Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
40b460c827f3acdb4aa4ddaab510fe82_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40b460c827f3acdb4aa4ddaab510fe82_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40b460c827f3acdb4aa4ddaab510fe82_JaffaCakes118.html
-
Size
36KB
-
MD5
40b460c827f3acdb4aa4ddaab510fe82
-
SHA1
d9e07f222aaebac15c41a72778296976a2bf25df
-
SHA256
3177d54f54679e4615cce9e0eedc98ca5cd0eef3c1289eedc50565cead5402da
-
SHA512
a40e4907333f86743efc1d2d91e4b2282d9d86da507d65be8c058fa366cc972c50c4e8a8afda759a82adebf5bdcee2f3397c567a9aa3627526e0a17865aad602
-
SSDEEP
768:M4FQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34ali6781DdRA4vEOjq6h8aRlR9:vFQW81D4RA+vEOjz6raA7IagC81DdRAW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF826671-11C4-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ce4feed07550b199554de0e5d91ca03b04afe955022c5eca76723ca834866abc000000000e800000000200002000000025463a8c8d8195271ec0e86d78cfcf6529958f9ef6940c5fbfbc778ed9bfc83120000000f9dfb24202bcbd2ed0debdb83639745720e6395f2a4bebad4e14b4d9d2c5e0c840000000732787621200614c2f0dcc9e596299e322b478b83552e46182ea6e4c66a999eb3c6e024fc6c1ff625529883c3588298dba4df62b02e9cfe03be13e30c8589906 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f62fb8d1a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421834140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1200 2976 iexplore.exe 28 PID 2976 wrote to memory of 1200 2976 iexplore.exe 28 PID 2976 wrote to memory of 1200 2976 iexplore.exe 28 PID 2976 wrote to memory of 1200 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40b460c827f3acdb4aa4ddaab510fe82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c69e25358efb5b50c17a618f01b97f2
SHA113f51ecdf37d40c9190696225462b0b2ce4e9c1b
SHA256d127461e1e4d5f08189e0993a6272e904acebf0147c8fcd6f2fd3e3270690e9c
SHA512820d7b990b9ba9dcffd6db607ad2e857a951aca683d857b7b9c5acd07da801d24e619206540c6113c13084a7ba18141114a0e1eafde9258f21d6c37cf5fb4bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b84dbfe97e0ad657b36f253eab9c241
SHA1d3b48a6cd0fbd227ee887c41b58530f8391be12d
SHA256af5eefdf2a9df0a3945e6e3accd508a4b63f2478d117bb7e2800399f4ba817fb
SHA512c52fb0afe1d3e61ee4f023e54864cbd2703901cfe39e099dbc416234603b87fe05545dcf884679b21ffaea223319d29edc1c0193e2959598e8dd93fe9dcd960e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5767baa839741dfccc01fa5a21aa73c
SHA1f6084dc0e63875e1b106fd0d76508632e7159373
SHA2563ad4dd3404d29cb30ba1781d623baceec4907c4e67a519ea2da642670abf7e90
SHA512ce89337413c917966c4093a0c8e6af24030559453324a9427b51876f14dbb927f4a7ed8e237991d0523c4bd7de40ac933c75fc3dad57663c9b0e1cabe76f7180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e7917bf78d28371549299af7187f511
SHA1843e34bb7d800ae496a4f3b2dd522d339a44760a
SHA2568ea4385d335b07c38d07e1082ea1851884626d0921460a48bf98563b43634ac8
SHA512de84dfce23d456b4e552406d8d268fe5f4b6fd2a149e01712bf501531076405bfbeaa4933e5e292d4d9f9863d77526b5146a763845c63e89341a5daf0ea32f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50538c8ec0b0c2ecbb0dfaa4fa60e83c7
SHA1d90c42d1925991d62e3efd6ab6a813e452f23cf1
SHA256c6865a254a3ad559355bf2c1e0190c780a546cc0c3273dba4c6dd4bdd5d8abd9
SHA5127c4a198c4368b92ab2f328dbf480273dbb48850c067c40538312241d9757b9973e82c948f39196c0fcdfe88f29cfe57c0aaaa2c196a95e1c05bbdae046779fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7885e28975644e17f77ac24e92042cd
SHA114a7c369cc81a70e5dee3eb779307f47545bbe99
SHA2563e313b522d70ab347f2ad876fd20b63aa847a977c8e147fbbdead55ad002fa51
SHA5128b67c45bc90760097ddf48753c15dd13c3e891de3f0d46d1dc312bcdd7534dfc2ef76e7d96b89a08c755dafc3ac0fc5a91340e0b8611447c5b498ff1af5d82ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54065fae4c2ba4bb890b72a13be7329
SHA16d733382f9396d4b5828ffb1e7315a10ab697fa2
SHA25642b07236b58a196d98720b7d1ca7fd5308b328ed2e6af19ea30d077363ab0b3e
SHA5125764f2372eae2028150aa3a0c7c3c9bcf3a19bba37d98e4eff608e5008329e5b71a3767d2fd3728aadc27ce078276b040bec2385d8dbcb94ada8695d30f2f466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54470ffce21911d2c824c3f4e6f7c4b46
