Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
409c6c276b8141ee618c98124b8180ba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
409c6c276b8141ee618c98124b8180ba_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
409c6c276b8141ee618c98124b8180ba_JaffaCakes118.html
-
Size
79KB
-
MD5
409c6c276b8141ee618c98124b8180ba
-
SHA1
699cf1d1abff562dd90811a3d393e5b20a3ee053
-
SHA256
ad6c36a5e1240cce767ca4c9c1f2967fcfe38bf4fe1e28680bbd6af269152ea3
-
SHA512
db5af77f891e20a16aa550e023360897a6b2573a5e177c69a3a277202a15990d721a12376836a47d12154ce602c40f853a2e733a2bfca7e45ab2f864a0ee6c09
-
SSDEEP
1536:U7LToAELwLvLMtLJL3ZL+tLnLTLCb9lvuiLvm:U7l84
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F65209A1-11BF-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cf64d0cca5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e45b80fd1d02e9f275b02a37c234f6921927aca84155f744d1450a3b3ca907a7000000000e8000000002000020000000f3c227c25e802823f46ce7f167bbc5197b0ac1422716770635363b57680e591f2000000095a6f5a3f3faa3576994a360aca45111d43281755818cb699cf2fde6d7920339400000006239bdc7df255a764ea0624e4b472712b8e341de27986bced7270e71d7c5e2c68a615a6654bf1c1ead617ef5f8cb0015a1d50d691590f8a46fa1e9639cc5ece3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421832033" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2552 1936 iexplore.exe 28 PID 1936 wrote to memory of 2552 1936 iexplore.exe 28 PID 1936 wrote to memory of 2552 1936 iexplore.exe 28 PID 1936 wrote to memory of 2552 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\409c6c276b8141ee618c98124b8180ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd6e5643d632a45f95126baf00e78e5d
SHA10df83e031645e64cc5780d68f9ee479e5390e536
SHA2562d1803ff72c6911ff28b71703fa5cbc49a091e279c8f677f4b3301451b099360
SHA512739355a5aa02e3ac97f716658a913afacd3fe4253ae76aa67860738e3fe6da5f03775f61be6a42c9a06ecf0208bf62c4cc161d38a999994c5e1cb3f82c382ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e692c2abf96172bf473d8b68f7c930
SHA15dc796b931ceaea2d0c614732441963f98e33dfb
SHA256bde7ec847675945fdbd6ef11195200870e0f6fdec2a69a5dee24a7df2a6248b8
SHA512a7587a607c0e3f14dd8bb03afca2491489ca6187cd38b08e785f47e47112194192a28513c2cd6bb79545e51173c8b2f05a98ed3de6d1acd96b8c83e08b894092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50458f09e039cc64eca924258de7579d5
SHA18f9d43081d471062ae471624e4841e9a8b6b2d55
SHA256a5553d997e4c824684d5f55f1f450c52a623b356917eedffda261d7f681623c6
SHA51206ab47aa25bbd6981bd0c308004e397ec6b5b4bbd785bcbfaec959d684704a18af799ff82e510d109239df9347a9a5a93bf6ec506df13bcc57d035ca46220fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e28a99b85e84b65063153d1d957f1ee
SHA1c859de9efb544256536f7a24219891778d2ffd0d
SHA256f340e0f1a157b02c34dc0568c8790adde9ba43176f56d799a9748fc38c7753ad
SHA5126eb73dea13624973b59863dbc61f6f4941aa6ab48f8bf5e4f54a8e914a020d8a7f71b44145a61e88d1a8160d9633b4cc73710c548a1621e3b04d366e429b4df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422955b61bec1c8af289106fac6776fb
SHA1313a70e730044c80212ef41cc749f53702f91848
SHA256a37c33d0db2884ba550462534f3e2bea8ea4f402b7ba0a9510737fa523d9d18a
SHA5121d4910dc10cda693f8a6f7d00cd21c3784100d1ef4ad6e5f99fa87451cab0245fccb8de5427cfe49cab423deddb6233aa8ef5ded22d558bc51fbf8d67a1f2a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b3d307280b5c8709967c9c8c8282de5
SHA19cb1340dab0c7d9d0a444036eebdce127cd0f2fa
SHA256a28b404cadb88af77ee776419195279cf27c11612063ed0d646e888d06a79a63
SHA512c421a5033575a44d911e8def4fb93f2e3bde7eff825e9ee4b541f1a4743bac510ecfc48ad2eeb23966f9aa727c5619f1020def50c42e5186a6d0c5298d015630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520cd6e70d56c4815eba90018383d1399
SHA1e18513f2a21ff7f9aca9dcfabb8525297a931b88
SHA25651c6cbddef94c401900e0a58c018c7eb69aeab3e646c8f1f4c3bd9c1205f6808
SHA5124a93ba9e4c063c884c1858c2e8de0e1658c5ba76acea84e1ab43962868cf1adbc1c9ca14f6a993b90071c335bc29567325fc283606aeaa4a184476a801a6b392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efeb8815d280e55ab4015c89ed08501d
SHA1aa9a8e8104bfeb99c86d7f67696d845e3dc1ddcf
