Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
5b95406d60a0b09b778850441650ddbb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b95406d60a0b09b778850441650ddbb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b95406d60a0b09b778850441650ddbb_JaffaCakes118.html
-
Size
73KB
-
MD5
5b95406d60a0b09b778850441650ddbb
-
SHA1
ab55eb886b1a327319664b6143d15d5e268c534d
-
SHA256
5ba3d9a83c8ada34395a94df6c88fbc8cc27aaa4116e33761d2091161758602e
-
SHA512
b664907800e7d7306524bae3431772d91b90b3cfb5f73783bbd9583be9532bcb68def0064151c64fafe9dbef3aeb4e153276b31cd5586fd32586de842659be78
-
SSDEEP
768:Ji4gcMiR3sI2PDDnX0g6sp6yM2LdTb1kj1dqM+woTyS1wCZkoTyMdtbBnfBgN8/C:JybnxT5oIfNTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422316271" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BFF16F1-1627-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000004fd7ac6c39227e96512b1230f5637982039abc60485d4c7b13f40e63f4b74c9000000000e800000000200002000000095b4fe388511a7f28c4dfb9ec452145a9b38a476cd7f2c627a0f808011c1c93b20000000604fb84b9778415355eafacdc963381974bead8983e0b7f417bd1221497d632c40000000c274780fa238f1a5aac53cdcf7199b8d2ceee7a626762f6ec755f206dd8bca3203af773ad6216e3b10d739c17c27283f947d337b9d2d31f9a20516e37f5f182e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06eb64034aada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1612 2188 iexplore.exe 28 PID 2188 wrote to memory of 1612 2188 iexplore.exe 28 PID 2188 wrote to memory of 1612 2188 iexplore.exe 28 PID 2188 wrote to memory of 1612 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b95406d60a0b09b778850441650ddbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0af1c27c6214ea69b8f60a28afa22b7
SHA1ceafa1d6c57a8caca80caa8f6d4affebe56f2871
SHA256b4be1c8946395a77988e21f7ed74a7f056025ef31c28ecfae4b250d4d8d403bd
SHA5121e89c4453193dc1533dd2e31fcce5d71719d08dc782264275e6568f0e9dd19112f1f19b263acaf61e6ef3743fb162cf1a4b2377e55350a0059f64277e58190ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53308c68d8b0f1c87483eb56def4f21
SHA1d8552ed3ac5cf6660aa9dca39555b58a8363b448
SHA25615387abeb50fa1afbad1489ef7594f57ef3e45fc383a54e2de235690d6d59472
SHA51202fed22a48edb4db4018b8d066a291c5bb9b5045fe31ea4c40c9cfc48b9bd4966f77124702e1ff87330be20402442efb54bebe18529309cc5d4b03df5f2d689d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5204b73bdc68f52333cf078e418164cb4
SHA1e71ce87eca066a9d43f550965fefbd5056cb8ec7
SHA256296cdbd5a7b5441578b676a6a38972a1b8c397380b6d620a6cdfb3d80b852828
SHA512d9ee01a3afe695b40907693a0ec89e4092006f1cb9b46ca3989714c47618c22726f7b1bc87224b12783ebe4b10a1cbd666b337d9b8e6e3dfe3bc1ce2aadca1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e86095c29e3cdc909e7cfd8ef03bf4
SHA14b86565adec88e8e4a2174dea049d02c5ddd3c6e
SHA2563d512b81890c7386aa7b7f7bc0de42c8bb5784fbd5d7546d7e035b6b24d02b3d
SHA5129d63a37a07fc25028739930eb0fcb9cd9e38790fea10c2933e9f7c9c42b6eaaf29322fe86ea947a414bf51471a76e0475a4b8153a13295060a24401eac371808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8ac7f0e7e5aacbde6b78d1097794b0
SHA1216fb8e4c2f57d5a91fc412b4e81744ceffd0d82
SHA256e19cb189ef540c8f2e3d1759dc3c94b3f7f83dc83dd8dc28c797352cdeb2dd51
SHA5122c7d9813cdbe1d3b78b6a28943408615bcdd36eed46a4e2698a1f7b129dd21858c0cf7ad2b0276e68f7d363ef44653e94935497765a3376e32eafa54c08aba3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab54227ffddda1ff383a8a177041c60a
SHA1b6ef0e907f65b328559d4c15704476eefe374dd8
SHA2568f40ea18283c9829588cb31a9f8fd9a9585218412c2efe3058cd58977831d3fd
SHA512e78e8379284e85ca7b4ebb4586740e11ce3ecafe0b1746ec3a1662240c5c41cbcfdf4d41e46806ca6bb7de1e758b070025f1ac7e18bbe0e62e2aaf688b04db68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68fd4babe54110789692188251d1d68
SHA184ce6195e9a50cc23778fa94c025b4bdd66e8450
SHA256a8ac0a978a1a87a0bb91b1f0ebb05c96ebfcfbdf39c17799cafeffd1a26e9e73
SHA5125052d07e78364f10f6cf72957e19637a2438ff30ba0eccb75618a46cfead6747645c7c82a0968bdfdfe1de0fa90f8299dc1d851de33c99d25024b9fccd651863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda4005daefb372c904a68225b037077
