Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
44861d3997f756e3ebca4506effa3206_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
44861d3997f756e3ebca4506effa3206_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44861d3997f756e3ebca4506effa3206_JaffaCakes118.html
-
Size
460KB
-
MD5
44861d3997f756e3ebca4506effa3206
-
SHA1
e2b706e7350175d5e716bacfceb83be1f98c8e5b
-
SHA256
99b48b342384c1e41a2264ecd1b7755a1193e9472ab7f6efc07b137b0e8f9e9a
-
SHA512
4b1ac4b4772f3bcff91257e41a0fc63c957a706a61118293ceda5c442e1cbe1435610f36779077ad054915a9a4d244ddba7f5a81c23cf1186dad38654dac1839
-
SSDEEP
6144:S5sMYod+X3oI+YHsMYod+X3oI+YzRsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3Z5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000bb20d54d8adf30735ec6446b646ad45ced5e6e60f8f0432963c1865cda234e28000000000e80000000020000200000008891e0678133106d1c260433dfb5d34a08ffc97eb259bc6e6d32fc24f911dc0c2000000096cadb2afdcefff69c36d12bb014bc1010925d8450812421e2aaffb68adc39c4400000000456f2da4efdd14a14c23b485780d5a064319e084e093f2836ff69950f3676ee37a4a138fdcd77b9ba63c51d6852a0fc142522e5465ba13c9c6d7521c8ab2201 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51264401-1273-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421909064" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b9aa2980a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2164 2420 iexplore.exe 28 PID 2420 wrote to memory of 2164 2420 iexplore.exe 28 PID 2420 wrote to memory of 2164 2420 iexplore.exe 28 PID 2420 wrote to memory of 2164 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44861d3997f756e3ebca4506effa3206_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbaed8e4c9ce101faf3d6ba78ad67589
SHA1e938ddde113e8cf2802dacb9c39c9cd78be73180
SHA256fdec7541310e6dcf14bf228ead48a8f766b7059b14ab9d31ee5a53039ea15cb7
SHA51228f0328873ba89e6f8fae31cb5d56abf258e2a630097474f11c63e207f9c5dd2cb2121b1fb78d6205cac032209bc46a9e4abfb29340e6017b0694b1d6937c9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54caab80fb613586417c03892c635b898
SHA167cc1db012c5fa8152407fb438cab6ab870aa12f
SHA25637f28cf980167650509438f81df6f988786c8d296a93e3525b7c6aa699f464c7
SHA5126cdb18cc5f6dcf1f5984b6731269e98266a057a7d03ac87837955a8d65765de0bd20bd741c8be6cdc304038d5f7f755a85b57c777217a5cd29176573093cff54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f354c58451a7ef5f406eafd05b9d408
SHA13cef48746f8c665108b6910766149fe42003c165
SHA25680c9873637fce001079c51d48fec12f9afe1b19f9ff77bddf38b1fecb6884c14
SHA5123b916837365eef56b1133c41d996092a05025e649c9ae26be5e2e44265ca600b387dce21fdc624198acd345ee8f67b9084a3b393a854f1a97c6c2248e3b1cc19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547913c9edec478bdc951f306d8159989
SHA1a7e80174b70a9c79628d24c87eda1df7b83ad88a
SHA256abc7a083887422e339c9edf076b729d00d3179e94487b49e1e892e59538a74f4
SHA512869c8d553648d784c36d1a321937a30a0f34dcf6cd5b46fd90e11d87207a43178d6f5c7c8f1ff13c0e12830fe0ae24aeed7c93258a568b0439bc47161770cde7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381eaa985167ce546fd6c33702b62862
SHA1fbafd9760ff44ad6baefaedad91e648b7e21668c
SHA25689abe4df890065353f10342a3aad65287d5e51167601c1af424c69394db463ec
SHA5129aa741ad618152a4f8521a65c9ffc187bb103f8ceff09782d1c4f1bd7e63d3369d2356f4e515f45370776b65b288ff74abd2865580e8892eef2c164b38160443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43df273b00d3d96732d4a4367578142
SHA1794fd53155ac3eeda9808fd9856f0354c96546c4
SHA25645efc4eb575b13ac319716ea0e6b6c02ac658894464b97988e91d743fb555791
SHA51221fd6b3a14e8544e71311d3c44fcf330750f7cf99ecc6a2a926a02c1da116ddb2ac84cbddb3345e6ed3b5f771c7db24d71e1486aff380e6e58d373b7ee596fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a9d98f76f90771a868d4aa19483197
SHA12cca7e522f21a8db6df509cdf48b6eb3c4a81256
SHA2567ef82b28be58b88c5ff825be61d592c823f91aac4e30e2a3be3daf92d0b76b44
SHA512912a512f9b062f52b5c2f71a6a514e7fefa3af4e25037abe9281d1673205e6c75fa4d1f3d7d1ca06936a4e7be0eb3c5b60955095cb16b7a36773a51a438f8793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eab01090e2d110589d9d84a59b8c2304
