Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
472e478396355dc8b8eb739a3588a120_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
472e478396355dc8b8eb739a3588a120_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
472e478396355dc8b8eb739a3588a120_JaffaCakes118.html
-
Size
70KB
-
MD5
472e478396355dc8b8eb739a3588a120
-
SHA1
1ca597908f505ee355139b8d2bd01fdee6b4b607
-
SHA256
7873f67ecea3ef70c864caed628c4bbfc6308be3f4ef858c83bf1907d56be8cf
-
SHA512
1f01406dce8f3d9a4afea2b3917e266a1bf8f1d6a56da61fdf12a9ffa27fd54daec480aae364ed067612d2f17ac993b6fcc628348887faad45479f198434bbbe
-
SSDEEP
768:JiEgcMWR3sI2PDDnd0g6ZwEj+mCm7m+WoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcs:JmJo+L2lnTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001aeffbeaa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003c6d69547326b73c42d69d02059f612396b8130923175c10f6f922b112cadd59000000000e80000000020000200000001869f23324b6d531083169c7db91b99b708c9e3760f731873c495bb5cce03cec20000000db933bd2b585a8a0aa39a2a2a40a64c28881d965b672b28831f7c3c7dc522ae540000000855547ec02ea335f3491a11aea6f13c540a5d7370c48d95519d001596520c1970823873536c42f3bcc1a9d8ce83c70ce4cbb1ec38c3d3f739f8a549af55627f9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27475A51-12DE-11EF-805C-EAAAC4CFEF2E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421954950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2704 2280 iexplore.exe 28 PID 2280 wrote to memory of 2704 2280 iexplore.exe 28 PID 2280 wrote to memory of 2704 2280 iexplore.exe 28 PID 2280 wrote to memory of 2704 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\472e478396355dc8b8eb739a3588a120_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b79eb85f626d5941b8494b2fcb193284
SHA16f8f47b3f90db69300b5517bc8fc4e96e92e7ae4
SHA256f5c4498c065e7759fccb3e4d4170d740c513b9d11015ef6eaf9980943f9da815
SHA51290c8b5af82fea07216c6162249087bdd368925882bc2834c1bb0e2557fb668902700af2c76ceaa4a3a9d43b3998d713880c047d5579256703f19482fd6c59677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567af1a6dd4f6f3e41bf52b14d277ece5
SHA1b6fb8c22439ce93e162d90123e96720f6f5322f7
SHA256de4485088ca0b00ca9d41d67c591b6ca60eccf5e8161bcf5eaf7e0a34080a35b
SHA5123ee06918198c4a2850258d4bd2b14cebdcdf1686745329de817aa667d3c68f864dc010781e081175a769c1e0325c9090b8773129a831886dc58b640ec53c465c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c80b94f0734f06591d1ff794443eb4e
SHA195b759122298c85e96a17b2877a2b044e0cc0576
SHA2561305cc4476428f81b344052b6bb770a45cd55d9ec3a294d3835257c4f517f9e3
SHA512a5a867a501b99c10efa555b1edcd7684861ad7ff712214edf53320babcd6052f8591cb82226a22a771fc3ed0bdee555128c8a586249f2732169fbb6a0c473919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d88bff3bc68fcb1e44fa9801843d3c3
SHA1a3e57dbd66a861f507d4049d4b3804bd6e71108b
SHA256fb9a596b18e7cd6db77ef7a3a2dc036cee55b3ef9b3ae9bed0b803c9458dc771
SHA51257d522ad941267dc36358156bcf40826a25371f9ae2f48dc58c0907540f5e0142bb1d67ebae83b36e55285d126a530f5af48dd79698b3cfa6ea5ae2dc73c6437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfe444c211a3b1762080cefea74fa66d
SHA1e4ee5e8d34fdb205f91452cf7dc51978134a02bf
SHA2561c9fda24999761d94b32dccecab8c5dfd85b3a27516b8171fb94fa8a6fe52eb2
SHA51208ec62bef66a9f77b7841e3d97d70f94bcbde6ebbb16f94761d1667ef26b49cbf4b9553d05a516efeff07953199af811340fa18a14fa8c84810ba5a9ded6e5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563aee38a933a0b971369861a065b950c
SHA1ad03077e3485742d03f10dea20f97e83a1bf9036
SHA256301eb502742262623bd3e81b6400f5aa234be6bb7fdf0b4a7b4f849527a38e81
SHA51254e825475b8e7f6790b8c5195fbcc600b37b476b3e402439055b34a5adb48b5931db9aa570c02814801ef920bf34eadba47bceb5261ddfddf4b09ebfe2eda04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b580b76d8777a89f0e0456f5aa3b2a0
SHA1972515acb20dba11bf15f36fe387e237e92c002a
SHA256a5a7677de4c1d6f6a18e698b36de8d9cfd7fc1f99da053fbf1796a205c90cb3c
