Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
4e5bbc8536fcace5e7aae53e68fcbcbf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e5bbc8536fcace5e7aae53e68fcbcbf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4e5bbc8536fcace5e7aae53e68fcbcbf_JaffaCakes118.html
-
Size
3KB
-
MD5
4e5bbc8536fcace5e7aae53e68fcbcbf
-
SHA1
b9d7a539bd6979619b74bb2e95a5562843f56044
-
SHA256
d35103f6c80ce410ef56cc028bcec4829e1c24dc675b9fb3c994e11110afd77b
-
SHA512
2881dd61c5b3fdfc55e3247c5c4657eaeee150da3a8fba6e195c0bc2af56319210ae672eacee1d1cf9922b01dd7b33a720401653a59df0f80673c3b4d9c244a5
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000089fb295e367765e1411bab81f3d33c4b80ebe5c3113e86a7ac5a36a410e66b4c000000000e800000000200002000000099918444728c1a3c9e0d8fe4ace6e15bd106a0c95dba904f13c598d7c847effe200000004e1871cd70a70adfa75a61b099f9b92e056179a072e2fce551e2d83c8dae02de400000005afde2f7f3c360fa8d5390dbcb1db79b1d6e78b9c2993041f453b7dc6dc53ed03ff7e4aca2b64e800f57f5f151271d5f8da6a27ad62746cf15a4b72fd781b4a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422080526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a035895d0fa8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89037CE1-1402-11EF-818F-FAB46556C0ED} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e5bbc8536fcace5e7aae53e68fcbcbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477fcb74b1e9a1b99bcf53c8828a15e5
SHA1f511510915c4bfee1e7973e7dbcad90d6956d199
SHA2569dc9e5c5bebd68e26bcff563f7e977e090fc3372f1c8bc3f411bcaf1163bf0a8
SHA51226cd5b51bc70a8f76af403e0cfb23a5d4ba23d007303205dd4fbef9ea798e0f41cf578c85698e2a8b2f9529c7eed06a134b7a830692e0e66a1073f543416904a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef15c5c0e9b6816dd664263916236c0
SHA1d4b8c09488857c8d63bb87a8f6875d7ec3d4bc4b
SHA256fa7b2292f9086855f71607542a0b592685e802ef8968515687c0f2212b702369
SHA512b44b2678064e0b1bed31647c761d37caac4d2028561db02670607bfd0c2f19af7a70be22c388ea74c8a530830b5ef5433751ed926cfb8b9a163293a8d561986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034addc8b3b65f8153dd17935eb1ba47
SHA12f37c26c846980460c1012dabc87c6ad9b1cd16a
SHA256adc8c790a3aa27a574619934e997c4120eed52e77fb04358482d86caa786982d
SHA512419de40f1ac06612d4bf135dbe5a62e65764fc8906ab3ec8fd7312c4dedc0ae174745afde0dfd005706511d07370de49d2d7383c83b63687ba8e284adf7a427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137d0cce595bff8576b251121e125318
SHA1f5b16a81aa590870af1bcc7978a04b43cb10f64a
SHA25630f59a5522d419291a81507935bb5a57ab24c4b0f73d9a362e58761b198fcc6d
SHA512de4cea272bfafcdad130f2bed223c77278682cb10b32a1199210a456f1729a29d9d8e1ab21e5a5cf37f4f51a33f3d4779708711b97b5a6a33614fa755addd733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c233117cac0d4186f55180f2e4ee4455
SHA1d8a09a9f554301973fcaa3411035cf966c65c57d
SHA256c4ace23633b9f8fbd2698925a0abb33127ac7f273a12f4505bb6e8c0169889cf
SHA5127964e6c0449a2e9524fdf3e1c9881edd23f49ae3940455853eddcec07a24ff197bf250cca07c4dbd56a5698462f1b05476475e0a45cac03f8125f55d5be2ce67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d99f8e0337a82f48e981f2bedbe8a83
SHA164f35bcbbf3435d2b795be543a2d8f64799f4818
SHA25693d20a654c349b66ac84817759a80b62187a10b1a71b8ef17d5661605a6e44dc
SHA51220d0e0b759e8cb95ec74141d23f0ebc015bc00ac775319d2393b632772e7bc3f05f22a1a3fc268bf71a65d673a6ed1de790ce12f58bd5010c6b15ef2eaa58b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576bdd437b64c5c52735165699a26d15e
SHA17dfe0b7ab73e3f8a9e0509641283ae8d3db32e97
SHA256234a78dbb77a9885211f5b05d2188a3b14eafeb2dbb801fbb600371cf256379f
SHA51254f822f9094e560f22693ac9b6da8be8bca7e7a0fe3981d83d4ae98d551bc41c25bd7dae8addd86c86eefe39f12df5b24ce857ec820759b8224a2673e5fa2428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5009214c555c40cc1367ee9eb29daddf2
SHA1d835ed7087a8aa8904e35d799784a603577b07a2
SHA2569169a0d60fc00c6a76a7653374b6e86c8962ecdca32ce9613451089c6210a4cd
