Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
5f26e1e59e8de42f15825627a02d0c6a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5f26e1e59e8de42f15825627a02d0c6a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f26e1e59e8de42f15825627a02d0c6a_JaffaCakes118.html
-
Size
21KB
-
MD5
5f26e1e59e8de42f15825627a02d0c6a
-
SHA1
dd27570dce9c15c5d6efc37309de490c1a1b248d
-
SHA256
8d74b35a621221586b567b6fff202ca307200e154e26334a0fa729b0798874e0
-
SHA512
8e83cad1af2ac97501e883ffb9a4ce46315210eaa8db27d6a1b629076587bd67f045695a5c06f75c2aa1218622068ba25765853b32a0ea98ca7a34b32added8c
-
SSDEEP
384:fuV+iKUf6jIB11EkqvJJVH3luAfolgQtKEdpIuXQcl5E86rI3y6YnSMPTzCCYS:2J4jI4VuxRJ3y6YLbzCxS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906e93f1b3aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b5a67db4eff474f95340e8c2305c6da0000000002000000000010660000000100002000000023da9234e8db3f00e9d0885cc02db0bb526c00ba9b63e89bccf27a015049ed06000000000e8000000002000020000000956e4b55b8aba6b473872e5e09d291079ef32c025a6e4a1373dd5a908c14334720000000d5a9c76ad082cdcd42b1e0308df22cb72207a82ebbb63a0bfd6c4dbe32f9431a40000000d0d09ac6c73d35a499a84beb3b769ecab6128cbd4772c0d25a4a3fc34b715ccc79c34832fa7a03cfb2a314a682abf3d90aacdaa22e7d404012903d8aca3cacd0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422371115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D05C691-16A7-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f26e1e59e8de42f15825627a02d0c6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d4301c62b9b3194d7b0aa0350e2290c
SHA1798d25809d9c10cb5f26e70798a5248803829266
SHA2563ec33b0915755e5a1bc5d8dec952ea1d1747a5226f5a759db3c2c09291112813
SHA5126522c181e1f6d7c5d920b766105c15c2bcd258a0ad6b730cfa4912a3c6676e7f7018e37ce745f66019494119736d898b7a27a91d128d94e46413a57cfb06494e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8adeacb121ae15fb7e12a119e7321e
SHA1c4d62f7660029b515c3edc630cdc34d8bfbcbcb5
SHA25625ffc53f5cce86ead2ee332b9bc8b6e0008c7f1fd521ad9505ad8e7d7e27c23d
SHA5122085e8a85f7544856625bc794a059175afb1d3c26f467b20eed2a8c01ce2ce969050329c0c83000d0388c6f4cae6f934a94cb4e5a3d0d1a4e5c0f32c54292b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d20c09bdeb7fd3a341c606094344d7
SHA172de94dd678268dff3fb4bafff1c506749e4b8ce
SHA256939faa81d8e080d72fe1a78ba9cd89bce8078b4d4c59fafebb9aeb7f61a3b660
SHA512e874aca894f3f5368d8442772cc37e39a67381c86042632fef45d77441c5d4378ef572e488ca260aed5a420ae6447473e8056e2bae15c23c7d11c249a031c930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d9fb6700641e721b0b176cc3850202
SHA1b49e0158886654aa5559a153971f64d80a8e7b23
SHA2562526f57d2098a52e99288336ed1eea32bfa60b65a480bc9c4e8da6a815cdbef8
SHA5125918e4a8599aa595827f7d8a43019f9eb3938ef29e59a92fbfaab5fff205bf405329eadae311f1e64fb2188a128e084987785a5710322d908a04e8cb87db7a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a04818207f797adbf2f4272be15adc
SHA1c248d4073da2bf3efb41e41e6a9c45ee2f9ae5d8
SHA256014fb9df0751ccd77ccc5b4aea6705e851702f42e62f4c28f805a9094620af66
SHA512911234b99d3ae76eba15de60afa92667e4d69d1f526d35ed480e4ec7a1e6c206d7ed1e4616be6677b52e48f05d7a33d549e12092a403a98c386f367ef2930087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537ba49030ac3c820edef7e5a302391a
SHA17212635d403fc8aef19c0045e4437d19fb0ececb
SHA2566e5611df74d09ff99ad412a5c602a94e087538adb4d57b798538ca54dd8ccfb2
SHA512309a3fde35272432322bf5fb4fdf5226d12091505b53ecdaf52d5f4004128f2c9b9b5b51cfd5007679eff1b8899e70595f24659847f3d2f21c43229777042cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e193c8d27fb8391911f6c53698582cd
SHA1bd75a961fb590f23f17e4d3340216e76c3b10dae
SHA25656f9d94bd8edf959c412bfee51788acbc00da614ad6c9fbf8a86c879bf811bbe
SHA512324dadb4d777a4618cffd03a101b35499cdbc00ee1252d335d5a91b40a302ecde54f8706ddea7f2c5675428a6b47d6309bb5b7b2f0cdb762fcf3a043ffe474d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e07b69905cfbbfa09cf57178d8fa467
SHA123dca3ac6358d65bd767364cd98dbdfe2fc34eee
