Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
4585eabac65ec801f6fa9307f51a477f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4585eabac65ec801f6fa9307f51a477f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4585eabac65ec801f6fa9307f51a477f_JaffaCakes118.html
-
Size
8KB
-
MD5
4585eabac65ec801f6fa9307f51a477f
-
SHA1
d593d8c19f8c6a1d3486bef6c01541be6c489455
-
SHA256
67a7d7d92a8537ed3785da604ed66d0904437e0aab2b692b923b8e417522f353
-
SHA512
af76a703debfefc8988e4ebbd83975b47a1e8efffee990209eacc20420384f3ba9dcf33db4f8537323472f078f0685129dc4405f80c4f2c0eb4626b664057bc1
-
SSDEEP
96:f2zhLhm5kBSP8mZ5TgWi3WaMZHW4sTg8hzAWB2ZC:f2zhFmqk8q5/imN24WvnsZC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421927067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e73e10aaa6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BBE4F21-129D-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000340995f43e294da37706f5f3d2feb74a5021a369d4dbe08bb082aa8662856a4000000000e80000000020000200000006f8ea3b8bd321160b2edc71433a597554daf6cf6cc37523d7d5d885771a1e6f3200000000c026beb61f3f8bc7ac148319170eb8dc6dad1dec6964b597938e0d481738c0d400000007950c71db0200f51aae86b5cd7f06f8c1fbbbfa13962e3f279aa8cd733a3953bc284b6b407b053dd50c055af038ebbfe4d25f66c70e5862291fb2cbe58c35fea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3028 2976 iexplore.exe 28 PID 2976 wrote to memory of 3028 2976 iexplore.exe 28 PID 2976 wrote to memory of 3028 2976 iexplore.exe 28 PID 2976 wrote to memory of 3028 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4585eabac65ec801f6fa9307f51a477f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0633a152b2b0e4c57396320e38d36dd
SHA170e6b4e57350e3a767ac77450b248681f66f8bbe
SHA256539e8619793aa5d6fe6f942013ee537795407bcc247392b25c1e925911f76606
SHA512d69228441e1fd908205a445d8c936df241b920835ee23f99371ce7751983eb4fdb86cc1140b3ff1df565c5f50091c9ea72dbae285824c31e7ec148c6b2188040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9044f6cee7fc793f77d55d44998ce70
SHA1bdd77f1151a67892795dff7d5d8a54f73746c71c
SHA2563cc04c803bd6714e02babc30faf08468ff9853c31b2155038196c1c75ee7d10a
SHA512db9aa9be000c386a2ed463877f9eeb1a4dd793cf678bad598e4c8f7b0266a615063780924d08699710090b908dde998ed6a6624562b4acd7f2481998bee4e3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1bf4c6309291984e6e2038e62a7ba78
SHA16fa9072cc26d9bf800abe837c5b5efa7b13c1e3c
SHA2560d8ee32105c91f2d7bd5cc94c101c83860d286d2f62d374a402ac448b188a387
SHA5128a4144c29506a8869ba0d15dcb2814d522164f5e307c33daef5d92173a9b814268563fd3389254d44ecceeb6623081039ffcf175a54e28a8ebc85e988ad18a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdb5049af9bcbb6b69c26feed5d441e
SHA1af74356ed95d6b839482c43fbe8cb725edb5ec82
SHA256cd4e1a46a25ba52eb2cd417f3a8e7ee14986484bf52a78e5db7d6704fefa612d
SHA5126fe94d35d11d97791d25915b345d431dc97bf825f666709a8a6a678c2b9a9d064c67466ebcb9e630eb82a4fccef120e691cc2cc4294251cc3bfe519885aee92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57747cf1d8aac8d44c0bd9e3ca778f358
SHA1666860337b203ac9db39b4d2c072acfbe54dec85
SHA2563d2618278f2baeeac1e64fee499f3826108656f4f65637ce2f7d3eec9a1b1a07
SHA51240ffa61fe6df49483685a15de73c1fb67a6627c0a9ff045a6ff2b470034a2bdf10967924e38f158efa461c90db14668a4dc618e5f13e59c2262e3e8a34f48d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3fe4c75ceab9dbb672058b46b9d5b36
SHA1e514181e9f4a879000cc0577800a1db6e4e8c90e
SHA25676b6e6bd02ebc60048df398f8844cee67a05646dbcf1795a8b19e55fc51cedd6
SHA5124d8ddd8debc60e5355fd88cf8f79f9b7e2343065ccae07f2c745f17b36e9f6676df9144da485c9db219a817f81338a94a44f785b88f5932dbf638d3f272bef7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a9cf0f8653c5c8c478234c0059dc15c
SHA1c9feaf17d1015a0336671dcfbb64ca67d16d6b90
SHA2568d59516002a4b279c8435ef87b2e6e0ae31c96570e779878198ee456bc1b808b
SHA51255d137c308c4a3d8c492cf586aa9fa90211e069f7000a67545192474fb840373aa10e34aec80c87cf947e37b34090b02c3d12a8df6b16b40650e03f9214bdcd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d372ef18691e879bef5abcba6a741bd
SHA1627a2bd61246dd16fe2f888e79914efc2e3b0ae4
SHA2565f7f858b9d6e6c3773eff6020de3de54d2325d1f0245c3e77c50c470140bd836
