Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
5c2d05fca5c48ab9b3000254d19ee16e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c2d05fca5c48ab9b3000254d19ee16e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c2d05fca5c48ab9b3000254d19ee16e_JaffaCakes118.html
-
Size
4KB
-
MD5
5c2d05fca5c48ab9b3000254d19ee16e
-
SHA1
351c8cbdaa9d85ff6044b2f69e308e10f53fb92b
-
SHA256
174f4b312e24919dcc117072b2e0231d87373ba3d10d00b40040e19ccdfa4cae
-
SHA512
a3434149cd46c3dac4a8b7ebed8fbf547c9fed23e13d8ac99a21b3fb912ddd07b31e666fd60079a7ebfda4f441f252f82e01f9295128a257f4a09eb322c4cbd6
-
SSDEEP
96:ziEpA/ZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhzPqDZ:zi8kwV4GD8/h/KiZwQn/qdP8Z
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422325275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06e9d2549aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62D229E1-163C-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000026b76055c135e54b68ab539a13624f934afe4c5a1ff9ca82e3319cb9f1546684000000000e80000000020000200000004ccefd9891379a4ea0d7b0e659fbb1f4b3305fa140f284234de8de80996b651c200000005cb372d02e3e1119ca3c8118a881e01d5dd46572155c918853f84bd106fa573340000000b51cadaeca5c3196065fd4dea5c91e44049a508b632b385be2cd7c3e2f208edccb24b83764fe99ec9668fff26e4fb07464d5fb59e09e3392582530e63fb7b320 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c2d05fca5c48ab9b3000254d19ee16e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd2070ebe09fc0b5b59ac00c0b4e3cbb
SHA1478334d5c0a64417d30403c6ef988e12ff34ffdd
SHA2564e739ffa2ab485647c60ea21a2d63d975262c70e903722d0988cc9185e9cfb29
SHA5122e1dee82e873a7ceec02becdc30c40bb169697cb669b3ee53c8ebc6851c35a57fddf134ab8f2f9d05c95345d8201362571ccb8d2e331babfb67647a73b5c2c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571041356d8a0d2ff5b0c23faa71fd255
SHA16ff857695c67a2243e4383296613da9565e7a52c
SHA256b67893752fbc709fae23f61ad15c354ace1817a0cfd7024989397cbeddfee834
SHA512401db6ee3f2b824bb7367efb8f6c51c245c510accf44b3171143cec5bb508b820c56bc5a66b7c6484f9d1e3b08887b1ddd039cb09ea24570b76cfd7978f7934c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0e8fb5ac71edad6c1a85949dc7611b
SHA121869200c9b7664445d43e308d5180f422bb432f
SHA25615b5b57f388adc28386b2092048ff3974ee85c9e264ff83140c8b17961238fe2
SHA51285dbfcd60d9f4cbbeadd0d336ee061f76ebb6b5a6be13e326ab49c30297b5e2123775bdaacb031d86a5fff71e9be4cf30eb099ad62f4011e2c039f4237bab5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f7a2c0481d7e6d7ee8bf85cff94bd5
SHA1a5cd66ebe82d503328e1f99196243131e79dea0c
SHA2568b9bfa5748afd900f2bc869db9a578e12bfc952fe158987fa33aad02ee76235b
SHA5129ffe9111d8303ca4764a1a981083b671ebae97ccd513274c30954a831190287afae716eef053f5fa301534aaf51970a5ea06b3510842b798e60588c38648a728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426c36a95ee5562ebd28a85b27caf7cf
SHA1ec9f5ddca07e5318e9e0e866c2c807d61328fda1
SHA256b93bfb282c3a98d98aff0877214b6af267743571ba28890bed06b2b14dcae2a3
SHA512c38e37de3c49a1293ef4b7f104339426e1a89d1fbf37829e3a9819858886a32d4a6119410d330a1f7cac266b15ce5fabf958ef58dbed15ebd49821ffc4a4b03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b470acc526c4e2a5363dcfd2209972
SHA1d8aee05d45fad4f3bae4ddeb0d9ce2e64e94019b
SHA256d5d4822537b0b2a0910a62e6827595f04e40e2cf71a6a3c7ab6a3684f634099d
SHA512374dbf9f648f8f418a263c110db9820b2418c3ad872e8f3001561268ef401101ddd8a29765db9f3d3710cd06220a0f6aa6a078010522e1c393929db589145b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f81e070396d4b06a81d5466cd5f5be
SHA187168d5ce91f5043eafea1e7bc831be283621501
SHA256ba4496e5ebda736d9cc54c2d76684b7bc196b40664f34a141a3f25274d611197
SHA5122480ebf0d3a3a19bad712408e834949986bb35e16c8fe3377ee601c3f9d6afbc30003cca01f07fed310fc7d3809fc9deaad68b4870d7e93782d2d3b2ea07a9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f223d4d950eec0327c32b2121cbc03e5
SHA1c7b64dc94016a8c900b4117834d4f484bbaffb8d
SHA2565e75af3793d9f940ebf35aa11336de0dbd95db4e22f90bfc61914b3a4707b2c6
