Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
5c8b9c80e16c7757c3f8bb98b5af7836_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5c8b9c80e16c7757c3f8bb98b5af7836_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c8b9c80e16c7757c3f8bb98b5af7836_JaffaCakes118.html
-
Size
26KB
-
MD5
5c8b9c80e16c7757c3f8bb98b5af7836
-
SHA1
59c886925198d1cf8f5562e1aff7a397ee46d3d1
-
SHA256
7c9cd44ace03bddb41d966fd3e70e4c5f15fe1cae9a7d19fd421a76f9318675e
-
SHA512
47ebf81678014975b4a46b08d541fdb3d245d1743863f9d05a848cbd3258559924dab90e1d0f356a6b29eaa6464f78cb7f4e6a40c75b666cbac94c29fadcf843
-
SSDEEP
384:WgCVLoKELQhF2FgJ3Utgl4psM4Q/dMqA2AUYLxD04ZKTarcCqZ7iA2ANzopyPq7S:IoQCXlaHXkp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005eaefdad275004ddaef74854549101d00aa1dc03f1f93384be5ebd0e66a25827000000000e80000000020000200000007dc483211b65ccc9d4ef94fb55fc788478acced3f1d15825fe77ba282b68e127200000001626fac823a009543e0bcb4706b43e3dbc28969ef3cb7dbe0feec5c511fb16dd400000003449065be67fef677ded0fbaeb6290918ef1475579a5ca8209f50f2e79eeb5ac1549f36711ca05fa76504075d804f4190dac24477af9ce3b71d3e11130b5f1bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65CC46E1-164A-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e07c3a57aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422331294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2544 2284 iexplore.exe 28 PID 2284 wrote to memory of 2544 2284 iexplore.exe 28 PID 2284 wrote to memory of 2544 2284 iexplore.exe 28 PID 2284 wrote to memory of 2544 2284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c8b9c80e16c7757c3f8bb98b5af7836_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2d3d07bb7a900bf6878ea1fa302f1ef
SHA1ba25fab477b5255ab3e3114cd6e02002a5237650
SHA2567c65b27bde0a8edc87dfc7313e2947c1d7f26dc4d1797e40ba79f10481e087a3
SHA51281362b682776bb941d8886165de9f5d21b95ccd6338fb2a3bc3a240d875e8b87a47acaf45334a21d4019de36c67bfb5d39da3312713d5601365aaf70591b9fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df217218605a678eea52e4759e1ce0e5
SHA1ab2b3939cc46d1461cc17209168a8b7adfe74cba
SHA256429c9abdd3ba887ccac5d4a76ef0abf0147c0d42bf0bb80a4b6433671c4f8876
SHA5127ed5a92e88b3ab15e48ed7738f0542d01f19b07d213be246d56093622458428cf3ca6d49c213133dd4a7e951e9c9ee58f2d06a156c18799ea92dd7c9993d0978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829e23db3380c5e54cdfa0c15534906a
SHA15925484baf6f963cd4711f3d61d74025abbc1b74
SHA256f5cce1d5f885582a9afdc34284a2742e52ebed61abb1c67c9f1266dadddce4fc
SHA512ba7b314f36c0cf1abc003791a49633e847bc5572e71736f51836ae85cd7bbb31abda258ff50b8e415c4cddb518ab83bc18627135469d48ed45ef0e59939bac31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fecfcdb43c372f83ebdf00af690ac91
SHA1a2f7bb4709e8eac8809ba891a66abd3bfc16a10a
SHA2564e5265af167074e9182023cf0b7b17b5cce37d2ddf1762edb442b63e6dff4d47
SHA51265b30486d8135735887ccfe8daf56728a820eea833ea3325f0cdd72a7bcca3de60476521ef991f3cad495210da6951f9cacdaa3987599467200e3b03f3645f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b33904d582473a07c71d3848c714cb
SHA11aa96267cff4461c1dc20c00b0cabad7c3653d17
SHA256cb285109df25a8b06567f84ce3b8903e3f933925a93679a920055cfa839991a2
SHA512fd4b4811fe976c41d37272691c224f89639f2ff89500894897c562d51daa118ca10cf3b436917869742c64b3fbc6eeaed429425223b83541ead91c3ddf66de45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd733d1efde444ebeca8cba04c590871
SHA122aa4bc3734296a50a108d2d9c9ad8e39f8e03b6
SHA2569875afb31a2c461a2260eb252dad21aa28bff79f8d8de00d67c22d75cb430368
SHA5127051258e3c2f50452a7fc6fb54af6b2ca7d438337c2f47f4eb117e1f8624a6eb5dc6b89242243b7b8a2611c95046828a2e5f94253a4df774fb1e1d01583565f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded4ef26a3446d30d4a644a79455b6f4
SHA1d72fb87f593527420c941831e7da7f7d2682c632
SHA25621e61d7991694d25fefbfc1059a0cba5fbca7737b3ab7fbf9917c57003971961
SHA5123af459fc2c3ad5ddf316c0c2866340f8eeb5f17f72ae998838b5e31fcd0b8d7f6dc3b3d31924e81338e9c8a76b4513d89762dffa0a07d5ab1cdf413845953422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9ed6b21092263c5e53c6926abb59aa
