4c58feabfb9766789887bf27bf21f85a1637b740f71154b00673676a3bcf86f313252f49a3353886ad6c9d360bc58444fb02cceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545237d57004d0243d124ee1b2dbc1d6c
SHA13feebf682476d4ca1b37d9b50bdcc8835cbdae19
SHA256692dc29b3a4d0559139e3cc23ef5b451da1995ab38de654528fe55c59e807f3f
SHA512f75a93b4de0d4789cc22c346ded179ef357c9c41f9eda3d51af7fc929115224335b9c0d43677ba6fa38091f1250531bb9a03aa64b6cae8d72ba764106ea1ddf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1396c3457af920b9fb0c0aef18e4ad
SHA1f976ae0f5c106ebde9002c030316aca9487800c3
SHA25655b209789cfa7dfd665797035013e1f8c4e3574f130fd3e015e3822effe39b84
SHA512d9d4ea327c169679438d648190422486d62373dfcad8d11284d5cac8db66806154a4d0b3a6cfe99049540ae46b504679fe580cb4e6e1b4be27f55aaaf0723d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781de3bfea8a48cb38acb0df25c55fd3
SHA1d23f38b28ff15851ca8184b8abd03bb3f47eb55a
SHA2560c238f295a498e74277083b2c0e9966fb9fd1469dbc5374c7d821856af6187d6
SHA51256a6a8d01d349536dc53c70ce13980d3dec9711612bcc15c8ba17032561f2ee812a2ce94a9f3dc8f36dc7988def0efbb83de61bf22b1e20227de0eb902da0cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f155b709a267891b3d62f1cc08fd6aa
SHA1167a5b07cc292fc495d52bb29a5ed29d455fd970
SHA256460c0857fc99944582221b266020d400dc4aade35508518e9092b4f0761537a2
SHA51269582d8395013cd980083c0c3e93e623bb3e115b63e709e979bdf4e5211eec62af73cfa0fdcdf897e0b5196a58566e919d588ff4eb41009cb2a304fcc6be88bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838adbca4c0db2b17a0ce555c00ab6a3
SHA1eebe23c075cbd7f4ff8f29251adaba04237bd40f
SHA256b512bb7eaea8acf3bbf191d99de9a20e3e108885ba18b7dc9b68532007d0001f
SHA512e50c936ded2cefa512adee1ab29acdfa513cfb9e20e645ec3f4ce12429294360064edd36ac704fa0bb2355b07351f9695c62ee227934948171c2bcdcfd3226b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e86d2438dfae27a6eefadc067ddd931
SHA1c8cb0e44bee188c90a4b634de47bae42e4b31db1
SHA2566f8765b9c588a2edef67ad22032c26d52b242ba06bebe43c335917ae1b723230
SHA512070dfddf65b12407644051e5a830033de98e310b329ff18a0363afbc18ef3c78e5c26ff5cfeb4e64e2ba9724af5f5060a5f2696cc4b930364659ebca884d011d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c478940e708dd2a133695add02d2d4
SHA155d6e84648426c26e171cb5bbcdfe7b1c5566190
SHA2565e1bdbbc78a89e62e64236b666a33fdcd253e01f24ee9a358284c4d091886dad
SHA51235611b615f37af2ddbd954908add22911b5c1114c5b6d172478e5d6d7d99f322317dd66df10912c68e946e20a3fe212d134048ff084dad3c1b8288b55c27217d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761c18bd3b5b22ed5e2df074f1200b5e
SHA16b3028c2b4cad9ed6ac6c531774985feb9ca0c70
SHA256ad7a836d83dce15c4c4b189de2b2393939c0cea85206338dfed062e9d2b6d304
SHA5129517563066a0c8c3ba8725be13487bce32b922b2e1b639b7e9913a74d7753e856b62e4561a5961c0afad24042d1ba6f6f8b96a29385e1822cf8b6e82b2931f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9e9d49fc1748e97346339df8f72dec
SHA14e094b91d9c091e556b3c6705c176a2c9821fbf6
SHA2568f10c4c74267e656fd51f452d8cb5dedb09721d06151c4d287fee355bb7cf8b3
SHA512226dd60c1a9155c2d354b3a74715c83eacfad21fd9bac5e82d51690ff95b171458887bf99a1a14ba9f1af739b9fa5cc38fb9075914983583f90c2fa1407bcd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036644ba412099f34d29ea416e4375ac
SHA1946bf7f9b308d08e93f25e874023d087afbd985d
SHA256e76d680c256ca40b08b950a1a98825f24fab89d035a44bfd1b6265e33bcc42f2
SHA51285b0b4b8198220173dc79e98e3ad9dab42914a2a24d7de8cbd33c84472c5d64d92bb194191f0a794661b01cf56adcaf00056feea837b48bb78877e4a288ddc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c504e63beb2f557a933719ede0f11fc
SHA153a325cf69d391c7afed4df77491294bc374b852
SHA2569c663b0385b91f87e4a56f6c41bd953e0987763ec3ec0c7eb1b0a43ffc101495
SHA512cddf6fa361c959b63287c4c0a60a03d455f15a3a70c7ad439db19df62188b25a6186642d922094f48ab56d7fda7650f8e38a050dc64eac277140d7fa266f23dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d45175969ee145f2dfb3d7cf66b5f5d
SHA159c750802f204801dce328f3a7c7ab6aa13bed7d
SHA256e18564d3c334c4acf9434eb93028c133f9fb0af63c95e1582dbeda10df08d918
SHA5122dd148a7067c7f4f3f321c3fe0c9380388f2d15e59b9de713bb3a20bd97926dfea5acf2b70370e14b9c1541e4b302fda9b6669e9e1e5aad658baeef010d2f796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dbbd7be3a0785faac0aea97060c5a8f
SHA1f6b8cd762b6351cad621073d3a9c0efe414c8fdf
SHA256bd2e1ff159222cd45e61ba8524958ffe3b54b728d0f7e47efa0b0336f284017b
SHA512aefff2b6e45b6207e43b8ec968753262651b31760bca386410b911ccb61b29bbea221eb4c020513216e4150f74666f63099a7dfa978574e5aefa50c4197d3bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b152415eef6e20c310718b039550a25
SHA182a70e6fc2477dbe9b304f0d7e75c4c980368421
SHA2561b1f1f1f4d1dd518453d47688bcba049ff2637da7d16e6348b6c176aa3777c0a
SHA512acf1b7ccc57e79f1483586ddd0d9682b825adf40af3e68eac84ded460b1cf24bcd26a43eeb88d8d8cdcb110e589d39c58274e3ac726d5ea680c1d7fd3b60099f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a