Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
46dd14b7fbb75c57d491cd87a43cb463_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46dd14b7fbb75c57d491cd87a43cb463_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46dd14b7fbb75c57d491cd87a43cb463_JaffaCakes118.html
-
Size
26KB
-
MD5
46dd14b7fbb75c57d491cd87a43cb463
-
SHA1
3391d46e9443a18fbdec954e5231090187e0071f
-
SHA256
a9e9f2d865c04ddaa4a00c447bc6d90c4106b76162be65912cc726dc5bd8f6f5
-
SHA512
3ea583208d71f2034b308b0a73e29434edccb5f75baec6c1df62749cb4eb5e04334784def47151786aa4f857bbd388554640e62e4a11657f5d94f9b25b63d215
-
SSDEEP
192:uqIjrab5ncynQjxn5Q/bnQieCNn22HnQOkEntV5nQTbnFnQ4CJVevo7Nt1Fo+NzC:nuQ/A2SygcW4AX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22C66C21-12D2-11EF-A304-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08f94f7dea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421949788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001b90321cebb677e92f538dc7d3172b3d33d19158821593bc2552aa0137474194000000000e80000000020000200000009596ab55ec98ac46666d0f0fffcf37ad7ed52245df874d995b50a93743499e362000000071a174943cc1def36c57f84edc5dff8c2789547175eea0034f7f00fafcb935d54000000047d58e812fca8b9f20e937c5c7c26d3a7be3809c08396a642bf0e97dc47c4552beb5b4ca74d0e2fad402fcd852ecdc400aef71d1507ea98b10c6de8fc1924e22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 820 iexplore.exe 820 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 2552 820 iexplore.exe 28 PID 820 wrote to memory of 2552 820 iexplore.exe 28 PID 820 wrote to memory of 2552 820 iexplore.exe 28 PID 820 wrote to memory of 2552 820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46dd14b7fbb75c57d491cd87a43cb463_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5461d43a99af2c9d1eae768c872e7c6db
SHA13988a169b2e4d6176a6a952dd537962a91013c2a
SHA2566d21706486aed11818086648c1dcf8b70dff50d1592d570a595404fb1953ac83
SHA51245fe1b0aa44565b53005118583bcecef9d0932773d7e7af7d4730586f832e1b6313a6e7101cbd053c52ea686abbc91af4f3b9316a385e596dabbacbc9704ca40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9524bc79ed9df4ba5edbb38fa926a5
SHA1bfafed99a75efde8e324f81cb28bf4d63d0fe807
SHA25691fa8d679bb44af5d1cf426c428e8b669bcb4dc70a403c2b0830880de1b937cd
SHA512c1c8a63644f947b66e12d689939b775532c91ba9a2bf19d30eacdc2474a56aae0f13513a3a9ba813021e685d718b33795f6833b8a508c99717a6296854c4de1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477bd47179aa24e7118bb605764d20fa
SHA1ccebeef2241ca91dbf6991394663f7a4562bfae8
SHA256c9dce8c64d799dc2bf11869fe374c8004a97726261658f76205daac4edc29856
SHA512c6c96fa0c688e970ae904a892334443ac304c5499f685dd9f57457ebb77a08cbc04b162cb849e67f725807aec390fa5dde3b88360979ab1c2894476e14dee1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59731c784cce49b594ea1ad55f33200b1
SHA1894a15991a66409fc5a14b74fc6008a40220da17
SHA256756020a41557e04dfcae248880311be1476b40c6b88e33b4e82429e1666cfddc
SHA5123ff1e40bfe6e22106a54917ce6e4e2f75f4a0e3589158d233e8c693c7d741b328fea40c3b99ee9848186bc769cbf2ce164db2c6570371102036ce24f1486d8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9ae937d16fe8a4ca51e2f4ca6fbc4b
SHA18fd3591f263ddefca4ebe07366d97ecbb9087a78
SHA2569b4e24813964f971859cf01d4f48622801ccce44ac536ff4b4c5e706b7289d6f
SHA5120ec8caaee89435dfc26bf7485851e637a05885e9c771eba4ba4d6c95890fcd7db955a4dc3cbe8427dcdaa9043af81a34251a02212291e9409ab9981abeb448e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d62dedf890f9b2943c2bb3569461eab
SHA170575fae59d1f1a6a7a535a97be38d5d49d4234d
SHA256151b8b4dfe2ef59e0260d5b6a4b8a27199715bba22c7af9f1d465d93ca7db6b3
SHA512cd8b774c52f2fe07ba5bf5a5c8af92831539f0590a438d79e6cc86a7288d437c8a80a540e3176891f47f13fb03b139fbde3959850a92fb6c0852fef97634d7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba49530398ae89dd4a404bbc42aaff5
