Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
623efaedfaa94e1e30412e6a2a927bb2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
623efaedfaa94e1e30412e6a2a927bb2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
623efaedfaa94e1e30412e6a2a927bb2_JaffaCakes118.html
-
Size
350KB
-
MD5
623efaedfaa94e1e30412e6a2a927bb2
-
SHA1
4aacbbbe93b3658a4284db9c221b3a2b034ee28a
-
SHA256
5b40aee307d4e9be7a8ee9188e4cf1fd4d855232e90a818367c67ab5919323d4
-
SHA512
0a66da44a1bc0d83782bd01be39fa5ff2845780d87fa90759f929bdab39f9d2f6d957f602cfd47eef283e5e94a2146ba64ea3efd16213750a98ea02da3dd690b
-
SSDEEP
6144:SzsMYod+X3oI+YgLsMYod+X3oI+Y3sMYod+X3oI+YQ:85d+X3U5d+X3l5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000008815028fb1eb56cee3918e344e67698620bc06b7a0a7c7b0f2410e4404300be4000000000e800000000200002000000042596dec4f7bce0c6087deba60acb476f7aa3e9df8a2880d8d3fd6c9fcf47dc620000000f53b8e68b43a40af51d1958198fdeb942da8c470123fc097e9ea85a10eea6f584000000049ca6ab4a483f16308cc5dc96cfb3c691da0f9297f0ca5acb6ed5447e059d1ae97621753d8e76b47be1f7f2acacd69e97d8bd9448c6f6313cdd25bc336683b35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a033b77c52abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422439209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A842C0C1-1745-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28 PID 2340 wrote to memory of 2324 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\623efaedfaa94e1e30412e6a2a927bb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52219a5371a967fd60a76e80212995e93
SHA16003bf2407bf55338485a0a520695130fab47b74
SHA25607fddcf6be893e84a38532fc77fff04fd1cf5d798a4e45fb09ec363034c30560
SHA512e258a3a905db844d6ab030d6ad28987b18b2289b03406d9e2bb1588e92027093ab539bbf5648e66acd3cbdc765caf1a7d3b278a093d1108f91f62d6bb89b77b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1ab91ffbd92ecaef1a172b4ce76dbd6
SHA143e6f8032e3e04d1e0572e58a7a2fbcab5981d4d
SHA2569ddc84bb953951da17d1812d5a5810201717ea6d47575826f9134b62c78b8ba7
SHA5124b35078f6a9b8c0a28a5443e21e2feab210e4b9abf957897a95dd69b675693fc7f5577a332560cd0b316f4fed16a4bb4de43c9d6bf27f6f7ce484ec6416413e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bfbac81ac18347263288b8b27590899
SHA1ef4536f8ba6e78969156a784dd6561211f77ffb6
SHA25639ce8ace69fea818e989669f7fbe6b4f0a12616a95ca61803fcc25f7146b603f
SHA512e46977fa39d8c59675363ddc187fd02c2affc5d2fa943a1194cb5b4cb15386710c43b5613e78977a43da82018d0ededb649289c9bcd7b8b6fe68c4e0e21df81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5287514256ed83b91edc45a821169447d
SHA145ee714b2a4e9006926c82d9fcc6d67cd5d02584
SHA256332b4f9ab17928c9b7916baa2d3228f13d211cd6f10aafe03098eaa00fefc068
SHA512bbdb3b773f0833b0f5ba9b35fc15a2699159267992f5e060806090c9d24984c86379dfcbf5649d7e7f65a978b7bdf166724a058eeae57fea8dda657be9a49f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a6a165a5ba783697a9e0c56bb6788af
SHA1712175fe69b38b7d8f54a4feb3fa461f064ba71d
SHA256c93f421952754dc8b7538b74023f2ff7e01b28fc44ddb54e037c8e3cb83bb672
SHA512836fa2a8bd498e0a9c268f8a89b0819ef2eb6c074fd7bd8753fe14affe865084adf9e168c3b28085f4f34e381fb1753b13ee69e0058d5f177cd2b4159ae55377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55115307e77e34ad9ff63d6d94c5a1d65
SHA1c16621b97264c11005f54057050bbec5ad65ef49
SHA2565a72496e68af0624905268435f6d734cd9c270fa784c37a32656ccec7d5820ab
SHA5126ec5ad688e71cb34db63d3176518e6c5bf63f6adc980f38c303ba8f2e1bc6e8a630df231ffda9fe937fdcf09ea9d6e8eb97084dd8846573bc1e76b4e1edbd34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529d655911a7a90f6f8b1bd248fa01c88
SHA12e27156f0497920a01ae9dc6ffd16796479bb47b
SHA256bafe69d0abe0b23e95862fd36f1d5a21fafee348a7369ba40d71a1a7222540da
SHA512315455bd29201fb057c7b73a73c15b2cfcd88888ee9827040eab1adffccf49dfde96952689510bb723da8bb1230faa5c4cc5adc48106448dae9d08c857695fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5732b44af6644cea83651d646c3b11e3b
SHA147dff67b2874754af4b2c23218bcc40a503de766
