Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
5dde6dacd932d38f8c022bfb51da0ad2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5dde6dacd932d38f8c022bfb51da0ad2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5dde6dacd932d38f8c022bfb51da0ad2_JaffaCakes118.html
-
Size
188KB
-
MD5
5dde6dacd932d38f8c022bfb51da0ad2
-
SHA1
0d48485115ee46f8499978436718b65283b27ab2
-
SHA256
11b7700a0a75bd3c4bd60d5efb562a95ae46fa061ce269dd8153e13395087f17
-
SHA512
4b46284ad5f3b499304847e6c110085789f1d9a9df4b0edfe1881cdf3eba776f2de5f4a8937839d65451a41ba34340f3262b899443200412a4a630c3ba8f8496
-
SSDEEP
3072:kIK/tyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:kIKwsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422352102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005f2acb60052c9511c65d6c3d9f843fb7ee76f183f547f8d2bf173842bc5574cb000000000e80000000020000200000004c142fba7ebe3d784cc1a69356ba15bef62c1659557ab4a08e499c37039b8eab200000008539986b0bdaaa02917188f840a309300f27e3999a2907ab77325ad337e3d38540000000c4b7d83965f1b377cfa34546a4d86b5ac2b98146910ad077105f89c980811bc2f9cfa670a76f61a0ce37ae25496193679385cbb3e1981d60e7c8bcb6197243b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8F27421-167A-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01381ec87aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2052 2740 iexplore.exe 28 PID 2740 wrote to memory of 2052 2740 iexplore.exe 28 PID 2740 wrote to memory of 2052 2740 iexplore.exe 28 PID 2740 wrote to memory of 2052 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5dde6dacd932d38f8c022bfb51da0ad2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36a4680971ceda66228328a5d0d2f21
SHA19c837acc4586013536bd836642de3f0ad4a75589
SHA256a119a8a40b35a08cbb17c763e0eecf2b509b71657731c07f7871d76be90850c1
SHA512cdc4be7aa9d4b5f6901ad5964a73f7a06d5df07a263533aaa2966570f917ce200b19afa2b1c878f5e6b924d43220a6f531a66588f48610529137a0611f33ecb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e458c291796e8306f028c80596bcd2
SHA1978509fd1223cdef01e6409f5c05dda61e502920
SHA256e2ac5c7eeb603e0afdca5e960f3e356019e04c37d14cbbbd5ef2b78194db94ab
SHA512e3624b0143fa6dcba4211244e9be85c71c0c255e57efaa9cb28e016c9e6eafc678fff62263e86b38a7a9b94608b0a31d80400988a88d6bb046572ff672e611b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6147923ef7a6fac79f12a42f6ac0e6b
SHA1ded5c7e8e73e7c0f7e44235afdcc33c01c7ea68b
SHA256d3fc449265a6e2cefa77d4afae76e195fefeb293cc5e79dc536a7b30c7643c57
SHA512436e14d8d304e58acaa674365209d7251bf0f33693f1dba7f0a87b526bf4bda9b5f7b33f6b502c5b983a8b45173ca09b0add8363f5697e316df5d8a8e8853cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56864f1f7f0719cc5d7f1a7d9f4127191
SHA1590dd68de862116f5aae64c33e6484a46a554163
SHA25643b632b1f4a34ef88bfcb9283bbe73ae75402e587614143c0427234950b042aa
SHA51294eafedd16e74de143422955e43b32c11e54f06975b79b315bd27fe449b0b698e6d88ea14334a959a0100db443f6193e55ab139a57ec1f6412b5a9706acb6a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e6a975920f03d575468b4a3ac64b152
SHA1482b5b2d10d0dfae71f5c129f7aefe5574a364dd
SHA256c11d5a92c1a92af7d741cdcbc8163f87abd3941ed49afd56aeb872aa14a6fc2f
SHA5124a3ece7ecdba94eedc2a540cb01afacff69a09386b98f20e2be92f4caaedf76498de78929ccb108e6c673283063d150dbc8886385a64e216d6bcc63e10704c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb772e0e3ee60d6743c5d9ceb7743d94
SHA12ebcddeedc724376206b348e5c0126d01d72cf8b
SHA256bf4fcdc1dc3a92867a797f20488141a4ccfa746dae6e93fd39efb3c36c38f9e2
SHA512fb595321cb9e03618e526dd0aba8e75df1e567104384011df50b7a1c042e63b332df40679aeee2d36c793b053f34bbc3278d5b5e233aab29e22ff739ef5001f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc1222ed578e7241e9df6fc77885d3bf
SHA14b795060cde78a0ffeae50cb6afac9a65fccfd2b
SHA2560a8dd1f72fa5e4d1e27dba4d0ff7c6545f678d2e18d42ec7d1a02f4eb2b126f2
SHA5128a327e8344d7cd71dc2a2da6cb1bdab2f7e7d4890a1eee2278f9b8d9710d03d7a6431f232b357141a69c4449e4cdf56c0b5e92ffa2c330837793ddc828caf715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b51b8e79f000af6fe7d21d92b0fb9ec2
