Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
5e13be9c4b93ac5b16f88a59ceea7053_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e13be9c4b93ac5b16f88a59ceea7053_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e13be9c4b93ac5b16f88a59ceea7053_JaffaCakes118.html
-
Size
461KB
-
MD5
5e13be9c4b93ac5b16f88a59ceea7053
-
SHA1
f6f916d221fa052e6b25e939b1786e81bb1d495a
-
SHA256
94f671e06ff6fad04fa7aa8f7a3dd6efe921d7d56bc01c98d9c92b31d78cfea0
-
SHA512
7c74e6761afc6282fbd3e62f9035b0a697bbf2a8d7bc42c9a57247f5013262d1d65348393072b8af2598811425949a95d72c41fc001aa6223668128bf46b8315
-
SSDEEP
6144:SgsMYod+X3oI+YzLjsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3BL35d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000223f0d9c3c72bb4d245e9ef02d1756b146015f79ff81972511826410e3548909000000000e80000000020000200000001b2872a9bb6cf93b079b150c1566059f6e74b9f98d801e914f950b9401e5d347200000002802a7732798b70bb8bf59c0ec5c0c2e0288063801cc9f59c6c988d19a3c415e40000000a9bbe48b4196ac1fc7f202ac50ea97773d916254883e808edb815b8e2500d002c753e767d4b676509f3ea21d0dc4ac5d41fe08cbd0f511dd09f67279d5f5f3d0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60714fdd8eaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04C566A1-1682-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422355183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1516 2088 iexplore.exe 28 PID 2088 wrote to memory of 1516 2088 iexplore.exe 28 PID 2088 wrote to memory of 1516 2088 iexplore.exe 28 PID 2088 wrote to memory of 1516 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e13be9c4b93ac5b16f88a59ceea7053_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533930b0c432c332ac6834d54d8faa79c
SHA1187416abfe9424fea2e950c3f2b021dccd14a220
SHA256044485a1e86de81dc3555caa83fd031be02702e1429d288b4705800ec70866ea
SHA5124a83fa87261e8ab88f85341e262765afdf93d69d897ce46e7452077df05f49e43de9a4c3373a2b8a16bc395793f9c44a0b3baddeffc27de9948c4f4df5007b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a97f539f84a28d586c961232e2096ad
SHA180b05f1bf4d646ae6aeffd3caf1e4de89dc00ad4
SHA256fc875bca3081373b0b495d867ddbfc85a9dc2aee93b520bbf77e96f145159cab
SHA512e7208ed562a2b839a083aa018eba6e4a2960ac81fe6054b48b378c1d29299c919f63dda3f508024a214ee1330fb7b292be8d3dd11aaecf61d08f865d71afeb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1a4965503cb65cafc4bb9c5ab7256c
SHA13a35de2e2289006724eb4959430c0d9652c5c133
SHA2569cd4269332ba0ec7fe441084841f17b68a5428b0df32985d003db37e62b4130a
SHA5126dc95844760fed35b4f51699d65e40804261c2a19a96e5353a04f8dfbfff55873a9ac90ae37a1dcd397448f6f741879448a709c6d0ed97486d0c38539a489b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515759997b3f99c883e28dd21c23df8c5
SHA1b4c7f7747f3a1d48c61e2d950f7138aa5797c1d3
SHA256f249712b8596bd50a7687a8dc7e3f7e4a5bf917ded4253e4f734bec0ea65682d
SHA512a978e9345904c4f502a6374259db7bf4e2f212cf500f250f79b23150183c4f19004e8ae3c15b54a6f281cd8ca5fd03e1dd35a0fcef18ad15dd5c4160949c8a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412c1bd09de0d3496b2146571d4a11ca
SHA1dde6ebd1b1b88d9abfc25b6f331d3074abff5515
SHA256b1f574d7afca7e6da8b04e99d57862b8a623ffe417980f1a6f00e690008e2b0d
SHA51287851630e2f35c93266145ab1979c0fb50799a3f1c0553059f90119ebd3925e2e80237793e5dc18e52bd115b1e1e3c8788f64908fcefa0d52159fa436771f0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68d3c54070dc8c39f80e6a662a63171
SHA1a8f2348bfb08c550aefff38327fb5d0ed7cd9245
SHA2567282c42c2df3f85b5fc8c62d203689a63284cad1c9a7a83bd3711049172dfd49
SHA5120656d253835a25b55c514350d0e84e583040aeb16e3b177ea90785958877f94a9e807b97108a2bcc9eeb25be7a5b07a71a8999333f31474a702eb1f8740e2342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2a7d0cb90aca8ba4c713bfcc739f9b
SHA1dc53fa590733f89f9a121d48590d373b888a7cea
SHA2565410f49cce9b3cd2750ee09b91fa64cebd5077cc543f9b8ca29733a1579e2924
SHA512a9f0159c99c41c39ac729af185e71a050f4875c7478fff59a14d8e38107eeb808220b68930b283eb6a364fc20796a455004832e2e3ade24dbef100eb98d1484a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b90ffa4a0e8b6b1e63791c6cf5e3d2d4
SHA110d104bef7139a13f8f2a83b5791944112b1f05d
SHA2566fd8495d2a2b0cfbc6193c3dba9f7c3249d773f2a68b5a0ca95eed806aa804fc
SHA51228047b0d4c6351daba8e6be144b0f4d8ddab093576b1e4e6f03139d7e1e82644f914bbb8aca1f660f8779e0740a7b5e0950d3423023efe1e87b2c9985fd89a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad6ed40b8848122f91544193ab794d1
SHA138c0875ee040e22c888c60ca49a1b5aa7d580f36
SHA256b3d7c7717add98491fd4e43818c3bd391c125381ce23689f16a26b6d10a2f09c
SHA5120b9a6b46a34b239efa3e8f00111b9970d78541e9042adb17d5473a3c175ace3c942fa0e53a9f53f93a750e879a19706f57ea4f65adce768bcad18a104851946c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58857e21170b3d40243ce42b49d0632ef
SHA11a8ee53f221e58a0070ef30c4649a1208110e1c0
SHA25680ff72eba606e9643f5ba04213816b122901d66309eb3c8c7c9099255209654a
SHA51295db4bef11785980928af44a3b768ffbd943322e2bb779496167eff1597ef793beaa0e80d396c8f769ba605246894b86682eae0835914acf9f972e5764f75107
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a