Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
5cdb460261ff9d9c57e66f311e772672_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5cdb460261ff9d9c57e66f311e772672_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5cdb460261ff9d9c57e66f311e772672_JaffaCakes118.html
-
Size
741B
-
MD5
5cdb460261ff9d9c57e66f311e772672
-
SHA1
defef50838210d8114b5c1bf8c143e52b7256bea
-
SHA256
e7af3c2a15cb5f9dafaf3b519264d596e3b0d45f706d0ad204a4841903a551e0
-
SHA512
7d8d93226c90acc68f1a3e7556b6b3cd19e5800769893230386ca6f4a7f96da29629a53c3839aaa8c8137e295d2e0a6dd9eb9812e032ef776b8a79bf7f034eb6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c011938f94f567b9e9bbf3e28b404f598ce18132a6611d709f701e9514a20d2f000000000e8000000002000020000000f98e4d2ff2969ca7031eac2385c118fab75f59d04c697922ad873a960d2d43e520000000700223ba01d7233b9c7955cb549bc7a1c4e734f6bb758a32144cb673c6feff4d4000000095628b3fd5a17f6f4082d7eb6b1259b55d0fa36fcdddb3bd06454258a18411b7fc66fc6e6429ce7a3a3395cbfdbf96a6a7c19eaec1a94b8710a0a1cbe4d9dcff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03f1b3062aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422336029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CAB8CE1-1655-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2560 2932 iexplore.exe 28 PID 2932 wrote to memory of 2560 2932 iexplore.exe 28 PID 2932 wrote to memory of 2560 2932 iexplore.exe 28 PID 2932 wrote to memory of 2560 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cdb460261ff9d9c57e66f311e772672_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549bab5265622441658c63cc454c596cf
SHA1a98b0d7f5a664802241efe53445ecb6bbf47ef30
SHA2563a9c45fcef8e36a3af6c0d3c559fb7db7f08b60ed3e7f376760405536660eac0
SHA512855d57af9475f8d278dcab35910fa91d4c7f2be3c4f3a4b7845bc8b0965ac72196281b0b27960eabf8d762edc8a4b0d9101f6eac2f31dc8a8c35fee8f823d2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e85fd8c2cb2750363617662c5b26deb
SHA1c646fafc943bffb596f8891c7fd4ac7e37887b2c
SHA2561738fd383250c3539e4b52c5a0442f511f82abff80d00100ca85c5f4d8a6a95b
SHA512b315ae388cd332d3788577db8a94948fccc22e81bb7da95aa5fe6fe1f9a28d37b08cc40dfe45ca48aa8c4c8df33fb9ba9ca11cc7897a0a56d4a37898fedadc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c395ffd92003b5e4729d7c720d3504
SHA130640bb772d3cd6aa0401bd4b5d9d579afe50f99
SHA256424b79bafeda3294f2abcfebf5de92e5f13b921508e6015fb5e0658f12d74f7a
SHA5127f862b2c845d969d7e51a232f9b02233457b1fa5392565cde0435c448795e33954ba09127a3bcb4e0bf59b2dcdcb2d973c3efa6c98e8166997785ba15d462af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c4b9d475a95163ec1d3541ea0daaa8
SHA19fac1f9f918da98e9ea1697aa11e8d5cbafbd00b
SHA25601483ef19cf8618e26617812adc759ce1bbac364612ee1ff68a67b3ab64cc160
SHA512146858f52c1bb179760fea2194dd3604bde0ec5682609f559d4b43ae019a60e5fafcc2cdc49af5cd3851ebaf3b68d69c972e269437b6ffea6e200ece49403493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd19a9287f06eaf96d91c9ddd66d99e
SHA15ea724763b8e86ea3419b38af8b49cd956c787c1
SHA2569433a9ef98f33a35b35502fd7991f3f82331d489ebcb122207eceb5b82df3a87
SHA512e021672815ac32599bd0e38e8e412804acfffa4df7cd65424b47b51a8f58cb665a1df2532958566af462abc5c232731e292edf2e0b0106f7f580e789341041a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5555671abf0c9888a3f07e2f2a2f376
SHA18bbb48c59526ec827aa30bb85c50345c05ab1450
SHA25678c3b6ea2b744184358572e7d9f5f4b5abc20b9fb96d35be6301bf9658bbf7b4
SHA5121d1072e583510a152890bc67178d221e85df290ca7b14e5957816d49fdcc10d9a0aeb503f57de41bf7bff3ace5801332695560befa5e0f716d33336aff7a532d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f73a75b20a1ef23d636d9da367dfa0
SHA12545a2477774f914bda9d47dbd33f82cef5ac2d6
SHA256611c5b243cc93e72e26392b799c9e156d1cee86e051279b7dabc671d5bff6978
SHA5121155c0578b0c52f71f2f36fa015a444de98ba06c8625afd1e98c04b109cb01243c06f46060d05edfa2eb371d8104c6712612f357e86b5ae8f832e012807caf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a2d620958cac97a899e8d1a436c400
SHA1c61ebd90905f261c684bc39134ca1dda646b93a2
