Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
6251ebf17e9add08d667c1ba145f157a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6251ebf17e9add08d667c1ba145f157a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6251ebf17e9add08d667c1ba145f157a_JaffaCakes118.html
-
Size
10KB
-
MD5
6251ebf17e9add08d667c1ba145f157a
-
SHA1
62e37bf6b0a77297d0984355fd918fbcad5248fa
-
SHA256
679260fda5e80b193dc62a1cd4e94ef2b081c13f7d267155974d6fb192ab5672
-
SHA512
47099b48aa008f8ed2d85144a1abff2f03299eaeb1f1c79608d6d23943ed3a7b11c31dc2ce8191222c0933e323e8d8a9ed398e69e470164948f1cffa34b83c01
-
SSDEEP
192:hZH5P/ymAb9yvMymLyXRyfRyvLy9sdga5IsDf6L1tve1oDrfOtlsVsg:hZl/ymAb9yvMymLyXRyfRyvLyBfO0h
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422440139" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000104546dbe098fe4897c58bfad07de4a00000000002000000000010660000000100002000000003dc77c75fae8c9b9b0352247e7905d01a29d9b5826c6b1c6f948500de21a268000000000e800000000200002000000068562847daadff34fbd06f24162b064a8422e9457ae4282b82c4a6a92327b0fc20000000a32e2eb58b667eaeafabb169dd7e0d05565894eb4a5ee0e5f87bce6947c081fd40000000d9dfc8a52dce8025b2a51ba3bc2d5f0042848f61a2616bb450ef720149b5f72909459b2a494ad372a56f97cd2288caa3ddc765541797c2ea9c00b4d6f3194796 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a364ac54abda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2885691-1747-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2508 1516 iexplore.exe 28 PID 1516 wrote to memory of 2508 1516 iexplore.exe 28 PID 1516 wrote to memory of 2508 1516 iexplore.exe 28 PID 1516 wrote to memory of 2508 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6251ebf17e9add08d667c1ba145f157a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a60e3e510f9319d73c0eb97aefe2e6
SHA137277b3568465b7780f29f07083beb1539e7c649
SHA256553b583455a4daff62d73ff8d06b0bef2f513bc62ab7a4939580d820c7565f24
SHA512f3547061bd328a7487efc0020110512ea0b0f526fdb7fe4d79d9d7f38949f85492ffa61317756815c4a48b961f315f760909f92b6050c0015cc5a3326c12093e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786f2f6273bd4462fc0a01e83f345e91
SHA1e8f7540201ecb81953a888f6a96f7b1fe3a91e72
SHA2568be8371e12b081c13dcea0d8022cb6ffc298e363577644e37d75316069ea11ee
SHA5126d01e6af145460658cb7a98c5ef0f28dc37f58589de94ac5c422e87e8181e1780508e0ebb45cc9abbe2bbe54815207590ccefb3dff04f6f16abb1606bbeca319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a148af747ab74277f0b0e407b3c47c40
SHA16b1af9df661abff958cd8f8c89080115540f604a
SHA2564d446efbe9aa714848be544381fed88a5267188d9383653575918e40204035b8
SHA5126e3aae9a959307f868213cfad820eede415a92fab0a61b52192c85bcab2cab0a0bbd84df3094c36201e56882a01b8938042c75d3ab445e441e2fb83654f44431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506c63df548d7d60486eb34a21ef94ff9
SHA1a249e91db286c7a1224002c07c74d97a48a8d358
SHA256155f9b24e05d324154f0a51fbfc918503002ceff3f1645d29f94372789597d01
SHA512e470ff4e11e952a8fe4c50cfcda3b4d0ba5f74f42d304ca9b768adb2bad185b11fd0392871f1aa69f86d9cdfbb5d0a3d4d8c5d56830e89ddb14e7d92e173280f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e72a49ade54cadc0ac2e52562dd6ec9b
SHA167499eea51743e6248f46fe1bde247d7adea406a
SHA256669eb4c51c4b8020727a9b3424c27b4b4846c057a1e9ba1ffdbd2cd8fcaa5e95
SHA512a5c2c1bd65418f452378d055f2b6142e820e7f2692ec5f4f42ad11abb3aa89e9de7daa5dc9ddb8670e29f240adb1d07cd53e8a929c6d4037ddb2e260cf3cb61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d33a59095d90568c05b60e8377699b
SHA1a86a1017aa8cd029072f944f19bdc64fb565c6e5
SHA256d1694c7ceb0f5a4e51321592d421694acd7ea25ce62f1f37a9b558863021d978
SHA512fff410f077719e904b9ab855b46ea2afe1e9b4fb9c9811583a07160dd9f4ce86cd05c8871b69c2f6e828c01f574350e557c82619a072318e1b5793e969781e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360675d9ebee2170608e549db2ecdc23
SHA1b81030dc7686ee0db5826840894c24e4b942c615
SHA256111120d360fe39fba808136dd359f8e8a9ccc3404154771f7d4c93f98a775833
SHA51262d633608fbe69721cad50c9cac2d5a07ced06378195a55c12b9ee0dcfdae18b0490d9fe4f08b9eb58b15607db2744526d55bc4994bdf532a34fb53b723162f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5e4446db378d9b3379b1668fb72d4d
