Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
4aed6c153b43047c7fde58a13e588ebe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4aed6c153b43047c7fde58a13e588ebe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4aed6c153b43047c7fde58a13e588ebe_JaffaCakes118.html
-
Size
13KB
-
MD5
4aed6c153b43047c7fde58a13e588ebe
-
SHA1
f483d1d231f29e64d49f0b143b359a816abeaf0f
-
SHA256
47cff479710c00e8f9b29cb6c834c1531271ae4eb6f7cc7ac87fd51405749a66
-
SHA512
300cf9745d3449140a387e095528a35b1c921b61d29f45d5a1a58f07d5e1b27d352381e5a70aa7fecd5ec8493b08b6b68a0e5cfff816176ce424ccc79fcb7fff
-
SSDEEP
384:5Lfo/4wIrFCBmtyTzvCX/YHeleR5d+EXJ+S:Zfo/4wIrFCBcys+d+qJ+S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422022152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000796d2c7ee178b1c6b4286846c36318077658149b82e3e06d72003802bc2571f9000000000e800000000200002000000097b01b9baec7b47fb996d7b5dfeb908a818da5901dd5d3e9274a7d94ceb0805c200000007a47e18d5e417bbf26035ae51c453b344f3a022f26ea392edb63cbd6628135f040000000c3e60ec8e2d2053b52fc7038e3bce114144a2783f4d868f1e4bd7394bdb813ef46ca0c141e1853428b4eb875e8272c11d410e807fb979afa9912517fbc9499a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07e767387a7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EDBAF71-137A-11EF-9969-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2872 2948 iexplore.exe 28 PID 2948 wrote to memory of 2872 2948 iexplore.exe 28 PID 2948 wrote to memory of 2872 2948 iexplore.exe 28 PID 2948 wrote to memory of 2872 2948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4aed6c153b43047c7fde58a13e588ebe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df16729e70c776f638f8d9b062f7b36
SHA19fed9de63e317f6f767a87c75eb5dfe703cd44e1
SHA256b2343ac62271678175c5701fb09e25902658e0d1cd1f6a011584f3c2a2ceacbf
SHA512e5ff452689d848619f6373ded44c2974a91c68bbdbc663953c26c9dad6d2af3a00818238e7b65db0296ef5671678054437c688ae9c8c492e5110fce6bc86e606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4f47489168d98b2af2378436390f4b
SHA1ef3138725a7a02ac23700863a338c9af36e546d5
SHA256ae3df39f0736128e3dcd38289f78ea2e0a62594fc5e69a4866d634e1cd00e836
SHA5124e6ac4d8e829c74d720e3bffaa13a7641b74fc20bed062353d51e6737f9b56f500a9cbdecf3c2a11701597a06c5e8eb4fa48b88de9b66c15748ed4a2b2da6e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e536fd61716eb573c1a5531d5752fd8e
SHA19cf144f5e1b3dfc8956225c3139cf3cb68ccf2c1
SHA256824de12a1879dd3aade4fb59508bee3c3c65ae2ed183b323b31583251daa2655
SHA5126cb219efea3fc51643b61a502c15532ec14c31c128c93a47bd08877ec8645a42022617dcaa7c3ba0462e56f53b0c3d77ae52a6b97556b36eb13f700f4ea1f785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a0f5470edeab3c8f9249b637e66047
SHA134a858f4ff8c32deff992aaf4284310f2b7f8e8f
SHA2567f41483abeb17d42d085e2ac247bbf571a8017319bd13610945b01a7df1092ad
SHA512b84df76d85cf3c5468c1a62a8ff64bc2b499fef374c4e11a1881cc0e497493d1174862061a3b85bb2ee917b9b223916159e350d5849a5dddf629392f32d629fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea34a0bbe038b093fc73b940e1e856f
SHA1c767e946f520a059cbb51124a68ccc1d5a61c3a6
SHA25677591eb21d119044e7ba5feda46d40244522a03ec420860ed5c341666afb6800
SHA512f45ffed51af9edcec97339a3cdb5f1cacc058116fc4dc85f131e822c86e86efc226d97eb61fe2eae25bb75d819391ed0457de1ead8ec6f9e21318327d86b6775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac1f0f90dbb3d0c0f39b46974fa810f
SHA187b41c5c9d83c9211f15bbf28c349c761cd4b4e1
SHA2564d880e9722740f9a10aabbe7a68c10a78471eb37a311205c553e4d9b3f9d87bd
SHA512581863d56017dfce44cbcc12ee7f11abb06ec16d88ad9b9996e7e3fe0e17880eb5131caf09e6364196be56e0027d6d2ccbf5ab00c818166d42da33a6284ea555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e78eb2a21cd6beda804df849125a951
SHA126265165b031977fa79a145a38eb044bc27e22c0
SHA2565315b6c99140f73fdae6060297e314e7ec95a9bbcdf942d829244fcfd42a9044
SHA5121f1b425ea7ae22d9a8641b6468749353bd6d26abc6a546f9bfeb4bec2e6bbdd58b1098a8efb8dfa3109f24d7c352a4e11f34fbb6c46751a39c7fd29c2e70a1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd6068a58a01bb5e49a32b8d0606dc5
