Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
5f9fc195c720a6fb3c02e818eba93a6f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f9fc195c720a6fb3c02e818eba93a6f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f9fc195c720a6fb3c02e818eba93a6f_JaffaCakes118.html
-
Size
825B
-
MD5
5f9fc195c720a6fb3c02e818eba93a6f
-
SHA1
56c508f1ce17b2b1c66c0ba070f8e1978ec2b9e1
-
SHA256
32e1572b98afe75f643d1c6b2442bafff9dddba8326f0ffcc0a0e1e7bce36b86
-
SHA512
7e7a0ab0e2246e70a333f93f50066224646e489914447a3cacf8cb7f75d54e787134a254ca1687763a6f4bf24f050276b55d1a9b69489484fdbaaca7516e0e91
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ca6fd1c3aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000c68e3ef3367f84aea9d1edc83d852b46fa0064364964e4965b0fcf62bb056db7000000000e80000000020000200000004e15641629099c7b7d9b9a6e358d18bce886751bab504a8d667358b6e9ed96102000000066e3487c86ab68302f9ab1a4e896e1fe859c6b1db0e0d01ca31a890027dc9ce040000000128080b0198ad4a79bdd0b214a5213e99b98d1c695da49c7d550372daf1202735cd2fa6aa5e6c4cfbf38a7e2cbebd610b29af95509841efd5d8b3714caa637ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422377965" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D6D6CA1-16B7-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28 PID 2904 wrote to memory of 2944 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f9fc195c720a6fb3c02e818eba93a6f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d616105d2ceb0811a9b64b0b7acabf
SHA1b35efbe9fea330f42c2b75f6f5f47cdb8f215f02
SHA2562e283243b271ba93d8599a79400259b02b7f10d13a81c958c2bae51bd518126c
SHA512337ab994548d28d627fa5e5df1e744c1efd349ce280747dae9a0a37fb25340ebdbd2d1cebe4d19629547bfe400e258c5598685de4a0fb293acfc4f0ff1014582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52758d83f7ae97ef6c3f85dc3692a32c2
SHA1cb9b06c409282c7ca35667a09044cfb435e776c1
SHA256dfbd8f2fe7064108ec66f4b4bbbdeaff7449b1fd16d6e504f7b5a47f42c796c5
SHA5127c68f5983fc11875750106fa9b4bcbb4bb0c7cee06d116f48bfffdbcc6bfd4e7fdce2381c3acb0b953e9753321b53f44c70baf06c9405d9323f1aad0a06bdcd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f35dfdc5f3a1fd102094fda32ef56646
SHA1d3f6cf7b026621657fd9c1a587f527cf7bde4c02
SHA256e8ca00f52dfe5ec4e9bee92ab5e6bc1f6ed469752581d2ff788d6d66d94efa34
SHA512d64497a6f403bc44bbf0a47e120332d6f6dacc50ca5c376a4ee32a08edd099612ce7121cbcdd4838610589be01757aeb6141a6cf2acc821a388b1257daf13832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f725feb7e1f0bea3b6bfc2dc056edad
SHA1314887c9a7a6cc5bdf6bc2aa6155e356d41db5fd
SHA2564a77ddce6dce4d18c89b1fee8951ea40ac6ac7cf7871f4fe1963f4574107f55b
SHA5121a488e3ac9051a21969f5687390edfef2e7a4610b64a2b65b3bfb1871728f45d2a1a65334ec68759b95b0da975b5ae70c4f994b079286ac0715f7dc4622a3b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fa22d56ddbe36ea51048213e0f39dd
SHA180f347258ddca99117b9479b695544f304fd4f47
SHA2562d96838b6f997556d73f7d156f61145bf32617e371992486c54de3d798777931
SHA512017aead23ffdf344812a7f95031f47f5df8a71dbf5dcbd76fbec25dba977536536834c70b08154bad3f947d1b10f834e90c65a21170e1c94f3b7603bb49aa2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480ce2a9dd8d4c1afeb1c6572349b848
SHA145b60c812f00d4d3a40d0dd2f3200a99ca334b4c
SHA2564f7fa6d6c1a71f20c6bfd65e6e06a3d8a9a73331c3d66d5d92d543855680d3b9
SHA512941fda4310d936e497b103e369537c3e4fe376f1059a27ce98579717d5e3208903c5cc9a12745833a2dd01acb6587b74966db674a00c3c7460666deaf209cdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55089ca63d2a9d3fdbe1e46e017607c09
SHA1424619e2aa91afc743d61c2d5c2eca3f23ed2276
SHA25690485b1586b8e0e74254e5efec528a7a5ed97d43ea7fb4576fb38dcc0ef010fe
SHA512c741e169cc8834ad21bc951810c33fe4397b1bbcebba0d809b53f1777a85f72a610c52b6907f9c30da44ee3ba81bedf908c2ed1efbb5f39ef1f2d94de1910f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fabaefd665a9552685d5883925e24e2
SHA1fb6e86f8380e6755915e105b2c2736b202bb0a65
SHA2566010518b31c6f6a5e111273f5cf3cd9a0c5b911687c2912f64c114a9df56f16d
