Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
4b350bad70060b1165ec332fdebd5cd1_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4b350bad70060b1165ec332fdebd5cd1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4b350bad70060b1165ec332fdebd5cd1_JaffaCakes118.html
-
Size
351KB
-
MD5
4b350bad70060b1165ec332fdebd5cd1
-
SHA1
78abd04b2bfb5d50bf1ae93213577fa2974f6b15
-
SHA256
eec63c0c40b27a6be7692f7d0a8d457efd4daf2af213a18c5299b80f5a7d9b97
-
SHA512
6e244402bc2e435eaf7a32e5e080fb6b45024376376a3d27b77fda9c846c0ebd2d0020f8eac841ec03e2a627330c5913b2d2e78bcbd3ee17fb7ccdfe8aa05096
-
SSDEEP
6144:SssMYod+X3oI+Y7tsMYod+X3oI+YMsMYod+X3oI+YQ:X5d+X3b5d+X3s5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422026472" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000003ec3b544f3eaf929f1186889a4e2d15a7b0de0f49706856c3fd47ea0662d742000000000e8000000002000020000000ab8670adc2399cc3370747b655232e2a4b780bc644f8b05ec765831b15a1094720000000690f59e144626e32f1a28d8e3618ecfc04367fa8b6713b7c40cef6b542ec29ce40000000144c08be1f8010a1933e15f5567b1aea7f060a3742f8a8c404ce0f881f230a958a62d1b4dc0d5c2051aa340bca079b1b49a7a1e7a83f4f9d8d0e2d39601bb006 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00642c091a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC8D1A51-1384-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 992 iexplore.exe 992 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 992 wrote to memory of 2808 992 iexplore.exe 28 PID 992 wrote to memory of 2808 992 iexplore.exe 28 PID 992 wrote to memory of 2808 992 iexplore.exe 28 PID 992 wrote to memory of 2808 992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b350bad70060b1165ec332fdebd5cd1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ced022caffc7c77607f76a4f8b4e82a
SHA1cde51522c5599345a2347f6e6b4b833f8adf405e
SHA2567129a77ee961c8ed842b25cebc804e7984c0cded34daa8376596695efa408e1c
SHA5120493826f3387a862948ede58219f83a70cf2ee6c098d76cf6ae8f104e358f61287862a258bf0b59b87c6ebd084a2f94d8cc78a1309d561c41f703bc4da34e569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece541459a316fd29c8abee09b69237f
SHA14cbc3ba00b1dc62ecd20d9a7721252f2b6146468
SHA25691d62f67496681728d43a8c0a2ecb98d70fc1ee1a8a7cb17dbf898409c9500db
SHA5125ae22f09ffe7106590575dbf1747821dbe665184442c316d7b4da97619dafbaabf411de3e5a46528da13dc0b549a66d20f8c21e0c983c09be5fa3ae9c4d31f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1e3969d894a6003d78842384caf322
SHA1d5bc09d84fe103a0d947450e10c39e46d6dcd2fb
SHA256a59364a06e9e94b3536bd41e88e67301a80e95065c89737570af70fa3b61fb5d
SHA51262e2e54a39ca2774ecfe53a2bdab3547dfd2f74786261589763863103c167a1defed7b0c0d89e68f03071f5c3ff4883f922c4c5683ffe1e8a011a33026c03d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507fd08fbd284f6ba220031ee062b8957
SHA1083c5464438e0efc9d0e358a9d235fec18ef7834
SHA256bf2d05d946ac156dedcb715379414869702b8787bb69bc3e3fe61dcfaec09807
SHA512d8e584c63bfae2457e6a3b08b417e198c2f2cddea8ab503199a71c4d22b3c4e6a72926c6ea5f2c0e879bb342523741b21f5d867e3ece0c17016dbbed1641375a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4953053dd7b1f1cfc399d9512622b8
SHA1527c4323dc4f217b878c9bba4166532d9a2fa595
SHA25659f2b9a75c9d9ad7fa9a17af25ddebab6311a69f99328fac61ca4ffd2ba69322
SHA5121709266bc98803815038b7fbdac382844abb86ca6b6f6831a708c8d97112a8aabe5634218d2ffd3cf50fc19d28b179f60683db57d2b91a02f4e97a4eb6291212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f85b52189867de67f17eb70c02d96ca
SHA1e3978e322f8e2945e5a0e26573c9b3552f6760d8
SHA256de8d040a3c4e2da8ff51da4b370fcf6413fd288b83db8e507f279982a2a472fc
SHA5128f2a3d06f3757916432022225845ae215a1ed2165001b0f102d0ec23e8a19e69244a6f607227e43024298ff6460197b9f1eb5e4be22622edb36bc4e478bc4887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56addbcce70bc6c023aff7e5346152d34
SHA10c8c4a10caec193768b6368118306ba0e5c87b13
SHA256c91a928ed5acc17e9e4063232968d8c0324ebea6c9921c8c007cfad2ac594c09
SHA512f915bc58ed65f0ad72fe9b646f385f36e9be9eab8ebf76a78f8b921207da5a4258b7df4975cd392183a8d4e7b29f28017c4f631991e8b163425f9f32e012f2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5306e9f45faaa3bb577792b93c0455e98
SHA108cc3a91407f3ab6eabc0d020771fa1afead2a88
SHA25618f1560fafbdf2e083fec797d1b179cbeec74814f2b23ab006dbf9ce8b6d2ae7
