Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
5f008df8443bef017099fba9a4fc562b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f008df8443bef017099fba9a4fc562b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f008df8443bef017099fba9a4fc562b_JaffaCakes118.html
-
Size
664B
-
MD5
5f008df8443bef017099fba9a4fc562b
-
SHA1
8c051978bcc1198d0e57887f6d77a5ab8964d45e
-
SHA256
3e44eac7e312ac78ea1aeb64981342e7f897b49641e47b6b60801aa8a51699ca
-
SHA512
a557d7c33b7b07e81e9ee4fb0cdc455827f0ea4f7f733c8cd55679f629df5ab439bfcf6a7badcd4df4f479c4b93c849261a6570cbc73a0aef912e0cc5a6b0ae1
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422368892" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08333c5aeaada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000087e53a1ed292178db0e4569b6a5e5bc5f821e09b0ac529a345b85a917931fecc000000000e80000000020000200000000ab01171b426bdb4db257ad6f365b4197b70187446457873374f3a1ddb3331de20000000ddd672c2a4d81d2205f68b63ade892a06ce35d1760ace157edd530e8c03d824940000000739d6b52725b689fbbbb6021e3a9b9336123f61a9e9334f64ad9187f52c84f455f1066cd819fadadb6d36cfb220eafa8cb79c2b4f729022f4e80b40eb1da3af8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F09B0E31-16A1-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f008df8443bef017099fba9a4fc562b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596dcb5cd5960ee6376a8b798df671beb
SHA1ce1fa8c99886a553d674290ee0e3c46505fc872b
SHA256ecbcb72276ba2efe72fc7ecb8235c0d8b331a34357acf1cb3abf2537cc304402
SHA512e735e3385a9d21244ae70e11a5dddd457015c3a2f85939930f6bcc6b5bb21d6816dcccd1a2bc33918620ef28c0bf3a363ec71843c09ed836522810fe71c51a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d10ba4c0f7f37a43511470d91f49e4
SHA1aaa309104cd5a2e400163d5717a4a2ba14586063
SHA25697739a08570c91e95e729f4445a37ae32de02e48f5659ebc89f5c5e36ea29962
SHA5128c77d38dfc398a3991174b71f84de600d6fb51681c090721372d2b09436f81d14a47078c692170737cf8f555237b0a13fd07f89f2e61fb6f65c1196fc0b27dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c818c96df501b7d8afd46963559f53
SHA1ecb0c6e56cb51b15a7f42cb476cd90fccae1cab3
SHA2567aecc08d55d637d01fa1d45fb82a64cf2526620210fe70c713adbdafe9b02149
SHA512dd04a702ced7fbe053ffcae368f2f67d3c0be5f8ab001c1f2d9fac6a5c2cedaa9548b29627d7e74ffc24a3a8d720ac7fb0f0d0ede8eb78ff6766cafb7683f3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54244d5e2a812b0a26e4e44dd7e8f8cf8
SHA12635863bb9b3832c443b28d064577774e29494d8
SHA2563c8e7ac176a8d89f71092bbf2dc2d35bc640ec5f4a200101f2c46fb3b36e73c9
SHA512372e11e5c723ce524c4fdf11728e8797ce8af120eb9485bad24700a6ffcf5bf57e4ec2c129b0b788883e7a3d1c0882652c7050fd0448031738885fb1104b8e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cba0805cc4b01b4a41f1d2b7bc55d36
SHA14cd31358febaa41aab4894427b09ccc4cd060ae7
SHA2560d9710c26daa56728e3cfee938d0d13dca02b8c70719fdd40474633f8ec3ae83
SHA512c1d4d0b13ff556fef805a2f4373c09e9c27aaa0be4dcf014e70b258f262557b64da28bfcd67c14c7d265f0384784b54646044c11c48b1085d279ebb0ed741fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b154aab50c53c0d39162e14f04e8e7
SHA14a973abd6d06e53a8f9dbf42c529e5cb510dd1d2
SHA2564972f181efe12bd8d5b8aba206450b9eb39e2001e0579f2e384bf3754fc1d9d5
SHA512ac600672cf487e789fb6e9c56ae8db7c8a919fdb5408b8c197db75dbf936cd982a6348b9416ebc77bc1c51a78150930594c5f4848e333631e1ea90133417569d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2b2f3f3bfeded4a13264e87a5d74e0d
SHA13b66bac71f95f16a03d308ea4b5f87a24b40ed71
SHA256c1655e99f17b64672ce47ba180956e194e1a4efa0464db6786c4e126bb20b128
SHA512951a1574be8a50acb408ff59cabad1c65c7b24ea9011fca3d744c233bc97f5724c49ca72bcf6346fdb206c1cd50627c534a35a8336a49015a9ce731f2e0e3e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58180b8c109c462364d71fd8e2f4b91fd
SHA1d0c008ada4f9b3a31d6ad1013019e6297cad5561
SHA256d55e2ae0e8820608b09c4eb3bfb7f78bf8b7d37844ccbbb17d8d958badbcba6c
