Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
4cbf0a739d587a388d7b397c6ee42bf4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4cbf0a739d587a388d7b397c6ee42bf4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4cbf0a739d587a388d7b397c6ee42bf4_JaffaCakes118.html
-
Size
7KB
-
MD5
4cbf0a739d587a388d7b397c6ee42bf4
-
SHA1
8c9c12cd238b78348f1fe1246d284bb8edd09cb9
-
SHA256
1465b3407e03286b18a050a1a309a0ebcd10c785a94e3c70c70760e288d36f68
-
SHA512
da08fa09f982316b13e60a39dc228b4a51ebd5a939f23309676445fb16551c1eebd0165df6b4dfd73dcaa62847356b1d863e430e1e74669e5ab8349c69af2845
-
SSDEEP
192:FDshbVr1wWSZOj70rOOmvAE7R9E0UsNxdQjjdIemz/LE:FDQQWy67XOmvAE7TE0tNxdQ3JY/LE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000035150f95a8644066f86d67870ba0a7252aa7718718f2d30778da39725a5dd937000000000e80000000020000200000002900efa28fe445295bf99abcb2caf7dc1e3816ca4d7cbf6c75582103d1b664f12000000097dd6b4d919a965db8a9cf10ff59f732258ba86b336e8b32e9ad2b09ffc89f07400000005171166df7989d8950e655819b8897d381b593d0cc02310f1fbab5f41b951965b91180d0902c341c8372909a6e58cf6258ca6eff6d3132c23ec716bac8aea15f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7831B671-13BC-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422050435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a3cb4cc9a7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cbf0a739d587a388d7b397c6ee42bf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57539c6d97e95dd4e740b9c3d0a8ad16e
SHA13a8e5ad3cab9edf5ff00f1ad447090f11559763b
SHA256d9a434a877c1d7cce6895133bbd2391d9b08b308df1c7849c8b64ea661425eb7
SHA51237293cb1e5c5fdd1e9a1e9a773126a4ecaf0839860be309a1b6abfdf3f2b52e9ab323368f48a4c7d11eeb21acb20c5467395ef0f6b02928830e7c47fa6a95760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcff7058d10fa9382029fed239a71a14
SHA1daded533a223a38352d46ced40cf69b9c39b1d3b
SHA256656749fa8577c5b7278a085727ccb8013d465e200a21ac69b139967b57bf65f5
SHA5127f04241032011ab757f757415464984f1e9f977b79a2bc4ea7ed4ea83fd2e42a53f2554a9b0392ff613cd65c6ae25e66c81d4a06cc23365a2ac975cbcfee8311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cfbf46c0656061c53cc0e934c2e3d69
SHA144c78265df7d717e02541de5eabd9aa7918b12f4
SHA25663a65dffb209b85171a1ccc2039f0de6759c1e9c447a5e5f9125a8449f3db91c
SHA512031c07876ed6be577791793194e6f6e190d494cfed7a42b2deed4340ee65d3761e71429765905f906b554d1e6d2f7c5565b014c798f2957aa3ed98df820edbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59137e5e93b54dd9040c403329a740362
SHA170c6abadc6034d6eb9384ab3e800bee27a2ec197
SHA25655a5e1dd946d3a3493f5d545e1029dac9f418f4477618b8f4bac7446c5a2c5ae
SHA5123a412b4584118658f2f7ccb691494d88815ce3568d47dac4183c9b8f12ee7d6f3ae7546c7dd52d676035f67be8c817bf5f50e2645ecc0e07c7f2f156fbe703cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56157735c9b7c96fd81f66b4de25f9ae6
SHA1ae6bc0fce610dd63d618f4df3852c7f4e65c43e2
SHA256a9574b456163eab04fbae3cf3bfe296e4a9a4909d99e2b79bfa2962f1345e882
SHA512f7fb8b6d12de18295382b94b0c3ac608958c1093a13e930d82e79863b1e14a039b185fe96b4e65dd3046e9c1a39d2ad14e6f670d4441f9a554f850d8a356d2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4866550cfc112b15812b0440e8b004a
SHA16dc63782358f1ff32b83e644be410e5a1fc9f577
SHA2567dc946a9a51995bae896d5a3c3c25689089c4f2cccf9d986b6606d51430d3d38
SHA5126ff525d006ce84ee87ff1242c2ef3ce99b1b2e9a81c466f4f900c61ce46cc4ce45f5a85c3304cf387991a53dc408134c31025a1272886d3c928b81a4afb21780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca06c21ffedca01ffdfd4053d4c75ebe
SHA1ee040cd8f2516a1e873ffa5b8793e965fbdac6f4
SHA2567402cdc5b6406f394d373e005f9994649d7e849bbd0c072db1ea77a3308d8aa9
SHA512348c984df503c4a418e052b5f42cd2828991d43af84047b120075173fab5294287033f99de017fa11a107e041fb3543ae868c2aa142e4f52162c52c9746450e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091aa9a54e497381f8efc77fb9b0b7f7
SHA10028996e9a9003b3d105b72f2abc985a0aed2b9d
SHA25603954f0a519aebfab684ea411664df97b17f0a9c62ddabb5ed3e7e869be161a2
