Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
5ca6163670273e75fcec72d7e9f68207_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5ca6163670273e75fcec72d7e9f68207_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5ca6163670273e75fcec72d7e9f68207_JaffaCakes118.html
-
Size
4KB
-
MD5
5ca6163670273e75fcec72d7e9f68207
-
SHA1
3f98dda6ea55ca3d17561e80e5499207ab02ce15
-
SHA256
458e639cdf0b1b581e0f2fd3348dbb837ca290f186cca91076dd65d9260c8a04
-
SHA512
f6f2b149459ea6d23d89832178b68da5956273d30bc2a9e8760fc47dbccce21f12ba2903cdfdd50e3b12cbd578aa9763581f17b6a1bca98dae70cbe156097259
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oesB4d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801b79e15aaada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000715d958816cf1147a452f95bc9a3553000000000020000000000106600000001000020000000b52517f1ed8444f7c151c610bdc097f191081fa44cb686242207041f1400b14f000000000e8000000002000020000000dd52c3303c9a9cde15b04e09a5673fedf1732ba738938c4c6dcd171ec178c773200000006cf0e38b0c1eb636b6402bec63db39cfe80aa79792e0f249354a446b5aaa39e04000000065a6743be0cb94268552c787c0ea5a5dd915b3396bfffd603eb1a72509157493bcb5026768c165d814965f3efae78901d6c66368c539ed30ad4754b3f9b3e50c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422332863" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CFA5031-164E-11EF-A4A3-CE86F81DDAFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2832 1656 iexplore.exe 28 PID 1656 wrote to memory of 2832 1656 iexplore.exe 28 PID 1656 wrote to memory of 2832 1656 iexplore.exe 28 PID 1656 wrote to memory of 2832 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ca6163670273e75fcec72d7e9f68207_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0097f7f844e4d67b5a68b12a4966266
SHA1ec264e0decf8420cd2077f02ed59e654fbe68563
SHA25631c01e31d72a3e51404cfdb44119843011d96f695c2d6266e8c82393a4c7f9d6
SHA512e1ba4149d880403d5f2ea4aa04c808120b6d987b48235dbbb20c60b40a49476ee9cdb2a912e6db6e44ae6799a1dc0707dfdce80e1724b096baa862951a2547e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574542ec55156b2d99b8969819af55890
SHA19a29e4cfb35965b261de8e918dd728bc0587004e
SHA2567ce23a9da0d7d78078a11a3f25d6004ff30d8ae476decd5c9ea7986000e15a1e
SHA5127433585ee59fe9c9290a13e4aa7db9f8deafd489a21fd08b94e4cd816ea3a715f3efd06c0ec6030bbe983a0f08472a6e4b043513104d9b8d431a83111a11e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f15b3574010da0180bf5371404661b7
SHA18925aa6bd2db4a104d5b126d2d7382f8f770d1f7
SHA2567f5a293e5f24202ea3dcceb285612c84fcfb0034cb8e9fe24a9cb70c6330e63e
SHA5123666c5711593f433ee9e257613b0db81e21c62c72ca5a610244e3f36f94ceca299915b626d09f0cf833e3849cbef05a348b72cca3f2659e10f8a19fa9b38e12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8a9b796c29444956b631e705243103
SHA1964a83011bc0c3bb44b0461f3d0cbb6bb31fb4e2
SHA2567ffa45f603f6717d6178b9e55fe612d4f8b1e688bb91cc85ff8abc25e7550e85
SHA51299f4d27601797831ad32de317145047a4b3fdc9cc4e6ef74a4a54c87c64bb3605885db32c2361bcbb1cfcc91996bc9b909fd7224f9cb94432cc3cb22ecb5450e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f4876aaaa8c2d6b891a6da6caa461d
SHA18932a427b8bc03065d545adc8034e03f00ae4135
SHA2566ea3ff92b599d7837c645de96d63927a35ea08815cca025912527665e1717bf1
SHA512efd74aaa11e49c4d615eb827729e2b5e6a8e410997142498ac36d7638acd7f35e8e4f9333482c38b40cb0069900b2a78fdacdff95829f997c9474204c2a60b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c8b704c12a3ab7e7fd9f00382c811b
SHA10fffd3b547931f73b94e19111c618e1450c693ba
SHA256305e357a6024c49b97172d2ed903d36a2c5f68e0fdd5afbc5377d7ab35773d48
SHA5127ec98c3df538f1f4095e0dd262d4ba508f1c6baf5265a1e70665b1498fd526c4c21858c2a6db54e822ad48ee5355e655eff44cc16bb0ab1ec35bb5c7ef818c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c0f80c1796c1f8d206c84a72b28504
SHA19ae858985991bb1bec307ce0a6469d3d3e1eccc9
SHA256d7797006a675b26decc3c6c5ca5faf4c1f30e1ba20e5c76946edd3a6ffdc7edb
SHA51286f4049cf6700da3b29163ca9847ca0d384c8e196683160bb6535585b47e15df4ce166cc00fc8fcfc69c0c26e8f6618c4cfed53e1a2d62676c18e181dca84077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519a6e9077ec501164c5df4441c2d155