SHA512ea9562f74ee2b4b3b948bed842530ecc4937e767fb875b9655e9882c7bb5f7477a588c70aeb1c0959d2f73fd11e3797b9e8f8b9387697ef79bdba96cfbb1daff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b300ab19acca35b1b69dc3b61c19fa
SHA1aebd13b106127bb5771e78f8c98e41c2da2331dd
SHA2563664e365a54d22c86f39d079e7ad42674535c5773def7f6d4388c440404fb57c
SHA5124650a67522517c36a1d924b235b4871754f1444e874a8b2d74157ec76d8a69dce70a2c7bae297c976546682c52bfdcdb44bf6a9e83aff2b686e0ee11bb370e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c570dfb04593ffb45e125e9693e43dd
SHA1b3962d22850779c12c8c51af28f627f2cd7ef4cb
SHA256ab2ffc3d6dadf215a2f3b215a8f543d086d49efefea55c5375ce34b8bb068c08
SHA512d0521ee6b65405bac75fbb8ad3501a1500ad793bbb2426477b51bd3e4c5c8beb586452b3bafc3057f99b5eca65923f2fde0ec259d9e6e321b401944387fcf71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f7e80a8ca6f8a5b6d940812b7326ad0
SHA12d9f544e18c5a5093d1230aaf140796a2c0d88d5
SHA256afacfec76f33377cb381512980bfaf69220b1d7365757d39531b7f63ca64ade7
SHA512bbf875bb7cb06aeb518734fb3bbe00074f0b76181e0d4d38c4bb9d50ac75d4d02f2a452a7a6f40ed6bbb6b7de99ee12331740666ef2d7ac917e95de9dcdb65eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594c79a9e281738ab8dd6cd9c14c79397
SHA1c64b1b9d59492ff777b60e06af7e095eec113373
SHA25644365f318013004127889079368087f9981e6e155ed8158e63eb2b5723ca4a8c
SHA512ff0efe16cb5ec6625c511fd65223d796a74a1eafd7633fc4fa5a4eadfbb7cbf50a520a939c4f7e9726d7c80559fc2f7a9f6f7ff77df43c6090377076238e5f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e4012638426170542c5885e3d19281
SHA1ae4f6ead8135733fde7f788e80200f16ccc82302
SHA2561fd5012a68c1e454f07e4e7978d2a9633cccc61409f262519c2b91243ef98fe5
SHA51259fd7da3a7423291ce9b540bbabc9446932c29bca3e0f4123a962c80f2de0c93a0cb3b28bdde1a21939d8173274ec30d88460f0d13351f7c9112588eff943633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d9cf513756de50b56b83d8acc5d3b3b
SHA108d8efe26326fe286fc1365ac99a4f4b141642a4
SHA256544e40b1c081d757b4a19b30eca43a3151be6f6a579421491f1a031d1625604e
SHA51271bb9603bf3ddd18f7d8351c67ca18e5529d904d5eb7741ef8bff3a274fbaacdf86e49c5a263fd2e9988e117160dfd3b931214cf2247342bfff8f89255aef143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d04e4732ebe7b36d674ed1f401fc75
SHA1e84f299790d3b1c4004b5ca54582239ecf3260a4
SHA256d430a9f1762c7b56e87ccaf9b3f8f21058320aee31c7d2aeb20e148ee8ec6104
SHA5127afe35b5edfa5b0e7d0b07b13bd24852c7d195c10bc6f13faff11631bf10ce5275a165b5fed8012293980eb74a93ca7f84820be102ceeb23d359a951e393e10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd5a68ef719eb547dbb7286ca199cb8
SHA1e824db21942b157d65070da85ce10142c33fac15
SHA25662bc584da915e089ee6a73c8fa6d6157ac9e85c39d3f17103f4c76d225d2fec5
SHA512792c2fa9da1763716d708632b6379dc8eed838cb9bd180e6dc7b89fc6a76e3d87d9a45fd76e1b9b708d9e70d39c2135fd4d09e275dd6bf1c5c87a6691e619225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540198ec57f36c0122becca5000459127
SHA17a1cc00857c8463da7c1add083a5ec95dd667f76
SHA256710c6bea432b598472bdc8076c06a5a394fa38eb35298f5ce386fef894e0ac6c
SHA512c3c841ff29a2f7a9065f6824ac1759cae3ad519437ea1b02d976b92597e4e71ed7e5d14f75c1a38b02291c5abc4f7042774bf7e851bdbd29a9691deaa9f5d8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c978e8c50fb70e030a7671aa89411219
SHA1012c81563a6221c9300ec1e43a7a910553635c98
SHA256ce12931574c66160edc55db242f96e8a5d08da64f091ce00ac1bc159e648a072
SHA512d575d689ce76ba42af05b5e4f3e8ae9bfdc1352ffb67bb453ecd4ffa99431976f3f35bd79cdd08793989f229e6bf3e8b6531de403ed69edbe760a6fce4a474ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de675d1038acacf4cb91913852647ef2
SHA10c10b05801cb2c756fa58bad5297cc564e536007
SHA2565a79fe6d6ab73853ed7221ad7cbc813eb2343316d7aee6dedcd6b13f15106564
SHA512b50c227f7e1e1b96ea939ff9ab95edc4ff7e0fba7bb4a43c63d920f9154e1e30c6370b95667c281e88804e1b81c894edf7d8f6859361266b8891812154aabae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5577c1698a664929556dcaea98a2237ae
SHA100ba9c4a4e4600a84ae49eeccda8f687d18e9570
SHA256dc7e88dc763f3a8892904a71b639456ae16f7b5415427dba609dd16326194a47
SHA512c1c0433d250da40f86c236f03f33ea4fcc8bc1b224ee1d06004aebe42b696a8904384546cc15ab668691354a6eb8b18e26c0e537f6405851db2214283c8c9e3f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a