Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
62be2e20c261780d80af8227e2ae3646_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
62be2e20c261780d80af8227e2ae3646_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62be2e20c261780d80af8227e2ae3646_JaffaCakes118.html
-
Size
12KB
-
MD5
62be2e20c261780d80af8227e2ae3646
-
SHA1
97172124932f38f661ef09a1e4db8af9aa74c129
-
SHA256
c7a5da8705979ce1075e4644efa27791f461cd748e24eb1a668584cff88accbd
-
SHA512
780621a710348bc06b0e81f4f25fed69dbfe10b0339a8d2611ac8da67fc932e83bb3e59be7470f4943a0f7c75c86e8c7cd85b99f19b641ce7e53ff2edbc90fd4
-
SSDEEP
192:CjbMgBEOks1QTxE6av//x/p8HgdqpQpnmxpsw5D:CcOkjHav/Z/+Hgc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{921D3441-1751-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04296665eabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bfc1baf1a0eb6c49b04a314bc28edb6700000000020000000000106600000001000020000000ac26904e145b0f5063f0945fe7cdafccf1354d581394269a05e155c26344ac75000000000e80000000020000200000009d2ac701b3b7aa8f159533e173d5af639e8225a0b59d12102bdbc8cebad8ba58200000003a5e5c8d1d13654f440a1d95617bb4d5f0087d5993c3e672b174d94409aec8e640000000dc2e33b7690836fdcbb78740bd3e2850944a314e8d461e834a89f461ff18e589e439c7e378d1dc5d04dd76f58a47681df23732f50a5aab6050651a9deed65594 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422444326" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28 PID 2064 wrote to memory of 1756 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62be2e20c261780d80af8227e2ae3646_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30ed4d57a364a2b95d3cd6cc7aa4579
SHA1873c003bf2a2fd1e0ea9b2f5821f36b5b6bbe751
SHA256d1a863ee077b9215a40870e980742ab6971ad3ffa272a7eb70c35a93eefcd69f
SHA512599e92fb9dd8e7d3636cc41b4b5634b4e47e2da1f525fe94d2fdfde01dab150c65b5d26cd8b78d187cad50ba85e45077ba920651588ca1aeea08b2d5bc4d4159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df0a28251d302439c20f453ed61b4272
SHA1d0dea0713cb38ae694f24e8556706695e509787c
SHA256036284142a749ba72349e608ef0cf975d34995f19bcac79a1eb5a6e2b2618842
SHA512107bd0fed5a10fcf69d8ae90ee3060d45086df91ea516e999f8d4b3901001b2fc40e2b3a1601198a086f50921bf42998cea4de0919be490571cf652eb2d46c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53781e775a3d0ce589100546c7b27fef4
SHA13a07313f6151df0af2633dbf5229e911ae9e619c
SHA256f539599b70bb005fab1a26286188fd50cee1b36aba3b1fd492f4f6ebe842b2ca
SHA5126ec157368125b888a5c2fc3541c4f940ae4a7283eac4219ff3c78ad50aeeecb64619e76608d348124d19531b62e888461157cc42eff026452649e6c990a8e421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cecba98d2edf6d59a9d995bb763c1a14
SHA1c9423ff4217e2ee5e6e5f671c25340f9f5665fd9
SHA2568fdb31932f168a14632d4a34df0af4d9b340136a34332a6471888ae2fb5282de
SHA51295972e41d80401ab04238db766a8a27e13f0fac74573a7fd2bf95c994fdeb79b32de345bd5a5f25786c3e845ea988afceb19ea76f988b5ae7df5c15bd06f164c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c0c753b35d20c39e297fb19d4b860f
SHA1d1398dfc093d0d230267d6c6aa0db4087fc83985
SHA256ca08bd6bd00b07b98fb7fc7f227c914ce7229d559b6bd18ac3533220b4064049
SHA5126b7684347adfecc2531e94ecf640d0e284f37449e9d8dbba29d7fb65cecb27157ea0e3ea206accd293d5f0e45a960965f3d9335f89eb359da88a5e1f9cb7074b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a88a87d527ebefbda451f1041042a22e
SHA1ec81783c62dffb5a5d3c3cb46ae23aa83eb79a40
SHA2562ccd3c6c3c67165d911e11b35ec9c26830898ac82cf3b97117dcc7a7b5551120
SHA512adf99c22b7d4da1291f3d3fbd65725ff4baea01d5e98a8b4db2cd123fc5d7589592ef4f9c3097d91eb5398d896ec54f486261a782b744df80ea2be36d652a4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7995a974760856267acf837b499912
SHA13b726cf3bdf561f199c1b35deebabf9df65aef71
SHA25682f320a6563c059bec6bd2339f87ee29781bfe6c4d3274cc06b49144f74a4b01
SHA512b79de7f136951a25b8e10f9d119f9eb1244e63ec23a8828fd20b19345feeb765a9806709fb5bac0f1f74138cd1922d13b002a2402a119b1cff9c9e2a696f5ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130917b14e2556b77abaa9043e21dfa8
