Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
4201c59505d41cfe68bbaced0887a1fa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4201c59505d41cfe68bbaced0887a1fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4201c59505d41cfe68bbaced0887a1fa_JaffaCakes118.html
-
Size
68KB
-
MD5
4201c59505d41cfe68bbaced0887a1fa
-
SHA1
5c6dff31a8855f7dc402965c9288e30ff3eb23d6
-
SHA256
9499eabc7ac067be8f258a7e0aeb9e49c26539fe4a50f017e6c429a84fe2c498
-
SHA512
a2edc33c61ae8ccbc84e2642d2465b6ccfd9992425ed53773d421396d5545f4f2d6d8a52fcfe47ae631897a71fc5ef9068ff04f1b4077cf9adf28d1db6a653e4
-
SSDEEP
768:JimvgcMiR3sI2PDDnX0g6U686DSRUdoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J7YqhDSa6TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102ee75214a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421862754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E372931-1207-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000001bb68579461264dc91bc0c8565b7e320abd637bcfec285d5aca3343e660a307c000000000e8000000002000020000000f161a584f458870538809a3076dd893e065cd0333128d357a2a4239a00168043200000007547d2d05d51710589bb7ba5f36326f52bc981c236a9a17edb726f728037349d40000000df8009868562c1d60dcd9377d7b74db7c1e60eac5d8959372a9380a9380bf1c90a5ecdfebf2fee83581cd80d31c8c1fcc1439b29206d3b214fa566de21fae1c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28 PID 1920 wrote to memory of 2056 1920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4201c59505d41cfe68bbaced0887a1fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7986f031ff653f6c55f36101ac8c02e
SHA1b389f8b77e6d1d81b33ed875f73d41872bd085fe
SHA2564dfb6b04b29c9a7cecc9987da70115074c74438ccef4449fec9fd59541c896ce
SHA512c07a9f7b7dba4282880271f45db51c9a3a14cfe5ce5dceb8c1b38b2f0e554c1397f3197e0c77756f4df8e6e23b63fc25adc410579363916271020becf3188ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b856d025072fe88fc5e44a3b93c7e1fe
SHA1365b6e7f21c09037fb9d579fb26d1b9d5157ae8a
SHA256a4a9b903ffea805431c5ee98f6f037f023ae80d7f77136e054c6901afba13f72
SHA512af39c56289b80960d0817f40bb76ee64aecb830f62b899aa0471b4572f09b503deb6eb1db4687af19b6f3e2f22aa9831b10b11b345c57c8fc9b8a584b17455b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e09df1e957188401c561177e29c68ab
SHA16719bdfafa6ce66b13daae6cc31414e7accc44b9
SHA25618f49e9028624e0bbfc8a0ac14c8190f24bcf8ae219f215110afd6d0d20d1bf8
SHA512228f4c3da1a3616554d89410fffecc96f48e95c7d64eae0b528fb0e9889056242982c130ab35c909b625c6378c20ecc38e190b84a1e36aa4e384f789d4f27a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82a5450249ec10c98d6a28af0265eba
SHA19477d9971e80481934a34b24805072b3af1633ca
SHA256b1ac5d818d71c8226e6cb50e4682bcab186528f1fe978ed8c24aeeec8394aae6
SHA5120353c2b8948c216c7ab8bd74f7d45d3bb1138cac2eaacaad8bc97a211195623cf2374ce27877545241acb702e203a16d7c05bb53da39e08f27aabcc8900fa3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014b285c6c622ee46b4e94363b35af98
SHA10fe18f7a4df89a60bfc22985ec32aa08c2220508
SHA2566ac87b2868f006ea430b353c27512ad7e373ed55fa88f3212e7913374e69ab69
SHA512f14aa728fc1726b51902b43a2af1fd3f5f13b2e77184df49cdb6770f2b8f0152251ee1ab7b4f1a202a0599181fb10a41d205c846c1b17d05b34bc5c4ab1bc9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55206d659d208b4ac18f6502b618f0f76
SHA13dcc6afad88d8414cf4cc5d5314d4258d6ad07f1
SHA256a892ad8b016654c0364e79f8a3123de4c2c4237f595feec812d7ad5554f0b042
SHA5121549eb8f48dd86b1fecbb300dd694c575c335886bcf669c7f431ef9138902cdc42c03ea2930d576baf837b13a6eff712395c091d75f1fb58c7f9f8116e65bb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af84499307e2da890b2b1c3d611d4939
SHA1814542849dd184aba374c98ad6aa9d1c29351043
SHA256ce2690f8612f8b7604a3c1015380e97411e5fd248d695de7edbaa25cc88b7761
SHA5123b8d499b326338b0962e5d441e6cd2cbc436cbda6336c251d082270d729732613b84ea13a898bc2acaf13f6dc15ee3810861dc11eececa2286b85e5776c71e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b09ab5a02c993f9e6e6943b4214c5e
SHA161c113eaa46796a482c285d3437391bf2a562ca4
