Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
44645909300e2881312600e7935be362_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44645909300e2881312600e7935be362_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44645909300e2881312600e7935be362_JaffaCakes118.html
-
Size
72KB
-
MD5
44645909300e2881312600e7935be362
-
SHA1
4518381105759eace134f753d936b32431aaf976
-
SHA256
a88a004580d8d59a76f3811a6c977886159160d36b2f15e2528dd02e3044e885
-
SHA512
2ed44586e2d0db4e6e94f7032e8148153d5619a0c1e89db292d9a314fabb544f159d27f0a574c690eacc538091858ba868f5cf275c41e7ffaa3aaf988d16116c
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sD6SwccqioTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3vTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a6784424b1f1a6e2b05a84d99b22d49a1a7f0420b7e5330e1c876dde85feb2c7000000000e80000000020000200000000e48fbeead478ec5a04f9a3336e056cb26c8687cff3da8177d4241aca05c416720000000a45a816a45e30ddd6fac765b1eddfb37037cf4c5ee9f0471079e0a727be6ace540000000c9d6ffdef5c15a57f551076a4b5c74d72ce88e0ffa8284d871dc801f82f63cbf25aa014d22a9055a16e055968d27fdc74a27fe523a5f957f98d01007df2fe8d8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49A68B11-126C-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421906045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ab541e79a6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2100 2188 iexplore.exe 28 PID 2188 wrote to memory of 2100 2188 iexplore.exe 28 PID 2188 wrote to memory of 2100 2188 iexplore.exe 28 PID 2188 wrote to memory of 2100 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44645909300e2881312600e7935be362_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d295107dd2ec54be12dc58d8811d61c8
SHA16323c4edc0df886aa347bbb24426e135e881baab
SHA256f16c779c87bf68d288061177c89876d3b3d35d6b91dad341fc1f8403af8a3955
SHA51234fc599c9956c778558471abd78a63bd3622e80daf113dad6bd72b6cae522128d7b81485b3a3ecf1aa2ed1feff6deb655bb0eb4d1d4cca56e5af4e8f397e7989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e98c19e8ff6e46e41fbd48d2348a4bc4
SHA1617f9e2f8826d2d81af676d8293ad3f343b9a8ca
SHA25698d62b7507b02c95b2b10241837916a8b5e758cadcfc7a92cadea0c16bd6fad0
SHA512ae852506c2f68bc997f5f9437e6a3135d4bab4002c1800d840e4ba0cfd6219f1a65d66767d771f9a4abafbaa1decf0a3812a0254b7c80ca2560d0eb5d848c9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c404f413cd647786e71f25fe0a186cb8
SHA19ec65899a7f7b721ca5e6d3279c1ca1f1943cdc6
SHA256b2b8de2ed1b72b95ba4a899f24e72e21a735e855e3bc56f8483d9372609f48df
SHA5120e06c7ed40133a371f0f7552b6d15f7b21bee1628cc5f49c6ee69a2f9e29bdc701dc1768e8610757a5190aa5feb250d299564ecb4f1950a3ba0a0edccb40d3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c621a7cbf1b48d66df881a2f657ffa
SHA11af93dd66839ccc2a8d6b61504ade0fa9eb30185
SHA2563cf8f9d76b436eb6ee08d951383ce50ea1dd6e7b4302b66fc36085a40405357e
SHA512e0c8a6b6c62e7f497257abe77759aba8e4890249502c047438c8ad5e67afe1e9557a90f4536f65188af73a58f3b1bdbd9441d6e633cd0c8d3c76ca99a3a6cc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5b2372383c47b3afd34e85e4238f7e
SHA1957649c26992a76f1fe251d1d9d0b459ccd9391d
SHA256a5d997706b0cd23fe72f744418c2adf422805470a0f8973af13aa706ba876968
SHA512fec4ae786378e714504a40c5c6e036601a3d48ad05e92dc082703c582c2511798dddd76dbe8dfdc86b6496627fecc3d67425f8380b5594c221b93231660f6dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527039c63fb3121ea8b0ee3f0596deb06
SHA198aed8c4b160e5d4ae7f6f7c5270a852fdfaff37
SHA25674da12428965b21ca1911a1d8d67ade9b48cea1de22f204bfe20bd828043765f
SHA512728726335c93cc060ed6b76e0227576855abf4071eb5d116d44d1aafe3dd829bd92d9147607299f0ee800c1b2def55882955f7c9485e71540f6aabf8ec55a4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5987c41e30892e0a292727c41d6ad72da
SHA14f3142bd14267fadafe3742fd9c48c50536b3d79
SHA25658dc91dc3062482c5dfcdc2ec338fb590b249cf9e63eec75be927f1eb45815d0
SHA5121bd46a643dbb3dbbb4e19d9ec5d8d0a369be904023bbeba24154514b59dc35b0b6335dd219818508c703004801f0666a7133b82539d02fc921e9dc533f8712e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57399da55fb073ea895872d64f5d7d438
