Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html
-
Size
68KB
-
MD5
4f437e1929aad0d0f3db654c0452a3ce
-
SHA1
ab2bdf1bca55df2b7d74fd6365ef4d4ace7234fa
-
SHA256
c8dba945a8348a3074ecc24bb1c5b0a5d0ec854342d6c1f667b160d8b0900c7c
-
SHA512
baf5693a6c4c05a2d2a218a8f8dc84d6ec23fdb7c469a3712b36ed2fa92a3a3e4f45207251f33ad7c59133aac1e7db31c971a46f18d72ff4b0d028b7ab86a2e7
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g66ReSGd68SNoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JK0/zTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422098322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606c40cc38a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7A81601-142B-11EF-AF73-469E18234AA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bfacbfd3c8a0044f8d2456ded926fb8e000000000200000000001066000000010000200000007f767076c1d1cc0eac748a0d1f89835e316a083313fe475abc05c99446428eb3000000000e800000000200002000000084ee062f2bf8163e4936688ee22ca73b41bc45c87826affad081928bd0ff78f820000000bb202dde915d4505656821be191600507a7983c3fa0021c3031c844a46835c6c4000000080702dc598794e47b1963452a101ca4ff80d68a6a69dfc4b0df0d0dc6bc8ffd297fd63b41d5f3c811dfcd9deafccbbb80cd8f915e1c274d6867301cd4cf745a3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28 PID 1200 wrote to memory of 2636 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f437e1929aad0d0f3db654c0452a3ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581a56a618d71f39605556c274aaaa327
SHA1847c7ceb112dba298b3edeadc95ea979b71c54c8
SHA256e6af010d5b878cc01d0d8f2a17cd346faa2842804ac90a177d194915a4f91f17
SHA51265d307f28e0ce52ff688bb6e30cd5565d410317c5a9779fa12896d6b67782205d519abddc49890ffd2139159a6032979e15a354e983d2f48084b50364427fcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea19ca86f06feea0408d56c456145e2
SHA15fc564b15c347812de05f60c7bfebe906a66e1e8
SHA2564e57d39ded65b69fbd26039da5972be6fec899e05d4e78ef5c724f22ce73df8f
SHA512ab5bb84d32084ed14aac8cd370681a93137843e80622693b6e1a372dfc6ffbc7608aac389888e3ef012a09904ba14a2fd3086ba699124c73f9e99997bad0877b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b16854d69e2930d5c9862be56f57ad
SHA12b67505209d6a6ec709719e68e2b52274262de3c
SHA256bce355ae842401a15ebe891ff59c8a9ed5869250524a241af91c3ce9166197e8
SHA512c23dbccc9ac329eb9eb099756364d69a58f4f5a462972b4987af3f18cb2bf24ca1c60c0a798cf56e3d0bfdcc6a9becba8836e382821dfd6ea61fc2b56dde4814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548616c44bedc87b18bbac88711d1ecae
SHA16887712c69047aed8dcdd6245bcd4658e927afc3
SHA2564877d72af7c69cfc6ae4b44c8eacd59d1f8271afb0f323993630bd80bface3bd
SHA51219912a5b3e894fd130097dfab118454b7a0b733838333d0a2350be95b407c11ad4df32bc48d335cb541965a6bc3adb60e1ca9aa064f127a866cef597ff2a9471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55423dcad47f8c35b3d5f00518bb13af3
SHA109dce46dca6a21a9c9b6c3503fda4c7deacde9b8
SHA2563ac456bbee995afdacf329a63fc2e62eaae45ecff7b59191db85f7eb9a923aea
SHA512e66643e6661380dc2935f7c14694f7d7b89e65667011c8c4dc2fe9acc077513bfb5e353833851d31aad3168173e091cbc5256ef249c3d58d869d863347b9847b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e034e160dc592134fd10df596476a578
SHA1461baf3a04cc6e2e69c596a1ada14c8747c5448e
SHA25645a052a4861ee113ac82fb8375ec78608466e4db229dcec57a021399ea035ef8
SHA512255e11eaf41f21aa23a00c3a846c2e5191f3c90da6a1c499b3fbede046a86997a414bc35e0ee2fa983f983dbd7d009d0db30998826e9fb70760fa2f65fd5a4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e411f86eefd21fbe579dd898bf94d4fb
SHA1f335749316134ef62c19824107c4d31fe5358b3e
SHA2567d1bcd9a24e38d2c732ea4adb10eb0559b3d8348ccf0d6367078054afd604661
SHA512a19e5ae2cae0df2942d05b8d89e46c04474a6b42f7097f3efc786f0a73b40259e0ac6fd8572034491a85b2fda3c04a1324d14d7ef92cc6072077ed9aec8dee99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d8c6ee99bfc2e18877d6cf4f84395c
SHA19de1515297fc5e52fe40c7f0e25cb56509201cad
SHA256d541a0c5b8537b0c0f7392ac357839d0285eeb549e2f044b47b914170bd717a1
