Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
46bab5d8eb6656fa15d0cab347b8fce3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
46bab5d8eb6656fa15d0cab347b8fce3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46bab5d8eb6656fa15d0cab347b8fce3_JaffaCakes118.html
-
Size
20KB
-
MD5
46bab5d8eb6656fa15d0cab347b8fce3
-
SHA1
640d0f7ee4187394f03e6ff94faa76ae9f247ec6
-
SHA256
450e092aafb24179bfbf5239cf73ce50b122acbe2589faa7511949ee07f0b26d
-
SHA512
78e7b6ed3ea38d6a93d3ea02712059ee4527c2ea2971534ad3fac1ac6c3867f925f839ec52628c4b5714944c02cb832acf50a58c1605a32affb23b5955366480
-
SSDEEP
384:Ih7jUWVKxWJrssqlVbJK16SkKGt6plSqOHogjA5eanylEqBVBb64:VxWJrvqrbzJAplSfogMHylEaBb64
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e50b8fbf812f6e2446f8e9b18ae012387bea51df75a4aa4a4c1d6b9fed688615000000000e800000000200002000000020a07613176aee4cb3b5a0995933b1c4380f701f386d213021442753f799068720000000acaf1eef0945284d8b8ad210e2d855090244fd7e3ab45dbf66e877870fd79d5c4000000020bad165a171ce3ab628c69a0311113246e32b08fa506a0b8f1b5186c361eb7ff590fdc546311651edd435a56ea4994b810f2a02d40b548f7453b8ed09060413 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a907afd9a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421947519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAA3B971-12CC-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1408 2356 iexplore.exe 28 PID 2356 wrote to memory of 1408 2356 iexplore.exe 28 PID 2356 wrote to memory of 1408 2356 iexplore.exe 28 PID 2356 wrote to memory of 1408 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46bab5d8eb6656fa15d0cab347b8fce3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556375139f0785e71e9277da123e10be5
SHA1f81df83aa095aad9ce9e7b7c7c5f7d43dc6ea852
SHA25637ab65c942a149e43cbebb2b2563707e7b579f47ce2de78357c483c215a472a9
SHA51228848e727ec66537e79e6c90ab7b40b4f3f485cb66b3d862f0a56ab8ad584f3219ac9acfa38dc7d2b24ef33aa626c123065b0f6687aba9083b053c31a2ff4370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c121f30942138e90b661a43defefad58
SHA1fa046c94cc9c20506a6c5c3ec660277d5e40f2ff
SHA25674648ef19a315add5d58530fced40f3d885b28a049adf2a5e75234ed4ea99633
SHA512850d579b4e68a7fa66bfb471c96d90621ba9a2e112e2fc8ddcbc95a054426874bcd7ba6d8dee51481648a45381b09c5b1a1419128120a3ce25a20d7e97c6c515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2407d3364d3287e5f68ab567335e88
SHA19a3ab68655e1a083d5818ba515aa35b39bdfefe7
SHA2569bf1a064128a2888d11adb5ee3483b527287e98b9def2add53fd44180edfa9d5
SHA5120610e85a9528260b8decfc27ef4476afe45f98cc1a753e171d25eca513285f4bb19a9181e6388ef37556ffb3154ab4736c8fde905ba58af37c37ce5d5dc4185c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c83b1ae13b09fbd9225f60706b07bee2
SHA1978d35f28c8bde55683f1692730f4b02251199f8
SHA256d9df4d3f47cda295fb394f302179cef0ad8f150a772900e5e5e6c7a9a0a600de
SHA5121b2760d5029a050da34d88c119352a5e385c75646c5c18ee43063d8cd0b18f6619d0fd2ca564dcfdc777695c859607efcbefa10b04f23c3e6b370a5e9559f7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7a388bc6d16e92e48e5d79b214c188
SHA1fd00921a080c63b0175098fd32ffa62b64bbd01d
SHA256a33a0e26be2212a4955a9ae0c07ca74bc2e3cd4b9ef6d0be9427be82ee1d7cc0
SHA512ce667df82deefd218e4206c0cd4a9d2e9a0a25b211d239c894719c4afb7681f2589f69a11cc8702f280635b43a7fb204610e6a4e9768b0de6b0760b97c3a9524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2da84fab708c776e0c188082bb76ac
SHA12f3631fdeca961851834807b055e5f5cd910381e
SHA256242b118f73cadff3a65c4e126d2ab7f9acba5b8abeb9ae2dd7bf8e310c4f251a
SHA512ffc49a571694eb57438154f7f7556fbf91428ea79bb45cb40ec1cae833406c876a5b0058c0bfdf92b6e813607d3ffdcdc513e10d68911566ecd0d6aa01c6e5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc0ff841e87a0010937ad2ee8c4314f3
SHA1b6769ef9e1aaa3dd5742fb9c0cd5d79dcb4f509e
SHA256e14e69fff069d269b97a505f41d519c2ac6257334caa0326f18975dd942e453b
SHA512a6bd812f18f3f125c8dd4d0aaaceb65960ec779bce691320339f75625b62d1437523cfac951ca2272dfaaf35850178b55b5cc5fabd1e2fdbd4ca83fc0e0c9658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809a9e8e38c08de71d54ea7bb9992b7f
