Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
42dd03f899ea2b1b1fab9ed7a30ace9d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
42dd03f899ea2b1b1fab9ed7a30ace9d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
42dd03f899ea2b1b1fab9ed7a30ace9d_JaffaCakes118.html
-
Size
72KB
-
MD5
42dd03f899ea2b1b1fab9ed7a30ace9d
-
SHA1
9f989564195df2fde68bcd29f09d5038d4cc5078
-
SHA256
7821312aa4cea3598c82d4eed0a98e1ceb343b646e33814494488b5cc821dae3
-
SHA512
2a6a2dcbc43374796799d1ece579d2695601fa56d9b908e4136823fd5309038d3aaa1de14820a8c6363ea23b301badbe31baff59bbbd285c69238880172606fd
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sT692X9oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J3yTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c6448c5e4773770dda00420c9bd4b87757f27674e4b1fd9e79e8b1850f8bba38000000000e800000000200002000000027bc0fe32582fef86b3dd5fc7b30bd1e2439bad035784ee621c3e23fab0c64a320000000055f7c60c530962b4cbd77e2a9e44366cfb0cc28153cecbc49fd9e6c7ebb404c40000000575d4065691ad88699655497c36d5011858d3d5d1ab4830fec000a2b93d4a3e92edf79f3cb2b3c7b2396f0d47f2d6a8137775a63f20d07729346c8881c974e92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA976B21-122D-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404e3d9f3aa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421879202" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2580 2092 iexplore.exe 28 PID 2092 wrote to memory of 2580 2092 iexplore.exe 28 PID 2092 wrote to memory of 2580 2092 iexplore.exe 28 PID 2092 wrote to memory of 2580 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42dd03f899ea2b1b1fab9ed7a30ace9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b7b7e6c8101797fd5df4f9543137a7
SHA1210d3c71b3f9ba1f68c9d8355bf8423a1020bf02
SHA256a5ebe907da2515ae535478fe11b700998ac4578089dcf62ad4c53d69c956be62
SHA512ba86d91de1b0a5cd597262531224934057b145f3505caa0a75f6b25d5afb02b6975979267c0d2fdad998c7db5e6357baf42e4c1aa342e25dbcedcad6f654fed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a272f92f22da92c99505d6abe88e81
SHA1af486bbe89dbf2c4b955a7db2587904354e343d2
SHA2563463dd5c7ec3764bc93c8edeb5ada31b92eecd791348bb7e3f99b1b32b0d4cb1
SHA51259a1d9e56fb955ffa6ec9086987d52986ab1d445e36f2685c7016c9bfefc60183f372a1a15ebebd5e465e13e7ae801acc77c7e0660694a23f65c649e3355cfd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15f1c180d32dc6dab3486eb8f39cb89
SHA139c3f67d1f09cea9cf3d4d88e652b34402e955eb
SHA2565da668a55a2775c338693fe605bf1aad2509977385152278bdeceb0284ba1590
SHA5123849eb4ad9f86ec72be24c4be865966bcd3109837678f977ee013e62e2698789805826190960c567ea435e850958d16753c548dae772cbfc2db0e5871e36e46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e49208cf7cf52f6b77aba7c925723840
SHA195de1d2002792eb237eeffc643e149bdeaaf350c
SHA256e9806d6bbed17dcbe2324eb2a4b4a609cf21e7f0986e2edab3289365834904cb
SHA512a79884b0642cc386dc4315a34f13c331955ee150db2933717cb2b7c83f7ffc17690296fd24f0fb884f5385372422d9f97f7d446b1ef76a20caa1305e539693d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3ecec2a0ada15d70d6564ceb1756e0
SHA116fbe5528133abd1a2c426518cb189a0fbf75024
SHA2563f03e6aa23f5e4c2076c046ef3e9ee5522a56ec20dc4fcaa2180b044cc51ae1e
SHA51268464797ad86d4e7b3f152938731e52ca212bc715e25eb3d714929651ed3e7b10edf9c37e70ec0fe0f38338381c92163754f68c4d3c26187f076f5ea41eceb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf328073e266c90f2b1c6000ec1ec72
SHA1335416263c28ae54819837573513475f9a811bc8
SHA256ada4b1fa89b595a85eea06eed29d6365e26be5997e9b73020ffdb6855241e583
SHA512bd5edbfcdddf84281c55eae649912c2d764ba1ab7f07416528c9b88d4ba3eb8ea07b381947761946cf67dd8808c1418e03afc51d5a9268c6c6ee7250460bc355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e518c89e783b675df7f3be68bd3e37a0
SHA1464ce3fed856f2ea1bcbf79a84b440f9f60e0670
SHA256ea727c637faf77d0f301919a4c8bb3408ebd8637283d4d431da4a3200412c79c