SHA512307c5c2dfef151ff88c6c45e70c07fbb4ccf80be98b17c8fa578cf5e635831c4f4e117a913917bf6fb16010a2a3720097820ba86b4c307eec65d6e49f39f6cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe9409b59bb0f9a08722569f972d965
SHA1980713732fd866bdb49bb68f1a694f2d4a37be04
SHA256fc6431ccb5e55cd738e93a2b46e83aa8bb7e0f67d2f4f5d6c1d75c3802975b08
SHA51241f0c38a81929e71217d600995c066b969816f909621cc486b2c7ff314813b201e1734b1fecb25adc2d5630bc665a5774912a8c70281d1e9cf78ee2b494ef960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56d638680629b637d78bb9b21e77d61
SHA14bee77e553e6c335840d82deeb997a8744e70eb0
SHA256324eac5d3facc65606ed248032b757032af02113e7de7e7e269dfd1094d816e1
SHA5127fc6129452726840fb8dd660b39be67846d425018936b35f20d5b6f918808ffa164b0f37a952f76b2b24239c9e219e4b9b952ab4dd4ccb874c309994e0e0f8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a40b66be0426de906b7ebf32eafa5b
SHA15996178cc868f8adcde389d2d9d3b4550394a1c8
SHA2563a834ad616210cb290c6a96866d8ce129669ac544059dbad7be755b2cb0639ca
SHA5122a10b6d9f5753f4b6de5c2f412b79d56ae2a4d9912814137f606f821a93732cc64c8b68bb700160694ca83c79832b3be957c8b71650f355191fe864858791909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1787c1ca7034c8b0a5b609d390ee8d9
SHA104252a195126bb6c74e2d592f1298712d9d0f1f0
SHA256318b13b190ba0afd11568c6d89c71d0f934447a7f21e28af9569548a98216556
SHA512bb2789e4290632b37c6bcf78953890067c27a6e03a1c5318f954d9f38c08d3c741ecabf98272c038b37bfe004d145ac4f8a9a1248e05014a3dd0c22c66d49e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1f64b2cea2f88f09ad8a24c802802d
SHA14f97feb87d9fca06e63eab17aad227a89ab2ea10
SHA2563eac71ba52d53d348fbf47b8dafed1aa0bfdf842148a41b3b7956144556340aa
SHA51292bf8e665f0c0b2d4f34aaf604942e840125e878909fa5e953162b56276e3e52d1c3afe78de92cdf381af2f1f896242900910928dd04c1b351311933da1e2067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f21fab0436fe535bd5579d5a3e0cba5
SHA154197fc06b87f7955bae69ae90384a411c2f5611
SHA2565b95682e41efb05f0031e438a88cada51653d18ae2dc19cbdb48cb37ee2e5416
SHA512c841553f6f3a99ddcae0248b1c48effc41d538cc8db9ac0f1230a737d7e59f740e7aac1046804713227a8eaea9fa3ba78eb577ced6e75484156edc84c4441202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b696ca09956dde9700c10c78333b1355
SHA1801adfffaec20ee67bf268b5ff94481d642e1622
SHA2561672588055672b695ad6581a2e44db27b60eff0430e28b2c357d74c9a04e7f30
SHA5120a17548019917de3ea07ff02c77fc8c248e7e3fb977552d7d4c76ec4ef40ac74ea1a7c73bdaf2fb8361ec39763cebc2f16a2442146aea169b0f270a215bb53f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2704f5d62c830fd957e49cfaac6667f
SHA16168833a1e7dfe8fd448ae3a65b73fb2e22866a4
SHA256e9b002d772bcfd5bf270c22f6edeb74ed31f89bc1aff2ae16b2e9d03739d7b9b
SHA51281cdb6fb3865e75bc17fc4869c3b0abebb718889419d40835c57fcc1f82bfe27f7f7f6d8839707ec2674a2dd346755cdeed25546e81a4d4e9e5c651963ed6ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffaf4eed6631a42c574b23f496fd6f24
SHA1d48e0cbf713aeb8cfe01f9a6fa4e7ef57fd8560c
SHA256c1956d965cf3033d6c19f48ef1d126d7c8e3877a3b8411757e386efe024e7112
SHA5120472319b266f906335dd7afb22ce85d94d7e744c81f9839dee3ab7c05f6b621d35462e9d7c223e261b48723d026d259c03ead78743d0b78c27f89d78d4d75457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab882895dd9bbad388ab69a986039b76
SHA196a7223dbf574b1c0611763e4f47508b2ee64b36
SHA256e3e8d5383244f023779f49b45368e949723fadb1ebfcf83d2c8b0d54b94d72ba
SHA512f6ca0dabae59b85e4ae6902e992bd947c0ecafdf34586bfcaadc775e99c68c729435d73e0f989ef76c088c80124a86a3bccfd7617fb4f3ed01706bb4b5f8f944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d86f60293b23997f0409d4491b9b10
SHA18a0a676f5073aa527764687a0e4e644317a4b585
SHA256a620c4f93d78bc842cef452d08049c102387a64a71003a841ba45ded8029cff2
SHA5124cfe2fae0f68dd91782daa814f5c10ace43b148f7a006720c757e80b30a679fe04ca416fe64b6de37072f74fcc1a3dd1df0c1f8af0e89624f239c089d12cb963
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a