Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47f36fec68192b33854c739da44072b2_JaffaCakes118.html
-
Size
54KB
-
MD5
47f36fec68192b33854c739da44072b2
-
SHA1
86f307fb128aa0d09ee1cd4e7797f41d2161a7cf
-
SHA256
b88db92d71cdf1c0836d34693abc53599afcabda2c626c4f8e6e8c6bd5839b2b
-
SHA512
eaf95602d55bb34e1ba8c8b5e4ea666deeaac9f9dba8935f8d81c77520b65129f2499114212f03486038a0545e791404477e3611d55fd2f5cd6cbca37186e03c
-
SSDEEP
768:OgOriWNcaSoagGjPgYjupCwlg6XgOjbKBVIcreYD7H4J1QDwN/5hi2vOZ:Z/1PgFXgOjb84j/5hG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E454DC1-12FB-11EF-A233-7678A7DAE141} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421967606" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000855f0d819d2790aeb1837deec0435fcf41d2d109f8c86b9abee99a35488b4aed000000000e80000000020000200000009a45cffb715b3b840a890ee1578834de9deb3512e35c597bd3cd66e61644b68d20000000fe79f5de0e63e694e0a0ffb3e71aa26f865407afdabaf242541a289a0b2a5187400000000dbc2c22fbec1b15ba1b7b9685e31fa1b78fec7d640a4364908575e6ce86f619e4a0bfe838cef36679cf611abd2baf0e71b93b7e19d4011a932d7e605a88ff22 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9070a57308a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1216 iexplore.exe 1216 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2020 1216 iexplore.exe 28 PID 1216 wrote to memory of 2020 1216 iexplore.exe 28 PID 1216 wrote to memory of 2020 1216 iexplore.exe 28 PID 1216 wrote to memory of 2020 1216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47f36fec68192b33854c739da44072b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec2626be18bbab0dd518a7fc9947d83d
SHA1d13f69964a3048ce9a39f9d3c2facb6f2d47ca8f
SHA25696b359ad575f3cc83c2e06c94cf3f7e80551e2106554bee59e4ebc1a9ec405d1
SHA5121ca7e514bd1b9c4fce8d35b6101a0fb2e4c5948affb1a952353ed08fdbbe7bd8e253b58895f68e005dd83c1d0d4bad9330d4132f34ecb94149cddf29f5c6eb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9eaa7bd177d3304a7e1bc7c0ccd202
SHA149687fe6ae76cc8a85c9aac3b25cf78dd1466864
SHA256cd039b0a4d778d7fc7a8fd1b7fd3ff5308e151b479bbbad9000bced5116b0556
SHA51217fcc74048732d2adc2ee962a73dfa8e9c227a223b9cf1b2b11ef4e66cd07536c0ee99712d97a0afee655bd57cfae157bb348589d067fb262c47a20d8e27244f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a8102bb78c6a14cca25b8a4cbc5237
SHA1acfe8e6ba6856b0505a2537badb13248243a2746
SHA256f646d2eb0f1849d4e0d8329119510652025c86496b254660aa4c625bb984ce14
SHA512c35b92852d3e81992dcffcdc9ea553437f977b11a99c120aef250531d279e95125bca3588228c3863230f1fc823d11b9b287f6346d2fae6e50e912f513e9f291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb0071789ea0e0a528b126b1408acff4
SHA1cbfd8e814a8084f757c611b0f4cb5fb68700a7e6
SHA25610606f4c7c5e4ae1713c889e43c8dbfd321269f6623e576374d655a4d27829f1
SHA51286d1b27e0270f0683850124950ddbdd172a4745413ed9e8be8427a9566a6b4210fb1b95849ef12141a2b5737f8b99a58b2869286701508fe45e81154389a0d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfaa16c08006be2b5beeb5c676085f05
SHA1c0ce4a83994e0de9a02928ada9994b7ea087e8bc
SHA2560ac5dee91a7b2261e5941ed6f11a4012716f5beae4652c636b314c08e05a20bc
SHA5127c80815be5a46f733bd462522a85581c51aec351b724ea3028f1283e16e7314b0a808084709742232ffc3ecde1d614971d5461d1a5f55a8ee2c5048f1db56ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3ed142cb31fa22131a890b63847a27
SHA1882158df0197d7a22fedf95cedd4fb9505630083
SHA25653ff0886bd92fd20afb13ffe48c2a9c191803d1919ede2a432cf85df2864b91a
SHA51233ea3d311aea9e660bc0d5890f25c6efef55a1bbf3b25dd6ebbb5e5f764b459669097000e94825b3c686d63a27248c52547ae2b5f2535c56a32aa640b662a95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5615e85c1fb70c07bf5cc82bdd5c754ac
SHA1457bbc94f953e6c21ebda4ff33b2ad623e28b39a
SHA256365245ecccd724866d0963a3749f0a0c86b7b7d1075fbce0d89afca14cef6aec
SHA5125daa35ebe7afc4d65ca3945d8b39964bf83ded81a0416770e09340fcd54235d8755081ada773ad6380e581eccc197b4a957a47fc8b664ca6d030f29e6d46daae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c222fd889be33da04c9bd44909476aeb
