Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
4764c2c6de59bf196a72bafc066adaa8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4764c2c6de59bf196a72bafc066adaa8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4764c2c6de59bf196a72bafc066adaa8_JaffaCakes118.html
-
Size
461KB
-
MD5
4764c2c6de59bf196a72bafc066adaa8
-
SHA1
c890ceea4b311cc16303215664f154ad4aff7616
-
SHA256
52e261d20af079b35876f6aa776a8c0e7ca377b9790a38dfbd7bc8e8a165ec5f
-
SHA512
2154aa4f0c77f7cd1e06408dde2005f0edaae92684883fc428d4105e846ec4954cb98613a3158db5d13afcc4a0a5744f67526b4d21840d8a2268fd3555019fca
-
SSDEEP
6144:SSsMYod+X3oI+YpsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3/5d+X345d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70825e15f3a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000003123172adbb654d162e16c874804532e1470e215c69f082d06dd57fc6a4f288000000000e80000000020000200000006462705517acc163ea7cdca3afbc83fdd532548f57675a88f6cc238b884af9f82000000097f537138720b1eece8fc6595d57ae93757ea74eeeead8dbc151b7b10eb2a05440000000b88193812e9758eb4ba256f5fe817c0f69239d285aa49d61d65fbf9e3ff3714692892af095310a958418c03805846f551ed48d7064a33357dbb5739428b383c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CCA8CA1-12E6-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421958421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4764c2c6de59bf196a72bafc066adaa8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b88d8a3509ac2923f5acd049819e9ef
SHA175fb804901881028c89cfd2ec89418fe2712b712
SHA256bd0986f746f2651300f6b5fddbf15540b43cac62dac8e5ffd209e3429d36de48
SHA512029c3ead66cdace7e50ca9ccb9e7a14e351427f33a0c0ba1ff9c452d0ee47a941ed3f3b1ee3a3c92a53eafa0f8443c018f6405b3e01846e538da264ed680c9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54470abb28f4e9a5ea1cc397357af05f5
SHA150de83bd820399b020a6981f823ecb605bae67f8
SHA2566c00f81213aa2f4060034ad6167c2251caefec38c4be5cade8d9f588ee26a751
SHA512e07e865d4a1ba8e4248f942ad5d202073c8f16c4d652f477d97045ab554222b64af2723c882db2f64e75a16dc31ce14d6e1d82ca35960ffd34e69a1c11f02357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce93141f69277516f1c3dc7f4bb9417
SHA1adc1e4a5424a05998a86d65cad75592e9e029cfa
SHA25691d5b4bd168678bfe3bfea88594f9f29ef82c25950888bbaeb8eb927774f4e32
SHA512ac62d9030d4887d7c8d8bd202dd5bf4948096fa78c1f52c59d28c49fdbe1141380c51103487da1960c93a1cd9b112c977c810bf0a3473216d3727d42213f33ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54756281311e344ae1d9e82db3fc9516f
SHA1772f8daf137545cedc0deb5f9236371c65b2630d
SHA25669d1ae35a1a52c5e46b50e6cab4c0684051c1a20809b9ada2e5500a0344b95b6
SHA5127c84099f7886a827bc3cab69bcc88eef6750e3ee165afb7df8c1fc343ac02c5df50c7d1e159795ac4087cfbcb4777868ee4396bf3fc5fc43be2b861a40bb2eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e149ebbaf741aeec44ce7be9becfde
SHA149006f53e4dcccef01bb961824632bb0a0a8b35c
SHA25678d515bf24970529f9a3e119c30c6c2d87d1c66cab57fe21804782ab0bf745d0
SHA512ef7eb0b0d6f766a42e5703e484859bc2ff09b560d9951c7f3cc1b9775126755d1097c3b0306336dc6b7ca6b3a1f8d4971fd3ea00edc12fd3bafaba4388d3126a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5230dce9a65eef2b44e6560719532cb1c
SHA1b4bd6c9b8373331bbeff3d8fb443d6b70db6b857
SHA25600894d2918f094c73620a593475147700fb5eebac4aea380df00d8a74d6628d7
SHA512f19b8e5801c52588f10c845b4230e72fe37d38d5fe0f8e0cd39ad08da9e1730e62b398b0e38772ed9866a3839b61368c60398feb3126ed6e4f9822bb77a1a0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57586f9884de91e6f487117da4e5e27ad
SHA181249b7c571f19127f00bc8704a0f4669ddd100e
SHA25653fd94b1a207d7b39a7eef18a3320efe2d0962a9d75673d040514c3ca4ea1b30
SHA5126477ebcd58724f0d2d4f4916b1f5bb87a3094f6beaa2ed3ff57f77083c9859277fceea298ab9e0a468edb776c2e417da5fd0881278332df2d2b5900fb59b4f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9f0250b8bf83ef8741fccff06677c1
