Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
4a558fe9655fbfe0cd2a271b058518e5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a558fe9655fbfe0cd2a271b058518e5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a558fe9655fbfe0cd2a271b058518e5_JaffaCakes118.html
-
Size
67KB
-
MD5
4a558fe9655fbfe0cd2a271b058518e5
-
SHA1
dbd7d2658ac47f8d1b61c8843a2e6d575df33f4e
-
SHA256
1e96c972faa78bf73a75eae042d4e6255f2eadfa15f4f9b63f9ac2c0fa3cd73f
-
SHA512
9236d5b6008164b339239ea7629076d41ca68aa2dde4428d60001d2df51ea72e3aa867fc2cbd795a243eb5195ad2765261cb72f5f9046155d9b4dd5f71e5ef6b
-
SSDEEP
768:JitgcMiR3sI2PDDnX0g6uKdIcLOoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JT86O/TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422012144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000db4019d6035bb575c0685b37cece728aced4ca12714dcbf09867e4753d1debd2000000000e80000000020000200000000d6e63f5ff5be8ba012386c6ebbb75173f2abc981c7a2a0404e478320b187bcd200000006ca9873245bcbc323f9dad0807ee204d69facb444e1ee6400ba2d560ab870b7840000000b01a67b8bc6ed1f5460abad9cbd461939ed19c38f53f8f9a448ef696d9d3c4f572403ab3d7cadcff9f4159b20e29d7543f713307f4a82156e06e4046af448012 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1080f52670a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{523258C1-1363-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a558fe9655fbfe0cd2a271b058518e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566e43ea2d51ea5f94e9be86d2fc3c82a
SHA19eeb4b22782c21aa17e79d7f0879a750440a7855
SHA256171de28cc2eea4b36302ae035717d02f7b2382de86f3b1667c408ecbf548a8cb
SHA5128f9670eb9528ce69aaf90c857ea727a09ef991e8dec0d736d4d54ec10d05170bf8e322a1a1c21c7e4f541497b09e9295891e80f50e6b860e876e3840819a665d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7af64d777c3d75663accf09f2fb6b3
SHA1e3d97ff570718286d165a32c616db4b9643ce31a
SHA25655aaec6e28ebbbd3916110ca74028c373ba7403e7ab3d001a78d2365297a91a5
SHA5128829817b145f34e6244e58d18221bcee213ab4069c525e25abf868d2acc2aaf916079840eefe08bef601bf39e5f5399274b162d8efa920c9225bff20f2ec71b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5993db7942d4c839dd18561b7803548bd
SHA1916475e4c44e4c0629bf31c7f5cc08d2ef68006e
SHA256e353e0a4b0afc02bfd27a57bfe02288258e997983d2ffe1cb8e8721632ae460d
SHA5122e95c5b0d0aeca8d98dc2e6a1280a441be0a5110b32a4f42367608893208706a86a2db5be051c8b3d1a9da9fbf03806bdfa0e63cd3333477ac27f78b20862534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697d4a69c0e881d3445972daa8de6543
SHA1d8991a775a9853b530f3ad62fb7db398d9021f46
SHA256fb841d6a0b3f663da99a4e5c90b92f039bf6945de6b1e0f5bbf58a123e86c383
SHA51221042085d44aee460c61c75d366559bdb7e81243288d907436cf5b430f0557e1ca6cbbc78170726a7cee9812f09b94ca8d1f97ae9966782d6b6f0a7866d371ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592240cd75a916c3524ca169da7da635d
SHA16fdf7e17cea28b245673a5d6a690c3b1a3aac6c9
SHA256ee6ad38ff887099f433c0803b1b18bafec5d4a908e917c8eaee16cd195b140ed
SHA51282b28d2dd8a34b4848822706cea07db34d10c524985c4c8ee62ba8d841a834644ca95a558f492c61f078acab5c5eb8539a930ba29360ea3d5f390ccf41529dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dfa69dc07940032b3296f8339522227
SHA103b69ea524921d9a16d2ed814d94c25b608621dd
SHA256cd5b2940756c3d506253dbf7cdf85bf5f8acfc15124c61663fb6a4f814f6110b
SHA5121886bc3b67e6eda95dfc0482506eed6e427461c3fecde8e5dbf36068a224935a6ecf0e9f5c3442b3f7d6d541cee80a92891543781f77c741948974e72ae072a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b8ba4393c493f24f17e3009de559d1
SHA1b97dd44b8bb1975735c542411368dc6839221db9
SHA25636d3857dfb3a761b66b912825d96a4741c3f617832843126c82e2fabc81915b2
SHA512b950642323d3ce83cfffab7ab1763c3f430a5a4bd833990533310b1d7fe75e15957ac9e4225e83f877b2417b0a3afdc6379b71bd3bec1d8deebb4be326b710d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3dda103ddb5f94eab32588061245ebf
SHA1b8dd270dea6331f6469f1c6e2ed62623e90f4614
SHA2565185b659e99c683196ef405cd487cc9f9b54e3fdafcdd1ab7cfe400487becc4b