SHA1a47ba02b931b8ce78766f5423b042c9f43dfaf4f
SHA25604a59c3c74e12633cc8b2da56406088783ad0bc1e646e44afcbb1b8708d35ba3
SHA512d8662c1aa6e2a67d186fd4926b0ebe0cb90b7700414e5482e658e3b526acfc226a3869835c0a9d79177de583973d146e2c4d6394ba34f45f06da72c5c0ec1fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80504494022da9d2faecb6026156cbb
SHA147785d3c40b3d79afebb50b8e7c20ae141e55d45
SHA256309271eb7de15db1b608f5a07aa80e69263ba665be14267f9b79ee0581da962c
SHA512a9f23484116c88a52ca848e632daf28328db80fe6ba541fc9d2bbda528b60d89aca98d00657e59e5b678005e0addb166bb1029c86793e4aa1650840746e728ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcca7e225d0525bf943c4585e0f887f
SHA1792a992541aadd73eb10d811bd59344f6e657e78
SHA25659c2873da12b97d882383058bd14ec2469e89f5814454c561bd44bea55f08442
SHA5123bddd1ea6c73cae0dfe8308404d3172fb638f3b5473c313318064fdf1f52175dbfa3f096caa52fdc6be865285c4f39f3cea0e5ee3c2e8145c6094cf0839b0062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5627c4bb97a144bb672fa9a3c3caa1c79
SHA1830aa484840a04025e13613d96e1555712f7d108
SHA2561fcc60c868364cafc76783aa5b1ba0e71a0c799827bbd307c97e2572c3d2b6df
SHA512882bdfc128b2cb70675edfca330323dd8cc55de405d0dd234d48f2fc8a98cc567e7117570ca533c921787caa86d348f1bb1a40d73f5ef550d72401547ba73a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53b806d23b224d6a49e97ab228d06da
SHA1d3af1cef16efe17b19da74e5adcea328d1d079a9
SHA2567cf46aca4e62120ab038c96b6e52c3ad6ac1e7bbaf55571de5b622fe55b2c306
SHA512f379dbb69e8cd1a7810fcac84c7e3a16c0dbaef06053461cd9a598efb858c1744a1d2905851c31bafcd75885346a9ba9d456d09fa06a84622254e6de88e8778b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d80e247c1b6faef9c77fff8385c10b8a
SHA13f9d3d5e6929811a5093ec551827a93d30d1f1af
SHA256f8ec824a6e7ffe2b6c2d0591a552df6e84e3708f8387511b5831b4e9b6192322
SHA51250bd792500b2348743d12415955640d62995d1299de47eb593bf122f1b853105ee417b2f2b7366fc3f17250816efa9edc57c4429bfd5fb185c39c11ef8454c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7af9c26ed1a2f736d43eb1016e5da3
SHA1a4b3647add6b9aa5f78609070b27f96e4d2b4f6b
SHA256f914e4b20429dfa2b72224709c61f586ce7abc09ee8eff63519222e08377c6d1
SHA51292d4e9f7cf1bfcf368c5e317d1a9e8f0703fd4d48af3f72870f5208afe82b4d2cbe0e50f095b8239d93e286ac713fa7b6138a58b20fe611212d4190fe2ef3b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5322a6152073a453fb637cca8d2035e1d
SHA1d3132803b9dacf0cd2f91830a14d5ca81ffc32a5
SHA256943787597ef7e35660e646d20231794965b8d3a9fbd1591976e145007799118a
SHA5123014e836be84cc3b66f6c0cfdc63121882fc621393173feda0dc1ba39e165033ede0cbbac22a653e68d446e093dae2c98c63984480946021fab7f88b36a635b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bf335f2fed328e52e84d7d6c7afdd3
SHA12fe3de44317bf55faf7ee988a8f51d09fb9ebb6f
SHA256d0c410bf2757b0a374bc67134149deda5c4f4849565c9c73a40c702702850d93
SHA5120236b33912df1f04a3b73e0e636aa998b1f84b00dc9a5960af309abddde4bc5faf242c9b38e46c23993d6095467fe1885dcedc7141c6b9679dc4614b17f79e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53241a8d0ceb67b3ecb028bac75a20b0e
SHA1559756c00c3f88a292a6c6d6939884bf3e816287
SHA256189e51be8b9fcfa27ec25a7681f0bdf7e2ea15e275c44d45739187e34dfadfa1
SHA512f9e4d98b61af2a977e93c25b5276943e039246892d76f0da11203f6f8bd9db4f981c386867e40b932726e76201e264d0c9301b07a8d406055cc83e7ba8965bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f8454552ea51fee9f1441e1661c6936
SHA1179f3748b127560847e7e7df109f7a082bc867e5
SHA2567d8b925a64916cee2e97ca8dbfd846b9de48536b32a220de3b82f0f52ddf304a
SHA5123fb8553b533545f45026b5c68d1e2ef5f6dd54e4a572ca5cba89ae2aedb82860e4dc0ef5964586c035b6e74ef09c96626e0f58c9933a3c6906116056dcbdeada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd72a3342030b42c55c8c71ee1f2a618
SHA123613c625d75c28538fa7f8d5843c62c8bd8b6a5
SHA2560013a97daddec1b8d3556036dea365f713428f6fbd5efd0eaf851c3c593ed05d
SHA512f21e5ae27291271f9ba2c79ee98023da0cf7ffc78fb5321c2ab8bb4e3ed57b421b08e6743cdc3076d32c1e71bf2e3a0480c4f3562be5d526bfb4453a0a2dfe5b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a