SHA512720edff8df5b43c361639823068e4dd33b0e0282b70ad0ca8b7319cc215a59db59d2ed054773a962b7dbf19b14c245be0d247d28c1d3ded06c4d734ed586b99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52338d73bf9410409d0483fd4b9c01373
SHA1898dff405d090d0698bc533c6fc5051619aa5e6c
SHA256302364506710365857db92275592cace58d4bee74c60bb58839dca89efea5c68
SHA512cc74b067ba5208599e4d3dea026056c5b170a0d789498be81ab6e7998b6a801237b43b49c3a4684f995d75fdd6d745b945b6ff0c9cb304ca1c2ea0aede680edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597dc3a5b405a72d2d3ba5c7c1e64784b
SHA1e75222f38125096bd5fb798c65e311c656aeb1b9
SHA2564d1263dbb87ac5e59252a71d267e5428614457e5d138bbc00fae593d3ddfbd54
SHA512c355c7e34d97020b8b6e2e6c2acda94ddd96b8196c0e98671fa2f645eff4e7ade23c2f907756c99b95e97e084c2da28f546db2f51533ee5ea174586c1398a0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6a9afe774e9c9d45ff50b5bb5f3c29
SHA1a5b161bd53dea8b26283d01e445908d0b396b4f4
SHA2568cef593340817e42b282d02d860cad7055c40712257e2a801b3f02cfd0bbe1f0
SHA512d2f87b4e248778571285787cfc942ab33739820c820bf3757940b36d2eae9769b481aabd35d5c30524fa635a39d81fd97e1bd4ea5170eb88aa22ad19a5a4e167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ad70a84b593e09a5a89c5d5ae5f4d8
SHA1610f0fdbfdad6062fea3b2972f53fd2af1413d32
SHA2565c1fb3be5094682a01cf319c9e29d4f226792cf8e1e80648d9a08ce77afde7d2
SHA5129617025d94bc20ee60724e0581e591ca228834627f8db6103f6314d98f8951bc2e924d33e15840bf2fbb39908767ac8928946947d1c9e0eeae96a5adcac07184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c3b1be9121029fd342704f70699c734
SHA11e1c6adb934e17b99b06c785410f22fb5930ba3d
SHA2565c7ac2b9d404e7a28fc466c22f4f4888517a60e491b91057156b47eeaad8c038
SHA512696b8cfdb7b4e3c3b820d6b2fc1802e3525dfa68373fef28c4de21e4663c2497e08cc43bfa30fd325d8bfd0c975f01865af2c2d691ad77dc0abc088ded9bc2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67ff5a534ab693a63516c45feaf9a12
SHA17db4a3d32f76c6a47b2cfc7b07dd5a67948e6e1e
SHA256a0ade37d16964844cc6aa30f3032cf8bfbcc687477fbf3aee6f6f2ba8f885c67
SHA5121672ab032fda09cd2e151d045c1d929047693621aa622d587e1267a5e219dd82d5fdc004b1283f5474b3dd39c59b13304af43aafa8407f1642dd616099d2cd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d4e14d3485edaa67a75aac5c5cfd74
SHA13758c0c0763482ed54b959a09c705825d1abb810
SHA256d4fcd9eb7a5ada6741aa5192a2ff5520235127b92505cd1abd0734fc6cdd2ea5
SHA51205ed1a107ba78f917da36264c0319249f9dcb690e3550b964e34654cfbb55e8939f5279e477fbe5ac502df6beee382e6dc1c5185f4a291e81aa19c723e7128b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cbe640b00e535ed2f851c6374c794af
SHA1f32d5c929a47f4044f5e1377a4ed16b588f2230e
SHA2560d7be75d4aa49bce3af8a30b6e2837a3e883062e24616453c1f545179013d294
SHA512ee37526177430a6c2594ae95897867463e44cf22b64b89c20cbc300cb5c54ecfb6e2fa021cfdc97cd700853839ab0707147d618278133d308b26d5344eab7829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc48e8e53229ca71152f6a210d39402
SHA1e2dbe7855d14e60ebdeb14deb35d08a8d02d5036
SHA25675090810c0a0476299abc86075ea469ecdf96ac1968844c06fed642193542fa9
SHA5127e1af9c37ceb576666bbae3f79ad0cf7adf30f709afad058a4985ffec534278368b8dd38af8b495d195571a88fb4f2de98efe6ba52d9dbde74223c42beed5cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d37e5d4d93d39ed70f0fdc8fce3185c
SHA158159d57dff0cee127bc3374033fc1cbef40dbf4
SHA256b4957dbac5f10c1e772f16fb221c524f3ac101f66f371a036331a79a674b9d21
SHA5120290149876ecb70522c2e9a1ecd9d7a7566d86e3a41f3b3f38dfde93f57b2c5192547a71da858e5da4fd543d91b3b60e26faf4449d13a40c73088e19d2766bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55311b5992804de437f8a1a95d8071114
SHA1d6e81ab9ae9330819f2fd9c1ddb51d29c194ef20
SHA256e6e820536dae87e7156b6b24139b5a344f79c27d3f7455f4711948d055104b3b
SHA512b401e4daa57cc52d54b08e6080780265a5aed939207486d133a457bc319db4690eef6562f34787d578006c302f99ff29d9ae01cb10407a95afc60b662a4efcdb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a