Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
501440af1a3c306cf418c81a00f6de50_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
501440af1a3c306cf418c81a00f6de50_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
501440af1a3c306cf418c81a00f6de50_JaffaCakes118.html
-
Size
479KB
-
MD5
501440af1a3c306cf418c81a00f6de50
-
SHA1
ecfe8e4a019f20256e3b176ed815d0318a5a99f9
-
SHA256
86a29ecd5f55c5484327a54ac20d6e287f27126fd9bb57e0caf3dce27f5adc1f
-
SHA512
cec282130c7255badda95c94c9f912f871d8be15fd1371f72179dde0b8ee520ccf428ac10d0119ccf9c7b31e4f30feb55aeb12969f72e8f6b0252018681a2a47
-
SSDEEP
6144:Sxo8sMYod+X3oI+YZsMYod+X3oI+YisMYod+X3oI+YQsMYod+X3oI+YQ:aN5d+X3H5d+X3C5d+X3s5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309e76fe69a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{108A3DC1-145D-11EF-B21B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000099012b9bd0ae9edcce0f51ea52d3f68d6a9c6b5bb72cdfab98ad954a34e923fa000000000e8000000002000020000000c1eb4cd3dbf8d56432aa2c40b26fde5dcd37a99c358f32eb0dd3d06d0124d33e20000000f1c0e380d81931bfa78f9cd7deb694153e92a989867e5d4a275ee333a3435dc5400000005204d4c2cd1a0b3a481e24ea48f1e43da3e309ca94222d417e7f337db096e69ced3c57676e2917c97237bee45b26daa8efe989dcf683fe5c5383dff32a151826 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422119408" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2980 2840 iexplore.exe 28 PID 2840 wrote to memory of 2980 2840 iexplore.exe 28 PID 2840 wrote to memory of 2980 2840 iexplore.exe 28 PID 2840 wrote to memory of 2980 2840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\501440af1a3c306cf418c81a00f6de50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d06ba956021a63f093119f83d36b4f
SHA1a7265931af7da2baba5f30a5fc08e35462e69c78
SHA25663c73c9a4c16806ade68b8a3b153ef05adb4300fd33b7ee9c10b0539cb6775d8
SHA5123fb339317dc73c3f6196ffe69cf9dd462fe144cee3968fea7617e0fc7ed3ea9ce92713d83e3a48a86dec2ca30013a622650a41b6ea1b215f36d6f28e6609fa96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a95e1d519969b983fd08a60bd6c2095
SHA1839f9ca9bdf0b4f63759b9f37385edfcd8302cea
SHA256f811e0869bc0de1811748cfb95430c1a01aaf59110f4e2af45b9a2bd0127709c
SHA51255f19a91a96b7755bc6e82fb1cb0153f659f72f57f3db9757d6320c5650e68d25638fa1ffbda6ef0cf86519b21d8b9229557162af7501414eb92f1ee0d65ec05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3dc0f99a43dad5870761f3bd25cff7
SHA1a0402a6c65d32706cca5643e2d6fddc9e768552e
SHA2565aa1c1d9244a03220ec3a6bbb40c67b402ac54c953a3960cb5e13246e3011d01
SHA5129d8083c5f58ac4b2ecd2515b28554a044c07bc138a3922e77785736982eaac8c41b6ce372bdfaac83dede02a3e2baf94d19afd79b4f8c4eb86ff711d658d947c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5671ae9de6879f4dd59e9498f00a57b77
SHA1879b0f4050aa13b1c9aed7f7f5cf42fe8d480958
SHA25607c7bcfa9abbaf026a2b53fa584085c46493dd325892059b890e39ebe24524da
SHA51293ff6d877d149fedcc999f3d878887026c7e69dc98b5382078ed3984e368ab8283b70c540701e2045a8c4970108598b83cf212945f8cb5b32b6e7fd024d30350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59511e7dcf17aa9dd8b6bdfa615d0de26
SHA184e73cc9c322a69f196f4af683d0003a7299f72f
SHA25646825216085233f158d1c8e4725d83de23d3f30d0f9ee77efe96681ca65a8257
SHA5121b0b42d8568b0dcd9573ba4fd62fc411618206b0d0ae93c99d573be2b5b9c8f09b6b3a9975f7d27bf59b9591bb67a1cfb0bbd85cb0e608f1e47256ebe4f64b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527df481ad9f7e5214b26d35177a14ccd
SHA1ca43281ede8e3d2215c07ce3acc5004840b09f5d
SHA256da4997ff892927d50d7e25a34f92fea5948230de28e9a8548946b21709358626
SHA512e4cd36155b9f91676376527cb9749d932dd563f3dbb1bc1bff4f76b7517be95ee9dc6f67f6d149948f67703125a4b4f471f2444a1fd3215ee4e510f882f37a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552670a21dc3c9875785c92d851f73b1a
SHA12e7e9fd1db8c7a58e9803be051f619b9b18e4863
SHA256cfbfa86043425f1efc296aca7d8bfd809d8a023cff121e116137f0d0defa5a9f
SHA51299612a5119606c40849b0ebdcad2bca735cba07e5f8be953f14fac334af93f79f3f733045eac75296f4c79d0af6e83dfff04438454a78bfe81db7e9e3fdbcaad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5e5796181836dc6ec957de6aa24d2a