SHA512e64bbd3dc087ca373f1389de953249b1ba7db26891454bbc972433aae8fb142e5ab5e4bbac6a7821632ddab85c7740b7ac5adcdd2fea9830f2db987b32a91451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733fb3b974204c26fba5b9bfb3368335
SHA185d355f626414a688ece226d187e0991fc4304f2
SHA2568446c02d82f51dd76e7202e826663eb3a32513d0c63f74cfe167f4769b7340bc
SHA5120be51366868b53f27302ad3a9a83d7e7ef42cfb1869b8fd4dfde5cbbb4fa9f76a2a7a93aa839e95ad4d9eb8ad9b0b6574319275fdf5e2d7509876a0f15e59206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b928da86fbc7ac0d52adbb8bfab3611
SHA1c15962b4b6ca2a2fa1230ce5eff475f4fb10fd34
SHA256d4dafd9a899631090054799ffbec1cccc503a7ae94f6603ea8a9cd783a951967
SHA51223a825bacb3e8e03a50b2e0310b3ad0f3f7f2f97cd9359705785759ea811f139f819583545be348ba63cda6b28b2b902b45cb5c4f3fbd5123eba117403607f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b6aab66141fd190c5c2d6d7f6fd0d2
SHA1d31a5fa8a7a514d59ea3d29c35574fa0ec3a0c5c
SHA2568fa14cce5ee7a9732d7690604228eb40f99c38c779c72de88adbd1fad6494c18
SHA5129fd42a1b70f0d02526baf395693fc49dd9bd13c891ff20220fdb0c45e258ddfd1d6c0e5e6ac7204e00a8c5bc627939cd79645ef72c5a82257418070971d678df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552c05a2cf8ae96829509cac5e9be513
SHA1a8ca3febd8c9b1c605173f678c35bbe8eae1a415
SHA256768c8a543e4d090e62b8adc9cc1cf0cad76f79fbde96a0e376e7cf25e0a35d14
SHA5124ee33b8401e9fd73f70152f521541f686ea238ae003c29c7eebbb90da09ea1b979dcc88fcba0d31890a563204bd8301f1a8ae90805d834374a9fb196b314f039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db50ce27a025507c035337f796a7a6a
SHA14fee5740b5584cd86388a6c7e821422a5b98641f
SHA256b48f5030e618f409e072593e6dff649581f2915b2b7a05454bf5db087137b028
SHA512c3a6c4669dd598dd5c2e3102fa174cfad3e266314a885377eab6c625cad181d52cce8610b77a1badf2080432307530d78ced7a55cff7cd1ef99bde287303a8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4212fd33e8c2b79c84bb92227887e0
SHA1423c8fef020e323e6f645a85915c1e64116c2d09
SHA25630b5d59b2a3def6c7495836c41071bb9520dd37d825999fafba042514ad7c2c2
SHA512f7e7a607a8c361ae1ad63a615cf66b2c91054b4528e737abbec9791789e6be6a083ffec254ce22e73bc712b561f2520a3270f0b27e80ae491be974664e532074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a398fe0bff5eceb632ba28e3ed3cd5d
SHA115dda1b58e35a11be2e72c43fdeec5e8284bcf49
SHA2568556aa0c199e411b47461bdf50ae86236a55cc213f37eca428900505d8c9be6d
SHA5122e61cba123b3221da9cd259d7f8c0c91ce5a7ccc6d91423386d095baeb41721d6b6c4c06735676c8bce4264f7225bc5d4ea87237d958a56adfc53f6ef2e461ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e777d86809e841b957b20308ff80a5c
SHA17ea8d37badd8d1050eff9431715d99747ae2433c
SHA256c89c82670dbdb36fbf1d383fe37e167c623c3bb8a48121c1c6d1834b7e6159d9
SHA512180e46462407331873b6705374ca3601b11690c35e32ada5a7982d97b5bf881178e4e6d450670d51e0848ffaa041f2177e9d0a38ac08432f3451b1dc239eb47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d0427d61a71f1350183083c6e6bc55
SHA107a057ccb4bc639acdd45747dd9e581cf63a126f
SHA256ab5caeea3151ac08abff32fc7f1d34a760e07959fcdabf1108662dd88434edba
SHA51298dcbdae821a5855557d8a8aa0f9ad33212e74d67ae866164b22e674bbcb344ff86df1e1bfc8b36cef1508bef002c19a5bf98942ca5b713257d1a737c4b87f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f4888e68f34ffa79f7c8b609b3222e
SHA1973c6b1a9378332b34f7ea4cd3faef2f17f19b54
SHA2568ddac14d2fc07e2cd4c7ff7b7fd346cd915ef51df873ff6229b6fe2823d3ec53
SHA5128afda572b32dc4d2d3f2e4dd2116bed252557743affc89f8bc75513a51110d74a2cf734d637853a56632e353844f31c57cd11d5d71f3ae7d96d12205b882c2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f8fb66ce5d39f8e733782c9c76751f8
SHA10a5eea9c2159eaac684e7f3bed9e2a781e62a742
SHA2568ec387d4c5d54dc24625b8ec648c60570bfc15b546001d813c25c5507807c128
SHA512eb2d899a3f645c5c1f2b36a87cc31a6b464546605c634ed946a610f5323191b727e5aa61902a7b92ed3d29991e2d92096408d0cb575ba801e3d5ee2cb76bdf56
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a