SHA2569d0d89d36e5aac7d0da69cb14239fac27abf06ebf95e1377a35addb8030c631f
SHA51260152309495c9b22280daa726768cad4a9dc4b7cde79d0b478bc871a7633b04a1a2b470da1653e7e78454eaa55eecdc32d01b98d0845a252fc1904de039e352f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a154e86418cdc2fe174d59324f52e2af
SHA19dde45d13b612ed2ca2e135bb6560ebf8bec4075
SHA256dbff2dcf186100cb6291e9744b0801e4c251680892c2a7436f2915a7bb832c4a
SHA5124597c6dbfb07e39b761d2597f4ee1e3a975cd3069ed44827f6610c6217f3afcf02a1501f84c065eb70b98f9e904bd4969411f5becb70ccbe25bb45ba13449f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df081fdf066276331ddf9e219d5e292
SHA105c0b845a40d8250cefc69a71724db1fa92313c3
SHA2565a087d6222421f5e8d201a04261efdc66795e2abae799439439eb43c28a9d9cb
SHA5125f665a78a50c74ab8b21991e6d7e3bbfcb8ea084b0eabf8b424cdae47ac1c3d390617813cf18a9e9cca66884404ffb1822312de24660ff038742017af245ccc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57702c6ef604ddef8611dbb59a893036f
SHA190ebaff603a4dc84fac8516f98b32fcdd6d421cf
SHA25604d549533f8b60db6814ddc9ed58fded1d02f1d43c32cdf133a7c4b188345614
SHA51220ad23f3020ee0e70596e5a67a35ec1cc6af47940a475d988017d0ad10c8329714071fd1b62e0e4811e384eec0cba97a413116e82199e27703472bd81fa7e3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0d8018403449756ecd038953147123
SHA166d2ec3a600b0a2b7c5169116e5b1447e3aad4f3
SHA2565868b27034dbf325c4794d73981aca82cc281e18ba12f559063470cd9d9f47f1
SHA5122bade6cb4d68adfa0c98f340c1faa1a6d3084ac30afb71cddb9acefbba92dd199013b7076fe075e55ad5920a84b9f726f0c4376cd6178e01aa38b95e07c36057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5cb8b5a6b43b15ef97929307a8a8efa
SHA10cb18e44ac71cfaedd73fbec0485cd713afbb1e5
SHA256d16395c56dead0975d6b11ad38af7ced5b084c134d68a76f5135a1dd9920f7f7
SHA512be48a74220b3e6b754a144308b36286e5d4d686c6f90f2c0e3b3dc392ca74fa262b60cee637a0696934baf543e699596698967642e677248a10803f65c81b608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e54be21f4071011ee6f4f724e55943c
SHA1d33438e3876e030ad9b277db69180e8bee695361
SHA25652b1e432700ca1ecd8660112fe3e7fdf3a9ecec3e469445437c7b877292faa9f
SHA51215951a073e9cd2b91a10adbd189a9799dc4d123744c54de51eb78ab32e27d3310dd6e7340bed279439fb031643e4793a0693635bb0ee12d3d8895c048f64b343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebcede89e3a96710cd749c509c3d2e8
SHA1d23cc9228002baa1b0d06b340d4d90eade2ebfc2
SHA2566cb9754ce05a6763775aab2893b0a0df9885adbb76f5ad301be842ef68d63d65
SHA51265b07f93d212f30dbecbd26464fcda4a4fb3c82439d3cf7b8587ac02483086f163134c2a184ea2779887eb81c5448342cbbd1655e59baba085bb2e0d59e4abce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f8c5f32dc05da97b8125b3a6d9eca37
SHA1e504db6f632beec834629aef10ddd969a7d323bb
SHA25653831be2aec7a202630f4aa7c5fc37f6c7eaf7760ffa07f1c6a35f5efb729c9c
SHA512228bea411b35ca31af458d823ee77baf64bc3e4ac9727ce60c24ef6322f9377311a84bb09f12b4f3735036ed4eaacf2b55d02107e4f7302d2402381bc4cb1957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2d79e47fa127bf61bc294ddacfdc98
SHA18eb5fe70a5ab32334dc42cd1abd0f335446a8ce8
SHA25638d575f0b4f636d4c5904a309f1e71bd833dadfeb76e56416bf7a6e8ee1d1d92
SHA51218439654541eddf7d06c71a670029a15782cb54ba16f5e08125bfa14ad6807516a0652fba302237c36fb814ea318a1029a9c3a5b45f167328cfe3fa66934747f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81c528e1278d04c5d7db5ab70afe7ac
SHA1675cb0770b64a3d46e21faabb92cf2b112cb479f
SHA256124530389e04a71819c0a4aa8fc506bb9abc6d4f661c92a9ad076f2992ab4422
SHA51235122e41725e03c3a12c73b33e83d511a4cbf1120b6a90531aafbcf7e64c7fe617b8aa1cdf777f81134a0820c4e130504510ed69ec72fcff4fe2ae3d4d0592d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677196da17789df0a68d8e99011f0eec
SHA132b1161d5dcabe2eb8914f4ba2553855858b6206
SHA256f3c5aed18d5607f9a5c3b2b0dea605e71b3742a68d9b5deac42848958c19204f
SHA512af1578bc25e512db4d71bdc6ea73a567f4df04057f4596442c352a640d1159b24514f081d268f81ee0a45a5bc9e20f29bc9f79c5f6dafa52cd307edd93f18f70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a