SHA123faae2ca364de2b068d6e80bc6f65286cccc89d
SHA256efd4f893573fbf4162d4057fb5207674b31a72c3aa67f1c04a66ef4a6b74744a
SHA512748332a1f1dab0695f99f3a4081bb51eedf594b2c55792bf304f3b2e16e5bafaec99622e2aac3d6ce2c1c7cda4a1e9f3cfdc2c7fa790790c220268dd03063640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54837d9cfa16acff94379f1388ed866a9
SHA1d1268e56789e13620c09fd484b0e64acd2eb18e1
SHA25641ae680e4dc3c01492f0bbdff49bc9c384fa747249e5e34b4f451f0bc67a1b06
SHA51256a380faea388deb7a24d0072b1071abffe76d44a8e8000de54d420135119ec9433858fcfb331c5a2374d413763b17124ae591f4f8c95668f52f86b4ec892528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d6d33ff3486d81a9132bae1b1cb832
SHA1f74441d5446a802dac729c3c22af4150494f0d76
SHA25672581e33abc9e97a59246b63102a37fa876987604222ac306ee97ee8dc5c0f84
SHA51226fa39bffdec886e3026494db2f837a6df77c8fd66518d91069097c2fe6d0331a26e7785df310d5ddceaa377b1b9f7823bfda5b3b83d68184e17295cf716718b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525144774cdb53ae0450595099bd00bb0
SHA123103f87c9dc3551bda907c30383f21a15112ea4
SHA256625d2b05d48fe9b9d21357a33914e41392cee7e7774dca421aacbbf38370341b
SHA512180a9dbce37ab75cd1ee3edcea33fdf42f08ea6ad13e1e708fd0d8a1c1928b41aa4938df0cf5b0c2cc962624e62cc8d841b2f6094d19ca241e9c800039a92297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a90e101f1e5a70200c4eb39c66337692
SHA12d3b79060fc13b2debd8534adc60748e42035df1
SHA2560f920257b7978849c9c1bbd7e2e7bad9e87cb7fbeb24e1ee1238e3fec5d37610
SHA512599815e09783acce10830760d5244d2977d0f0a1ca8e0e6f539a16f9e08a84049f6aa9e2ec6e7a7f1f308bd23ec4657e12a7ec9278e79e993668b8356424f9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537a5777eeab43266aba92b98595a3019
SHA1675df6d6e320bb21cc5160fd2ddcb01babeca1c9
SHA256654af784d7c290ef1175e64180423b968e1e90d17ce622e42610c5f013357e11
SHA5122d8dac8cfc258ccbfde240e5594018d5f9a8c9fa9720f8bcce5b898ae402cc5abf1585cfcc396cbd540de04d704a0875f1b84dfc906a538ee939af3bed1ad3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967391d8b46e6e3e4a0a556da0b370f0
SHA1e01a0473ed3fe735a4010ec5bb083290c615adff
SHA2561ea65b3c193f89fc40982d218e388a591788ef8e6d738866320b4d392afb1215
SHA512c125a22381e038d1b475e936eb7e6675c3547874f7240ab922020695374234171062d4d6f7a5b3ba09fe9a38bc26df3502fecc5fa99af5580e8d4f63a4ade3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12aa02f67c3eb12da87a6c1b0e967a1
SHA1a6fb2a5f2cd4d79152d7d023433590d328bce441
SHA256041b5bea3af9481d4f08fa7191b3aa81e31b1b5fbf53f39248a9570f98dcca71
SHA512f93e538ab6b414092a64945f501de1563c77c8d60cae3efb3c6880e67c19d50c802e623c4d2734968c6aefe3bb5cd015bf532e96d1c299f3dd683b8d64b98c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bc3ec23dfcba58b218d551c57deb92f
SHA1bbdf0847507a143e82ef514250ec2e9edaead297
SHA256f22ed87bf0d9c6e7ba444f1dfcb5ff1f8082cad8d389658debd5a85809ecb668
SHA51222c75185b605f4cfe7909fa9894650d16cc4ded35f2fa2e3375c7b05cac4fcf64d64d390a143991e1b598b58713b485b3d21ff6f8fa36eae5ff05393ab4e7cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510bafe7cbc8d592ecc25033599995f29
SHA13709205f5113932e3c2c0ed746ac6f094ade6431
SHA25670581f7423be3afb7d4e54591b1d0822ce5f5de109ac07a4de8b81246a6cacea
SHA51243d4d9a7036f6f8035598c847cf3782c8ab0f7071c88add65c88cdcbaf62271f7541084b14e3dd517bbf764506b6d76125f4ceaa8cc3b431e94657648bb40b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a014e1bebf9eb820c7d10e98e600688
SHA13e592167913e9d2c6ccba5928c3360c1fd4e422d
SHA2565758402dc8b985b125627b0cbed1f171a4ffa510195149966d9200f2ced0c56a
SHA5120974ded2a67e2b6b6bbd94b470d0bf453f7777fe85c9ceb954280167476fbdeb19f3f72ee16bd00985baf76f2a374df9f6a26a4bd53c33edaa5bb8fab444ffd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88bf7b9ac109ce7d689f4686cdccc3a
SHA196b742543eb4d58f6e125b765d4255c85603848f
SHA256420c5e60ad32c58c5793164b9492c7d79eb5553b7c9654f4186a6083df4e5dfd
SHA5126269528964076edbc6586de447e2511f627c70bdf232b0fa2d036b4d3f76239a2705709fdb809f28e5caf3d759aab66e1f6c841300fca66cf15e9dfa028e764d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a