SHA1cba6dfc615fcd7aa3a1682e44485bbbf06b2e232
SHA256ce04c0da2ed934aea91bb70a62318d263535ab5168d9e991aadc4e158671c43d
SHA512c09723409b03ae5b7c2a56bd0058f0ac486623765de351132bfc2c0538f51013a9414197f956371954febccde8c1ec08ef79ba6769c02bc2568d82b8641a2e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3da67516e582d5b9282514333ffdaf
SHA1e7ae4463e910d0c0655a8a12270bf647ae8c8669
SHA2567d7cc58eedceae5a94e989a918d1e2cd5849e890cf9347e56e772ae7d87de1cd
SHA51231996a4018f5ec805db30fe42ac05824d98f43fdfc91314788533d2f2f03e96bde48dafea9dc0da84afa89d23f47618eb3de8c5d831e3f204a3c9b3f236fb8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587130104db35d7fc973cad05b86644e4
SHA11387a12281f0fd8f72d7c3bc7118303be24821a2
SHA2564a28cd311dd43814c4f370b2f7721a2f8ca8fbc45da04033f9db1fa53ecc48aa
SHA512ed8b6ec736383abdff6e7399333fa5415e7453a4ea83fffa7f670459c8b18f1f80a292cade73b5c416e3d143e8a1a0ecb4f58fb50ce4694459a8cdec270c17ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573b4ac9df1ea548ee610090d6a1fe7f3
SHA188d2c429dacaf5c9fe928d280dd710533f62f252
SHA256ba3ef102f23d95e67e54c7a4ad823cb067d75bbd7fbc1733da097c2381b172d3
SHA512cde3b55e90831b13ae52db4662b9a4f0bcc2fd1006ffb504e2eebe614fedec7906ec8257794ab4ee6664707ebbc73478425abc13007475e8f2d6a50704346142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930aa3fe85fa6acb2f913c2859c08874
SHA1a258852a166e134c71bf4e5470213ae0655ab2f3
SHA2561f086c3775f2cf80bad5a953687ae392abb155c7aade111881d6a0eb66f29180
SHA5121ccbf359bcdbe8992fa602f67772ab1ee395c800ea28a779a038bea42d5aadc4ee9e3fc1167e71f3aacf3456c38291ce6bb38896e94dbd96385d288068ef2c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325156ae8755e877a2f4fde624fda622
SHA1a6c7dde6ff8bb88a312f78ee0b3704d7f8819064
SHA2560c56f39a2f15df6b9dbd67e66cfd83b11fd05c8968c9e7ff8658dda20074745a
SHA5127cd8e82bd88b8dad459bf219d85a1333a4658d6a806c667bd8169237c4309e4ca60ff8bc7229bba4fed2a74131e5e0124801b5df1493cb89206ddab6c4d22c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96eb93e171a0d5730ddd68f84611278
SHA1d29cd94f65053ce9de4f21122326da18595c21bf
SHA256ff46a0bd8bd68b52d62c328bc409ec1bb8ebf129b6e5bc9d2011838925220fc3
SHA5123e0abf2292aa822dddd9f4f51c09a5f5e1755cc2f2658dc2838db60a2c33256a238d7b8370a19e10fef29023b9c68177ccd4c57e084d92f56980a4621f16e595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58219a77c833061eefaabb7dc813d6a94
SHA1d1085ebe12543db8c69b2a4c98cda8d4c2a6b6bf
SHA256b0df7e69e8e259377b88d5147b9580a09bb768829c21e057f6fe56a60625f8b7
SHA512389d7329bb4c734d7eec8b1d599be1f15d37226004024d9aa67c73c7947541e4b1cb76fd84d3e38ad4fb77d16a9f6bdec2a454c0618aaf24303670600b46ba70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d76d54194421f99ee25ce2a59df9af6
SHA14946149727fb9324aedd0bdc1b976fd5fb10a50a
SHA25644bfee86e97c4f78291cb949cd3e60d03c5da13f7c7aa1d32a7b99368d277522
SHA5121a2a315dde3cadab8dd557a11af39122fd2ebb2d34819b66586f5364bca6b6425a90737acb729d36cdcb1939f76b30a959ef6d4710331f94d60c2bc0ba685618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552912882d6be5d6c96009940ca94d6de
SHA1023807798e823feb4ae13c400ea30cccdba45aab
SHA256b90148282b73782b1eaf7d6df4307db07d1f5160d6922235c62ffc75cf4d23ce
SHA5125fc7ee76179bab917a7a17142e09b022c8ef35f03e66fe8b9aba465a77f781d70979646d8d94175fab453f1119fa28b83e67cdfead05b59787d1b987df547ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df13cd3829af95989a81c1713e25fe7b
SHA172064cca41fa57858984eee1e0554771ef642704
SHA256f02be12f329eb7ef758ccc7c3ba43882ce3700d965a68b3cc74400dae721323b
SHA512128e7c1220b20dad1f6df16b24be80b7ddebf0dba47ac9eb7bac3402cae175b2a54fd428740b3a7ef156f1125b3ba894aa69ba7c9e9b2bc4f57e8fa68d2defca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511bf5b00050f264771bdb5f36ea55af7
SHA1d79f2187eef7d09ddab4d21e5c7a4ed109efe71c
SHA2565c88e77d27483300fe3d2385b958876364d83844353bccade8df25d796957d41
SHA5122c0529c82454f9526f3cf65309f13f6731fe36a712db2d99116aa86b338d14ac485d839eb9993fda6ff42e254f0eecfe06498d234ef89e22e84a1e8c3627f0e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a