Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
4c54cd7a4cab600266b4be0cde8cffbd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c54cd7a4cab600266b4be0cde8cffbd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4c54cd7a4cab600266b4be0cde8cffbd_JaffaCakes118.html
-
Size
26KB
-
MD5
4c54cd7a4cab600266b4be0cde8cffbd
-
SHA1
e450b91f7ac5b77ff125c910900a84162d6b430d
-
SHA256
b507e17eea773a3b4abf57c4ed445f311e1eba8bade444763cbbc332ae0b92a9
-
SHA512
ff96598017c85938c06d43eb18ca8e0bd3e24059e6616c532228c8b2cd7eaad5e5aec335f644220b1f88ceeb057f4913908b1c95d70d32cf28d7f72b797e8e90
-
SSDEEP
192:CyiQEczanE9vK5B6H6tdEVSNpETT6AxL5lf2t63B4hMn7Y06JfFNsLwlrD1zrz//:Cyi1E2CpfZ3B4X063lzAw1P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f4e09968976c1355c90574806ea96a4aef372063acc04e27e81fdf4430096f10000000000e8000000002000020000000bb6e026af9eca77077b8b5832afa740fa7b74c2ca6f8c32c9598a401d364d7fa2000000096654122b46e9270a38fd203468b16daf5bdab28280ba329fc9046b99731403f40000000e3ec4dc0e7b6b398a362bbf3139a9ec16c9d34100cc132879506562a03fa6d037cd19c1c54c5209612b301ab286d93c3ff10a52cbaef7d30a1191b7efa3fed07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a4e915baa7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422043899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{410C9BB1-13AD-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2100 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2100 2176 iexplore.exe 28 PID 2176 wrote to memory of 2100 2176 iexplore.exe 28 PID 2176 wrote to memory of 2100 2176 iexplore.exe 28 PID 2176 wrote to memory of 2100 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c54cd7a4cab600266b4be0cde8cffbd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9fbfbd44b75979c1f85d569525fb0c4
SHA17ad971dd0779935d6fc3768194473a0e213e457a
SHA256e4dfd342264f83c9630f795d4cb34a8732a0e8bc76ad2a268d2cab07453fb705
SHA512b770b4fef6e383e8004f0cf01c606385a94d73ed42fc08528f3fec7b52e2e3f66d07e7b670cb25d687e0270df866d0a6c722c5d4d9fed494bce43033a3d45473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5255b76c00e3cbb03bdec6363442ff35d
SHA1c369e87095e9ceb77bb9565ec0ede4a77d982cab
SHA2564cea02225c8aa1508cb6fd5c3699cefd57c6c4bd6324425a48a3bd4bbdb770f1
SHA512979e47c42e499a8316565ccc06285ce945871969596ce9edc30c5df8cc5c5174ab20f2198d6bc579cd47468a8911b42f7b1fff6a434e654e8dedd6d3be5321be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5edda5e9bf79e84f6ca69834080d61e
SHA13fec542af24829342d1a47bd70542fc3e74da88b
SHA2566bca788c58b2c11e9f1f0cb1bc00f96a63ce027e17d538dc080f315c4c204aaf
SHA51240995887bf75d27445ec2dc60007e91e7c907ec3b812722fbde04098acca3aa2096cec0f675c5feee6b274477669f0a2e7038023068c93594fe2ef758f02d174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c316e5546574d4b9d6417606135c126
SHA1572c67701203f83a378352f5e318ada0910b8b21
SHA256ba1a3644830e3dfc6a596983b38cd0c29f79a7a9d3136d896cd7f8367cdcdf6e
SHA512895e5435b28cea338a9889e01e80b81c4fdd89b3ac762389dc1e900d8fecb769aa3a15ad4008023fee7a7b1158a22ca4477133617af8ed409ade489ecc2ea838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb309898f9cfa346b0ffdce8b9e846f
SHA182c80e87d2f15ffca99887dd9a8bb91769196a2d
SHA2560f5df15a8377cf7418aa7802fc36de8a79e6078a005f3534b7033d8bbceb29bd
SHA512edf00f90e1980372f99a96451784981c8d4d95d391e870af69bc38a2fb0bd122b0432283d464db5f1f521ef3732d510cab0941c83289a38d9686370d234f915e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b2aa48836ef4a99f975fd60337e174
SHA163e5a0ff27bc5822b9184111068d74334887d8a4
SHA256594c44f303a8c110a222daba5c24d274f6278a821ebce76578b2a03a4c4b4fcc
