Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
42b055e32abb03164748b9c5a7a752cd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
42b055e32abb03164748b9c5a7a752cd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42b055e32abb03164748b9c5a7a752cd_JaffaCakes118.html
-
Size
874B
-
MD5
42b055e32abb03164748b9c5a7a752cd
-
SHA1
fe5b6d89b035d876def8f31fe2e82cbeb1277aba
-
SHA256
f1f6896c0f3e46d8179c679d7b32f21a5dc9aabc5d0b3d60a4e38a20a7c3a443
-
SHA512
323b3c1d23a68cbd2ca5f018f94529de7ba7820f109c70decb598247df060923f0e69a30a3c8b6cc194ead7865843a12f29cb8e05aeb5910efd073110781070c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84CC78C1-1227-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a1645120b645fd957cba1d15cdd4620955b8de0403b57c2c521c1caa797b592c000000000e8000000002000020000000a55ac3ad1f7a03194e4e8d7dd6432d009a3892075675b0f9dc0171af1198746f20000000cdc38f95c57313654705e4ce894be9df1daa4323b7a0395f053bd221c77ca79940000000cc2d416a301b21082e66fb4ac60be31f55c8ac7593d39b2830971797b3d88dfa892b3cb070896659bae4232c3407880a9e784afc0b6cbeaac4a708b435db237c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802a514834a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421876509" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42b055e32abb03164748b9c5a7a752cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b14da85c5d7b9af64cd00e304fa9a47
SHA1c51bfbb5749d012ac2567005eda4cd0d01d89cea
SHA256937fc5604c7a769222da8be56e3cf720bbbd0b4ba65c598d94b2ec6a13ec4003
SHA5120447300d14102b14797d3b02cc6abcca7e7795f13151d5e5646164341ba290d69f2861e349e32a04cfcc1e77d97a5af7afbec92e0ee6df09bd16b799c2a939c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86bd7bf42bb40d4d71dc9ee63e00e5f
SHA129573218218763a4c86459411e83f9795cfdf4b8
SHA2567c4e5c00c191d81a9a0ba777bc3b59117dc05a792f14889ba3b177c5680f29a5
SHA512ecefc6124cdb0615e7228be576c8137e51b5e20539fb1be0f4b2ce40a7a4090143f178a6c52cee8f5adc031bd800b0516da7e491cac8e04c63dc1c882c47af0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589fc50b453d64d09f52c5b7be862dfce
SHA18b025ad5e5dbca56300e7ba33a1863c4985c11c8
SHA256fcb270c35350092575bfc11527f65c00f6bb7882b69535ec450a5baec0723539
SHA512e582fcffc4ab1cc7afa674e9b06618d9d185d518084a95f7520b5d8333bc2c25f8c33efa0f6c4ab9a7351e5374e5efe318d97b1ad8045fdc867f47c438b339a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538b28e705456652d1a1a649e50952212
SHA182ff0914c8a9b8215e5ceb1205082f8610e40aef
SHA256535040b4326c531b881702045a622b448657be5318f451ce998d54e22789e064
SHA512b9476bae04ee9a303a75afb89b91953e61ed3ec7e7243828a951f7a3c968b8a92cf56fa1ade3156188b7430cdde3031007336808dd09ac5b8ccc71268299c685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b62af48ad1b2008b002e8e1c0321cfd
SHA1a45f32194cb5e564c7822af7b569238ce0222dd0
SHA256776d886ae6f056bd46de7bb1708438966a3279c27d2667dbd37257fe30bcb4ef
SHA5121853d8bf9d9d63da34bee3a1917628c2dbe616eee511962186c47c3dfaef4180b2469dc91f32991c8b3453827fd2693fd31303d9eca7550bbb2b5f7ff7803471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3a17c37875ebbe83bc063d3198a6d5
SHA1270ff0ba5751276617138cd12fedd9bc587a04ca
SHA256288e7ce00e697e6da2d63b7c384f1672498d678a036f80ce3699c0265fd268ac
SHA51230e4c3630f92ab8c50264c0bf7f119d44bd56a714d99b25ba68cfea6eaa7d5d6a0aed11a0d3762030ecaa8eb8b683a1036f763f65273019c598b0b4e14b7d75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b81d2d2556dc6c135315660eb9c4be3
SHA1e9e7863beb07457e7c989159da143c2932903906
SHA2566c2b7902f8bb284c3ed65d518b6e55615826dd828aea4b860db9792c6d9ae292