SHA5127f9cbbe6df4d2ac6192fff84edb6d48fe890a5391d66be301b2e0cbbece4139e9f2b39a23b488e802257447ce537ea12d1d1f748ae7a881c8ee911aceb0b757f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e806130a22771cf752eea466586dfa
SHA14ffd8f618a73b8993593e5450752b8683fbca834
SHA256debf58f8e5baa8b2402b545f20e0aef0e09db62c8f8c884b6a3acf6e8cc1d42c
SHA5127273f417a1bbe47c3639d2dd0f041e6b047a309eb00f2c73912e3f74e6b1e83deefe69f81c5117acc5cd54813c8153381091a06fba8792917dad731c2d4251fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50526f7332f5847457888937cee609eeb
SHA1d12887d2d184cc1ae4b9a957fea4aa91e7aeaf12
SHA2561661da2480ed9d0a3f634f5586852856ee2a941017276ddee9e0756854343613
SHA512b6ee0c8dc8444427b1f65e9c658871d248c93b493a609e0e373426d6bf7192ece991a0379ce56aa958875209761d1f63b291670c766dfe86fbc9c71ded156bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51441ddc41723061d3a545acdebdc9017
SHA14948206c7117a3104108ee13f83615d386032567
SHA25684fa425e24fe998b8519fc8880db33a14b75c066d26046693b2b048cb5108a35
SHA5120315624dee5fb5c7006abf832cde86e63ad6b7269ae1d69c1fb0a3f063ccc1a398189ab96891e5a6f6432520a9c5a23189845aa50716f0193977437ddc6183be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a47fd24afbcd06066e374c7512f90d8
SHA133ea89f5263759939901a4e3a93833c09820a649
SHA256a136e266e1e1834fa204b492d587fafa7e0006184e29376596f7a472d2e9b86b
SHA5120be08a67c71d34268fa7049d3d740f85042fb5ba9f9fd937e7cabb3dd4cdb7eff2feed60e7f74d0cd5db9c4ba6abd1b8025c8eeeb76ea38c4dd0064486ed14b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31571bd62b1e6bc55579d6920f34fa4
SHA1da2d438aa9b352b863d970995d4fbcf3335d12d3
SHA2568c4487ee07fce31dfab6e69ed1793dbf704f6151700c8062f786e65abf599bfd
SHA51259019af7f69333643ac2cc138bbdca0facde2d55d2cc09ba1dc7fa9c014eba0cf8a7d147edf0a05766f6f2175815e29ebd831dc08fb0fb1e1b33efe9c2866fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51859eb0f133125488413f805c29463a9
SHA1d137c9787446a820bef61ac7af2c6ea860abb8fb
SHA2560610c0a15d2cf78dc4704a4ff04ad54c0bb6042e4acac4a0689223647e839845
SHA512f89282178f113438ec2747070994155cfd41c08717fdc8edceee69b5dcbcd6806cd1bbf6d3f501f5f531c91da96a73f1fa3c9af55af2001b2da1fd72573cb187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b173bb30fff9a25da2bcd8ee91852667
SHA1c43682a1d14caf4d97cbd69fe482fe5676ef7caf
SHA25623ecfc95fcce20052f8357e1979924fc9b64c21c756cee8a7ec19252d658da2d
SHA512f0d1950f03bb104d5dae6bc7527395e966766ccbbaaeb6e8878b6890571daf51850964fd84d7ed8e4faf47fb32a7d99790abc85db40011725bc5c0fe0bf2ec30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f94b451a5d2e6256a2a2895ee935525
SHA178aa27be9f1c046f5e497093a92b97a707a37d3c
SHA25615cd8e8ca3d00a3ec84ebe174373f04b66615fa64ab30756ab4d4d94abc2b028
SHA512748c7c9d84220e7f15834117741822c7b5392b5d8411af2e83cb3f618c7cb29baf98834694d181765e97cb6cab0ef66ac9425930e6a0208388575e19c3406100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e1ab40beba4a98fdbfc581191ea7dbc
SHA1cee8ecacbd38f4febe50c3786adcbb7c4d7dd0f1
SHA256b80ae5803933583078aa6938ec1a17d7d3a09a746a611979577fce7d2efa919d
SHA512af04328d7a677a88d6b9e4e0013108c69d3e0456b5dfaa45412549d08a0c2fd839838d2fa61f36584b2817a31d83b89f31e671e25f3f8ea929fe6605af25c466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f138580d82d2c1dda96cf131d4c5806
SHA159f3e62dcdf6cc1a4c34b636f8e0187d2c67880f
SHA256e899c47fcaad096c26530f428358cf8ffaf8e21c1f75878b294e6d7b95ca9cd0
SHA512e55f8b297286e331e86c1d909a88a08c1cf526bec2a89a1bec2d36d71f4ceb4fad8dba83937ecc6aa2622f4c3c4529f612db90422fb1e36e22183268e77304ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5007f923aa37036cffed4887d9e2f2d61
SHA19a7af6400582d4353ac94fde4a6b61be7c63d3dc
SHA2565ba5408b928c0ac94c13d2bc31e64e921e7f51c648188e8de8a7cf141624ac58
SHA51264810ccba3477037d90a4b55d9dea4fcb30b9954276d97c716d2e2cb35f837cd538075c035cb8bc78b76721d27eb826ef964c7936af689e6f0ca645f670fe898
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a