SHA256360b98581d63f12a61de470f83f0ff0e87ec87750e3cd4aee7d551c0c32f6a28
SHA5124c5d08f67084b2a4cca8537c042ef82badf28fde1b6b2f09f9d59413cc8196ca7e4d6cc364b5a1af600275cff5e819e3dbc3916353d8faa86a81ac22d690c97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381955cde2da907ca39e788868b844ea
SHA135877b8de536cfb7e1736e6fa649ddde111c3387
SHA2561d63af5ef8e895d2cbfbba27683e697c2512574c026d20752f37330e593a6b03
SHA5126472330e95791f03f619404e807a9cccaa34378a7224f5238d386086384c4e4f96ba9722f0473f2264a5d343ead9cfefc0e1a6efc1439cc8abe98125bc4dcc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878e3e84f30084e1b0a9868cc610bd0b
SHA14ef94f2956cc553e9a255446b395a5174bffd964
SHA256326fbc739e29c3c2b627e7091c5f01bbea88c650c3d1347c21907c63663483b5
SHA512d9c644bae41beb61c16094340898e892347cfed6d5703f7629d5f104eb3e4003dd26004914cbfb73ef7aa73efc1ac853466ce30a992d8381b74f3f3d84c74f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9727c3855ba1e7feee4690a25b4afd
SHA115087b9b385d0230d30bf6a1ccccd80fa4824612
SHA256ca5df45430e2764d050a1bbdb1d07676ee888d34ce912f389e929ae8e664afb5
SHA5122ea291b370b117d977f1055112d03b1f1e07075e71fcb827741552d31c984b8b72c8b33b5f5d8e4f7334d63ee30c47763c81406f2cbf5cc395cd8e015962e9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2dce09f7f9a0f3dc58556e54539c683
SHA1416dc4da0f2d353e79e4b711a0e820c5f7280c1b
SHA2569f687afa99a75de45ee5b89fb9bd77fcb8fdb3607f1ab8465df0a771b715dfb7
SHA512eb3292b595e51ff3b2aaa5d717875e5865708a0bbec545d477fed276d24d1a9e3e182bb322cea7ad19b887ab15c6168ccdd3323bce362446084cb1a1d19ec97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7467b8f94382b9a7cd2084499e4619
SHA1f81e3d48fcce97763d4cd2dd79e0af9171e92537
SHA256c163b62182ede57f62fe3fe5cfc641f80b9229a8e46fc1b3597214a626f9f832
SHA512178bed719715f08308723b1806bc95771091e0a5d0cbccebf18a4f4d812f1d27913e497df38c71612467b543820870f23c796db87eec36c40221b571533046e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532ae2c48f67e7f0e7213aae0b8e560aa
SHA15b883e4d5621c4929e44e36e216d7267ea2c2b44
SHA256e1befd7b6d15d2693be4681bd85e95acd60590c4fa6a25b8566705a7aa1ebb48
SHA512e36f9e8bb080f76e7a54278c803b97bfb164e814636fdee55f4d5f4887b9b9cc07d5b7e854cb7676d37d84ecb896742ff319876b969d504018f078c60ec69caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55adefeca640123c86c4e4a8fec1a0793
SHA16adf9f63852a6c7b6702796e2569d9df09dc98fa
SHA2561f42a7e7872e1907887a4377c9bc8c305142077804195f9ecad87f3a235ff0ac
SHA512606509059c80f6556fcf5c0dcdc81aa467d3cd3d4483492001592182e043725737dc2d5a1f6c1b87b4d65e9314e72119985457022412aeea74a382fd5a5d2fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a70059ea0be2196b0ac511e5a72bd9
SHA1dd92054b6d357294d39e376af4e65dbf8798fdb9
SHA256b0ffe4016f2061861b7af0a3ef05ee3693d76af253f52a804f8cde3324ab1696
SHA512a0af7ca2590f34307ee8f1846f55f886ec352bcaf0b2b06b2e82750263cae1ad9eeb5eb990bda410aa5335eda72483fe7b1c9aa94dce7502917f10886565002a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505894d2ae4715ca5fa731534ff9c99e6
SHA100eb97c688ea8f379b5da27b3bd106f06c538423
SHA25629061df7c990d1cfa75523f0c03fd80badb6293ee57984d537419696071fed3a
SHA51231ab00bd830d5edd6547b2807e1373be7175bcb2f5731a1999244a061fc3cc3f1cd1ec995383985e7b5c17710774ee03fb651bb3e9e494c3e179de2b5669684b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acdc2b5908ab589db165bf3838cfeffd
SHA15dd789ade7f5951c3c84905357bc89b60e1789d3
SHA2564d636b8c74c6c55bf52c3f59afadb79017590ef5478689fbd03fa63100e9bf23
SHA5126195df21008121ce7014025670274309f11bc994abba898c1cd7157fed6b8d3836f3bad5a6031ed1cadf3db990484f189e99874b57ec7fc036a36b5a9aa3aef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59be5521b41029bddc9b10bb40de19a35
SHA1e918762bfe6ff7c59a10990e00e0846d0a482c4a
SHA25605a660885cdbeeacbaec92c94e53ae3f679db2e9bda8eefa39352150999d689a
SHA512efcc1ca1663c98840ae927ec518f56a3b813f4ee1ec5edc4077d90561ea1b662d0126714c309dc8a461bc74c0469ec021587ed2da5e72046e64f3128a1dcf88e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a