Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
4810cb58f152bc39a94dc0de0c4ff8d2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4810cb58f152bc39a94dc0de0c4ff8d2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4810cb58f152bc39a94dc0de0c4ff8d2_JaffaCakes118.html
-
Size
36KB
-
MD5
4810cb58f152bc39a94dc0de0c4ff8d2
-
SHA1
ccf43bb0dcf5879730337db8abdc3886177dba8a
-
SHA256
f076908e88fd44bb40739e3c21777a39654063362bc82bbf44d66ff33e962780
-
SHA512
55f18021515bde0e6d621009cbaa00dbbd393d4dfdc8eb854dd2aa783b0fca48f13d56461c1dfe1cc8056e233f95e27257398e599b557451b95b0c52bcfaecff
-
SSDEEP
768:zwx/MDTHwq88hARBZPXAE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRF:Q/jbJxNVNufSM/P80K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c058e9db0ca7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421969499" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a00a57dadbf29a00fe730b5ff25e2c74e50d070ca789943e8d8fc85f34f4e1e2000000000e8000000002000020000000f0d128e61b51c37f9080624f913a8f69b7b48d4f6b46534f72d633f55ad35b88200000007667db7775b15fbcf269db2483d9cb11c9c7c0691f61cc11f3d293a3a6b093574000000010c625c0374659c69b551cc1e7d8922175674cb6855c9e383054253fa416c5430a7060d63fb18a380b311e7718c7c988b3ec1f7b78bda7654d407b10b2dbf7c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05670CB1-1300-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4810cb58f152bc39a94dc0de0c4ff8d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d770a55c5799f4882d93d1d563a4e6d7
SHA19ff82d77e475e1a87777a3afb6a4f576f651e372
SHA256a142557aa08ba03d8e571a3eb9cbd3bc88cab1d419444c693cd6dc4eea893430
SHA51234b2a3b1a988f163bda86b2b8ab4cc704ec152c98b217152e1747271f03386286a20b9a31e799fcd9a7ca253f75aac8252a8eefe7802de712f78392e5d2962e8
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD566bf5a447bc44943f2f536916d8faf9f
SHA174efd6f54bc56827884b08fd1a283b1fa9c4ef13
SHA256b7119011a0806bcf7e79849d8b106583aeb003b82e3d8e3fd69bc7a8d55e2a3a
SHA512b5b7f0a8b2896029a3f94ccedbff8fdd05127d3d1fac4310b6641dc1244051ffa6acdba7f50ae5ff8c5628044345d9218b6658be882b57753825c7cd8684b7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508dfba6c48b35d600242892f6617b291
SHA1693c68b87d0b08aff1f44f4f24065d749eafee48
SHA256db2517105451bd8ff00cbe123c25d8f1eeddeec017283843ed4059d7c413b06b
SHA512752d6b5fe029558af6fdaab2e38add6a8505e84d278f56eec3499055b149f85958466131a3affa56565f022659984da17a13329f9c5043feb1cb8e98a377e4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac476bc8a1e6830f6d3f9cc90df37791
SHA14d8a107b7aed1fef527d46727a3a855f55aaff5f
SHA2567a5856951893f302aae69c2de5af206ff3f542e74917e62f39a44a25a3d62665
SHA512a298da3b0b58526cc84aa4bffebadc2a8775bcd71b092793ddf8ae79b212a1a2f83713cd5d18006ef1a51833249bc39737ba022ae02fcf1637fb5f3e8a817e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288aba4befe9e72801b860135ea9577f
SHA1be739e1d4f88108cffc210eaf106970b3a1b8c69
SHA2568ced4773f4d7a6cb6cff80c900f40866ae4b3d876057f75aa54fe01e76277955
SHA51280fd7f2e208a0070b7ee3bbf4c60f32434e39580f2a91c783fb3320a718c73a8754d1fa8660f2dce43011d9020f43642d976d69f17bb2784162b60b2a796aa6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418c2d50d30f6d76cc549db226fc6f55
SHA1f7d2402638361be5d66154734b42ad7465109037
