Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
431c63c6943262b77fa5419382ab6d56_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
431c63c6943262b77fa5419382ab6d56_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
431c63c6943262b77fa5419382ab6d56_JaffaCakes118.html
-
Size
36KB
-
MD5
431c63c6943262b77fa5419382ab6d56
-
SHA1
f8bc028cb2659be0cfa05cdd52edefa903467429
-
SHA256
4eb50e540d7e816cd9ed2731ef3b8c19624dd6761c629295afebf95934af5105
-
SHA512
b53b49decab7ed98813a0866e087af6e0e0cfd8b0dd255abea3bdd4250c92b005d23c0f454e27cd99e9a182aef98aa47b9fabd1fb98a99ddf01c28bc9c432a3c
-
SSDEEP
768:SXxeruy5isettU5dhBHBPytxhv9tf9aOV+0sEL89ywf9ehA+08zmrhxHv9eo/0E4:SXcruy5iseLU5dhBHBPmxhv9tf9aOAvk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67039CF1-1237-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421883331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000f54ee699cf3b8ac10c7660549a62e4934f6e8d2ae78ec6cf70b5e597f15a7850000000000e80000000020000200000006c8d03dfb6a67205dc82a1318a52358c08c57b7a70a6dafa7e1bb759f0ebc98920000000307a483462b38aecfe7daaf89cabec895892c66d314d0cb893e7b42587ecc4c8400000008674ba4d4248ef924c94dff34b7019efb9d7599d46b2f6e578c7d9f48680ad05f1eb0c265180336964f8e5213674b40a1e41435b71baa0cf68e7c22a8a705479 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608be96d44a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2884 1656 iexplore.exe 28 PID 1656 wrote to memory of 2884 1656 iexplore.exe 28 PID 1656 wrote to memory of 2884 1656 iexplore.exe 28 PID 1656 wrote to memory of 2884 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\431c63c6943262b77fa5419382ab6d56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503534a59b010a27378a2321f0b16b735
SHA10eb5cae257d125baf26caab5c2197eb7a81ba5aa
SHA256ab70255cb6bbb8e1633cbcbe3949ffa75e20bccd0f74e4242ba6115949d1378c
SHA512a15edaccb3569896d29cddabd45032e47b842a7ac20f23c461ca64e2a9cbc90d000ab119c5766c04ab71460e8709d13457519246e1c22a4d73808024c9e81b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ef0d614ff1cdd520871dae9f3a564d
SHA1eef950186946536838d397dc4d22862c51844f55
SHA2563825014d0bdbab8da85b74b54ebde5a04cb0205a9553d5166a3310d3956abdf0
SHA51280ad024c17a7b49c7efa793875b6193160eac6611a2d33eacde4a15b7402482114e344b4fd980da9b9d938b175455e214a7155e7f59097c9727fb71f8ce1f93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33ad31ce477612627156d772fb9350b
SHA15c608135162891208475d73543a82a45b50845ea
SHA256b7fb0753f4020aa22460f7c084a966a5e1a981ff5302479f76aecae39800d391
SHA5127b697b8cc178eb11cc49632e7bf565ca0d37dfe7174ae8bd4d109894fa7365b3109e758eb562af56eebeb26017b4cdb992b5cd3be1b17ce6c55f93ea3ea31fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5239d7c431372554c698d24e8df3a2e65
SHA11d1305d23220a49f47da9fba36862ab555809a45
SHA256a3a30b33285d1f28c4443a98d9d3e7dc92686006d17678eca55768de6d1b4b97
SHA512bc4fde0ba165f7e37837c72152c07f4f5d080a8d70022bbd364de8d770894812954a2311df4ce5bdfe61824eb014f725cfb22653d677c06cb700e7155c928f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921e1cdf57f8a4f09d54986825cc65c2
SHA1d8b2bd9bbf57281a5a00298b4552af248787dd13
SHA25617e2614cc814d63bd2630fa9df52a7287096658a716517c0993e72ab0227abce
SHA5124db8635e2270e55abec117d40c8741b2090329a18c25c1f231283b56af35803e84c2cc18599ee03ab4e32a05689194a936d7e4e24e792801f34458fe65042830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d69ada31c25c723bfd4d642d9c0a7e
SHA1fe19a958782ea0796b3db343c736a250991935e4
SHA256659e1cef898268538055661bf3b99ba15b440da8320d13decf48c2e044d43b46
SHA5121b3f2c453a49106904c56a147abbb91fe78ccfa4cd3f7240d61f9aa21537220a78794ec1076b63e1da8325356e52d598c6d10936111603baf85bdfb7f49e9adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc865465b2c9d821260d68f9665d1c17
SHA189d4501f0825d8e72a40c8b5e01f193e30112a2d
SHA2567564ef1fe89a1c01ec289feaa66278b7ae20dbde4fca2e8ab2706a488b91ee18
SHA51240e23e3e10e87553f42e78c08d9005fa5d2d0fadab5cd65e9f2a908373100c2f22501d5dd11bf56cc948e9883d781d9e1ab48ebecfdc9b33c5b1323db4569bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7cb7ad27302f095550e17e6854400f8
