Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
5e8eacaab05164a15ed4d088efddd3cb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e8eacaab05164a15ed4d088efddd3cb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e8eacaab05164a15ed4d088efddd3cb_JaffaCakes118.html
-
Size
461KB
-
MD5
5e8eacaab05164a15ed4d088efddd3cb
-
SHA1
a4e893888f8e67ff0dfe35f847b38c5b0b3967db
-
SHA256
76d3f440610bfd2d21513c294357218ae390b0552d82887b4abf9f03e86d755a
-
SHA512
7f1a6b171e11e496ac654b5452c6052f0090f89558fccdae61514e0a6fddd32ddfff292c1bdb2f3f51577048f33c43e5473cd88705429e8e98c04f59f95f485c
-
SSDEEP
6144:SAsMYod+X3oI+Y1RsMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3V5d+X335d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BDF64D1-1692-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d456479bffed503e749256c67cec5e4e0787b8676cf4265dc03d7443abd839c0000000000e8000000002000020000000d1c3735f3c5b1b468dce1830f47b1bea4dfc7889dc793d7a024536c6e41f941420000000803c092ac4721ee0da487bc1307f8681166cdef22770e8e4d406dd46568f7d2c400000000aeca9a31f368a2f86cad4232e72ddec9ff1f97f7bf723a61a9235d7aa4836544b2bf6f720260f5b443ba33c8e254043dab36f01d0715da298d148f6f51b44d2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a479349faada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422362201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1940 2968 iexplore.exe 28 PID 2968 wrote to memory of 1940 2968 iexplore.exe 28 PID 2968 wrote to memory of 1940 2968 iexplore.exe 28 PID 2968 wrote to memory of 1940 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e8eacaab05164a15ed4d088efddd3cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a09de5bdbed958f42bca3aa76a6a249
SHA1175d6d867933cf0946bc31dd1862f01f7694f5ae
SHA256490cd39a4f1d04dcd190baa432a5d768ea5e355660b987b80c50ed79f1769bf1
SHA5123b08bfea0ef645dfd268b062dfa4296e5b26a27cbabc4d670d87e367eae86478419a9e6bb9f5b4da9274746c0c45292e12279d7d67c5cf64ff7cb58e4ae8d922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a1b405ce36d29a9d8f41cad2011604
SHA1812344aa6a7090d99dc574d266517b0b44a6d508
SHA256bbbc0f45194efc33a0a990db08ae7c15db42fefa1c70820a550293c3015aa0f1
SHA5124802fb9e6a60dc30f76c05ad8877673b5a61499034aa3b46d6bff20364aba532e9104dd524e2279ae31e5ae1e50739ea12597db3b89d0b8853beae0ae251c0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5529e4a017ac28c9fa62a42fe1d489c48
SHA13909822bd47e2a8b0a91739bd044ba4cf28fefe5
SHA2567b52d0a11b278a60cbcf33a772154ae87584ae97e021acfd7c0b31e4cefbf5c9
SHA512245f024e9070fd2a5b276a38516b253977cb2e1f4f0aae5ba03a2620f376e8d3523559cdd8a8706b8f655aca72015a054cca5d2538020d1131fea16611bb70dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cb7fdf024328d0d515596198582a670
SHA1149810ccbc18b9c9e3a525a9f5646109bac193a7
SHA2569eeb127724fc4db44082ae72fe2760133ca496425a8448343dad96904af2b08d
SHA51234bbd834791b23ca6cd4b31274b6494e8b68bc25ee656901a3ffc34ecfacb898c41ac7ee34e64457801ec0f83f37c0640feeecf06a7e4160d1788c008a3a9c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad573cc6fd5647d1a10aa91eab1d958
SHA158e8a6c09b28e30546eca6e60f1a9e1ac53c3acf
SHA2567b8b58afc171edcc1769f7b82c5538ac7a0d169739a51a5be4020cd5ab76eb6d
SHA5128096adecff3a5716ea62eedfe491061914b056962f93b6c9ec67840b1394430ee6b91ea3736f5447588f6a3d43395194399787fa257aec280320afca2f12101c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d595d1d446d3bb202bce025ee755d8
SHA162d570cb3f4047a51e9fc5b14df2834e34ef2c3b
SHA256992055054f4e116c1d7030d5bf3efc019225ee9b80087bb2c67da4a890f77a50
SHA5122ff1c47b99afd97d318aafeb876d415299c9ced9d0c6192c8df72fac628c084f5331ab9989e81a710ad959f7850283ab3d32290e4fa6c9492e67d2eb3f3f5ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe954c8843df237c28d1f8578e11f257
SHA1b4b6100fc0f249ea493bc4a111638dba7ffe7fed
SHA2568b0cf21149154825b0e6d879d61cef500ffaeb2ae40ca92ef4ed484fb00b8fa7
SHA512871bc1691bf1ab3efc6a0039ae2d502848a3ca6037c9271d04aa38cc8e0edfc7242c10689ea6b28b2700c6ba94aa70edc9f618fc61916f7d96555a398eac0292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bde62c3256583e3b251e0c922803127