SHA17550d52bf97783f857522a143ff7c1d56988360f
SHA256cbae59272a3f2eafd2a1e49b49a7acf8cb2272803483b182ffc6ff6e847cc101
SHA51237f91da6c62ffd965a6bd141a73b073cf43602773afe11669346830e8cc46718b172a7ed0f8e0a11789335840405797a1a5ab96d14f8d13cce84d6fa3620ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552dc6d0587576eabe9b17379bfae1950
SHA100b1c3a6388a6750e07e7e741dfc6d7d091791f7
SHA25602a997c752e2fb334c79cd55cfe35d052af5ec7f5bd1a89e08490c0caf919ad0
SHA51269e0992acdc89848c7a2f4d17875c0b1fbe498f18d041603664ad5bcd593c18ff6a186e1d120bf43c62f75097c45476447cff81066a49a9304446e589084ae36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad267cf66d67268239eda7aae6382a0
SHA17ea54a870c5a67b41fa8c7adaf7d67c109d00b29
SHA2566a92f815a3dea76a5185c49a2f999c2c9668336f02175a9895806525d8f19212
SHA5128a8208994fc433645c6741355afed2e940f7cb1c9fb267d6ca7bf553500fe4272a8ca5c6268f25c6902f0190bf15fbceac0a33143abb23031b7a1bf890424044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52851e6d51f2df14042c395c9dea27931
SHA1ef1757d4c4b91a62753bf5363c5a91a79f10cdfd
SHA256969a7bc84e271e485155de7af7c7d4953be5f7fb93cce47b5ddcdfc85be06da4
SHA512f9c8d6ec00453ce8a598eadca106ea33300c407451f4f7696636ec164a426f93ab62c227527df7c221611abfa34d94e3250cce6cbff7f0438e64621b0d997daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6b47fb5c12e288d8ea816b81de7c33
SHA1fcc1728cf69b2ef9cf256c9de5af70c1abb12d9f
SHA256f728764dc06600674f9a876f16e7545a4869c63078a64f090ac34b96935d54f8
SHA51297d70c37d2e2681ac2ccd9defbf5ac9d263da55731b7d67d18700a0de0c5baedeb4124c4db0dd9b8d153acacbdab49fa98987d773fe50bc779e8ee2e635c4668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566499993133abb3755426ec526fb774
SHA1d08ce08697bc992ac1e582377065f0cce91ec109
SHA2560d718cd654f902a738292f99b5fc85d1509d82ac848efd51da259994fc89f053
SHA51284e65d29205fee6e6c2473a2354c3625490d147e7306dff7bb067f12a926239f2b515250ad98b6eb7c80c435db66634b24d1cbb379aead8d8fb045dc0af5b1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0c9dd63ba971869bdbef4664bd7789b
SHA10f0378050afa9a9e76ab62abcd1556818e1b9971
SHA2568fa433205060c1019bf0d6d0a62a5e47f689ecbaa5bdba11affbfce7024dfcac
SHA512029e8ac3c22495a56a224679c535730698bcd70e2db472425fb81eaba58ca6052da548b669c0328bf257bf58113f4653d84310a065c4773be36f67f49d442b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee862ae64286f66e5863dd75625dfd54
SHA1b644a2444cc3faabc72e46aeb99b1ae89f0c32c1
SHA256d4113baf31fdf9f0c9f5dd2e08fea97f83ee493c68b7a7e4cd38ea1a44a463c3
SHA512ed5ee207b17213bd4b2959de4e5fd7ab8d2b7119e767ad2db6d429eeac21d13eea0f69dd0a131cb44cde18054d270f1e416ed64bf49f311372c9f27c5c0deb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571ff8c20b239a408bb535e8b1114671
SHA11ebcf67ad6e7c26ea99e134909eab415603c6dcb
SHA256d663aa7a9a5b47bd27a2f7a330fb7e043366066207a82ae6066bdbc4669044c0
SHA512f210602839e00ea57a2eaeb76abd36762784098813843a7bf27955868952d360c1a980dcb71fec8384dd7df5bfa011cefb5fe50e0896cad41ea189f0520addb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368988b8caddd44360848a3d1714b961
SHA1f17387401d9f9b5138f27174c6a9defcd62afe27
SHA25621b6bdf5b43684e7cba760add10bfb9df9fbaaf04ff5e9e29868eda93a0724ff
SHA5121b89b7f0c3833ae615931ddedbac02939ce92d70b6a0797ba33f95f7cd97af95ac7c2959ed2a3c5bc3f12ccb339d2d44764c085c34446011b00cbbcedcf63aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509da3c462bab3e018ee955ed84e69c51
SHA1bf6e21282db1f6c9a3883a60800ab5a4a7fbe0a3
SHA2569363dc0331c5691565955f67e8f725043d63a5072010b4c908454454eda0c11c
SHA5126b384627c4e1a821cc517d0e8a5b342e4c60398a47adec5992c0430209af5d3b4e1ca408986eddfeddbfb960efc27d9e549ca71aa7ef8d70c6435be461ad8169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57935496510163451199a1fcd839e0f68
SHA177b588790e09865f76712e596cc12813e44c9db4
SHA2565a1c6484abbce26540e28e8e308faef63a5d85bb9402884f48350596f3385a68
SHA512c32628850df452a07e84bc8e3c515da5a43b1a008a796a0de7d787071585a1a2a67560000a2323cc19307de80dbd3bbb5d552da1cc8a677f55c9652853b35ec9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a