SHA191df6961420bba9f33bc12c8b8f9c545429524dc
SHA256d848ed39e1f1234ac400f4f110a93fcae5732a716417b0a406415c37344526d2
SHA512121b48196961c6f1153d10e49093ae8e26d77728c71c45bb3ea24f80b3aeb54067dd8bdd002f0b31c430e356a69a6008695d2ff07256322df7a583ceece46033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec3072b24de9cd65025e0ecc374fa48
SHA114a16a6bea9d17a13be9c9f6805fea12a940b609
SHA2569d1f55574325a92809b82e7bf9bd3f20155626b64afd6caba7f6d8463841613a
SHA512fcfae08765691833d301e12ce58cee6f66500f7dcd2bd3891e63fc5d0e629cb75884e8a93cd05e9c79434ea7bc39267b2ba314f02e9dcdc7997dc74ce5b701b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa04e35fb51daac3c496828da7eea6b
SHA18f157bbd0126f4e84b22c69a1526dcc3e07588f2
SHA2569b8f8a074ad02fe92fd058f9110a8ddeea5ffc23dc109aa21110c1385ca5c50b
SHA512a1a70fc78182fe3ee9f0d8401f53a8037991ab50d850c22e66a24b5bd627e37ca547d699dc72e36dbdbe71bde066baab7182ed9713ed00b8d3cedf918787f22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bc4d1671a1faac5a7e71e8ffc58af36
SHA1af86b88b0cc9a6bad0555e4cf6ac5d735ca9be25
SHA2564761acc2f22c57a8202a313fd1537af28d93f2a619d45af7599c528eba864168
SHA51294c0a7067c1870310ae1e6a402f1437065c66f8b2048c305141a26a6ba708e31e4ce6842a019fd7202082001c57906388f698692dab213593464a5a345840023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37ba8af18dffb576f31d735ec7d4e50
SHA171c80596d0c881308d80ad89d906fa74aabf0dd9
SHA2560a0faf4f9248de07159cdc179a6061018881849c7d8ff83492d52a1d79510f04
SHA51281bc35edadcdeb888889e7d7c5913e9a6fa905c059c833260236cb007a2503ac9b55be5b6263eeefe2dca4f0d4cd9b7dbe2f87df9d4cd0dbadb0b6c0d71cfd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70830a57b0a09f0378c8f904237dd49
SHA1b7080619b230eb97b92cd365babdf78ed27b6748
SHA2562de524a4f330208ab0f5a41fa8b41108121746b4d48096e74a7e18bc50f9214b
SHA512026fb5531ab75171301f11b6e0874bb4e12502742c04f06d1af0d22d4633be945b3a18b407c318a70afae31383ce45981d0e0a6b73518307c9b1b2b5001e43f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94182e147c45f63eb11d8cfc8a66be3
SHA134902a9872c428e09347a2ce7668f74efdba78db
SHA25650e7fa58e4829ea9609e554ad96c42d4d50ca15f70e589cddf0807099865424b
SHA512b949fb60c21d5e6467bf9fcba82ddf04521a3c2806da179d48bb1c1489671a8ea191b0bae35e92abd717737901046be78c4d4b2dff7330a727550b84a496df6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e179bc8ec9f905afa4a06d6e670b6d65
SHA1bcd07479fa5d016e502f187fa3bdf141c923d768
SHA2569bad3e1f87b05d0a83a1573cc415bb0dbfc7b6a2427bdbcc3b06a7c8fb86cec7
SHA512dae08abfb54be8627853224224d07999319cdf02cc4a4b723bd3a67fb054cb5ae7e8a66931645c686412bd8e189429f9666ebc3b8cd153c67f562f0e55d535e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572ad7e22710ba0665dd9d74e1189749
SHA1ce62e1f200a6275ceb14998287605f1383ce4894
SHA2567003d7a3b01390110c8a79edd864af62ad97d4f4e239b67013bcb641ae1ffbef
SHA512b17cf9d74a6cd18d16a986fd36a3e37bf8392b10a566a05c9be780f1809516eaa9854c4ad72847faec2fa7f437c8a7f49012428f25d0bde49f7d2dfb9c1a17fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58253a174a40786811459b81a0f67f663
SHA1944886fabf876f8ad01315b01e7534e3cbf59796
SHA256fb186b3ac72182a03086122ff7bf582fc6ac3699ebcd985a580c81ab3ea1d40f
SHA512f6525a1d230981f3ffb6c614a81e221efe42fd752535a353e4d26cde73154e8186440fcd5079a40510c135af371a2f5d2bcec4877a5d67aa5da7fe39dbf0c914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb75095028f33c2c1423b427d3ebbf6
SHA13f4c9a4197567a0a9b9a694263c4070c6c9c6a35
SHA256c259239a436910579bd45a1719db6d1afd0d6cb435186cf0babc733a2c44b52b
SHA512ea1e9b1c69bb733a7f6d4e778df8de84903ac3e3e314b6d490290f42ff31e43adbf23af76943b2ff958f17f863b2edbb30cad383c40dc1bcbf369aa0b99959d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe35ddc4cec36ac621346b879f215e2
SHA15561ed22c062222e9161190b5ebf180485cb2922
SHA256a0cf34d8dead10839f90c79c36d6e916d9a766d701e518c308c0e6f30e31a0a2
SHA51232d44a7c811c9901d57f27fd2c2c3eae24f9c62c0e51634d132dc719ed925bc6ff9757db12d0b156caa25669c705ac51ea6df1c6f963e928e25447042afdd7e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a