Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
438d41956591b72d13d6fc7302b0972e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
438d41956591b72d13d6fc7302b0972e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
438d41956591b72d13d6fc7302b0972e_JaffaCakes118.html
-
Size
783B
-
MD5
438d41956591b72d13d6fc7302b0972e
-
SHA1
834978d9af4ff58a46ca7a81fa4ce96eca2ba8e1
-
SHA256
99ff756a2bbb8e0e0ec16f2b48de5c3041b8db70c70e0f8b29080ba3873dd879
-
SHA512
e75ede02ffc5005f8ab1339ad9382dc5a9b04da61cac86dd770c6f0d0c6649046a8b6f13031404297ad8d331cd7af34d01336cc26e3cc9916f71d113f3ac5692
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301ac83756a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7439EAC1-1249-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421891083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003a77f2a625423fe432aa4edc59e358efe6f739c4194a583fe33ceff35d21b115000000000e8000000002000020000000c95f6bdc51ce4c971727ffc16c4958b7936f2ecfe81cb4086452347e10a47b83200000004a696fb18fbd47ce0ab4c380eb8496ec8f4a3365b6362bbe59d4d20ac5c4710b40000000174ec74543dbfb80ea0986a14f28c8608215078614eb1aa3b6a44cc9c5e0c46a71db6af7e115693cea905b8c88b7c8a2006d610c7b9e5df4dc0f95b760aa6a16 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28 PID 2940 wrote to memory of 3036 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\438d41956591b72d13d6fc7302b0972e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54048aed3c3a93b4ea67808f746f553c1
SHA186031c046edf51e5166c712c620b92234470e9a4
SHA256398ce52b730304c2f6b608b060c4593d96db47aca4cc09b28c02cccbc19fc955
SHA512e9691c0d3d93ebe3212244d20a5e1278f711a4dd60487bd25c84699ac648c40bdb017c8e994d80ba34ed9778427ed91c88019195033ce71fd3dff5bf9b9d9619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b6685e516db9e293e434299a8b8551c
SHA15b1a868e9e35203dd78918cbf13ad27b92f54e2e
SHA256b09b063e4c1fcb8ee938828218027c0a67670aa1ec4dfad3fbd61bce9637b8ca
SHA51222e8b88e6e2293e7c3bb0846f6b89e55cfcc0688440b8eb9e33d421b1393ecf766afd382c87cea0e9b2bdfb283fa157bdcd9db12df8484950c8cc9bf42fbe85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac75f0916b1e21fa49aa154f066fd30c
SHA17fd624e4d9e839beb60c490900e36ca8acc1ece4
SHA256733ec51887a68550aac0557652a8981916ca51296fe94d99ad76c8cb4edc132b
SHA51283422d4c7973d3bafdba87be898a423827fc50e18a873d83da14b6707e480d287a31f5c21053dce44d054c4eb1102344f49990886e0fdbeac472bfe8d3ee99c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595b96305e6d79c6aa9566503ae3b079
SHA14b3142ac5f4a1398fa567406e729bfaaeb0bb7e9
SHA256f2b9925308788096213e9241d0e3480c8eefd3e18996a784218667e3e125eba9
SHA5128ad03bde996a985145a669a657329609f0bc203d07b719242128aca8fdb233889c7505c2fc099c0c1b39b3928f61ce558fff612cbf50a412ea70a67234f9beea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc00e52d1310bd9461f2c6d311c3b153
SHA1539a79e90c8f4112302ee0c5c6fb30bacc8d0de3
SHA2567e615e6a23298e2ef0dbc248be7d4f383f240e6a41ad74e14291d46f08673641
SHA5126abeb23dddfb9b67a539c3eb405581c275452a3f01962a69fd90e74417beee4620ef8a82ca414bdedae6730d6b7ad8751082be7a90b3a6e7f7d94a996af0e682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572441d9c3507fdf79a210971ad47a8fd
SHA12d0fdbd7debfc748a0f56562877db6936cc5fe45
SHA256113805ff3ee31c30a8b1a72562daed1454956c90e7af172c53583ba414b567f8
SHA512c8229e4f2bb619a736c1592aad7d386d3d870a013e93534c6a9a9ab6be875a45dacb9e1e952dabdc7f87c7c21c27e400ef555cd0266967d5a6eb509c85ee2af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ab1d22d46f34162c14daa989a7e8e7
SHA1cbf2bc6e1101789b0f2b5fec2b0e66801db7e881
SHA25626addfd05edc224450eacf1126292491cc6235eb86d6ca2d5c70274aa3db0083
SHA51233dcf548aa7c3a6d3fda9d7d4c82057b1a9f8bac3ca4789cf2dffbbb2e248aabbdb8a1b947ebab49dfcb8c4639f2bad5db89c2d91a03c7163e10000c64b04f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a02ef5745f3ff9bdd10ae1d178174044
SHA1d9ba135b5761c5ac000484b99d04cf321e4fbbdb
SHA2562a33929add263674c1160274f7049578a08ba46993322d26da43cc45b795e48d
SHA512cbefb25ecbc81833e80ab2352a4d014b1fa0b0f328e1f54b796da42a9307c1f8300dd3c66a0b075f157f713c3b59e8520e4d9c6de69b11afc726b96c7d47cb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd32a532c8a59c5d922d999cb8cb8fc