SHA1cedf4e791c280b31056d3efae1c4733df47a3ec0
SHA2560e0b15bfe4f6433784d242ef462ee33766b19284d6afbdb48553ced2ff24781d
SHA512548214526f6c00ab424e809e793a4926488c7aaa7d1b6addc61b1ac9d79cc666b50fb9750e46bc540be3ab399165bfc52f7aa00b4f93c510db52a8d17cb9c7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53572ecbbe6a0fd1761c907e2e5811411
SHA1909286f5b120a6a7a9efd387acf8d5068e9fa47e
SHA25689c605fd70ab1767c65ae5c23b86cf210088eb5a9699d68d2bb8716f8b0f8cba
SHA512a1af41616ce5823b412f59c18116b84171bf0315eaef55ec17edeb3020da13aa0a664cb789e59cedab1b1137e4cb13db3e5763df72afd4798b456862c4cf19b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8adc9cc78a77a4c50fdc6b09f29c97e
SHA198b6ac1e9ae68f375abcccb05112c65f7ca90cbe
SHA2562f69acc4f2ce0c89b75fae4fb246e130a080f99275577cd712a5063b916c0258
SHA512920428de94a944b8507c5d0d7f8d30adfcbc00ea7fb24124052bdfb61abf026e25802577b007f5ed510f06ebcbb8cd22e33ff432f637c90120550afd9bc106b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55495c584bdedf94a6bc30b6765082561
SHA1f9698c94de9254865ba8392749726627fc129d1c
SHA256e70c936cb5a543ac80ac85117760ce10d4b47040a2e821fefff2dbd50e6c5aad
SHA512be13f8a5473d3d6cc22c757b9f075d70383c98c0f5f9673728f3477703ae55dbe74bcf3ba71c171f86c8c49096fa5b5b0a26369406930e4fb3af0022920398ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b967ad1b444a82d8bd15319ec0f08ca
SHA169449fa07008ca204aa6635b4f30900a8296cfc0
SHA256a32f14e800a4038f5699488b602deecbab847608c5d371457db952803ff87981
SHA512c177f98b05899d486e2f30bc7e6f00bde29395b306927c2c80cc0dafe6ff6574390dd115f8d7afd48f6d362eaffab7a81aea6029b152221a7270ed139396be93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ffd1d6d5500309368383fea1a9bb5f
SHA1f04bfa5dc13e5a235e1ad054ca7d8fe719b85125
SHA2568877144036741ba37cbba4d4727e69d298bdb0429c729e518015e1c85b54cf18
SHA51273669410b153c17f64eb1d05d9c9705291fd205e3492d048091ad70c2c96c4ad5b8efef6eaa551c7719fa0345b6b2917e71897fe70e6f84a81934dfc4adf799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a034d0224a4487129975e9f48da0d08
SHA1706c73b1402444d316fc821d5624b705e1c056e3
SHA256595c39fe6393d62f01ec5e898067ad7e70aef7d5990591e55258b42765e6647e
SHA512073a3d5066ca42d9a0b567904bb9c5c0e142bed1899c7d5dd525884ba0caad9a824719091b882c6d7bd265b83ad17d7d2b6d7d5051dac0a076fb5d16d0a96d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d4f273164bd47bc6000e96cce40739
SHA1c7b7ff4d5f98839bd2f4caf7c64dd0f862615181
SHA2569c4503d226bf88b65c083b62c780a7c133a678ca40b8f860765b5862aa1971f6
SHA5125f9806e8ced941da374331d9ecd9d2a97ee0f99ec62607a7dac6037b2e66814a77169c4129a156e706bf4ce86eff31f6b4e909b0c4cf331f86d5354f937724a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2bd1fb7ef6ae117ed5cd5f0dea54dd9
SHA17c76e67a0e42cb43a236305f23a9bd2257610448
SHA25614c081e6fcceb66de3487d38c1e9fd94712fd630b65ef23532c28e8d90032d68
SHA512adde1d04261d330c2d5511965bc877ba34b154840e8db91f192d77e9460f5ab7f839265bdaa7ec3c337b316767b18746f1533e691af0b309f9711c2d724e7fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900c847854a6341c65bb0c861a730d24
SHA17a01887c9da2a25adf540652bc8b4995350a7c8b
SHA2568f45aa88748e0d25bf8058c63896e07eaa0ff38b7b8489705a5daff68a2a0094
SHA5123a8eba19b4aa359d51bf5f8f5bfbe93d39420a8b4d2355825f447f660a0f27e20b26ca03afef61a2dd11c75ce8a76efd8633437f4b4cec61219b8ec3515bfb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ee9c01f5e385773c4ee232895b4e49
SHA1739ad7c698dba112560346b846b222ad9f1895a2
SHA256f2a85d74e89d55bbe02a516cd5af326adb33e8d6ce7ea7beaa0dd73e8bf8f8a6
SHA512af0fefe50f4725547d243ca087600e3c710d08eb0cf826a80324f463763bb2fd4fd9cc1312a12782d37f63d5b9b08e7090b843fdcdf19f3b5e984b48b03a0551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501dbce660904a51ee76a727dd1cbb77d
SHA106fe556897078d692fb4f56c4df13510e9db75b5
SHA2562543a87460c90dfc6f6abc133495274c4c601b1b9d95ccf9f952cf3f18c2dfef
SHA51258ee3f3596262917f69a0636671312c2884208803bb474fd85a9708a5cadee2aa1389d618b4492af7700a8c0f757741812d18cad7b37d9786e84227ee06bc6de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a