SHA256bcece9a15916045db35aecd9882dfede49c09a133fcb01b51d3f4ba9f8ad6247
SHA512e65394bc71dedf53154aa380ad232a4ad0c613d80030327e28eb9ed7933aeba7bb0c1fd8a32167a1bfd09f1e7dd03ad33a079d54d0522c805c6f4575784d51c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e1d02b9a01068709061c9c74656d92
SHA1cc3cce4c894c07db0251d7f1a1600e6921a5b19f
SHA256b9f076f6e852b4b8d6493c9312e2c48faeb4e91a675e406e4c4e90963439f3d4
SHA5128d3f0201fd6ac42d62942f4b6d7d352b1444f7ff6e1a5f1a131c34c0d4fc64560ce6213799bde4f6cc2b4c16072765f2760db8da916bc6145bdeebc7b276ab6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f242afe247244d3e756978704a875e7
SHA17f3a7b58ee243c6da53dcfdb9874f4e9e5ca669d
SHA256b4b53893fcafe4c4046cab57cbb8fbf85285d31c0a72552d75f7af68937af65c
SHA512026d72de440ffacceb00180bd4f3e1d17ba0f331efacbb6125878234c33a3c4bb96022c394a4c6703f0ecad6dbfcb90cde8887ee8a9b228b6442c95479f3e2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f20c9b40e046bddfd54290afeb17e4a
SHA14716cc10809411a618dcc0dfc4a93eb5a377da14
SHA25601a9933468987106bf4a0c19fe4507557f5972843b7fdefdb3c389310622dd6f
SHA5120b33b209920a99a45086a867e983071c70eea406ebe0f5c34dd170a6118039b9e37927b8f44f04ad2174c7c10c815a2b7ac04fbd684cceb137620bd3b4d059df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613e19c0cc874ba4d8ba2fcfe51a7456
SHA1c1a985af0122039724968b356ed0342f7cf7c2d9
SHA25622acf5eead7aee8cf536f7664c203b46212d1d854cf72fe907661fb24decd247
SHA5125d0d0676f1169121d4236cdc21dec7170fc911868fd595eac6e7a950cbaed35750a6a26e89d484555850347a4c37f881606618e9e006351ba4d6cf68f85ba72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03eff33de7368445665f7c4dc661e78
SHA15a30d0900854cf6e65f7407225064a938851c1b3
SHA2568d31f4438a1415d21993198e49e36dba1eeda6a0ed780af2d10585bb968980f2
SHA5122651037bab31054ddf6014748c7298c17b13e1179abda87192bb74c225b5fc5da4de28326ffc82b94c62a26100c21c5676b5783938c6312b77032b2b7b583e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e597c6b7998acceb5fb682af9ad955d
SHA1006745f387c15d57102755f1f850d51140edfd42
SHA256eaf645cfca87eacabd31c2276c1ad66f085a6807ccad5ebe4702c978ada852e2
SHA512a974c5e490f54be1facd10ad4d1ccbfd0ea1ffa46568342003b54563b4810f69300fce02f2bdb7081695125d58fa8a33481081d269e36635a5e891cf782b4e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bda5ebf896dfb615b5e9cb842bc2d3f
SHA1c2e6b248875b53367c9960228b7e6a286088b560
SHA256597f85dda3692e6704dac25e2ecabdc708b20c693f40ea00ad9ac51068a80a91
SHA51218c3ab027e2016bec03a0e096851ac7fee6359b99a2359ab37a4ec3a917bc96be61a3edb66379edc4c7bb0ff1a4d3f7ca1ff418ae0a19e9a174fb7104aedb5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD511edd308bc7cd7fb2a6593f2b52abc26
SHA1fe60ac8bfe638d7cf2af041e522e528d8e44c997
SHA25689dae023fca2a604264df4215735751f826d7cc0f18794427bedd7bd95a9c9f0
SHA512cf74d0ed8b5fc34f448033f7caf359a74d22b0dd6f7b56576ecefaf09764a16b825a37009fdd1423d1fdfb2d8fb7f85631548f07b890a1cce538dd43aac2f89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD569adb09e699c7f2e45c3c478acdf5c48
SHA191b20679c037291262f2453f49d5702ac6cd9147
SHA256fc42d47ebb86e930581381064c369b5a65eaf3e494aca74366787bf40ba811ac
SHA512b8a83544511cc7bd76dc7983828917ada20e109eb21ed2d95eea03bbdad7935086be71421688a45c673a4db7191193193c3b00b7bd3c68d7449fbc0f302ec666
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a