SHA256a813ed2c9985d8c520c294aa386c2837a4d20d05791939de8ab5a9e195714de6
SHA51248602618cb321fbd30b22eb07a54268b34dfba1bffdf5c70f4cb58042e41166686e5b5f7394f121d9e387f1f3005da9d22b06a4829891434d9bdee49e65ccc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5b5bc8b271151490fa73006899a302
SHA14fb762d54ecab190299b03db9ba69ecce62ce61a
SHA2566aaf94e79baccaf6fa1f43528bd9e59322b35d981f4e46a0f6ad8ad8d7d2e389
SHA512df7a199c78a07fb307e9cd9634646825ee71c9dff2b8d8d0a0d9ec6a003bde5baafbbe16b3d3b98f59219d4ca854d39391a187b8efbbb3b8be00b84d3b8bf003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a8e033d80a8047ae0aa9eca7a82416b
SHA10912e3f3b2b623a2ce3610bd407e677070f82cd8
SHA256fddc09004b5a4e82ec8e2170fbdaa49543f7b154868b14843f5518dd4edbbf88
SHA512111a7214cb96bc1fb9eb3750fd4238624778de51667392bafce4b299fbfc548e4645ac4018e9dae80325d0a8c743e43e18f076e5fe9885d2133cda54d025151a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ba1916a76916e19efa07a423196bdf
SHA15fadfec62346131f325fa9ee19b48fc742830cc5
SHA25683060c645639cc97df72086b984c0b0310fac63e4e3f2c234a3485a53a18b693
SHA512e70a49f6595fc884d098f83e87b9189736e0fe8c82d893620ff4a363a6e027e50a2aa04d0e4b8218f272d1420ad05c9caa518c09144f3f509562552e09718525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6da1fe0bb1ad79fd012b746ad0b54d0
SHA1802154c06bbe252c9d26c5257b19f9c210dad511
SHA2565852d0b0aadf72f021bbb57a1654af392815f2bcd9d2512d3a6763068c6dba28
SHA5121bac5786d7ab95d524696f3d39dc16b0a40941116c3d865842bae713d331348acd6200f1aa485693c5e64107a924e0985cfae7ea79e0dc229d17a35f83d4a21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd149206f8220ec7ee4d07817a0ac06
SHA15928468b752618c51c242ea3ccf9e7a048ffbdd9
SHA25622088be8427dc016292a4934f0e451405a4e9a1e6686c3537bc4e3b315204d2e
SHA512ffc92fdfeabaebaa39132defd21ff4b31a3dffd6649ea9ae4de429758d69c8560cfdf6075babae96926dd78632b22035f733d4a7be81abc209cf8335762c2adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6b77bf4749a5c9a15ffecee7553f30
SHA1581c2159fc5685243bf36250269b65556bcf554a
SHA256ce0afb28868d3170b03a099675741755f5a2b39ee07a6073d4c556e63c1f2e70
SHA5125664067dddaf19665e5d5280ff24344057b1f59fa96d45e5e9fe94d420b1b849895085c4bb6e829bcb2057679cea42b79f86ef2e10d75fec03c3d18f2c636ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b814222f9f23362403a5f7373b46450
SHA1ef0d74ac8a09082ea538e2e751330d3462fef344
SHA256d6b4db1703cc62980085ad70154b417f7160d64049f57b0792de28d23d18761d
SHA51272a3a4480e6f36dee87c23de6e00f78b50475328f04d4f21e7679d5d20d4b3e237d2a1bbce8a2a677f33331c42385b78eb0d9a2e7faa7ef9e89c4c3b53c6746f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d15d6fd1fd3acd82fe44b1988f0b41
SHA1809bae061bd3485cebafc75f8fb1a8aa7dab4671
SHA25621d684ff403e469629a1d3f72254b43b7c6acb678b4ea8ef4ccb1e8f754f255e
SHA5123dabb1ad7c6195af0af0a8f328e27a3e97ab8cbad6ef88bc75699eda042ba22a03f70000a34915b3d4c1c19713cdd9554daa27452342b138d159b574b0918b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c672eef7c68bd98a56f22819414bd8ff
SHA1abae27ee857d803ee3b1f43c8ca7fef9a7dbb2d9
SHA25665e908e2289d5d12217a76a429c9fb7f9093419f1e498349f3eb928fc75c71a5
SHA512919b5416cd749e59408d17ee1178d26954e5ad66552640974fd8807b86abd23e1d7ad954e4cb4bfc382a74dff01ac54815f89ba96d4057eeceb3d4b53b052331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7714df4d5c750eef6214ddf2359fa6
SHA1434aedf96764a87e23d6af838c1d09c6d0871613
SHA256abe1f9da3c6ed501f5c7f53a7a5ba9efd701fba22f470c6b90747d663adb0d5f
SHA51297cccfcdd32acf43e65ab078d9b9dda62936f13721dab988efe08ca91f94706522f0fa0863db54173dde079d7d6a8f3fe2569b1d4aaddd01ac6fee3a39363338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b155dd6756a43f4eaabcb48c6108e6f7
SHA195c8e2a070459df0b414182ffdb6a7d842f15d8e
SHA256e905b00a3d050c588e41244179f0c9e6bcca3258c5f358ad26c0352945fe8b6c
SHA5121fb718ddd4fedff14bbba0ec65f1e5f732dd92d5d084549c063996a1012f15e29923083ac3cf3a70913c6da7bf02e369f140201abd6deb2cc2dbe23d926b3354
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a