SHA51240490886dd361e740cc43cebdecbf59f3f6aea203177e2836aa4d0ec092a1b09b87da4a0a021bce89eb0cbdb8b17b3945bc2602558c5fd150566b0a7bb6dca11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08b05624ea2cc0823866faffc354394
SHA12f3df0f803becd6ec2eb0b4b0b5379ffb66aaddb
SHA256b636328652171e290666a5bab5bf930f084f9faa78b9f9651fa27a8035cda6ad
SHA512d91be7ce2ba64c7ac8bb525f7932fb46dc512d3824b6cd1b0089b54619f0d7f9fb0665f2c70b5f2a5523813fc89663891cb4bd1626d949d305bf2e92fb9e09d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbcc268c39195d74eabd610455cd1ded
SHA1d57aee5862632e26e80a2e9f455a79d3aeecf16d
SHA2560ffeb782c358aa23db4c60c4de089921069f470f424505fe1888e3a66d9908d1
SHA51254fdae1bc0db909f607c2e4281209e981356208b47be22df46f4423d5f9380222d3e72ca05a2ca97e7a18a8cb898c77e1e5d81f19dd0f8cf932b0170ae3481f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5891327aeebc87c807712c0c2e05b5c0c
SHA11c440a41999be73839d96e69bc222e7d6cc79770
SHA256f49926f95f60482c65c5c04d2789375a211583555bfc7e83f13110d1ef060c1c
SHA512ce007479cdca2dd68a5608268186ecad8ebce8d7367bde9aafef7dd32169374d9de8e0a3d80999c5e48bfbfb95ae89f28f3600ffb1d13fffbe8fe8e94326205d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d9942423a23d22ac32a4e39c628ee8
SHA123c5b173a716c569f010cfe6c6d3225949d187c7
SHA2564295e2e43db43d991988139fa4e3a27413d6c91586aef9d3c84fcc7b0584b25a
SHA5124f82b85e51b2380774b6f2f4b68a540f78c3a892708f270ed7261a8c4859af71a46f3e5948e69fda3afdacc8df7ada3e44c0305b849d02e60d5d02f1050997a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c9e3f310302eda0204b7f2296859314
SHA1b261c90b93b5a8d7ebeb3a40bfcfd3de8bfb604c
SHA25667a6cfba6fbf8bbd99d6360882272c23ed53e02bb2a47b21b913d0c24f43f558
SHA512916e9e3843a6030631e59363d3fbcc97d33e30122dcc341c5bbaba66ebcfbf52426b57d84bc12b6605367848ff089b6c15bf65defa0b0ce0d1c2250b5dd1ce2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d46dc52006ccec0e91395c7edfdc9ee
SHA1338ef9ec65fc531be3c1335d2b9dd1139c713c26
SHA2562542791781d62c3b7367bb8e20bdfe099b436cd734f2b6f82fa18604481fb0dc
SHA512beaf3a8f5d517aa44c7bfe97607e495744720e1e2e32c055ceb5bc0825ccc0a676aa8991efff644320ee0e0350e66100acddc329bd1988ebfc6595fe7b210318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c73d0492f71df2e196e57625bde4e3f1
SHA1ae1310a612fae934d5695dae470dae354ee38a22
SHA2566951d667d7bc3787540383aa35ecf83c227bdbf50f362c7b6498054c11dbad6a
SHA5127a3b9d7b41fef4b337ca0fdce8a6746c1348ecee2600bd8cfe14a845f775b4352354ed965383ee28cec57faf6371363aef73d00340192d3c82814c0162f26fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589ff761efc69cf1c124533a6446ab01f
SHA17b8c3e59533bf5f85991f8877e9e066f83dc0c3f
SHA25631e80e7991b700291faa963af20d60e4641abc54c65f72e8d73e1096675025f9
SHA512f8292ea2b8cf03d6a12c9c96de021038f7dfb4f4f4caf9e2579f7480e0c619fd21844d7541e266678b8c7e0bbae025c388e7654e6eaf9c6ccdba992a72a6a876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf49c16864b0babd42894b1f1edc0e3e
SHA10b49d3a2bee36fddccf804bce9a62127ee9dd414
SHA25628e4cf03dd7863825e0b6a47391d76007e09dd95584d3a526cb15fc889883461
SHA5121ab83a7ca3ac77ad7910046bfd0b8c86eeb80ef9615f44e83a845db2c58f128c43e86812b16abca7acb19eb1b968fb24fe8c69edb158a3b6a785edcdb1be4aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f47dcade411ad9275777770ddc9a715
SHA125b4b871d84fb44edc17dee6fdf660b3e2553e4c
SHA25607274a743fe9de307ed8c5cea9026b0ff75e26d915985dc080c1f89106763682
SHA512db02c36c318ae445a25423143ca8bf3ea5f669b8c7a7ac9837edaed915eb1c528b942c42316d3b3b692f4b69625dedaf8d72d889161639712b1f8ecb60741093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572ae1ab960db3a814d1a1522502fb069
SHA10336af90742f7164ce1c3d11e5763c2c93473bd9
SHA256b6573e478f1f0984b6daf25315a0ce13773b8687fd3ba6fd4c227699c588a8c4
SHA512a33da473be94ff1676c696f98aee8b56caba83b7a8144d3a3cab129343570cf6b4f175c24d3122ab96fe74cfa8b0783ce3d783dcb28d23f81a0361fbe8f6f261
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a