SHA10bf5c1e322e9c71523c08d03103ab52fee79cc4b
SHA2563ee7bc213d16a4c5837569d9a62ba45a960c2e5d5308226b64be9390a2e771f6
SHA512aab84f83e380c141a836f8e09debdac536bdd302d790ad107ce66205468fe3ea2d910c67bc41805e6760c1922e8424be8e87487b93cdd1ebfeadd2aa23d3383d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5232e310a015a10ed58be1d56f6bdf75a
SHA10268f366793f61f523881db42c812920eab92b63
SHA2560366b1f7a91b0f96a33e50e4c39931b43b93201f05a8be2bb01397ca15f831d9
SHA512fda532b2acd4aaf00b3b22decd16469801baa00f6e3bc67621ae3b6ef639b79f4fbe79429f0793f1c64a58fdf74625659d70fd84d00186b6d13c098180ddb2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adba1733803a51b17c23ea7aadc7444f
SHA12291e4fee312709a7b9136013d623c6c72767b20
SHA256c0baece59e455a043c744da892edc4f4af859a9dabac9c0bb8579c1f5b15257d
SHA512e37f19211c87f2341e58986065db850a55ad45eeec41bad849beff4e20786f85eb8e8c58b45460b418b4af9a0f06c207abf264b353e23496a23894c6bdb6f272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c10e2e8493cd4b41d997f9c3498eaa
SHA1ce88884a77491d098c9ee5adcc771fc07df3bd1f
SHA256f45c2b5204f71cff4e46da60cae524fcc4b5cf195adba33dba0817e14b75f97d
SHA5129e0fd35cbd122c459f2cb7bca44043c321a911a25802287132d5817efbd781cb9f56cb2c77236f3dafeede02d93b75cb42ab40d35154954fd63ccf33e25c5f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f438641684adc83c358af5bc0a413d17
SHA12119ec0231c38a85a9276df306b56a4fefabb62b
SHA2566c0b32d745fdfd32cbc624934b44e8c6ce302118ffed6c1f1fc8ce5ff8477660
SHA512705f606594051c5aeb8fc1cfb819d735c3f3f1211c43bc9bade4101c0b81614b2df0bbfcbfd721615ab179db23108b0c94f34a6d16c5e74a7aa79cb3edc79ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc7bf877771394f9a400e82dea2d5cd
SHA126d348bad790d7cd07999584d7abaebc123c170f
SHA256615461785ffa19471721c0243deeefdcddf8f9c17cab2902918b644c4f09cc7c
SHA5128defaf2e6856dd38f6cef03d023f69213baa8620e7ed0cc96d6497ed2dcb11c9f64d9f739a2ecdc48ee2d9dc87909c50069dcd44d7ed807c0728430643696a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b8fd903475aefd6bec3ab3ff1c8400
SHA14f92d0f21e88c605a54da36873d2cc8fbea61ed3
SHA256a3a54f6df0dd49dd7f9b59aeb94b92843d8d63175dad882ff7c84f5adc9f16b3
SHA5122b4a5c19682af8a1bad52f98add21a7a422cdb50bb9a1f7511797d05b265bfa9de3aaae4a82acc0af9151ba61cc6a7b183cce9b3935d4b36e66f8949c7846020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b73a15aac5e185a951f9f5a8ce27f48
SHA19e04f94617e3eb55d9f3557fcdfba3818751e899
SHA256807a16d3b0c1dae0c0b4ef01bc405775bf87ff7470f7b2482e5b9bbfdcf64bd4
SHA51249e3c4953ce3e556a87e09c0b32b55d3e899b822ffb2b3fe94e8cb682224d3470638f585bd134e00f6837190601c018a3a8f5536decb34a42b33d805a4cacaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5404cfb65bf14c313f1a1cfc9f9b9cc8c
SHA1ca69daecad31be183e866ad4b05a3c48ee1c26a9
SHA256fb1b03d4795c9d8195290f04f5ed4fd323977cbc7dc29570af1102eef4e5c3be
SHA512808237f44e0a7f81ca5ad55f7414562a77a324686c39c54dec33dbdef3588d4a3d9d65df8a97c00707e19a0ac7941fb4b8c9af7e9fc18e2e533b26a708225922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d3e1fb77bcf40f4035bfa93228b5a4
SHA1de8f15938c2d06fe818431a7e33c16b3368fcd04
SHA256fb47f7f9b8c35f4bcc60dc0e393aed5a4e6f31dd800917d2fd173e14763b2b06
SHA512ad915304515b32822973a51551b18bf46adaaa57d179a8694bc845b5c00ba380fef98f528df9599a099a6f0d2bd1b91c75f896c3179ccf24f16211c950f4f0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6da4332f306c477c11c115ffc1c95e5
SHA1f4d8440056a4c8b51f17f2cdd4c4f651222cec48
SHA25647dff089e824e90901af9168880cd0a48c7e11d8ffe4a85ebf93b3b23da4d0a6
SHA5124d10c942e517928797d8561e6d53f31fd5d30966d4bfd40170d05e2c662571a1898e9d8784b87fa8d7405622071aacc5d981280929515fae5be33a906dddd6f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a