SHA5121a0904d5899d6c503663d11dcb8890895c62675660e445ab3e616be050aa94e27fe4205b66e1efd7eb1601fdf2240fb5ba841964f5de58c4300e186f2e40c74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a0f7d903fbdc92f921676cb7f0434b7
SHA1124d23bbe72500578f5c8832946651b022bfea4f
SHA256047d5dabac1825668709407b0af7acd4d2e0c1c9024a466c00d0fb1b78eb0d56
SHA512642137cb56eee810c3c71680d0fad5d9ed70c509c0ecd626838645ffbb6b63fae7cbabe3e8ef1ed3a0c37aaaec382523b74be9654b74be0cb815975d0f894ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8456448f3431ea0575ea413013c0ee0
SHA14e3fb5df989de3577ccbacb2e52a3b3dd19f86fb
SHA2567f442bb409a8dfbd67f6bfe22855ebe5be3b5e51d6e8d2f5969009d4a7acaf53
SHA512ed5ab4d00af298ab2eb577ec3481f1437d3c6b448702fba633850cdb39f4a4adb448f33ca7e4115b7f5dbdbfd288efe2624b914908f51132ac89dd3dc9e17788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9de96c70883762ba63bfbee35c430bb
SHA11edfdb7134cc52a2dcf6735f1a36ab9c716d6c98
SHA2560f0469a270b5a5f61f767d525270592d702ca56fa84d200bd6835803869f792a
SHA5127dbd35eca9ce6d310b226adc34f8bdadf77a84a1d675e260bc297c29f896ff1fbeab7df9e6e20f72a4cab536295bfb3ad206f981e45874858896a499228af567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b799e378ecc68e9976384e2ce0ee3b8d
SHA1ecc858648510d2bdbc032309f9a17e8a1f8c5136
SHA25628362eae80f1a485ac228210896b6218b97db17f08c0f1fb540e7e3725be08fe
SHA512480b5f33497fe69f274f339bf6a5a15ce9fa14b2d055ac3ae67243d429ef42bf382b0e7c406d6eedd2620ac0e3235b8ff11bb779f5b68739ebd56c8122e248c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557fba5ea783b3a4bc593273a2a67e053
SHA123cb9502ff18b813c2218ebc8d409c51a821491c
SHA256169e2d4eba850cc7a296ff900ae66848fb3e52118b53fba2d9c89a6ca899a6d0
SHA512743a9c70a15bc697075bbea84a21dcf8803569d3d06d97e6449a90cf83f00da41addbb545f5acec08de2dfdd0a895a3e32384e8db6141bc1420ae69754bdb229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c932c07bcfa0bd2e3b712af3ae5dbf20
SHA16aa3e6257d9d418f4ee0128205dd8491f1041c31
SHA2569ff4c0cf60fd755b7d4f383914beaf4441ee56189c55acb5c021342f345190ba
SHA5121220b035bbe8ed640b962036eb7358ccbafd966174addc61a981e7c1cebe60d5501c14c91fe40e14cdcfcab1b29144a1a2b84ed884b96714e224e07cbf552f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576be3715d3addb3f223d6b53d7f8f9ad
SHA19d1625c71b0b9f6a7dcdf96db1fda9a30db78a65
SHA2562195e7a9675a990d55de54798ec79e8319e2164ffcbe020707c959ec3b238c33
SHA5122a6615a0ddd90e40e747886f27f6a9974319c4b0d5fb2e60b32b51ee7c5e8a68b080bc7bfe3ac1e084e9ee89201173ae961ac72b551d9d7d1da6017aaba69d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0a6628aab60690f0a9f405428b69f0
SHA1fcb84ba06c6b0ec9a7c2ecea3618a498faf3065f
SHA256e786d093c39a8c97d0c0b99a1d8e85da45046f53889fd1edab0469ebc157efd9
SHA512c5b84ab231a3194ad359977107f70b2158788d866809a7c46206330f7c6278dd9bbdfb63f7852b44a9c6e9af87bc614e92c79d0642763213232bda27fa1e5ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587c3cf5de3ace6c3dcaf827bfd6866f9
SHA131e8956c2e7125a8d2ff5da94e45584b4e5a49cd
SHA2564d4ce3b683b9141fe40445135c49ba6834af1ae23020fa3630ab63ae49b467dd
SHA512695302cc3ba5126aa5e7cc80a7466c0ffefb15a401c672c6df383011e994de3e81466939427bccfb2bebee55e0f1032818fdc04f2d17f77f6d7b03888d1f75ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5af37e62cfd88fac6e03ce31295ef2b
SHA1eae39109fac91f66b1e5549395cb9c070fd315da
SHA2563a265b571703f35694aa9dded0cfd6c1321b6da289b2e514eb8d2b504bebcaed
SHA51282ee8626ca36abc5e0d14119af51f0629089db62ac0d1aca678b87f0ee34e79c7f074dc1dc29783b23ba505ae45439b13b154b24cff4228146be3152aed60c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aae9278990f2f75f8dc496551cd6d7e
SHA1b306fda5f86a4a7efa4c7be70959b70179bd3e39
SHA256d6c3c338a596f206671c1325b87bda79881dc9f0da1b8382b8cbba3b423d5f1e
SHA5128687dabd0f6d692183f11ab36a68a8f0b11a24c25239582a83d84b208abc029c00e5e79feda9e900f104c175b9be217a82b67a003032fe7192bbfd224070a23f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a