Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
62717126e3243b19a8da201c6ad955ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62717126e3243b19a8da201c6ad955ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
62717126e3243b19a8da201c6ad955ea_JaffaCakes118.html
-
Size
1KB
-
MD5
62717126e3243b19a8da201c6ad955ea
-
SHA1
c3e2514f055d2d862ee715f98ce158a3d94e8b66
-
SHA256
1b47f12a48ad74217ec084706b44b3b38c1aeb9fb0a6f2d38daa7db5c7cf7d1e
-
SHA512
921e8f8bdd3597a3427a73365a63a8158b4798bcef7c9de60f9ac06ac9f93b0ebbdfd04cb72e8c0d9cac1208d95c5fab94367dc729da366027d0b7ce13008332
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cfab2d57abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{593190B1-174A-11EF-A3B3-6A83D32C515E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422441223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000f2b742e9aac542afa31af425d3ba459d047b9818503b2d290f716b1c312755a1000000000e8000000002000020000000b6373d45ded3ea0fd6d3220cde67511bc42165c271266c8f58cdc85b699e6d79200000000505f783d0ea16a8a81237ac60979c01b01b91ae635728dcd143e3dc30818a73400000004439f06c5b79ba871ed18d04cf8ea570f59189275d53f4998b9db03edda1841767b0efbbb32e2dd3d58d1dd275f84d6aa37a68e78fc75ab24c1035b4edfe3bb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2120 2276 iexplore.exe 28 PID 2276 wrote to memory of 2120 2276 iexplore.exe 28 PID 2276 wrote to memory of 2120 2276 iexplore.exe 28 PID 2276 wrote to memory of 2120 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62717126e3243b19a8da201c6ad955ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542045d69963bd947558f997ce880bd04
SHA1f1b01599ba031c7dddb0d0acf0244b8a61807230
SHA256ecf84607ec2ecd70335cbd77dd1ced5c2af4218d5d7de6534a3c5be485f879fb
SHA512aa29495d36d1e5cf3782f5d01318b5bb02e6c3bcb5f111d261b533684283ed3616a21c771f49c6c4d58ff26eccae9207d76a779abcbc9740aed56d99e8323ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54049d73c5f5a7f9e3b370913a93dfcdb
SHA15b4279e3f43bfccf2adbc36e16e8e63cf4d9ebee
SHA256552c793c51a35d0b6eaa3d0eeb30f2689301c6e77a44542f87a5af575e849e81
SHA512b5dcf7d4df77c25e912e625f1ead6978a0fb70c7ab26a3d898b194cd9c66bbb236655e4c14118afe936b8ab47470dd6d543b778dc9054a527265bd6013fa2107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6124c6c2cf7dc0b151aa803952b5aa
SHA1712ea1e6954707086731c5fa59ab69ee840c5967
SHA256759ce8167d77482a5ff5b2c5e386ed70dd853536b8c3b63bc992bef0a7702996
SHA512e4dd512bd1464c7b593c15abfbce72b1a3b0576d851f9da899c4131353e1a8ac459a31d062528744fd07c7adc5b7cf8f750e6de5a4e7fe7d00c0bee9a191cf54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9736900404bd6f923f1c6a37126269
SHA1039443a7e1ff7661539dc256e84919a39a6ea0a2
SHA25644b81ec9cc2aa51092a804ec65d5325c70c6cd6dc3416c47acdb4ac76c878676
SHA5120baba49e7b958c4de432d8d5d7e3909edc0e4fde894be6b5fd1a2aa51320a3b12343c226c7f3365ad5730c14ea7d77498b838a37c30587fc57648656fcdd038b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e5bd99e736513973916a806ce82335
SHA1093089d964c486896fa55421df8b291ff4f3521e
SHA2562a2f88e045a87205e356c57b434221f4d3fab81d2b5c76114ab43508aee94788
SHA5125a224e8e7e43066df103acca6b9ec907eeb88e2114871abdc93392700b50bc68fcea1f1ca17b78c5ee826eca55fc5431f70863712f5c4c079ca9cef5782e6405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af221255e01a02754a6d51b78ca3d41
SHA165a57cd7e2f94d75c0e9548d74d9088fbf45226a
SHA256c1301218f40dc8a4523a0ed45d78524ba0bbf3fc36bcfa466a8cc4c483f33b1f
SHA512352fdad50438689756f9d00dee06436ff0909fb7ca8b5521b1421aa8a6456076588b6b58d81f889e04936cf1d067f9c8fd35e00c2be4ad01e4a99c581c7622ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58513c9a86e00f2c3ee8a1f73240953af
SHA1881a33cc464f648a0c2741b37f02fdc94f65bda9
SHA2569abf87e73e69a2d7e8ae37162f2f8fac33e10ed22499bd496e51a3f0f13f5947