SHA25617b5ae4044fe8b6fd4390355284172a7dfb7818c7461f86bf5418fdadd8ba207
SHA51262a8b8b2d1b52543565904cc619ee8aeae4a1ed8e306d11a8f281e7612e83eb08ff1ddd71fc49819ae971cc572511d8ef6df6c98a35ab011bfa8da28a723721b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577871d584f67bd56bb9af5fe5d7b1fd1
SHA110e60d78328f2214e484974a4533c70aac035624
SHA25684405f5cf56d2c52fd1391b4c438abc2d8570cf095a61655f2858d7f5b8c67c6
SHA512f50562774151ec712d776ab81b4752d17959e92a4159c06ffacc739ae76d8945e8632f229b80a75bc37281dbc7d959aeaf1d7cd2013f51d3f49fd81d2ab750c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971d2791b525f758f38ed1aed1a420da
SHA1b6bdbc2edfea5c80f4702387e9e860e440ffd03e
SHA2565bdc8f560780091492995531970d0b7966eb39f53af839cb2c50514bf6172d0b
SHA51202c7de207f3fa94eea141030f53a0be14f0f66e5ef062a0c51084d404779eb86ffc505c3f89de3f8e9204092c395eb6377adc51f326fafe03a27ea4a6de28561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f008e5a5bdc824e264cd97a57c0bcca7
SHA10946a98f091eb3df77221ffaed15b2bb37f93fde
SHA256878e90615decba054d80d5918dddd3d910c682e155905b0aa1adc208fa99abb9
SHA512c7bd9fea7fe97220a979afefa6bb459910d9a8e6a1318ce80b8ba36f7ef3150af98be7a641c7daf7352e958c8a54f181dd8089959810847ff8c318fd4dbcc4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2c28df0bbc36a0fbf07d0ac296ba408
SHA15bb8fb13bf10a621b11cac17257441f29654af3d
SHA256db91240eed71d527a8ac17004cf221106fa6e39e349d175bb83518fbf112f981
SHA51261da28ed688389ed9b10dbe695ece7d1ef3b8d937074bcc8bdcce47238e56cc024e8d02b26a7f30936b6f58017054536095ef3f845224267dd95c3a81724b291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdde278f5a53ae8416b95f5b395cec93
SHA1171a36175f9998a75d3c43abeb2e0dd0f6e75924
SHA256c3ea5e2da7b99cd3127f96f8b2d191e2f00ac5f03d3bb7322bc2d8113b655afb
SHA512ecea1f9241e37bbc24a6fb9972992bf84f3b0bea03a6f47623951e78389ec4fa7a6f1ed7ee1f2baa378de5863aed5b5c5c078d3f835b8f6048b58804aaa13059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522e88d51cd3f0e48901e73470977df7
SHA1eb7c13fd07d0b042d33a7d7bf598e319428df846
SHA256eeccca1738415203bde24de43881cd0cb2a0ed39d9d8042e03c0f3eff69e23a7
SHA512faf689018c79681405673cb9e9ee5ad6bfbdf186e7e458ff8a8694ce10e0959f7845d727546cf5100db172041258ca5b97e536cac14197d73c97a2a330eaee4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59878ac3ac49110f865720fc2ad7865eb
SHA17b5851dc41acfea5418ba1bb0ba3ff7b36e79d50
SHA25675ad6add6632a40b58ec1bd19cefc8911f6d5d80096a5851e2111c2d2a99b119
SHA51227fd80a454a9cddb0ee75ec22b149992a1771ef7e5c8ab60bb45ff754028760b8394d0f70ed178732d34d3e633fdfa07641327e1d1add3eef121e32f829763a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a660a789dedd499a1f24f0ae48177b
SHA1662241195c5a2ff3717cd96fa4308b0fae711cea
SHA256b6b539ff8aa6cd6b15d1fc07b2491bd0f3a4fa5f006a9d040d1d39a5731a995c
SHA51291bc83d61a165e7ff160af5c1817e3c69097765c11cbcba20d85a1d2cdfda0fe2ca5a5e74407caf602b4f8d86e49c1a73bc91124a6f5392a2b7c6119754a439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f7aae5c850986f73ce644f2892d43a2
SHA15f398cf415f88d8f8481e73884a518eee0f04702
SHA25633a0755016668bcc50399e3613befa4e736f6350b99cf8b1f3381052c926e229
SHA512710e1cccb7cecbe7d6830a208b0489f5cd8a98af76d7802517a2aef71fab7e49d5a1cf9dd1cff98ef01f24e74b1abf43b72a153a7ce03888fd1bcec90dca9ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c14e467a634b5608881392585f5364ac
SHA194881cb9c24ff25bd077e8c9ee67df72689f2535
SHA256af47695fd598d6476e3db548c994f6f867d560c10d7f61741184949ea5b43cc3
SHA512228c0e64969e377a40185cacc55b0f967e2e044f6c33bfbcfda730de3a748e2848f4ee671debe0dba4d4563d9423aee5d128d19c08fdf618e15e4b3141ed6de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26ad2714196a56f46343cd58debf1ec
SHA187e069d3ba439198ba9afbb5033ae07ec71cb497
SHA2563daf309bf434939d6d040b72639a7f3ac4094396783a008dbd94ab81d2579052
SHA512280dff30aedd53c9c33028558053cafd3c9d3198fb91f6c47217fe940e24809b0ab8cb35ade83555e0a1c953013fb0c66ce917d327f3fca0b9d85277aa80583d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a