Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
4a8c486b94affd9feac4d7622c45e09a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a8c486b94affd9feac4d7622c45e09a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a8c486b94affd9feac4d7622c45e09a_JaffaCakes118.html
-
Size
4KB
-
MD5
4a8c486b94affd9feac4d7622c45e09a
-
SHA1
cfdc1a4e1e640e3422cbe29f8a8e0272a156086a
-
SHA256
346ab1bd3736b2c23ca692c22727c7b76f21b68d730f65e6436d0a0e96a834a1
-
SHA512
9ed1dc58cd98f55cc2ad6d8803850740b4c540cd77deb449f9f3204daffca66efdfdd11937c07183fb1a6c5e0cc97a55fef916330a90cb2d257a5874cb33b3c6
-
SSDEEP
96:ziEXZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhVDSWpp:ziawV4GD8/h/KiZwQn/q/SWpp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000861e16cc26cb50d4da9ca2ac07c467e808a061dadb03970de1f655350fdd99e4000000000e80000000020000200000005d805d336d7354e0fc7d9dffd3efe0b86b5d5e0b4d81af4331dae1227bbc2efb20000000b3930e7fd55a8e20a83ef134eb58e6b844e9001f8f139df00c01c2735f51e136400000001be09e5ff8cee47621cde29eae8610257083828e32abb563b93ed0ffb351cee8687bf090d8d0b402bf6baa3f06e1fbc188accd79684b27ad407828e03be99b25 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{457B7811-136C-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ee6e0879a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422015989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28 PID 3000 wrote to memory of 2208 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a8c486b94affd9feac4d7622c45e09a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e8017238247123db8511f0c575a4231
SHA18a9bedcb43a4a4fe134d0bcd4bbf71c8054cdd2b
SHA256324400cc4f2ba92f044632afb664b66d543dea3522d2279479476427b9733882
SHA51235738e9b95fd5bd7abf597dec64d04853eccc27a6ac10a27508ec95531faac253ccbe8a9aff7e020c806469c61ca0916a0aa48346bfc4973767c552224a67f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8bd381980c181282a912a03f809938
SHA1c76ec7c1bad71ac0df977a0898f9f65f196cb9a2
SHA256f1015b6614dac21c02b492244bd9cfef6081c6dbebf6e28dd96f3728d61d7f88
SHA512472246cd67dabe66b3ffea7c48d4e4ec41d04cd67f0a8a96abf99d4a4644c6a9315bcf28efbe94f859416a96c7d33d127f0038f70885a9969cf1f0b9a7a6ba44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b9a90b179e9bcf491805c388633fb1
SHA127d5889929e8f1b3b1a744bc0ffda558512a8b74
SHA2566be78134db3b4ca7d5446ef3528f6fa6fa5d45a022ad946369e363f022cf14de
SHA512a4fb18826aaae67329d2bb6d428236d92f9414b0484e8134dc8bf2bc627c61ceddc922dfb1b71292ef9118c33a75cd2ff48547fb4f156d78613282627be453aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965114ff7e28292158803d80ceaab084
SHA1ea10bcc9cf98f3f18ccd944e41d26cd9cdc4c10a
SHA2563a3f2b18c2eb23acdb706e5514637439d4b3d2f16071b6bf4c582b0bfc1fb901
SHA5120cacddffc3ff16cec3e168825d703c2c67f86a534274573dd68c85e2a1ef85ea6564bc3593a61ce8617b8932f5810e9900ea62201ff96c3c4acd37e673013292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52474c8ff21e61ec856a515b3376f2c56
SHA1a9b94c8de8d2d90a9be4952de5b9dfa2b2d0ffea
SHA256c4051bb8aca81da8d967aa01eb182cfb54e51e057c1e0753f76e0b7b25920be4
SHA512c93f19580f386f109e2e1a6cae2adfc820ef78ef3bf61aeb6cda7ad0324de32d0545c2f3773fcef84f3545f3dc5ae3c6b253caa034c09b2aa04700b46839f58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e48a5af133e619a7d4d30355e9ee2cba
SHA16cd54516b84a6bd3c928e9c5f32664aa00086ea3
SHA2563716c9ce281bfd683c42c97a4aa2ab5c2caf1b6885a46f8433bb7534182d336b
SHA51205e8e979afa3e490c4ff3d033ccb2fb51a588c5687998fd380a0d497b8ab860257b5146871235d0809a423f20aa1e0da7183db6b5c7f82c34a9e8f8c95b697ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e414393371c299363221896ff1abeda8
SHA13905292e07be75673d42c005cebb88bcd4a9afec
SHA2563ddff634d0509e9adf8183f1a4f980c0aac3fe86375baf39b0483d2dde87425c
SHA512519af29eb896e672f7d2d0e28c677c4875ac431660a7e28e22f8ee28f888b7a29fc367759f52ec11eb7968b76e1d3f1e1669dd9df2fb2dd39dc58b5078f3096e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54454cb3e418234b94a178398638dd1fd
SHA13e37e9886564ae04309a5cb431ebfa8c12b9a28b