SHA1e51f3e03235213d1976baeeaec597088e5a5ad16
SHA256d74a67a474576294452ec75dd377db4960236a4926581c48edb4806e48ea84c7
SHA512599a105286fb140bbe703e7b05fc73bda3e98e16088ebb0e87fdb32602f04454c081e3c0a4d523fe40ab71b273dc498d28d75f4f29b98f2a23f929b6373e7d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55636b9cdd8752efe72c8e863443667c2
SHA1ba96ddbdebfc8f7ccd6aea0f61d36e73778ffc9f
SHA2560f06a95fac95339edef4fef01b6d64a19f86cc10ee5d920ba4b568f7c3782887
SHA5120084f4e2331db70d1727ffc30150a5c40e9dcfbb0fddb6693f4767befd5fb99e86a8ba47e331865586436dc5acefeb2f94990d1a182409c1693524d3c9cc7555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a1245130d5ff0dbf2e8391427ad5a4d
SHA1f5d4e0efb342b13fc5bcdbd27e380ce2490d2d64
SHA256060e2511b6a5b1b624152e57aee4ddca40765363c74ada7cd2048ce991a88fdd
SHA5125d613ae5a8e4d8e1a2dfa33ae0d866f0e5d4c76b13b62ade1dc0fd365150b21113c03df168075617107e1993071a6893c76a46660c557c209d6b9a71e705b0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598a05a628b0008bec9a8b0be365ca8fa
SHA19ff58094bfb03d8ef6991bed374c0d9a8478f472
SHA2560d1ccd81b9c6c3a9b942a175aefae870f8978236814fe37af5841baddff80fdf
SHA5129f4f0cbc4ebb1871d6e4a8adba1df101bb765dc47a687347201d3c0ad9ea8344e144e5b501a5fedb02c4b0ac249fc5fefffd980e84a472f2b744dbe07351dbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e9068a339b594c679269f665c194ef
SHA1b97d0c8647d966c481f705c3c456f22cad413a20
SHA256285227eff5eb2601e9c964ecef37eb34cf902c473e07aacdfd3ea249f1f8c017
SHA5126b66f94a01f02c2cb438ded6bdcb62a6cf006f5834a297a6d020a5e7c1157a143e554004bcd4aeb96aa88ad6691163788c368a8517900f8de01fe0ebf5677e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5709b8e319b62799d9bf11f545869e5
SHA1115021cc2946cb56aa795bb915257754026b9810
SHA25695bb5b8468cf01834dbe18d68b2d928537e6f371c96f02971acc123a73c02a97
SHA512d31feb8713ca5ea67e139703a0dcf36f3fc61945404308c85e8584595982d2d1ead086cc04a88bc55e96c596fc1d1a1b95ef20c1303fbc744b543db8804c2e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43dccfea883c25f63ed8a88f62a2323
SHA19d95a99e3a7f425bb677d4d4899b212bab041e95
SHA256bd01643e690c764a15cb70cf22a4d12134b2006e329d80319934dbadee0146bb
SHA51281ec56c6139c83fb47bbbb5967461e391abff3e178e8f08ea0eb0452cff793a6c2928a337adf2ac9d0f5db34e73796f5168f2460a667d1dd489a0157576c82f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408016db47f080f30b5992e93d890783
SHA10fde15c6996350eb2bf63bf6431d6abc6eef6959
SHA256a502bf4daa1ea9d35b3b049bfd8e4b300cc51b483cec7712fbba278684b2c71c
SHA512a1da275d0b178078e2cf2ffa483e0a1a4c826589531c2f7a045aae4dccd610dfdcf26c0ce806ec59be87921a2c98e37b47cc88b2334e5f041a43f57ad2457f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149029c7f87909703b875cbd8bf524e4
SHA1b38a5e28a42dcbac9127ece8764f0e90f9f0706a
SHA2566c7f2ee39f6b7765afb78309e621d6728cc18d0da7e9642cd91695a43642e645
SHA5129b724408c5a9f47afd9c1056e64f91d0c5d96e8e2192e56cd29b37b7864e9935d26fee69647e72cbaab06fafa18a9deafdfca2eca7b82ea79f7a1cebcc600042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c94db5b39a90ba61a86015238fea616c
SHA1fdb5971f1236b9882425f6cf082ab98ed92bdef0
SHA25666e499804b58ca3219e023e1661c036a02b1549246561ad11c056b4ac29f48d7
SHA512b1e71f4ac4a29239bd7bf5957ca14f8ba341c27cda2d1c60d02d0214f28241ac6c26dbf08be870e13d8f9bfb5b106ce73fe778d8091283175c288829eeff023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0bd81c1884134d7fc11e7dd81510fc
SHA190906c7182a58645f24d064dc8db4a1fd22eee18
SHA256a25a2748c1dac3f9ee161f06241839ad9f93b5c3bee46b17b2233ee3a210a65f
SHA5128389bd68efbbd2681a4fe6d976579a982302dcb07ab58b17d73c48fcdcea9e9acc107e7a996be3650303209290ebdb1b6e49aeda9e1a2b048c90b824c9c5cb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c628b92b3efd097621fb93c3aec8a9
SHA1b402bfc024c7ffb58d7283f1864dd03e8e24d2ac
SHA256020fb1688f6a002e7536709cb558f649a95e575c978fb609676f3c0ab5fe52de
SHA512c318b40413396ee895f54549341944ef9b9d2d28c10d617e9f248c8a17b4dd21370d6eec1385dd765c9a8a14f95ff58e8449ab92918f2126db03c1088c2ea611
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a