SHA5124f12725b2b8600c0558fd5e7c8ca12bb4200192532125e71278122915aed18092e9fbf5fc0068ca1a54547d0138ca14b50e899a2892caf150a23d3f762340485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642e6c6865944f9d1caba7150711de97
SHA12b045f14f432cae3c72232c1d93126bf232ed005
SHA256977509211f85502a35e75a2e1e9d57af17f50a44939d7300b5bd51eeaef7e31d
SHA51221ae5a9e09657d083d0d93756757c93d4a6d5791b684af99f7d9f125729ae50a9e181c6a7ed856701559b57bed817ed42664e4b3e6ca1a2df067e77e99d14e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edcf0317218f092a661bc37021ca4771
SHA19d920f3bd4e2c5de43b0b9488217c65bab62866e
SHA2564d60d9b40af218377d80c3a337d07d36b82100d21a3c51c6847d20980f363db5
SHA5120025d1968fdf68a75b17545dcc71babe2617e61f185d9dfb2c18afe9a3cdc2096a80151146e67e6ed7e814091b6edd422db0866de8bb745d480b72ec9a4a699e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2c10bf3243472884fb41d58d974dcc
SHA15f751e53308ea2f0bcb3135f6f11a5aa67c00af1
SHA256b030e62255579e1be44c8ddb491581b348e06a07dd18b59e514dbeb39d8be83d
SHA51287014ba673a9d5f840153b81f630bc0e055d72ee6c0b26e991ca4dd3deafe01617d6dc2ff377782becb6955b0b6e053ac0e09941b2ef24d3aa2c577f3a32a61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ff83bc7677d41ba7228e9e37542c50
SHA1df6ea3845045029ff2f821392c5533c4e56dc405
SHA256c6bbb5b9f5ab3d99babf6cad751f65d830616cffb7b3211d8d16e6ab850cd0b4
SHA512057c6392151f5a619b6c53e622618190020f66084a75aee146db1a894bc5a09836087b7e4c3f65e5d7652a55ca15ad15342212bd425d0d4b5188cd2bddf7dc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533849bd1a0be6604628a0cc764aa6f1e
SHA1613523b21b28d3506d52df659b5b40e3f100acd8
SHA2565d7d89961ee8980b432cd20c336e042d79a75c2a28ff4799333e683581711f84
SHA512e171b0f99e056a49e53f02ae6f12be50d14b0a9b0d236c82c594551ddf0eb8cb61665406bee9db60897f1e80b435c3a37d6c441832af8526d251f2bd7e0e4a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c41f16b11c24f0db4002be63e5671e4c
SHA1c6820364a88b0dd117dbe583b47f96f93246465e
SHA2567567b60233c3aa07afe5e4a1a56674c6992ebcf1d4b9ac74b875909b369a3215
SHA512e2b2ba5f3d63e2267a5ab38f437f8c3aecc1159a83796c970f7b557deb8ef6c5614d7cc3dd02bf314d0c2788a66d6bb96a54543fd7d770c511d7237c5aa7778c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781568b21dc5477a54cbbbaa71849fe9
SHA1f0b4ca6bb1705923f6ef91c229199a744b21051a
SHA25673fdf4e39adedb211b97667ae53e70250ccaa2a6caf284fb1a8e9356fb7d44e6
SHA5121d63c0e49387a26fec98877cfce19483afcde2efc1881635b1e65a6e717a136e7f2e563a5b42ed669319afc957c12b3c3097003e80f403a6e78cceee1e785a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f59e023d12cb96e800ec306b04291c5
SHA1fd9cc700edac29bfa0b2715a122f3dd90d75c642
SHA2567b1d623475fcd9be8ce21bf82ab620b3290ca562df2fa2313d6216da6e6aeec0
SHA512fe2f8498d709ca27bb2cc29fc4fec3a0f8ab39f2e0d72e056e88d55abbad6d33148298e16956c0bcd15c2dba2d35e6c715071b9feb8c664d4ecec9bd6fe8f847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53023327cc5d2066933a1f796c034b5dd
SHA139e25ff8078525de325f396f51081e98d590f0ff
SHA256c30c5ae6737e3baa2a028c734caf6fa6c28afa66ccc92a9565dc40f63db2d4a2
SHA5125d1478b545e5b77d0d13aec5959d87d681c404e19ccf82fc0d916cce56c284d6ad7ac4452bbe8fd3e052ac00844dcb79dc3036b77ab063a49d67d985b66b40e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d6b523e8885d3e772846a4825dc17d
SHA1cbeba339ecd24d024dd892be144329db434a024a
SHA2567771750ac46dfd9f262d5e50bd48cc7972c38bfe75cdfcb1d1cbe4e13eb9f1b6
SHA512e22e6e5a64e407910fc9b2e24040ad41741fd6d85abb0497ef96083db9176ea084af9d6aac97d0d5e38edcb999033ca0edfb6d4ea15632bbbedec093947f992b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634ecabd5fc84370fbcc0bbf4141e870
SHA139b94be8785937807c2e7dcefbdc9514133416e2
SHA256d786214dea6b1d0eb1be99f0bdef6de901ebd4bc269ec9bc68a5f299e304adcb
SHA5125da874562d2407c7306c03d50eeb3e5b9feeb23f86d0c3582c3977859ee43b7e2dd7d485c97858bd708062343e1318dba5cde718db1d38ee6bcc1dff24166146
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a