SHA51250bcd961a544e26fe21c0ce75d33e295b70325d68e2319d1d565b89cb0da107018a701c06f1ad3047fa61c4803258bdc031d80d380204bfabaffd38ded1c5333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4e0e7b0b16c6665d5c1aa69f004b7d
SHA135478fc3db3580ab87c0513a42bb4867b08a8f1e
SHA256600d906a32e633abf0794768d65427579c35f6e2759db9602f8edefa4528070f
SHA512adfe5b122f1f8b342590f9b276d020eff044a66f3aec5cb227c6c83048e451b6fc698b4b3d80c49c6bec0f239c378c96b93a525b9fee00076efb3dc40beff8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2574ba43381ef535daa799d9c11627a
SHA14d0ace11f500551b20e1fc4baff12d99710b200c
SHA25661d47438de60dd87280610b159dbc0825880f770e5bf85ebbb6a24a25e09a9bc
SHA5127efc0ff5909d0a141a788af2f9cc306f2bde47260774238779b534797cd4e9ada31132e8fad9db709a2973ac8311cc1a1e7bf84228953cd4e97785d72313e22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e7d8c5addbe952c8226d1312fe37e5
SHA1755401b1b2f9444341985833af7fcdb3f0610193
SHA2569143330ad94b1db818e4aa2f2d3af3e156a78875e091090f21b98a282c75eee7
SHA512c385a1a7195876757aa298f3709b9b6ce5a2b3f89fb14e2a88228a461bce6ae05e80db0aaf95fc594c0c6974320fa8d82fc0164d9dbf8d92f2f9339ef96c23de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d714d995e1ddddbba689b7c03fc764e
SHA16fd8d6838d50137ace73bf8085e14152ed4751c6
SHA256c39831e20ac8e4d9d371209b334035a4d62f2a9fe814527269e9c696718db27c
SHA51215a4dd5833789773bd64b939e904447d4d1a5a7b10a986332473f8ff8923a648a44851e052c5adadc726562fb80d8463af24c4f7d264f0bc319a5ca771505644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc01f518e94d3a92921e7dc7bea90ec
SHA1665fe1a4129a2844783066de404b12dd55db17e5
SHA256b72457c378669f995cd20788a8f99b6c83924b0c9817b9f13e275b031ff4f219
SHA512cb7849d41df56c82f94ab11bec2331d86d77f8dca1bf25e7fa21b12213c1b9c8d579da6d329e154b6ddff153cd682bb14f3aba3e61204a6b9632027e191f0499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0ed22ecd8ac454bff493b5cea6b0385
SHA18c5328cc3ecd58ad4104b488e0e325f8d31e390c
SHA2561a39607d5ad2998206d1431ccdc8ee8aba3674c865d5727b2be446303ff5b4f4
SHA512a5de20214874e55eb66462f185d404b506ce744daabd4f33ea59d9023ce884acc9b4ab17dc2d0dda016cbf60f2fa9e2487a1a02015d7388105a7a16f9be78a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a7f9d96188898a63fdb1214d811142
SHA1bc8513774568ba432fa9b62b0a4cebbb13813a36
SHA2569567c4259bccdc5ff927bca3327aeb9c6593252676e147ebe4033e399c261dc3
SHA512b0c01d2a3e5416b0ddd4376cf9896fb617cae6411a58e1c7a372204baf9bfc690d39d4696fd66220a66baf52528df6e01dcb4d855229198765dd6ea30be9a746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530666221ba4202584791ec2bcb9e13eb
SHA1ac8293ed152b0acb65bdf9d4fb55e46822db8d69
SHA256175278ccd02c9e7280ed50e0c78149cb29b82103a0a2ce486623251437f4192c
SHA51265d976608103ec81944f833ec938b31de5fb22ed98492df85215e579f7fd148128094f6cd24328263c91c79c466a469aaceafb86f3f50f482c3cc6d643906c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f69bd2946989a64c26909c1654c25b7b
SHA184f342a5da465a7e4fb66df2d0cc0a94c0758d30
SHA256608d155e0bc360b8c510b07eca7acb496c59083c312ad087f32a87d037d83e1a
SHA512487638eed7f44e11fd00ef9f7de4959cbc063cc9b426f6c79098596793e917086e72fd46b0d4717922e128b94d1375d68d744fe60f0375fff0b77340bb9f15b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6704392d536d8a246d4d943816c8a2
SHA1351d121f0125116ece77b721d50b2b1d6214aa6b
SHA256e314b18ef60c8c04157980af5c84c18fea62416a40f55b12046e5094cef8d146
SHA5127111a9995b0e261e92d7567b28450ca6cd85c7303767a6838301d62130965a2572c8d95e3ce8636bbb77cb346b9f64bd05a5e47d306d45254aeccf41770c91a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a