SHA1d3df2bfebf18b40cc3a5feb092fa0a4744a04a96
SHA256c6d61daf2326ecc15edac3ca2b757e6016e61f966a76909815e0e1a34fc677be
SHA5129c9529f977c2bcad3254f7d972a566f252f01b0acedce4d082e55b4e77c021529116aa8223a01101c0534fe42c18db05c2a2fca540e4986f31f5f59e11de8c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774ed12a06e7f50c2525ddd77c8ded2e
SHA11454f3b47771c09ae6afdb8449a49e5a7e3e99b4
SHA25634eacdc5183de1425884468f594abe5169bbd237a1aa7f5719035f1da9e250c9
SHA512f0782bd44f454d866bf7eedee7de157612b373f3a2f1a09709b5ffbcd5d6578e9fc58445298344f7f36fc050fa59d725609f38510f3322606f011dd28aae4bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffd2e016b50fcc25a18f2ebc7847e02
SHA1f9fe3cfac086ba80e015ac318839288484c64a5c
SHA2560b61f3b20c2e673d916b37d67e8fd2e53177a1d9a8332053a70545cc35a219b3
SHA512eea176554bc252cb87d4bfdb6e5a4ec5d146eb421065d8e572a8a804d8b4e147fe2fcbad0dc827c5e894a0118b784d79403b32a59a1837cf686f5b9540360610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd65e3c1eea41525eea74a9b53d5bf6
SHA1b4b65be74b325c696f3a5a74a85b74a87bfd9554
SHA256ece6ec9d859c172d43abd44a495dbf72c3078160fc273aab555bda1b51416ccf
SHA512cedcc1dbc6021674d8423857752f4ee2b6d46433f0feba960433b8d2dbf9257d0feb0c7445486a9c430c5c940a2a23bc74835eb1bc04f36c8f5081d6af6aac39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af72b22c7fb7ad77fbf37661f942ba9d
SHA1c35fb8870291b7b46f15f8fb81a13dbb79fd33a1
SHA2568f2257b898c850afeff38b4b659e944181ab74ec43f11fec92dd41103701a1bd
SHA51276e26b2f75e47b5c67779e4f0861c08da86c034501721323cb1011856095a0075434381f622f8331c89ebbe8306228e60eb526285c24a9cb08c77d8b3a8dc178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e340857ddeb6785e2625ae1b627fd3
SHA1a1bc015b2369d6db7f95f9e9991e94ad655d5272
SHA25665c90d26e2551aa568c090357653f724385ea2d225464960c515ea993d57d9cd
SHA512e931f6832338d43605cba5b55bb22b059971b5ed0c698dfb30d839e750b56d7d013427c178f7630e8a133dee7a570b2ec4d9388778d4c660759fedec06e43323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505261a72196d9c0fa70bc1ca85c32894
SHA138359d511876524ffd43c480be962766d159495a
SHA2563c2f324dc0b346cca986873c929b1e834feb74c45494dd72cfeba89e7cacdee8
SHA51231586ff7c7b0ff64e57b8a914b18eff827706aa198b92db1055a8177ff9838e8acebf81b7929b662de47322b51131fe995fbb8a2a16bd2bee20cf77c73a170c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a5aa87d286bfbe5f96908384310726
SHA11626bc8a22d942efe2a763086f9219ce967d8c8d
SHA256e02cf4f3b7b25f0ba22ba2ef3d1810f474c838db82f85d67dc290d9daea28bf5
SHA512833dfa21dda79ea883ead4fd95467a49ec14a7db76f953eb66ad14e91df49cb33c611da2f548a39d70a6e2ac9a2111b72fa57993514dcf7a9e0a60297ba66b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b232d349b574ff92ebe4a2de83245fcf
SHA124e40d11ea6c9f49f95dafab1483d35743c606ff
SHA2566ff05ace082f2d5508624b215ec251be2323ca907e6a7413958a4010c93f30cf
SHA512463fc61891c10608bac1fd67148768cd3ee4d674fbe18e7f5cf976931a224628b9a985ef00f203f4722e64af1f1d0eeb4aa7d98f84d94a0cb4ef1e56926a7836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cd1e14f86db78e7c941bc5c0faf2bf
SHA105013ecafc84cde627fb17a46bd39f0355cd224d
SHA256a146a70e7ed478cb7a6e88fa4514c84150e13be89aecf80a37cfa015a7aac5c0
SHA512726eaadbf6166b96d282e25b23e03d3527bce2294b7b12a10e878b990dc377db4e6d8280c943994a49d4e9cbe8be7ac9b5d8b40ae6c393d84cab6ce7c448ce3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc4a3bdca60b722edcd37a32baade88
SHA1a5ede134f2e216e915223e24ca610942da636e00
SHA25668e510b89640dba21251fdfd9b548ada4d780adba0755ad22199b9a481b36257
SHA512645c3f02fb4aae1f6b836c129114f00e6ed1f0a03dab664923cc0ca0650488ba986c1088b600a4a9d3a3926c467551f40c1b93e6b8407edb98bcea328d195410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0ce2ed92a2a1f6a3beae6e158e1c08
SHA16b7650b006981962be7a8bc0b5d482b8c762aa7f
SHA2561faf975e92c13181bd5e92074dbaefe8e2bc2f479504a9590012b74f5a897cdd
SHA5126f92ea5fc5ce015891ca36006339de6f38edb060a66aa35fb4e154bbfa649bdbd3193b7b283294beb95d2b3b22ef79e03ba3b03600f1692598e5cadbaa71bbde
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a