SHA5125eaf2a5988613b9f210dc2766f2bc12334a32fe5fb381bc13aa569416c36d687a7dfbaab38de7748abbe4b15a841a4f8d920ad88870c0725b2d1d5f5e5ea0a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a724fd09b55e7265500f96cb19ccd620
SHA1413902b069871a52ab8672e7cbdd7ad63c8a265f
SHA2568382d66d3ee69f972dd9a628d343effada0c4181e0ebae92864466a3415f78a8
SHA5124c0bb1002c4c414ae688b237a1af3b8bb5382b5dbc8c5e08b81e31d848195afecfe2e675d3b159f93fc591d6c398f7dd3876b19e4d9907ca7018afaf8b033a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679f52f87c677e6c77ab78fc6bbb8652
SHA129471005e8d7fa9c90f68247b6157c0b8ee9059f
SHA2566e40ee0e92a02170187bdfc9662bfdcb14b3de78b47d65c76ae3e973dde686b1
SHA512cf8ca2526f8d5eee5e20c5122433f2e1cb677a11606836682f2feaaf092520a6ae5eade01f26dde1567d38f7c295a62341e418e7d1c21128456f6ba88f89466e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dede7771cac3ecae0737e4356c0e53c
SHA1cdb4d2d526b9a9b8a6fb7ec2e2cfe740afdb8176
SHA2563fe8d2721843be7c104045616585f00278ddbb3585f2c202b30319129f2e2b19
SHA5121e2cb08ba6020c741c44d1da5d017d5ae1611e59cfa03b81ab245cf896f8f01af3bc96132f07884860be33b520b57b353540c67e06ceec7f032d2d40b0ee8f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bdf62c29d437dd343328e07ab88b6d4
SHA13130acb330ec0d46a4c508bb5b7b7fc824114e3c
SHA2565fe76ed7eff6d794c31633b2aabf3a44bffe3ff2600068db382e31611a344e81
SHA512cb358a8696dae1a61a7fdea1a4845430cc610534fa85766cad0704c4fca2bf5477f42b2a21661b314404cf6e89064c4f689d34d63b2af912f8a89f67b5a1a6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfac991ee27b56426eb8a42fb179e9c8
SHA10d4e3a0a2f1aa3d19d98a7053b2d2b6e3197c456
SHA2566cbd8ba69bc195c3dd1abb7f513698373e2ec30f4ca4c9d52625e665e6834d2a
SHA512a145508c8a77cc34a0daa56f5c9d1d0208c1bf66a905f13fd90569cec7668c14d1e8ffe1f9716c6743ec65ceb39189af9bc173d26f330f220c3200696ebf52d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aac8b9387aa5febadea398b17ec2d63
SHA11b6a9d3c141a52e9f8a28ce1fa9e526879831409
SHA256e6e7f91b662eb79b590a65367db3de8f93dda4832caed68f7f43f14a6a8d09c8
SHA51206399ec4438c5d32abe671602a720efede17b8848b6ba8060c08d251ed6d596aa436fb33441c6b7f9445b29f4062b92419a6c771c4c5ab5e490c9604311e5c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb919c9460ce9f453dfcfc8a09864fd1
SHA1ed69f3146b2d7a9f645e120a8ccf43fa8cdd1915
SHA2569b002262fdc7a336f64130dffb7905f017fcbd86ec0c9ce920c976555a02c84d
SHA51292dd7ab313c4ae6fde86128c17465530919557435d47943e1b92c084e92a303eafb161b9ca43a2ab7357f0a10b52d8b674222f4875dab9e9d884ff5c19f6e043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948b44b001153be5711578c1443a8397
SHA14d2bb0e5d7c9e2162b46ed13506dd505ea3e04e7
SHA256be0aa37d0598af904d16b539fc14bac17913af7e54925c26f71fb3280e09d63d
SHA512b526cfa94412232cea40ea513d51a7f3e1c554dda15b146ac33f0e28317ac6864ffb966338e6c9c7ac0f7276da0710e6ce8842f35156128a356784d71fe380bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d974057c4f155c70d0ebfe6e7810a5
SHA1253b9441f61b7ba1943ea532320e8993cd533c31
SHA25650ed8094790eb142b410a31574d494da40b6f6125fd84de0a0903f7042f4fa44
SHA51240100110a2cd8c375802f3c4fe7dd25e18b1b9553f03f58e24a30781af07542dbea247fddcb77df34408cc24d9778fccb673931eb2dcf57d656f604de4af459e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852666bc1dffb11603de46df0f9935ec
SHA103f887795ed76d0172a61d1a54759be9c6322486
SHA256106bd115e964c975482a12af063ed3bf727f482446452898da5b9c49f9b99ac0
SHA5126c76aaad3c02cfba886d0939a94f022b83cd6ee0beae13428b687e0b0519448789fed02e393bbbaa2c7972a43a5a5cb1fc433c6611315a8b218d83e93c761765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92fa241449cd28537c363523d8e4f23
SHA175088f65f5cc746afa9570c9d566cc01f90b870e
SHA256a8e6dfe9e6f673ea95d26e27c0732ab8dfea1a037269912cbb1b125d67330935
SHA512e631e0790d29e9d1032a9ced7a92caf219a07f4442b4e54df116b4defa91339e767b688fac787a48a9453396e8a945c3a322391316276758f06859fcff27fdbf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a