SHA256707808d43dabe0fc86ac5925dab41a2155d9d1302f1d4ae0d7c683d6558c237c
SHA5122457688b3ef101d7efadb1a8d82a39f22223048e0303ecc45f48109bf6f4179f019403f62c6550a8986760ee1225b90aa4203af869d95883705ead412cb713bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55473cc936a83b2e9340b0729358207bc
SHA1f3ccfed3c82b63153537237941fbf5046c65c6ff
SHA256c0687f5d0cbc91d91ce208436e8be147297680cdd61f474ede4eebccc3492be1
SHA512e64a5b3a09d982922d83e99194a31906663c7914e25e7e02b99099a277f6d5c6308210970aa1d96ffb6fd7bd76862cdd9638d30dd830cc29fb64d06a8bfacb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d6412b794f18aadb084b5e87cfc0df
SHA186b67867d99c4a5932069d9eac35333fb7d86037
SHA256b454fcb27c9229a7bc9dcf29b68adfc9185677b39024254681280bd0d31b133c
SHA512cc1bcfa7078067940b7ddedd26775a7152deba4c965400813a8f81ff1311db08efb98641048cc5d434358a6381a0382d49ab5fee5df09b1ec12582dbd868984b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f658235ea5f9e98a3e5e1b7842b836
SHA17c92c2d2f11c31ebf28beeb788867303c0916bfb
SHA256d89664fd3862fe1d5b01bfafa21030fc72ca21c4fcd1f82e696965d76f2e5d7b
SHA512aedd099bf053dc7d653cf86b7cc78122831711d9c05d9b33cae34b775f0ebde7e03219b74afde5f9c19b016e2574a1da9c26026d7a8fadfb70e1d9007285c7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac398afe4b9b746a44f38a76c0d5c683
SHA121ffe0d5acd236add704b3a80cf101034a368ee3
SHA2563c26be77908a14e2ee9bae3306b63b26e4103500a800148d8558250c61819cbf
SHA51234756d26d0208483db2a87442fa22e72ac922c22adb2a2c6b1767e7d8c26416db3c60cc5c55d16c50cf74f9e24d3d05cdc38f5fd01f569768fcc0697c1496e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13d286f967844d577961f309895e9bc
SHA1e775b7e609018747e3ff8024da845a2dfa5dcc34
SHA2569c3250f4713d7a54fa69fc053bf16dde9b6d238e9d986e001a7532a8dea8ebe8
SHA512de35feb63bd5adfdcd4ba7f2213a4dce78b6689bb15d6e618d6dedc725095549bf36734f2df65d0f671fcbdb4e4397a17f35363bf480fb9a95cce912ef04ffb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42b9c83931dbb8d1d6a8b02217086fb
SHA13c420dc3addf2fe9dfab6bf476102ce997051333
SHA2565132fd586bccdfb1b7ebac76e2887da9b15101bafad608e8828284c4114999ad
SHA512965a31c8dc0412e402f434472a33ba46e11d64ddef88864b52aad79cef9d6dc53fbf6387828c6c33db0f43083e69986d7fcaf9c2268699342798a9bd7668e632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a35347ebf0d35e291768104ca0e1345
SHA1dd68b34361a63a5efba1919e86b6c0cd027226e8
SHA2566e76791a474efa9708daae5ce40f04ef700f3b07d5dd8497d3674f8f4d0ceff1
SHA512bc257a7900000d11247a42b968ba7bd0fbeb14a85193c7e3014f04e8e5c2909bee2178d4d5e75c3f63dcb96a01a79765a4f45a02289ed4861d046496176a3aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2caadd2fcfa349217349dcf634ee2ee
SHA1acd3bf3f8c4d30d3958d918496b32cc0e62b569e
SHA256a3b24d85a51e2cc5c9cfde314e9cd47dbc97a0adffff5bba39ebe9aa8e6c086b
SHA5129891d377f3b7670f31c65787efb809eabbf8c0bad8a703fd4fd70cba70b76333bedfed89cbf91214c49a8328865b8124aeeb5c640d713f559f747a382790475b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402d682098548aafc8dc6c675c4f6612
SHA183533a6789f6c1e7878a8d78525786a09ae8cb93
SHA2564e20ba0990365652d586c6a8d0fd38b773ee49de18c7b128048bc3caf998d628
SHA5122f17ed165191eec915f6fac1b95a3dace6b48395a4f664b710223f9df5b0dd55fb9248cb0fbd1530ac9a540b03ae2a747a3ae87183d5081977b21eecac4c32ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adce7e7fb8e6ff2809bc8c3cc6b712cc
SHA1c0882c640919b55ab37882643e196064fcd4facb
SHA256ab7bb98e1d62afda5162bff18da9409f4ca514db23ef21fadc6e5a6e556d3698
SHA51276a652c8698b4376d922c103b8d02569d32068b8eed0909c59686c34bbf04651d1a9c47dbe75757bbf602928cae4af83387d3b06278020d2e922cd0e60596832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e56ed865008869ee060106403330a7b8
SHA1ce41f3c2f4929dc94ece07f1725fd81ce658bfef
SHA256339759ffa29785a261af8c7a2e2886a7f21934fae8a4faee2d2dac61727844ef
SHA512dff19bceecc532a733b2f71d58e97890bbcc7ca9484a36b7aa384220627ff9d49dada58c7fad268ece0c0bec503b46f9e9160d27350836fbbeacc741df4d10b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\amzniframe[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a