SHA512561f0a9b4ad4691301bc2cbd68ad7ba2c3a2083545970e2825bd4abfbe65fe64b05283a859e7258f0a599204b19b0f320f5664b8374b68ab1fc33dce7d086c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5649c0e1e2706efa09d0575d6026ed357
SHA104aa9f86ff4ad38e2b5f61e1afc90870e07e3b5b
SHA2561273dedeef9eb718e3fd5460c5e2123c58ecf5df26b41c34951ea016588758ef
SHA512d9893876970acca43c21b781a2bb6453ce4981d48fa22cfb9e1a83d9906569d13faf932750e6e2af8cfd173e24cd1c42909f84f067903c62733aa92b8a61d504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e229a03752dfe7737cfe00e037f2392
SHA1a50f43b0b4242df9185eb036a3a02e7fa9007808
SHA2569297355f43cb1b0faed7846fefa1c0980462f18415d153bd45d0208a182716c5
SHA512d409592dcadce9175c1d2e7c02e75a86d4d2c2f4d5cb08b47a878dbe72f2c5599e742cb721151cf437ad13abc95bca510d65361261015f6215b0361b6fd50737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ab20e0408641e52babe6d61e5daa04
SHA1da8dfb905931109e8043d275e9ae7cf6d7213e9e
SHA256e5863217bfd320c2d19db99100f51046b03e26bac820daef1d392e842a5684ff
SHA512787f52cb8795cf9aaf08fc1e49612303a68c5aa3d4e190914eab22759b91c2f4e80a9147a2306285dc333b652fe83521e436e2c1512653aa5fd4685bd745d25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954eb417099373254bd7d739fc72141d
SHA14cd95b8167ce65907e0893ba8742786e460dedd6
SHA2563fb873e6924f738f88cb2c6fb24d3d62e91c5f63e90e1d4cd1ab0b983c4c279b
SHA5120f38dfa75ce396cabab98644e92737257435bae0edd24183b5ee1f46e6c1cdec5d9434cb34294cd38049c6904113bc94130c24eb055f586f7102cf29a336f973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e0091b3f1e17ba36a58fe537d7469f9
SHA18587aeda0b8cd5273c5812221e42fd346d849b6c
SHA25628000c5373ba242498cb42515d0d2f34485090a4dc6a8310d71430e9449e02fa
SHA512aa60d0da5bd27a4219283aba4ab15c03c50f1e88eb3355481d72ff30a041be54d4688c721349ad58a3a411b5562e0203235d46240031e223275c80b57368d393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535c8f4bdee9379bf5568c4f28b8101ea
SHA177c905526e23665f634fb2b95c5a1d39ee2a8475
SHA25643ca4b6e27aeeb4bb4a7b8472ff8fe87f45f42c205f101f6bf4c29f08f8fdd10
SHA512ab379b2031da4c726082071fa2cc5a03e350805ac7a8b73897931be090f3e718a16b9c6064aabfc5f68ceef125b1b12178c12f1e1bc108ac83374fcd19e2afe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e49db962a603dec557dc34b9f5beeb77
SHA1ab80fc1619fbb300d755b16b6d64b73aa5c18501
SHA256bb03e2bb582790647c52d7a27dbd873900ed8de0dd42755af4ac88e53f52dabe
SHA512744562f993c8cd7b87d5679b8eee05d1d9fa78f4e6e1d820d17c67bcff64fb04b0173a5954b86b7df794be05589d9a4a639842af82fa8a837cc5af35e5dc7662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a66a1ffb6cd49058b630592fa3eef6b
SHA1ebdaebdf3a13fbd9405c924bcd265c88fd5b1366
SHA2564d7591d0ba10cc9b5cca614c52150f775ba45778c4935f202ca4e18c0a7878d7
SHA51223e2d7561b736071104d51e18996989deccbba57d7dcc2f5d55cf42d99da0bc7d6fc692514effb3c8daeb516b91dfc0f2f7f44c87cb7e632d1dd05e87208860a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335968853b5153474f5d057b8063f762
SHA1ecd85052a8f3312069a9be1d8b6df8e4e70d5580
SHA25669d0da3b0a6494dccbc4cf177ba1c279f1a340f548c0f9a85db69c624b3bfda5
SHA512cdd892d5bfb9e9d6600788c42f12df3b92d82c1b3ce1990b67f07e4668a82451624d7fc715ad61aac12619345456f3dfafbdf656022f43318638d63e7698860d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e4b5a9fa8e68df427e2ab6791fc816
SHA1c7a6107d93ce9f325691694c46230823b81e7c5d
SHA256c6ac196323b8993b08e809ce4c1b450a0b96f829ba8455d2af95ee2bf4613250
SHA5123036823f37adf8ca601c75ed3f891ad9a46dd3f06793c8bbdd3917e5d2ea599483c98ffc0db8a1e41f87a60c0b2fa6efbd47844c7768e1cd88ab4684c97d712e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e5c352f0d41ed8447b62ac40bb4634
SHA111da423ddfafe1ecebcb3ee3fe8328cb2d157b27
SHA25668c4b3e8fc7a5fc653aff20c54ac10edba2e850593b5b8ddb61fc6bc494a15e5
SHA5127f63b672ae7d8edf10cfe3d5ae2983eb0d08b947c3d0c63d5438a3ba9ef8434f35f99436e4af049c38633bfcfce7c29a2f8e2d05ffea808b9daf797e439477da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a