SHA256cf20fe6b93281ac4e49134b1d41e2e7aa4ad35c692248fdca664c0b89e2b12a7
SHA512af6098f887f755607311ee5fadb1c10b4052fcb974680dbcf373e217be7540b9ed5e26311ff633f42b57bef09069c00c1abddeb7f6e35503f5d5874c8c7a28b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528887e1d97f078a492f467cbaa141a49
SHA1c179ed082b6e990fd611a7d959e57a6ce2bb7751
SHA256fea50a0d50156c71ea6f53c8fb9373c4b96e9291dbd8e49890f8d1b19c068f49
SHA512381560e86ba26ad732ea5086616ebc80103d8eecd446a29981be01305648c9b1f1957dc95604f797d061c3e8f4b4f390c598f359f27a63cfc7db843fc0d7c1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed3e78061686b15f9148796a786272a7
SHA1671de8a7efa3fbb615ea66083a7e9f3966527905
SHA256d9d0b65de6679a39357e65687eea9cb381da40c4146043f13cbd6b55cedb4ea6
SHA512ce4c4254355912eee65f577561e9de32200483955daad5b62990cb51e25a9a31c65a732492cd94212d4700289967461376e7050bd08310f7afb9ee7333313c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584106155f23bd1c4e26504207ce57eb8
SHA197dbd29192ea84ff8280a9d08e0140ffa2e492d3
SHA2563ac5d6a3e01eae8e727f23bc78e8c417686cddf2b2d955e46d7d6be08df0dc62
SHA512704570d432484c13e4ccb1a79fa24066aec8ceac47f1d1c8e114c9cb6d56218aa60c2a9e3eb97483fb9577a4861d2ef30a46afc5129167da459da34624edc18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b43f2fdecefb19f4ff74cca60280e20
SHA1b166837e3340f9fe5a27e1f7004f59d066089309
SHA2560cafbd7f7421ce4287077e225f0b85676ac8d0eebd675e86d33372d216149e5f
SHA5123804a451dd7b0b08f0a45e6260d293c297d423a4ca39daffc6b26cb46e6dfb4d7fceea95c322d9736a9c8ae7f58aeaa1505ad0f882dd29e1ddb295ef3d8035de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5026ca0f07f02e0d027018cc0855d3e7e
SHA103169eaf0b16012c0de26abc0fffa5f26da2a2d7
SHA256536dc418fc2f48f4bc0d058a966f578a63edd9cf85df94690432ae5441ddde45
SHA5120724367e53e35b16b78067db93a904828d01bce161a403a3ab569aa07e82a87f9ba9958f37a901761a177c98e123be6987862305737171aaede282cb176e15b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7716ffe40a89fa79e55bc8421d8c20
SHA1cf51002a5ac08db0b8da55c5956635c770874d74
SHA2566a2cf20f1517dec1f9de05b926474a44950ea5b4a7ed9e9bc2c970b3139b7331
SHA512eb36cbaf5b49a9741fc90b9fb5a0c11f0d0d71d16f19fc6211527a4c11f5a78dd35bb61af408860855c282d0ff9fdbe6a6d8f644f2f32fde12da0d9494a21a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6424d5abba5bc687f6ce1717d5f6007
SHA1502f9105ff01664c453a105cd2ab38841f68706d
SHA256d2900bd0f4af430821e88964060cdbc1e6c0b94cc35940295594ebfd2fb9eee0
SHA512577930aa9f595525715eaa663fc0a046a842ea3f32bf34a57b83e47faa60e5efa8236bb49d663985733274d080fbb7b3aa6928c243d1cad7378bd989248e8dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7354349750863043708c3900906bea
SHA12f2a30bc6c3cdcedcb9dd417236680a4e46e19f1
SHA25644107a8f5217513cdabd43049b57bbed00c94173abc3d19b35a3f148eecc8d59
SHA512bf2ccccba83058f001bf431ac6be84e1d6bd5531e4eaaadc3aa6cda552b4a04b1bb29e3bdd4193ea9525e3b2ad038535e972f46c4ab561aa4d8430a0167297f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d477d47cc39cf570481298f729dc385
SHA1e94fcef76e44b7a12657c18e34afebcb4a378906
SHA256ec5254cc9528e47c9f81652f5b954ec1814c4006a41c294dc77995246d1262a6
SHA51200ff2a7d0d177e0cf70e48615f5f15ec5327269f2287c0be4107a13c2c3bfd583d9de753f1019c994a2cf6f97efa427369b0c2c20202a6c6e04aa29fb29e1afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6cced9c07fc96e893bfb4dc8ae0daa5
SHA11313a6b359d0abedbdb299c3a4e428282826426b
SHA256f54ec39343ade919fa9acecc2903dd47904eecba56032f8576c7f401d526cfec
SHA512578a26fc5e30d0cf9f25c980e3a581d5635834a6719b87cf01f6d52d1bcefc712e7f9edd0af663a9e245837f0c5e7c924cbe1a8dbb0769f0ff00fbeabc994a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa5f0625fce75b2a9990cd773a71fd45
SHA161e1416334e3f416febed7d7d07fce123e9740d0
SHA2567e6bed2d3913195856e11fac9299a904691fcb0ce5d0f538ae032787ee155f41
SHA512fc291c9fd4d694050abddc863e51ad5bc8e55c66d7eef7d63b0c75aaf296ca23d3956d94a06abdbb9fa1ba11a93d56d059ce4ce25762c7487fef903181471841
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a