SHA1518ef09fa5bcc5419e0acd85b38b76d3a10b66c2
SHA2568d51690150cbad45e8a405bd05ee3dd046907f6ca051fa274daa8231f59c00f1
SHA512c3ae44506f102d1ab17ace3e8cd7f75f0f895a60fd916f0a6568a6a996316dad91b211b23518d02f1b811ae8eebe86a9337b0bfef67d862baa7679a924ae6fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57580f7c03cf25cf5ba79899ee8052c3c
SHA19530f815c5be3e6a220ec65e199d8da3d9a00785
SHA2560dc3dc18b9706905e4cb3433e0d14b70a8b80a7fa3397e1a9db98f031c84db39
SHA5129ad20da7ef3d4cf0309b09c8769012e4949bc919f782f5a09fce1e6e114d8a378da71208f9fc4b5415f1fad0528fd2dc6355adf816a97e8c84e7b99136915c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c12cf503c1782000db146c70b4ce14
SHA106893614a4a6581ced655c0e7b22f46db63d5a63
SHA2566db9444e8e0884f1d6232f0364e96d19d6b92d465d0c38a24187f613cec7722f
SHA5120590869c7b88da99f875753e483e34999632e69df8e09275d421f54d87c12b4386021d086ddf2b47f05d0237900853e8096823f25bcdb48e97bb80cd59edebcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b746ee3dcd908b57cbefda66eb01ca
SHA186e87b50d384cf80bdde55f0dda97e05677945f0
SHA256aa9f4b6975ddbba2433ea7776fb150917fd59b5a5946c6f6ee0a719f5945d272
SHA512b0dee2b58bd674c344f608f6e4d5c1bd39e70daf73575f1fc212cc1d2f97939073b753b86bbdb43dded5e1aa3afbab1972f02380d376ae601d19bbb3bcdf55e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b61761aa4826845dd1d75b8eb98a31b7
SHA1150910813afd6cd1a1159208aa59deb889ad2b4e
SHA25647ce0818d401d885eb045266320721e40eb800c29ba949d698c0fb0a0375f59e
SHA512644006dd8a7b71e13a1b5331622f0d07655c7da98e9b31351d02406e1998944bbb13b2b855babdd1c2ce9072fd4804cfec9d5faf0803304552e3038482ca4273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d31d53b078dd41a7abf8470cfeb285
SHA1ec6661bd19367e662a720a4dcae87ae69b08abb7
SHA25686d92ec2c2654193a9db157ebc612702a1f8f545131f2ace239e7124340c5a63
SHA51254cbd724294c4a7b7aeef22aed146eef938edceb546b5e3be3050e69e9c874603df3ff32fa704c959763a3519dcd12820cc11d4bac3d25fc87c3768be96256b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564877ddc82ab08347062d82b867d40ea
SHA101273201be8530195b4961490bd5ddf8f2308225
SHA2567c856d9117b67b1f12ae509a4e5244d78f8a2f878fcdd32a7b153f49bd6c9d39
SHA512aa769bf5457f2a1953102d58078f37e58cc1ad6e3b17b262ee3e83679528baf32eb3f61c3daa086b4254a87435377603d6f5ba2159ffb15ef22cfc4fd7bc2a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525fb10f784157bafb7311989333a01a9
SHA198f27f272519a957a7a4a341041a5770c2e025ce
SHA2568b2963e96b7dc600dba1971ec47100de939d250144ab2638e95724402de071f8
SHA5120879ab262106ef828b49e0b8cdfb26e9ced6f170e19c4c1bcd9181f84cb9d8b41c0d3cba7d7ebe03025e599f4aa9aafadb3b081b53e13a1769d42bdb21bad7ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c0df1da5be44f69bce9e68bbcb317e
SHA1582f7c210a2ec6a5f831ffc3f1adc7eecf29e10c
SHA256cfadbc084d90c2f38a9be630d19bb57bf19910163a6a4b4f5887a504e4888ca6
SHA5125889b4e68a393501c828cebc23c7e472351da6869dd5192efb5b5e549d4e6d2ac1841432072105e0821d3e6cba3e742ba7956ccac15d76a49a584e2265197cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5300b7ede9a3836e0d7db788f0726591d
SHA1fc1263805054914093483c4284218ce03e48c679
SHA256fc78e1cd58136d83e85da5b432aa41471aa160fbab1eb99de22ec83f59dc40b5
SHA5123f7972241330faf94356288bcefa34027994413d01f70de92d750adb6303af417619a610ab0beb21820d19d27c938928d55799b94e41de36bce644b33241bdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dadbc83a9cf9ac02cceb10d7bd7e59da
SHA165210b47facc1d051a71cbb3eb7bff6477574e1d
SHA2569e20e9c8c07ad68c0f735e102717c1ce82000d9c71539f47661ce87892cd8ba5
SHA512e9e5750f7c391fed0df116e672f5428be8a649bdaccf6169e110a85ed450a9ca9e49f459ac7d5afd4d3ab8333c5e2bbdde3f3c05de30c5ebef0f74de1f2aca39
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a