SHA181a573e0d639d8480ec9cdd6ccb1b71693fef309
SHA2567f9978f5bb2d27d2c4bd433b0c6203eb5660c7203941383e7ef50515cd94d899
SHA5122cf2ef263c51c29b4e8fcb10871950f51b960d08d964f223a1ead90b92c1aba27404ecd0564d3e89bb5ec7d576d6fefde98715a361c9f307f2ded590158a5fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f55fb3fe4f722c1ef434f0e1bc23c088
SHA13472a204c45cb04d7e5618f8ca108bd1dd8891ee
SHA256d72f1067d415ff4f92eb308825e74ddc47d4822c1f545683caff10abe18037f8
SHA5122a8d71e9c636a6d743d83a031bb836067e1e7371c04b149cc5d2eb750f55d24ba1d76ad6dc1549cb6f1f076d4ed216a6d3353252679a907e547755bf10aeb704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbd5e53c20b56d3b826890578b0e6978
SHA10b418f26cfcb664049a7ed61894ea849c6bd1e76
SHA2569adcf03056ea97853b7aec1f937f79e915fc9214f69eabc47c57f3bdc67369e0
SHA5123bf4c8d2a93cd6312f96463ee3c3fc0687444a9f97f2f6e72d8369d7ad94cc4ec44b79069a2f94985a61a891e85e3365cdaaded5b6f552322fe47d989d16f0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57260a8d01abb5bb63b947a206617dc83
SHA1dd096fe3e1b45eb4253db586f5ee56308fac1c05
SHA2569bfd57fb66076dc59de58066127f0bb09446cc950dbf6a468a51c28046466375
SHA512053aaed8d6e4bc3e8e4b5b5fdb7c629649873e6c4c6ef3a783aee2e14cc76da5f42396f277e289a6b71a798e41d342c9fe0bff84b0588228154b514ca11dbcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f8b612cf74d19f6b34df449544d7f0
SHA1643dbccaae30d66060ce3369e6933d32e83df251
SHA256b63297a05c20df760d36fa86bc37553afa1a11fc98629c9a7e865521312e30b8
SHA51284a2f8e7d412f38f450c08fcd5b5d404541e27dd5dac83b00e8860066f073670e94a916d61318f7be46587506e06fe495dc7f2416c5cd87e3b18bc38da0a46a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f6e8523566ae1870f77f553cdae4a0
SHA156121b80330552627fdfa27f4fc9ecb57872331b
SHA2561c43c89f5129728a45bd51ede030248945c960be606fb1b65a0d3f78a9b6518f
SHA512c045c6409d875809d35d8aea707d4ecf6d4ee96dc6b7a7231e29751964c24001e1c47320b92d65092d1c48f0eb5aa9337dfa9c0416ecda520351bbd3a49df8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590edeb7fba72a61f47a7f398ff36c1bf
SHA16b13ad7f05c862eeadf76e015e0abec747bfd911
SHA256265aa88ef9e6b3313b0218b4721ffacda99e3c11329825ae49a70626acb8d273
SHA5126a94f18c880173a6d8899887f9c73eb2eb79cbfedc759781243b6ee29819d9fea844dddbfa30f2f4cefbb66c24dcf7a871b5db90aad5fc70f82e3c59c9d094b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b0c3edd0dd178cceb8970430ea1204
SHA1dec79eeb6ae116b246acd8c6994a68244f28517a
SHA25635b851e4256dae409f88b12a03fd918effc0a77d5eb15ac27d1a8d8e3b5dec45
SHA512211a9f3c1022758eb01d8984e514869ca6a1e0f8ae17ff521c47b2db6f4694e4cd8ab2232eb994bd73b5ce84a8f66a19c6cc154b25eff0a6b73bc6c74b694c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591248320defcfc8f34e5550f293c768c
SHA1fe6478716a14b59b937d21fcf92123ff0629a4d9
SHA256074e258c5d197505db812d0696df8b67a67aa64dce38696eceed46aa720d359f
SHA5120b1bd984462b9e745c166786d8ac76f7b4bdabb4c13cba3ddf24757bb013f44f84c4d29d347993d50a1e1b07201c987547df84addb50118d78f74ec248355653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f880cf8caca5bb8e57f70305c0285962
SHA1e230a61931e0b28b4a8c7d946a2088526b5b196c
SHA256087631e2edbe8b5f5fc3bcb90ff7ba3642d6618f659cda9cba2a8d78cc54c37b
SHA5120b2925ee78edbae03185e8328645aaaf220f3188b15e519c7217e066af3650aebc185a985b8d5aa0f51abe9b72ea896fa3a83b1190755d67ec274f69d93af674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4651b71210ab32fdc9015fe2a6d58a0
SHA1df16e65a0dd4456850e5ef142155ddf1b63607ac
SHA2568ead74cb29abb6b5d550867083e39151483f8f85861181ba4bf32bd0b046a562
SHA51249cb38c40fbe8fb5cad862ed3788947c33ef669349e99e9e215763f990c7d0cc2093b36a97c57abb7b74dee1ed835431f190209d1e16b885f16f6af16e900e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb3f4e438dc8be15d6862db0aa03c3e2
SHA1f36a15ec5e0498ff7efb382c0baf94b12582c999
SHA256752f9796688fed8e74b8c2bff76bae6b3e093d44554e276e171cf122e2a5031a
SHA51295d884acf41b58324bc4e9ea8ceb6051eda6c8d9e7256b6de69da53de8b4fd85c9cf8fb4045cd28527d8ebafd550f0bcf1a22d408b0347aefbbd987ab7b83189
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a