SHA1861fe6191de3d7bd35777cf0217a6c97d9226e1c
SHA256a2beab3cf01c5c5bd5de43add63d75423942e6c161b85d4d7aa5629668d65423
SHA512eda831ecbf7d9fd7746e2720fe61acb0368fba0e56fcdd9c1510c75fcbe6ceb5e0a06fd93305a95faad980663fa776e0cebc25c1096fcf3b6984f836904bd55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599659cdc7991cfe74a024b10047fc8c3
SHA11386d470e0832d1dbe71f3c88567b84c3030ffa8
SHA256d95f4f6089c02eac203efa57a37316e07ce4ec9961ebbd20b092410f18a7eb73
SHA51241d0e473dcdb07647d65e58a4b3c38ad0ad01310b870a327de9bc1bc8a79bd35a513992b4c8e56fc22da895868b92c0399e095bdc9fab7058ef0929f24ab387e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb304275e3c67d27aa5b92952d9d923
SHA1dbccc5a7391af2190690da5c0fdcbda5486c34bb
SHA256fde2467af024cab9bad12d40cfe93d1a771d91def303fda97114305db6da9cd9
SHA512e2dc6fb3f87c901a2bd373101d88663b694a5c19af3832ff136bd31147a7853d9645b5bffa6565007de4b4f81bf75fb491bfba5a406d092c0bcd9ecac1a92897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e059f9b1a17e856b8a100c970308645
SHA1d1d5059ef5cfeef05367554b58371a246b487d94
SHA2563ccc487e24fd3a126d058ceb1f603452638d7363f349e3f2360c372dd68ee927
SHA5126ae5a47fbb347cb6fb928ecafb7a620b65f3fd2a734d82e66b35e971a78f40e1887fdefd92db86f36ea019f4c7288ca9616c50f2647f39d07c947c4511dda26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c698a20e5ad2359b3a5f792314cf21
SHA1dc898de902979923aab6cf6a3ca00e61cb325808
SHA256f4382812308120a9b650193a12397083802c872d726f4f9aa75aa3e0ee153e48
SHA512931029b7123afe5dd308f0070e80074f518a8a204f9878e5b9699b103a77382fe7c392f700b681028b049ee995a6b381c6a20c8808adc5e8ddd5537d9f9ffee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad984edfe134dad4c78d8a740d085ebc
SHA13820f8c6660b73a54c2f4075faf142bb55212047
SHA25620c5fe8e421b609fd9a37b0f3a67834f3d0f835da94a2b0eff7e482eb08c1851
SHA512c1efe43328d2eb0b5f9eac1a36b50458701a699483f78dbb9470969bc4aae79ab15c71ed89147b06c62edb394bb504227f054414e2918824d71dd66f8db99806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde3442fa51f7f0434aa9d215d19bfb7
SHA12a9cd587c63e3d88ee9c044f273842bdb590514b
SHA25600850cf1562446ed569acc18a872d070fc935173ccac75ba733833652fcd6f2c
SHA512c5fc3796aac20f37ac7cb8d395a941679c7eb0e6bf733b8e67e2ebc3bb1611e1d8bbbe2e092f793b27d83078fa4a82a2bf5479d8c3f9edc9b63fc7795e42224e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9682165b29215f24c3b036800bdb4b
SHA1d46395eba8fbf9f3e5c2c1d8ba34b41ca90beacc
SHA256807b6cf095168608a2e29555e59a8c764ce596175a9c8490d61113390766d995
SHA51293dbbee069dd28b0b6aa1dfb7aadde489177536f45717de068e9b8a4be49aa6a736f595585e6ac01903df33c5e4df31da7e82446c19e5cea8b3cd547e1aa8c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d127855d23306044cd03b527dcb676
SHA1945e48434d71ffc8735156d5c2f17e1ec58bca14
SHA2563e5cfd006c7d546c35686419e390da1bb99065b069b0cb954883a3228b054205
SHA512142aeb17f7f38653cba10e8ee178fd14780f01bd2a290456c9a3347811f3037d29909a39b58ffddc5e31459370bbd0a8743238ffb77c94be83bfe9e791efd51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5d9ccd222519ac05c0e3c3f3197ffb
SHA11f37347b81599f977dc8094374b91ab3f43ec446
SHA256f81572159e4eda7f8e16f2771563fd3c6768e7963ef8a8b765d16fc0b27b7b71
SHA512af7d89d0c82f1e2f11229798faac80863d6e93da7dcec92bff928f1c7a6aac9fcf6b57c3b499ebb0470f8581ece218336124f018011c5de1b5de5b6870d0732f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954fea143e5ac9eef75bedc7d957192b
SHA1c230aa31b9a5336c96455d7497739d8d49f18bf5
SHA256a72a19c1541cdaad53247ae26586a444b0ff4278ca9237abcfc23860119fb6f7
SHA5122999501d008f7ffc1e8e246419ed6f662decbcd8efdfe81489dc001cbd0aa7398ba81134c9527b9dc5e0f26e9bc1ee92a1621bcf755ac629e401b5ca88acc26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693cd5ba3001d9e10b0b81a81da4f4a5
SHA11a7386279bdd8608096a9678afe75b5a28e84aa3
SHA256146dd14938ee4e9c9b25cf63e0111fd63ba11d7d1fb1b1857bb56b15e3ca5b07
SHA512297662874a0c2ad8751ea77d2410c77ccbd50baf95fadff54508ac57ed9a7a120fbb16a9dc5e56f7b5c0777c0be6763054d073bd0f0e3013694b690e8d06ac78
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a