Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
5c7ff75be5ac896f856be4ad47576ae3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c7ff75be5ac896f856be4ad47576ae3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5c7ff75be5ac896f856be4ad47576ae3_JaffaCakes118.html
-
Size
71KB
-
MD5
5c7ff75be5ac896f856be4ad47576ae3
-
SHA1
d4b114dc8b04da7322935fc6ad207d98e468bc26
-
SHA256
933aaec825a7c9f1d8c9ee25c1e6315a27aa2157a6a2326d18708e42c0f6f8c5
-
SHA512
1769f9aee4b7ad1abac8bf250f365aee017c17fcaf10e4082f3ceac397c1f62315aafd7ee685793a51589cdecf2548b6a8a6e6a94505ab1d88c0f4aa2f546101
-
SSDEEP
768:Ji7gcMWR3sI2PDDnd0g60LC6FVEL9KvTKDWmoTyZ1wCZkoTyMdtbBnfBgN8/lboh:JfhtV4IIW3TSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5DCB391-1648-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ae088c6b027a68b8597c7c5e724e1149702bd00530d319f2405d44b565146f4b000000000e80000000020000200000000edde017182769c31c46261f05385a6dfd7bbc7531955c650d02fc75658b9e6e200000001e400273867e59e9743ce4821d5db6576c6c37fae0e70536715e24c4fce440ad4000000057a5ce81ace83f35e8b34188545f90f557dad31a844e1ac35842be230dcf530dd7ccbe031e86aba263523a0118e2c320d1a1c7a0b868664dd043d52a48c21e09 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f57eaa55aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a18964b686a36e80a04372930a3ecaadd3cf1f19facfaa50c39999424acc2f9f000000000e8000000002000020000000df5614b26ef091d3ba5dc9033694b8b6f808259dd80d36b64223aaf1d9065b4f900000003fd5189e88b930cacfb4afdc1a41ee35baaad72634729386891558bbe3a3ce43e95acc2edbb182b0c6f06b0c240bcb7b4d732a3bee1e6e8cb17c5e7aaac196a06a529a34ea13dce5bcbd9f90094b0f52046918c8fab392e4802d2dd0ab8026b9b6812100c142468b6dda692cd5807d654c8ab21e1647b3136ec0fe931ad65032016f83181ef1e48255ae66d35022f1bd4000000042289fe34a9029fc0e1481649f93d0d1d862ae034255f5f5b4da4c66f1cbc126295c5f13ca894373bbbfe82aa8cde9cf9b4a10f1c0ed298e7dd16926efa2ee81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422330625" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2748 2244 iexplore.exe 28 PID 2244 wrote to memory of 2748 2244 iexplore.exe 28 PID 2244 wrote to memory of 2748 2244 iexplore.exe 28 PID 2244 wrote to memory of 2748 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c7ff75be5ac896f856be4ad47576ae3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5330de3fdf7c7ef13de3a0c408f0bdb48
SHA1a64ba9a6825149b22ddd283a5d7f9c47c4d007b4
SHA2562bf7c741fbb695cf42494df1beec6c4b7ba538ac55c962db9fd4c2e1d33fbd18
SHA5128f7cdf25a73f40e56fec6e95c7b88cac9ec7edbe2a1d46f1201a2265d360b40bab48fc030240e63fd77d317bf1c1098c47964d987c75d763910da8a63973f80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe26a284054b4389b0e3bb9885e5f1a
SHA1196de20cdc7edac0e0bfb7dee69e38e1eb37ec8c
SHA256c2a93a586c92e6b359305bbef00c5c7109e0fc058896408fb27847cbc7c266e7
SHA512d201a296816102f1b05614e15c1c1a1427ac0b34da5dfd59670c4bf78ef4d8bca77702ef402fa9acb8cc391869e9d448b3c414d9efc624a11bf4c6a2bc347afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab2d7f254627347c59d99fd3811cb1c
SHA1d782c1b18e89b09aa83c468680f27f2085cec403
SHA256433f7b4e715e564c5b5777d11184a2c4ae97fca96072d7e4bf044d2f6ac72ede
SHA51228b7e1ebcea7e69a72156e1787287f52bd4e779403a666e20f34ae2b8667249cea95e164a0f4ea6af29bfd4070bfde3e646850f7633e9f30f92b8ff2f8216d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f7458d9825369c38236ed59ed74237
SHA1bd58a8b3b40574832e1c22d45715e4c0f21c10f3
SHA256a7aa660ec52b4e26ca4dcf97c974a2189a956ba18d8eafad9fa2f8f48dd947e2
SHA51288a12ffde9c3e3fd8c9761e2e67f99ef7ebf5fc13a48449f669953dbee61beabcf506f7286c1575e59e559754588cf0472bced9c2363ebcd010940aefea36545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5384214ed270d34b1a938ecf8ab477ac2
SHA12f6f40038742159e810f62320c5cb81f1c2b3528
SHA2561d3a4185367caff3db45e2a5225638a25ee2c0dc06119058a07b440493cdeeaa