SHA17cfb60a2bf6492f2798ff6c53f7950b585778b9e
SHA2561f7eca112972f0cac3710e35130a80f16674d94fe4ebe05d5978e736cfea10d2
SHA51284c8465bc694b727b743c77f22e7a41781b51c327aad1f3cdac7188f6abd845559b1c0e8a69fd0a2a2cad0ea57696d45fdf3ba68f1508d8ddf889c756c3ebf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3250f97feb220d2a863ebfa8c3fd9a0
SHA13d78d9f25b7ca52aa288d086585cc8d4dc8eb112
SHA25665cc7c8a2021202ff224b81b23ef7c8b3742d7d5b37fc77c418230052cb1978b
SHA5128f1126e0c0938699789193b812e58414e354d4b28dcfe8cd25b5fcb622fcc5c96ac16121d0b3ede1b5cee23809bdd7e8e893afb9703c484731d41d3115eae549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca8ae55a815059a868582b8abd1960d1
SHA1035f5c5f8d613bb660b10163b045b856f6f40dc2
SHA2565516894f2aace202e024e44e49db1ad42ce200250a28dd16a5ef8dd88207ee8c
SHA512814fb68cfd1af877e7fb588609cda3671d6d8f793f9b3a6fd7050c51da1fd40f9aa604e91d5583c7c25fc2f97c363ef6df854592fd0dffdf3c1da186fad91dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10208c3621974a7db1bd226c4d98b2a
SHA12199310573d728bf94a021bbc18b4c4ac3512302
SHA2563780a2971958eb237f0f3ee9aac00be7bf4451a0cabc329c19ce14e30322e2fd
SHA512173b942b50091a66aa31cf6c2a0ddf74621950546c71e805ec106b8d6f18a6ce902e6e305094167abf71d17ef3118bab11bcc29788bde9ee138664c8603aef9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dfda6e487b54299b03e509b7354cd52
SHA10a8ebfeaba73369cb953e29d5106f8e71a380124
SHA25680cd86ca55ae9fe65a4148b53887df39309a8aa4af3c0293f73c34538ad5eabc
SHA5121f44779c5e501dbe2296ee46c25e81abcd10c7bc3908daf90480530af85cd9416dbbd6aef4f1b8c0b0efd4fd569318ef9dbb0b88f08bab4b2bda8d7e66bd5a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513ec15d8583993e64794f243c5ab239b
SHA11e6bbba9caa8235e7c092ab8af0c0a1a2ed8d937
SHA256703b7a4596fb9dfd65b1de97dd7f13598bc79ed2e7fc8c6c32537c9bc4bf0afe
SHA512dd52ed3fceaaaf584114e0465b838676390d609838f08b5239b673afe823f3ccf746161c705c0a5bfd711b54628987cd7d3bf683cc55358eedb8b67a610fbea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef73a2a37a27a48b598e0ba62ea441a
SHA10f231a0ed04dfa35fcab496f47681ef08791adbf
SHA2568dd1010d209c9e96f33e6e8e90998127d74597b924e3b1a07d13ff1f5648b293
SHA512ea9225397d62d732fe73c1267fe0bcac9a44d7dcda6269c8f4d7408d9281547c285b976546908e2c45f50429abbc69551f999bae1795d6c75ff27bfee70f92d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c290c464ec292bf50514fcec4b9986e
SHA16809a7d3bd4430e38b23691a8c876ac506435a45
SHA2568c0416b435f0dbf24678d17c76b419da0fb1e820a21225a70db98736fd11aa0b
SHA512164034d5a3693f650b9302b62d63e85833e70884521df3ccfe9082f4ac097e46a175d287b0f604dd6b30b7accd108eec6b44deb31b26a68b6cd18290f6ba8e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd149496de640fb39a5c0539998f11ff
SHA1bf8c4230bd32355edbb8bb61cf1eebc2865b9a77
SHA2561591ca177c1c16033a8ff76eebac5371c3504c669ce01c56bc9773054c2e90d4
SHA5120a8342a7e331659e1b98bb86d7832098d9728ab1083ab91467e1494f2cc2338092bd4b0618200f6dc3185099fb65214b80949e71edb1d5bf64887c8b39ff3a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559b1d724bbe61c6ccc18eeae6c4b3b2
SHA1d05ce628d00b6b431b8f195865f5b3cec4ca36a5
SHA256b944545f2f08cc6f3f176fcd157ed528de4b26663e4b709ed392e965f114b140
SHA512d0dfcbf831d4fe24bd61b3dd6475922afb9d7776d129efc3eef257e8972a9a61184614be472788d4be460317b08b806f6bb04286afbbdbf364a17c56837b1425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529488e1dad3d2f247fbb7bbf34c8c85d
SHA170cada8620759917cfd418ce0c1b1dcf2a3e51ea
SHA25600c7b58d7555df4dfb49a3ae9f7632c8009a3a1712ed0b822b3318f692de4bfb
SHA51223ff5f0d85451a32cdb384ebe23f0bf704f19e5f15d03a2b519d3126823ef0dc5db6b99b806d14f74f2c05ec1b7ec8fbf718642426a5db0321f92970060d8027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a609eb81cf3cb17f6fb42ac7e28510ac
SHA17f2da74908bd298569ecdee24b4b693331b9ae00
SHA2569665f9165bed6e474229f575824e398af687291baeff2bcff1a0458b4c84b61c
SHA5125e9e47645863ede972f27f7b38d0f6214095c9f59972ef28ea2d9a3c715ba96dbadf0b5e5e0c318ccf8a1a0d7a0bed09141074dab4c6fb6be48f3daef1a94c58
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a