SHA116ac40a79093468d44832a960847bd766cd80bb9
SHA256b58402bcfd14837027869aaf67d6ab473153a734fd3c9e2026723dca1b203e4b
SHA51241278a83a786fc43491da86477131eb309ede04eb6808d2226141fcbe997112f0e47fd2dd206f87c201aed12577948ed31a16e76d0e55c9679ff13b4d4c17e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d34389cc5e1779546262400ae9a1f4d
SHA1b7c025186359cd0992db1ba0ac7957761f737702
SHA2566eec751c4ab020c638bbb393002ba25998b65c2623c7a1d02134be1153152e7b
SHA51222db7fbd61addd0a726c156dde84e4f2d64252a17566b09bb71ddba4c24077cdbd06f83f3dd67e6131f983db892642119bc03a18ea61c9c23c077d163e8fe36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc346bc70621cb7ae4636bc6da20eaf9
SHA1a260f200c07ae8e0980de738f8e170d4178a9b98
SHA2566b7a907d28a2b8330af849252c54ece3a1e78ccc863a7d77c1e593dfdeb91f92
SHA51274212b59d9e41a229d546d862ee5da4a525af41c54bfafaaa76cef35ebceffca8512495e776bc8d8e0ba9d03586dc8b4d886f7220fdc49a4b6822de939544372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa2f187281dd053ff690e5dc6458375
SHA175d3170eb43277d2841eb648e7ccc00a0cb3c3bb
SHA25642b97593754857f215e4b15a9df24029848071a9f1636582cb2846c2b1f8d665
SHA5126f880d91243b2d5f2acf96a67da3a5286096fdee194cf6c469d7b4eee2d8fc3b703eac4af1785e05cf03112759c72582438e10502cc8c935c447570fa24a21da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1525c481b804477cc16a28df436744b
SHA1302bdc5c69d141465eb186df2ffbba546d76fc12
SHA256c7e925e3b81250c36159494dc190b70225c79ae8e9ca14dd5495a22baf1ebd12
SHA512a3dc1096a2bfbc7a57e76f7a6fa474b069db81887848f7fe16600fc27d62c9cd3c47e151509ed9570314ca148aac686eca8bbc5c412e855c961e30fe2f384bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0276bbfde9ca92b0bcdd48541174447
SHA10acc36497ce18dd18e2d7e39413b83cccf2d31ce
SHA256f5485c68555b53945e13894bfe832addddff85016a8860665271ff7b078c4e88
SHA5127d73a1a654c1a78a93a3bf45e255dd4079750a379a601ce95276b04cd2dba51802bcc459af087e09c201fbae1f9f5a61ddd0dc32964358c8e748b31a0e2ffcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cc22f87bd52854e00c9507d2a34cb0
SHA116d261a7ad8d01a30f3dffbb34e9b3d9a0242e4c
SHA256362ae68eb8229e939cfc783cc2bd9e80388c878bcc39bdc0b2a80471fd159070
SHA512f63ebbe554c90a00215450261491b5b84681594ea40a9aac1aedb45e4828c6e7fea424f9268acacb09090e5d81529bebcd221113f7ec1020072fd87bb773684a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3eba463c5e6e52051265ed66fec33b
SHA1d75119df6449d85e25ede327949dbd24c5409c5f
SHA2562465adcb12fcdb4c5cd1eeb6754d690d31c9ea940309afa6e7c2a2a87d9a5667
SHA512b90628a94cb048deab065162c46a966dd67e6cc96ac176c1224220953fa7688f71585a992ee5203c8c88aea91feda3213ccb7ef9873363e351c36110aee28486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52317b3f3ad5c19828e14df6799df4d34
SHA1309f5ff6891e83a835e36491e788ba21e968851e
SHA256895b29964d61bacdba303ebda70bb091c155da7de9a630fccd2f286fab839a0d
SHA512680744219377c512471d0f5c06c32280cc1c84bed76b4b2f72e0df95170bc0b8f8d2e5023d0697cbf0054e470db80dba751923758534c187969fe3495d9b6a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdd14f7ac1fb40d0ed68ddeb35b1b87c
SHA15bb3e1ccd52070a609846eeb12172812e16466a7
SHA256827202c1ce8b258972e6d7b6688a80816cd50f39835ee9e4808c01604600ebbc
SHA5126c4c052be60009c5c171fa141420185e049e6e4b901338a53bdf464a954e2b35e92128a19a9415bfee8757fbdef3eec6077c34a52ae3593a62a327e59e84da5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534e8d1ea0e2b8c46d3e3b617fa3f20ad
SHA109182e14941ae3390f4966b75b9db218ef055431
SHA2563970cd94c83097220fb07c8216cfaa059b790a65cc61f6f35449b6b77ec86ac7
SHA5125a4d8c278c4ac7cdab24f82747917af892976454d2de21e5b87890bbee517759f417a782f46e8dc4419b739c120179417aa307d6c5e038b98edeeb3aca7eceed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a82b5f8a5d25c3907ba81feadf8ac0
SHA1a3fdeb53892bc4ba6f8c2e519154576d3c01097c
SHA256c71a6598a35fc7af81d8c4928f1a20535d7370d5b4ac0624d98de04ed9a05e1e
SHA5128040142081f84abac54db56c4061f7393a5dc69e359d804b83b325bba742983f5e511d0e3f317ba6c9aa9bcfdd223a7770fc55f0c69d543af7bf6c818c256dcb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a