SHA5126d6b6a19a244ce7cebfb8243f59945d563534ccb46cc0855ca4c50416239d65961daeb043dbaadf71c4c8bbe251edf9bae23d6fc6bb2a6a77037b2faada1a0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0454cd59d26c3b32241bafd06772a2
SHA1de2fd5bd67251d6f3a611de87db792a26e0bd78a
SHA256552324cca8b6e43f16a6c9e6b94793d19a3e313d485fec579cfa21db4a930c6e
SHA512e38d3ca76862a23c7215c1d5955e9478fbfa8d020c1d5b57cc37d3cee530645eb3bed0e8b3610e60618f477cd53306cb5150159c68f070e2ad716a8ae89f750a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556f4b2f91c6829783784287fa5f3405e
SHA140995fd4b51bd528cc67a006f885bd31584664fb
SHA256dd0014e713188cb0f81f37471283af5e5c9a430ebcb9875a6bc0d1b11003607a
SHA512f4f29e83bf9395d5c2a7cf487e07d15b67e8fde5bd99b1a9642ec9afe2a8162214daf7dbfaa15f5fbb2a516b1c0af56da9342d5fae28b6f380cb1094b39780f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3c0b0f1ac9ccea54b6cf1a373f0799
SHA1bdecaa81c57486bfdc8a7ba4a98621f628300c99
SHA25681521361993b0b42c96a45f82bec15d6f848c3577a1c6a9b96ed3a5b67abc67b
SHA512f13563240b66cc0db6b37108654e1d49e7e43654d5c431a8c2cdf0312e2eaf3103e91c32c84f5a163c12c0a5ca81b20b110df44119c0099d2854412445cbb996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59888fc4a3ed7278210ca8b11e715b14a
SHA180ab96069871f17ab4076194f398a2e1cccd9aa5
SHA256d00e99ba916bf52b02a2ebb643836e35846a2e37563c2d8523073a142b4b5330
SHA512c63b4177c280ab09553de91626011e7b8dccebe296fe1f8d28987c80747cd8a708fe02d2f6c2c14ef6c81e9eb764a63ba352c96c9cf99f20058b6ae359d6b381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c904ad86990804e4e564ce42f18387d
SHA12c7706d91aecc9b323cd0c1c9ca0bf98cc69cfc9
SHA256300493eb1f8c6f544de7d7cb3c96eefbf039194d85b0b896d4daa036f9de61ee
SHA512ae78cb0b0ee4c81252384669d242e20c257aacb92c49b0f42cb582e4fe4acc6b39e6e9d55887a9d8500b6305ec3e5755f329169563ecf67d7528e60c9f75fd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714cae107f2f7dde250e5a569c7c4472
SHA103a8b98dac4b254a3f65acbc74a5de61efe968ef
SHA2562f175802f82c036c04d5bd545dd22a5302e432a73feb976699cee07f5e647ff2
SHA51273988f7a2343384513238d5f1e954b38acdc1cb784a7b943f0d4f65e0ad892c94121cb70f3ab2df05138fa435c69e88ca53c0c274321c3e6f925e755bbc444c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563560a12ea0adbe54cc9608ef26ec19f
SHA198e105c10fa421bf2748f12c3c80fdb580ec853b
SHA256033d283abef098bd01b783fdf782cbf93bbdaf497ba82bcdde39d920bed2476d
SHA512802ec705d6de2b99635045e829a035c166e57e4a4d64c520044f90be8ce6902e5e7a3fe785610a437fd138c30220e1e3b8f3cac416a3ea07afccc4938a7f47f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e735be0e2d8c44bcb4b2909718ae51a9
SHA1dad3c74801b10400dc890b12d327bb6ebe3a44b8
SHA256f3dd6bd85da273f5fe3fd8c93508823f9dddd22bfe414e772136c12fb67e14b4
SHA51269b465d8a4b9858d34df5e23fad2118ec449c021bb6fa0aad86a38d2eed53450734342ee2413da2d9fdbe92017431f589babab06509c5879614139b78b27966f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce107fba1a6106eb731edaf6cf37941d
SHA10a75eef6a2cdc12e11a6bb3556ab28cf3bd0f53d
SHA2569104a98b146abed15fc10e87fa9ac2730d989641a84140db91fb40021ce181d4
SHA5124328861049bf146166927af590c1deb2de75cdd9321e67b56ea36a1c255648451d94bbae17824ad46ddcfd0079a225bd19d18a729faa6c11c0abd2f713666b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa0a4350a0633ea55907cace236b925
SHA1a179d7dfba280cd4f8df75bd637f7fdac8d0740c
SHA25639ca040f11bac8f07b4e5d91abfbf8d0d386c8579bcaa47adb9c3c8e98548651
SHA5129c55c962938a841a8387b2a201e1bc9cb89f9bd90a95f2e32e0caf6886a471a04ec78bb533c8b4d6651d8fa9d01da600c318392be11f60f127826f8d3644220f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33bbd82c1d3f68c385de28f871634dc
SHA15c1f01fffd9ec28978759603c3950680dcc6a308
SHA256eda92045417cd9094b0aa16a6c8725ed58c2222d4c2e89c80206c96e19e5501c
SHA5124255f2f53af8f94295391313a78728c4f9ed7b3bd4f16147153fcadcc2ae722a4041853196620de9b7121745693c7135956e264f4bca052a06388f54e748ddc2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a