SHA5124ec2ea1e6f9f5d9ec6e4a73be9feed029ca1f1e8113e4dc64a183eaaa7fa850650982339395c5771acf33680d4b2e41bfe379bf3ceb41fd681c94d789275f7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2631c0f97decda6ecc4f847546766ed
SHA19d102b46b60d423a433f7b37afc66ba2738213fe
SHA256c22d41a429bff48a45488e2a6a64812083de641a79f20b13c791f723ecb148cf
SHA5120adfe3015ad4c7f72443e323e390d0782c073bdb4f0724ab84ac9fb126ccecc746710d7ae40e73d0c19d1e202139cacf58da25d2087c3ccf503f6d46e0541cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa305d533d289cf74f57459a8387d59
SHA1745e375038e3d293c863f5ce1819727a2adbfae9
SHA25610fa49e88da562b7093a23a2f849eb65499dcaa3563f78164315491990d29335
SHA5128bdad5b34f6907ff77d68f20a1b2f0a54d27ce1402b1f9afcd308ddbe6fbd365c1e3d98d96ea5a701d6e448aa5d492f799c763acab9a80423a066c91de4707b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ae884e742ea15dee98c1d41262f5eb
SHA13e246a76f2699664b25f01451b86644edbc0bd45
SHA256848b685c34df0be45dbdd727275d873d38c905b73e4a40371aad735432475741
SHA5129b281680b3be094d3eb4a3670732b856488d35ef0112fa134c819b87b912292ede7e365df5b545a95e3a048f77b85cfc49ad274e72c2ad979ba11eb534359ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554de7a72d1402354915e7ca891a157ce
SHA1888b0ca8569819f99cea8e8ce6ca7d364e74edc1
SHA2567904483467c39334d514cc8cf1b81eb5c11519145a29ce9e2d49cfd9a27c96a7
SHA5126a17d4a385616e3342643989cabcfac9b92af1005159c0f054a5edcd2d132106ac0f29298fb20e362ea9a0aa787dbd118b798c32ae4964531387a60f2cbecf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728205bed451153f9c66ad65597c077f
SHA103e2db3f671b4633aafa67d53712eb70ff766e8a
SHA2562c18afc7f11b95a4f37be7c13178045a6186a3ec478f5a6c3ae34b489b6c2867
SHA512a2d15a66af10b2ed1f8219c223e3ef37f740ca9547be2d5dc11f585a0b6245bfe37a7a75bb4b484bcd5a964b7be8a4f4ecfdf67b37eb0126099cc1f81a14a0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b6af816dec95ea76ce961f409e85dc
SHA1889bf56a0af0c48e7a7bb710698a9243bd957556
SHA256553bec2ece612b070d9e4a75c1ace6a6c3c96826dbd918efea25ea7709105305
SHA51295c65aa07e688420cb4cfa006fa07c5326a9bb87850dce01d4fe3f2a087991aace3c4679ed2d0191ac590a51e79c5527047e8974a5c26a1eb8deadf41e9ad075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c426927175c9fc511c8d0b454ae536
SHA199d61105f3d015bc204ba26ef53ad4d91a82a525
SHA2562c7aadef019d35bd21c8c760e2d7d44985c0fb951d65d0d5701a098618c66ee1
SHA512698c2e57cb8f7e57c4154a6ea5405f93c87a17080172b6afd3e55a1df22b8dcc27918485cdd230be3299e27708890e02d0e0c95f81c52ebfcb4125a19bc96a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573580b6a28070f306c01cddcd94581a8
SHA1127ae31496d3dce1e8873d2fbb88566715f4de3a
SHA2568439857de1cd7a61da4fb113ab9c9ce572eea3037c1b87efa761deb54d5c899b
SHA51278cf778b97065ae00f7b6e0b855ca4ebc7c1012473f3a72ac423c6adf7e04faec1053422d3a34616b84c288b4bee95f92b32ee903db5507b3c4e2543cf68f26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd1058adb2fe650765cc56b806d78ee
SHA1fdfae68071dc6f46a8ef70da79e938756cee3222
SHA256242d082f789766631996a3b9c4b52d9abf2bdacac471be88947e5cac0dc82bef
SHA512b9909cd3fbe451285eeba9e0284e830c689072c1f2ee230e3bb42b63e49f6fe160c10438cde2393fa1a4d40e2dfc9bbf067aa2287a3216c43312fcf38bc80cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516bc2d4832db98015870288b6c9c3f73
SHA18d56924aa59f3267fc5e58f4a1c0f7f127320747
SHA2564d3de030f9f63d40068aeea72b5990eb5af00852c6215b8cdcbac50555bd7a05
SHA512d6dcc0b6eb067df065db46c25e903e94ddff10224c2d287ab81caa2b04ed757ba790a9b646c574a347ef8008045a0b45f450b406d5f79ff28d2aaa0a0eca257f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dceb08fd583109fca7620d0ad7eabb48
SHA14b4af202514c6e30a43ffcc5716ad24331c2e6cc
SHA2568517ed927ad364d0f93cb1784334f876207f34ddd556159b7233c8c8553c3f4e
SHA512d1d9b56bd24496b97f3ece33c91807426a3f6a975c41b2b33326f7430360d535d633b325dff7d0b983a57b9d0880df14f7b649c0c6c01cc3a9a560084f006363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551120e76dc2cf64ec1973055c6877d2d
SHA102d68597a26646cb48b22e0057db28755740d0e6
SHA2560a66792e2364b7132eef375042831dc301892fb1c6e13e2704baa8793ae8316b
SHA51218b165d686472903196397371f5108b2afe9d3e65215cdba7939a847f614181a24344950a84ec052b885321585722a0adf290fd7f6ecbcef7f1b5c5cc0f6463c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a