SHA1138f5a8363481f3f1157bf449d43561de8d1f0a6
SHA25638aeed9dfd995749466334e2b71ddf7dd19248c5b5f0a35c660610485814ad72
SHA5127add9e262dc811abccb8e38debdf560b1222924b3f9dc97d1dfe6274c61adf1db7deaa55dd8b059ab05ce1ed1514083c8e024e798652bff44d6d811faa43574b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f4e3879bb538a3bc1e9b1333323510
SHA102ef357f831a8cee0f7550bc77791565c987cbb6
SHA2562df59edd62686b1a8c364ed7b0075ca6ad3b8cf875d525af05c9ede5e07ee5e3
SHA512261bca3520a4a0b1722d127d9a6aa0db07778e967634285307c9502a8b7e3508910a0e7b8e5fe66a6c71351fcd9503f97dc24f1eadca22f74e1af1ae16290ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028c540af036b9a19a3a5f468e2c5772
SHA1697fc52793291ce1d91e667953c130a768c3a655
SHA25611ceb70636bef2b43220cacc9641c5021486e75b0c34ce2980c68111d55204d7
SHA51240c17523090df91d67100613e5c6c88a3ea6649e41aafb1a62abb7e25676dc0edf45f759eace24340352401383e0e48cf463f2ae1c751c98dba02b7a70e9c3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59676e984153449076c8875d602a8eb14
SHA1f3738178915cd64b5faf7909711ede0533ea4dc8
SHA25685dbb85c96b3e007b10e1f484f86d57bf0c5cb1c78e00f41a91d21052ec62170
SHA51224a3e91f50b6ee15ba808a01fcb6f9d7b880d3a4c92c44c7b25858e9f11eb2589f6a9986150da6529cd8bfc40ca50eccf0138deda29f656f90f58cb7d26e297a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1a8180ffb11158fcc41b88bfd92d56
SHA185c655a80e4fc6c1f1a824085913d1a18d902f2c
SHA2567f2c48fc3c8999ff8a9d3c462a56aa9a7dfa752a380069142e78878e1c4d503b
SHA51245b8f9ea4ae8c067369620f53605486a50fe48edb6ea7fcbed4bb6602cf1d132a1e499d55f31ed780736a8d304bd81a6cd30f654fb66d9a1451891d70e284e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c781e6fc4894547212a4e84fe147c34
SHA1d425ea1e5382a60226b09067a1495c0c0a0a7159
SHA25628e32e29fb81cbdb2519f8bffe7b4ba151f0f2c3e9e7668f088ea93daa9a54cd
SHA5126d9c1bb884aaba5ed0892b11217ee99a13b4ede265abf0c990133d0b9c4d6c4ce55fbd4c169c41f54dd2e7a94e98f6387bdb124e01df6ddf4c65ceda77c65754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb5b7bae377cbeae7e399ac9e633a17a
SHA1c9710e65f561331ddd42c0d7973a1ec0ba3d9a08
SHA2568b424ee309fbfeec14eec59f95f2d3fc397e63509e1fbe3f1c6fde11e48ca201
SHA512739bf41661854d83e490dbece5cb27ad1326cd3cc9cf1e8e6f5b0f8db972bf8cc9f1fe6b17d2af2f84b15f3d69620ae6db22a849bf805bb77aa1667e8441521c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53afd1b231d5d7c07a49812520a1c2041
SHA1a90ad50bf6dc4fac4539a1bb8b42362cb23fd2a9
SHA256652b0b74cad6c27482a545436f786a19c615ed3c98765b7b57e74556edc06992
SHA512f95b50cf6879362f895040a8bc520476126d70909e3ff813fea0bd4197234d3dcc5a4183957bef2a76d0a0d190febecfa7b7b56b68d2b063129fe57ce0f2565f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffdb6940c664de9622a59affe2ba8d6c
SHA16afd2ba8fa81bf4530d88d1365ca4242c82e8795
SHA25670a448a5eb1f573475c85f64e09ddfd8c7986d51a359df240c2502f85d37748d
SHA51267e8c49f171e3fff03dde38c1daf18de6c9006763f5dc87a1db54a4d811bf78810d1921f1a19116a07729b520a1e1d724c30642ef3b3930031f13db5a2665788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537966d7e8030755f1e307ca5f720931e
SHA1d3621edf29fffc499ed90f42cc5593a9928cb272
SHA2563f78550171bb7d2ad0c3e6b5c802a3da645dc3787bd54e5be0908f8d74b87afd
SHA512b2a2ac17ca78be781f9d10a2151915f8d7fadd77b7feca111c7e45a7bd139fc9b0accb87fef0bac40471b4b18301935d440ca899a4942498150d25a17d02ba98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a06f0c795c41bcf513f7cdd13019fe8e
SHA199c3677ab5deb06e8502c143bfdd0ec0a517e3e1
SHA256267c424b7d7063ea9ab6ca90e94dc41befd2322b9a030aaeacce5854da2e4860
SHA5126cc656044d618bda949976f5fb90f7d5e860cd912d809dce6d244dd15b57e5dc17343de383cd87c1ef498f81330135f58321f19d70c8c129f8a42628921f158c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53afd1cfb53fc228b65b3024c516b9ef6
SHA101e14b1cd34909a1dc7a0783d39f95b5e4edab1b
SHA256dc42f847b7a3b1a14c5f97cfa37c0466915ba8427d790bc373deea591790b80c
SHA51296ae919b3bb6f19fd40c62c0ab0505dea56e2d599204b673221332d7792f71658fde0e72cdf8b20face3aa8639df620382a2343265f7a73806b838e267a63e4d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a