SHA1adbda9a8562398711c6a9fbd6e5fd0d696d63920
SHA256d7bc1668b3b6cd635f97aea0eb6613be51fead69cdff2af8dbc7339bc1dfaf42
SHA512c98a4afe7fab2f771f096e40854cfa333b95876f9573492e16b54b9b7f6c4eb1dfaf32914a0da3978eeaa6ccfbe515e18bec27b0fda462c64f113a0f88235f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3367e0e4713f78fae6ecd507543451
SHA1d3da38729b526834e9219d3a96198d571e5df6da
SHA256e6a1ffbed6ec7097d4dab9c1a652366b10ef06aff83b4adb59fe79e3c455a99b
SHA5123e8e2ed0129b25330831ef3e664820e2e49358afdd1b7b76b3c7c9502eb292bbb21119922daa277275becc22e615f4205ba11e53bb8008c11c2f0b4f0d08ffcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f958d98387848788a39fc01bf9b1c7c
SHA1fb384d30cdba0d39e6ecc691c80513152df8817b
SHA2569dd178d01548f68dba459ed1516013e3c93e875d8503103563a99d567c7e6a56
SHA5127ebe449efd6d4339b7e3fa32d98c9641289619d4448dbeda9f4885ce59481d94ded3acc1f624e35f16b334eb0097020b48e9e1bf49ae7662b51a7e8159541b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584fb5cea50f8bcb8da7cc80d8dcc5b99
SHA184957e1b09ad87da7e4678bc67c89e9f40c62292
SHA256bc27b232294140b284c4e4da3867e437bd343e6000cd73dc755cdae5752287cf
SHA5124209c3a9a3edf03f5a49a209537b2224e5f54d3f5922381c61557bdf78f08b8b6f91a3bcbe2770e5fb54832e84800a22b77c2a90aa44aaeaab382708ce6416b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e139528ada0f820233c34071426e3395
SHA1ef17ed09ef6e220810a10b589f49d53125f357a0
SHA2560078ccf25b55f2c8f9fd9d2d87feeb7c8433cf8eb7a4096040d8463edc77b2cd
SHA5125f4e527e5dec3aa568910632c10237964fc6d644036240f4a62d55e590b83a3a92bbde9a50a300342ab9f50a3b15503d2ed36af4d8f06fb51deeaaa602af78ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e5c64cbe5bd309b38938d4e8c38e91
SHA18a951fe5acde1696c3517429d05300ffc4d8c277
SHA256b30e2d669d4c4ff31948a65510c21088a02f664cd89a0b3141596cddb64df614
SHA5125139fb44e83a4477f8a362c92cbca729346f95cd42665ef2bd6834ffa96aa4b8a682a85ab9c64f23c7c7eac884af03863909c492c80f09ba7427eca4f6243db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e3a8b8d7fe421fa7a3f0ed0907fa99a
SHA19ce5f04dbb3f59d746d2e233906070adfd84a54d
SHA256351712ffc26a7eaa547552cce00991860f8d1d762d330cfe63776b83bbc3803e
SHA512f725e6bfb96f0ea58262a00bdb50ff4aaefb214aad3a883fa0ec24f47f3c0c4f35057f30fe18d459a7e4b509d1621edae9f85fa919582a47d1f537c19bfc033d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cead4cc81ca83aa73e653f43225e921f
SHA1d3c5430e25d462347cf66426b34a74504c13e2c0
SHA256759afd8fde8a47350491ddc3a8be20702f87a095a966fe820e35536d1e0e110a
SHA5129cf5d16837e3956364f70c8298115ae67b12249cafa79491d5eb840c87ac7e58685144c9af854ac783ea862d9b1b8a78f12d27568d48e742b4dc95ae0e8517a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f1c0ab37940ef7ff876cfb6fdb787d
SHA10d3a1c906ac830e1f4d36cd148561937faa4d793
SHA25659eccebc06a53981357d08092e2ca6ba054aa66ea297727c6ceb2dc55b2040f7
SHA5124c115bd5e06ebb7fc796fc082a7a3954a8ce536f142c68c6a6177cb2b43b8d90169dcc6f452ce9b5dcc43d6cacbe7ee84cf56b8f29fabb4beb7fdd4f72ca6a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534fd925e03819a81b2922d0152fca1ab
SHA1d15728122e97959e462d889298d610c7d84a62f2
SHA2563fe75ef8e44c06827dfd261fcb96873ced2dccb59cff73a4039ea8c5953dd557
SHA5127b7d6054db5322c5654498bee50d6a20e877f19d555e3cfbd56707010b679b2df9cdc247f32235ce6e1c299364017b089c6ed726980ee9d679e88de520ecde4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f071e6dbd067d2114ef9a08d728f26fb
SHA14f909cfa38367cf0ed477ee448d4c9a29542d9c7
SHA256aea4b50c9ccc5ea64772a8888c10c1418daca79bd9c15c41db83c930a3abe967
SHA5124beaf9f7a13827e98bac2ccc24ab756098661fad5e65e9157291d6af623c4bc3cf03edec8c8907c5bc72adb849ca0e3b95416b3a3ac00a9641f1649e6c657c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5149a10fca1737b31f4e5f200545d3662
SHA1120908ea31ee11c19882fb9c7e9c8741e1fc4652
SHA2565b29e2b4c6158d442d99890c0c336e31921a986fdd552def941af0364b6278a5
SHA5122fe6e7099f0fd6d68caedd1817f06c5da7b5e3444c976dc4fe7180fb6b6c0842cf90b022f2bd836eebf3ed17d6bb7d2153db0f28a1ba283a24893e04cba47ab5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a