SHA1d4f3fbbfe8bc915e115804ff9b3efa3bb3bce0ef
SHA256f850b1509e8314e065106faf9a46cbd708818ea579487581c780391ce912f6e0
SHA51294214c3973b1997646db6e6d3157677b1bca42fc359dc06914d86fa4264e1f410662c021f49013625c8f1f15ec207d2ed8a2780d1b954ef6c54eebe4c2807abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f7ef1642149f0a0b8d85d8cd765dff
SHA17b26deff10f5662f70baba6f31338c0ac8c1763a
SHA256bfe3c868b3876b92a1b690fc5293ae9171e7c848bc14933f83c3a8fd92118d6d
SHA512b6f16227476d3cd73789e1dd1b379a6a997de2f130573d6df2da27c9a08a061a20797ce85175f1a376f69e6b1f4ed314fbca4649f8443efba9e33f14a87af7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccdd0ffa2437bd7bf08cb09882d304b7
SHA10ca7f84f803a0eca548586a7ddd90dd798062ec3
SHA25650e5b1746b05550eb5c6e8b44a9199d3390a0aca18bdf65c663ac0aadc3d2050
SHA512125b0062606729c08b82677352d6cfe401c536a62dc78ca0136e389c1fe990b1727c280a0c497a7ffdb5243dd6b5867054abcacccacab149f778fca049f40721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2aef60c7aea0bda84093471495c7993
SHA132b68ce686f2c8a9ba54e6b229e317dac25d9e39
SHA256edfda47e3f9c18d73234807c2e4c4846e691854c4f60986112a2eb6f1876c68a
SHA512fd6dda47d004a1843f73557f65cd2e5be9125829a488b103f80651f66062943882c66f2425b5b24069beb71a5e20864e65cb7dab0023d3bd83a8a6d199798c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5dd966379ffaea07b43402a7b3fd285
SHA1ef226f3d3fe36ba87b39981cd00459350bd72715
SHA256140d2dcdecf2177850923192e514c9f3508f79c98e093153e3248c5c826cf4f4
SHA5124052a3654caccae6c6624464ae16e02b1740e8abc42ecffafcb91a7e8851624aaafb87fed8704febcf42dafe7253c4bc19a5ea59d4fd43c090fd3b4a1d3731c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564fee3bf220cbf9bcc546979f61674ab
SHA1e70f2dd913c96b18fa189ffc9c725380b333dad2
SHA2564bced0287f7f266a66734423e069a81f142cdebadc573e5ca1ab4aa7dbe437d9
SHA512146df7ce39649366d73a286b1597c76beaf3e50fe7d27f35dbb53c394eb7f9e79e90d84897e25a1a767d0d847ac6f4842a3fff70ad330da51d9aa93972b31923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc64f72ad6c35a65ca8c6a075d9f38e9
SHA1eb6b3849463e9f1d422a10d31b72112cdf7f3802
SHA2569bec95044986fbdc361d2e1cf8dfbbb661503cb66795ebc047c80290810613b9
SHA512e1c451ff386210936ad3114809bb2c521c9811f213b94cd557b9ef3c64f6f5783c91adf255de2c3362312a8abfcb4ed112662eed5226f9923f58cf71afc00f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcfa1882c9bc1091f51d5f7cf5bd5307
SHA11d8ce3a29768ab86305d9f3e59fafcf373fccd6e
SHA256f5a9198164fafc96fd3fe4fa7d5baaab2e34de4e19d34e896018b2b283198a67
SHA51224c7acd46541c28ec791fab616067e9c187c2736bed79becbf932c77396feffa73de081915483b5d29029ef1ae1991720f014e729db9f6270d6a1ea5b465c5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851b36d7e6d34589ab2284471bfecce5
SHA1e51b002d473007916ba1a6c83f652b21275bf01a
SHA256a185d298f04c0f969f3e33411233eaa01251ff3c010819d05e33b23a5ddf6115
SHA5120d1e8401e2dd7f28c9908968333cd992deed9e6549225a0143e597366a52fd3382510428017e53ed85438d8afa28c80123dce6cff9406d44d4ba5b2790d8422b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5712ad16af1359202d1f4d4efdcd03706
SHA118999fd6d8498803ac7f25b11b0a75e7a4895f51
SHA25624a5736d588c98e8c62a0dacc11b55d1cc7bd28bed76ed2b588ad791ac7813bf
SHA512c52c8f10750ce7564c035f12868a207bc4ce9884bdbabac8c95deb9c66462d2fa1e24b8df218e591da1e6cb3a0f7a1cd276d8b77ec986bc7ee8e4e45191fe097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a678b2761229688d04b03b3980f9b6
SHA1d7355bd7b94bedfe47c11bf3eea4d3affb2c04e8
SHA256d7544a3a63b1485025f1337223f97c450fa0f010e142b784f2ed9a85e86268c3
SHA512c4dc832e337db8783f546bea0982de97c979cd3683fded31ecc4a2c83afcd31cefec055717f269f70b061278e2c62ae1ac6adc371eaa40d1bf51e1329a6046c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f77a078d72eb899d61257e69b24229
SHA1622625e0b205136b6f55a1783243f640c524c56d
SHA2567d15ab3292b209d64291b9650469682ff3704340715a7b86be7593edd9c873fc
SHA512913c12e7925fd45965e3a9fb8ceb03b7034b2cfba4d8a76a69fa1dc8eeb1b3fed5ac215c126c9b1474bb015f928d578a661237d9bfbe3b8c858e399fb2baeac7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a