SHA512d8be75946cc80e5fdc245e1d2b8cdf6fb908b78e64147923deec26eb8f8db00637c5420fdd6b37e97afdfff3d82130e172db563883f8cc5e89af7cf1dd334b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5048b0f6e6de197480b62c74c4c0b05bf
SHA1b1dae880369a2455fddd9970743bebead09077dc
SHA256abb11e5b89c392710de8b5590241d290591df51e5f9ef6cc75875b4bebbebfca
SHA512d6454d3b5824dce4e3ca1071aeba98cbb1cca54796f78e59ce4baec34a92e9158f4c6a6602947dce525ea0ddd3a92631f2a6c602e90029d28468f792366054e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e46d9ee2ee137e1faeefc0175585c0d
SHA1669faad53f253ea19c3ce67c39afbb9bb10e2060
SHA2563d0c0d2ed9f48190f0f09b4466f6700108639e367dd3d513bb8a5812949d5165
SHA512c3e0e1faa8ccc6eee08e0efe461d8ad041d8bf6854d9ad418ef1113d2eb624588819a796e97eea225e7478bcde6ff20eb9e21f97ed9c4320fa178d2a05d4fb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570d16e8551ed4325cdaedea3c7b687aa
SHA10d36b84a9d0ec9dfd5ea3bfcd05308503c1c27fd
SHA25622df92868dc51f661144d9acebdd15e96291f3d5619be514bad3942be4c48a36
SHA512fa45d69e85e59705aa13210907a584c42bab1e1993de8bc8aa2ab646254b3d6e89aac7ee92b87ac8e06ea3b9dc5f1f90d16762ab8e62f8678e3b89cae43545aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc08725a5485f1c5c323f50bcfc4c8c6
SHA16621041554345542a817bb4d58408687c2563806
SHA256545548bc595289558710994b504be79f630388e896abda1ad3c1eb0cfabb96c8
SHA51247de20945d921f3901050a18383329b06abca356055752d6d6a32cd8952103806a045b78bc15ec77ac42c8d2ce931ea68adab1e8ea58538da568d3c0603b8c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282205ed4e6103a2ec2a3d5d967bf466
SHA139f5219eb26808f5fb66a7687fabcd0c03a885ab
SHA25690a5391788dc2ae2c0772e46e388285b6a4cd695dc5990e6cdecfa11a543c1bf
SHA51227a4a94b9c4bf75cc05a0017079dd3cf25655321d3578116482889ca62096406bf3beb22ca844002ed01833d7f420f181940495683d4f34c3fb2da38722be82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd3dac821a4618daa628d7e0480935a
SHA17f9ef8dfce418b769f6de5dddadf0057ec63c320
SHA256e4e30198be89c072aaad59268c28e29eae46d5c68ebcdf2967ce57bd2acadad7
SHA512927cb8c2e5768811e73d21fe11b16fbac53d5f9ae242e32b1a443b06a8f25bcbd5b6a0aa4bae7e56103424284a787380291d5ad55c0da34c6e91b1dc1bf80644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6ac28b5a030ef74948a73946202606
SHA1f007eeb3ba3dfedf6f2d04db4377a46dbaa9183f
SHA256639d298bd6f43df40348dc1c503626cc50141c0d62d3c007d6417d98ff475da1
SHA512a16282d2a88c4d6831a1545801fd87c535fc73c817a3ef01f845ca50c5efe9f8889d97ca8b815f6380b4c55135044241c6f39d337a11e47878f0ae24d8255c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da83809c97b736b119a97682ebf4ee6
SHA1b22eb31c6ff5ddfc3e385cef78189feeb8ac4012
SHA2561613bf2f78caabb6ab56e05e2f32b8ae57dd1d98b89ceb811a9bab5ff7a60981
SHA512c39241fe3ba7a99f7770c90af7366920ce23d24b68982b3db79d49872b692299c050c78d738560ec1b596993737911eb81553f2868be811b35d64f0474c46117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156e685cfb456806b02fa40fa1b8fac2
SHA12486aed6dfcf6f57a489ee9045a7f9ef15a3c4a4
SHA2567e142b64eb3ed00345ae1b0ae1ceb2df83a5d8b95626e06cbcad8b3b1a8f9cad
SHA51252c135962a027f5119b7046317f0da211d722c70bfd936ad51a12688b4f557753710fbd105a1585b163692bbef2fa653ecc0d5b15f1a211ad691632f5397aa58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d734038447a5098b58856c80d73b806b
SHA1be43f062fda9b92a77c28f4d664820ad28ef687f
SHA256efe6b0adce7f31b12a041582b920e633cd54a7cadd906f192848abe01abc668b
SHA512b35688f860ece515ae8eec5da4be7a22c8d81478d88df33c561cbbcd39751c62b64390d31ba8f9d781c3edaef37427b6635e4bea429f137835a69a50fe63c622
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a