SHA165f5b19d2b306c2823f8dd0cbbb4870f851afad2
SHA256c059350e727f3fd4922975b7937767232a7bc7ac5d0a680e32d5a6c90080938a
SHA51213dd6607a48c314101bcc17ca33d205dde374697860125a8e6a7465339019fd26b9069b836772c52617cd7476dd28c6eb000c327a1e0eecc0d40cf80596116c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5725b5b73c71cfc1dac34ca227461af0b
SHA1de03400c40f105ac0341479ab73c59aabb847617
SHA2565dc29d838c5c7bc30340fd7b27901f7bb7955025699abdec05f93fb8c96c350a
SHA512169a8d210c1c62cd9f06a74835def03805558aff43dde06506a044e72b72c1f9bbee4882257a54b62c0158e7d37b9ba012fd58cc79bd5afbd38924fe217e4383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c698fba358041bd2a82dfc6e45032a
SHA10be8e68e5c8a2578c545fd8fd0973229668692d7
SHA256acdc3cfc0103112302adb2fd6c824dd354a8981226e6e810e02b3aa9d0a7be50
SHA512dfed88ece47e5e6de42cf71ded9639f5d5cca5fa15c39ab114776af98b256301c5ce531204669ed0d7826e4e1e2fe69c5145cef0534f9cede2d0f3bad010e66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54749fdecfbfb8364916a4becd2d5b8f3
SHA17f4e541058f31fb269d465762394ab7da4f07d69
SHA2564a3d95b0b97c318cb3ddb33a580ad2ddac9ea6ea49f294bfa29129b6013a39c7
SHA51213a9edaff55ab5a0ed9319d5578cf701aecd7cf3d691692ae51a12a2f304c616a8f7724d47a06aef38f78496c29616b6a10f68acd8b74948a26c7c2b46047022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a7046b9a03b66d4ce9fc09d5d655be
SHA1a74c3fd787a5c98ac979b0334084f2ee5ff6fae6
SHA2569d3f49b522eb8ac134ea5b3b4a95dc7972555825431de5dc7a1c0b98e60b27c9
SHA512bebb56879d673a44357892e23f972698ab94e088c229a801d0047401f45d4cee776963eebd9118b548bed268aff1191186c5bb94f9819fe865e069ad755ca539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1cc79260ea64c6e46fb28d04b3599fc
SHA1622d836fe437e05d8b8293c182722142b66a21c5
SHA256ab534aa7e8a2de9c47275c78d755fc568baf9bf14036000770f74fbf274e68e9
SHA5126ae971430de066499279a10ef68899c70c72953dbe821733b69776417606e06cbf68b314d0530b679ee033c669323082a69ce1ec25be4f090f86fa42c0fb3cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cc8bc493676532b33c533792cb966a
SHA1303105c1a66efcaf7f63880d554703929a907e81
SHA256ce898db7d6f97c6e23e1d2c65f17f5e3c8a427ddd470dbf73c6433fdd14e99fd
SHA512542512669c85f6ddbaa0a1fc7dc085271bb3db9b6bc82f53de15c4ae3ab68b3c616dbfedfb853b588e0ab938d011e9f678eef37b99cd583a3a756b3acbce5f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fdfcf92e0bb4d53b458c049428c6325
SHA1dcc3711ac9347754a5c7ab761adf7a6d9742e279
SHA2566d950b5ba6f483e14e61d54c02a582b24d61047595b1578524a39c7e09cfb371
SHA51278f2cc7d0a02dafc2bbaca03459b7c59a385848ffdea6a27005c35ffd03cbf20464508cfbb454db7cd73354a14bd0ae2a0693e3120545d85447d88c22f0a482b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d86bbf60a43a60f154a2006a1fa18d9
SHA10e62c0efbf6a2557e6af843dd868af4f149dd288
SHA2560cdf7087494d1266a163b927f5ee16d6ffb32c284ca96c6c22065436785dc8e4
SHA512b5e1b9b0a0d0001c5779f74b01460d214d8f2dc55ef285eb915a03578e6e4c66f89eee06cddb83df38a9858d2a856541827fba440a88c3fee424f3a87f3d42d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1cf3e7f480cd858e3a4908823036a59
SHA180388d7a6bf3df570b0291caf36c40b122b51398
SHA25618fdf556695070016178bc86f29e6b10a437cd7d126097df7be0e946c6c28dbf
SHA512ecfd197015175cae78ffc7bac43184c21ebfb7a9acdf48e72a72b334b267caab0ac74a8f41e659e3ee0d9bf0b63267b3516af1741c787b9c28a97f23cfa06926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb4a396218be674cdbb363ebaefb7fd9
SHA1da6a3bd91f4fca4284ed267d82d0ea235b36ca24
SHA25689c231c745eb1174380df463cacac25843a98697548fe5ab5540021e249ec34c
SHA512824002f6a3ad69110e59c2564908e071acc05a1796f7cf06e3393f4e62170d6e18c4ea6944d8434a118ada3d41ca0ec4dc708ecdcf0228c4e48e7ae50ead88e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529546730d2293159e3ce1e356bd803d7
SHA1aff0a2b9345e73b872b8d991564b619c45f6f142
SHA25611b9aea42173c8d9e9faddb8b23fb7389ddd1b4cdfda7d69b606a59783375bd4
SHA51290b53692cff208a171b7331e10221346b2142936f994b667471c68493af8c60bf37bde64ea8b048dc141d0241747a5f6c3e959beb38f4cff6159658045aa56ed
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a