SHA512152a8adafa7227dae78c7e6e56d7a9a7ba0479db02f647663bc0e1e9e1b228275529b574c66b412be404e1203bd4b61e022007e070f7b09fbeaf33ac5f401fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a1c1aa976d01218bbc23a9ad92e4b0
SHA1e60be256ef2df5e7da7d2afe31e0d669f74bff40
SHA25690bc6387fe06a68a5809b07d3f68d7c76652e6a41fc33764e52e09df03a7bbe1
SHA5124928e4401cb29699dab631a600a5dfed3b911e260b5a48bc7584891b72dc3a3be6373b105abfcb64f4f78a7498534bc2c41d146ab10f5fe251dcdb831ef60e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bb7335bf223b5dddc06c42105866ec
SHA1242a3524012a66bdeeceadb1e1e80be9971ad16c
SHA256420bed53ff0422f02dfd4e4a9cf5213c7ea2b6082cb4426cd7da23c13fd27049
SHA5125b7e1963633f2deb0de9b971f6cd79675a9827d0f9a3da2e527421623dd64cd253db21430a644da1c9b44f5236247660d62709a9f8f98b3c794589771ae5170f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52520b9554e1301b01b34fa23cbbc1b61
SHA13526941e9ef401180ae2108f11bdbaf1a98f7cd1
SHA256d06747699badca8e52e5431c0b7825019c4d2adb39ba06a52c81a8af544718ad
SHA512bc0363b82c8159b57a7d689db523e73806d3b108ccfa9d571af7424c8146084844049a2d7b9c2f4b12a2a4c2b3601c0262784fe174b822221538b47f9350e2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f711999144b30646304978baef1beee
SHA13db273e979d68254d3b52291a5440c4dc153a726
SHA2567fc18dd9ddfc7e40a420e42dfc5c26ae2b9b9300179ca73a1039faf88367d4e8
SHA512d34ca5a07f28490d41f021df3aaa25af21bd05b2b1b737139ed93642b94beb58e28b5e36e54b05d7ea5e753450761d2d36222470fcafe379175c2cdba147fe87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e6310af1879b0405a90c59ea999c5fb
SHA1ae325fa4ff9078c4baf7a1a828af7a8cafbcfef5
SHA25675445f944e604297be86d9f3df81ccfd90350274e51f5aa87530d8090d7d07ca
SHA512a20e63f7380ff69fa2997dcae49a18011fcd021c2308b74b0f6b2115398b85f44615f421bc46b5a95ab5ba77823318f6e735a36a8bbe76cd46ac88912c0f54b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616b2c68ecb18d27f08f0e1f489b5fee
SHA156a8d0c6edce7e86516d8099baada8892c4f873f
SHA256b6e40951f8662c4cdf87a453df482ce8d43372e77b48f836544a3bf081cecd49
SHA5123633cecd42a64d7ea21b9b59e3ff02ebccbfaa10d3a96f1d4a9deeebb9291b6bf4f61923656f7fb149129d00da47778b5f8eac902e13bb43afd1d9f95d9b9bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d4aafd253ce971017529720085f847
SHA1a156c50e918278476a2d5f7b4b0ed1a295e6816f
SHA256c5362890c798664fb87c1df024b2fe2c645fb741629c48745eb08e1c00db7b6d
SHA5120f0a2e3ad1ac6d14ac9215dc5d5d30b20e802382bbf6680a5ebb4a71ad03108354ad7bbc85b3a64d737d1bb182b7c75b4f213054d93b39ee0403e5c6a3aa4886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59be20b19e8f7382aa679bf8714eb3eb0
SHA1d8828f86dc6aacc6a7d1f0c278d2d4db8c8fcb83
SHA25677b423fad2bd5b8248525e61c45fc3c16e3b8e768d70f8af0f416b4962deb11c
SHA512f1165c92507a81c3ea293ca368b46a878cec762b20ab918b0af6cba73f197cb714d08d7de723f14b8cd63a345ce4444d454c7f37d406eef4311ae76abbaa9fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb410c2d46e9048a159b751d9882ad1
SHA175c496aec3dc20afbc0d25448ad55d468a66254b
SHA2566b1ebc26609747d89993941b89511d37bacda264d726781308d3160d61cca20e
SHA51205f7dd6352c19625f8a893663c4ced19af8689a64b7e2ea8f58f9ccbbcc50017c524fe385fada7e23f186695c99fc0e39c0e8d269f05d1e452acd70659a17fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f2c87b659be1ed79085ab3727dc538
SHA11da9174fe802bcf8c90d925b93526c76964c9ffe
SHA2568ed393dfa569704b7f0ac4696cf078c3cf2fc4958a277f6b42f95041d77dd416
SHA5123b7f6fa1745504d1fda77ed707023f723dc6abe053dfca889ce4163814f3356c81658eff1a7a6b8327dd3ff34a3bf4f0959de212bf8913058b0af43c14f2c91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8712f227baa5c428bbe680ca03fce43
SHA1c58246043e1796e4b0aca93a55f3eedbc5695e0d
SHA256dfe8e0763a272cd7a70bca335f2f1514b0a7dc641d129ab54507598ed97e1a6a
SHA5125111c8373de5ee1ddafce2d1fbecbb429d0483a1e04b73402fa64dc36380823d89d1c9b149de9c0e361a5f402220b156e0c6e81b75ca7812eb58f6b8f5d6f026
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a