Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
63529fbba60498b89090f275842f9fbf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63529fbba60498b89090f275842f9fbf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63529fbba60498b89090f275842f9fbf_JaffaCakes118.html
-
Size
48KB
-
MD5
63529fbba60498b89090f275842f9fbf
-
SHA1
13d63028ece69a1a76a45ee67760054dd6c1770c
-
SHA256
a1f5d7b2bf0f062fdcc37abe98f6800cef1ecac7d3c33eecc79bfa9118d0fcb5
-
SHA512
f07dad9f13a146531b8f2e12a587f82632b6ac9b487dc96ab0d4e87b6117603817262b2929f9c2339705756be8c8ad85bc32ca64eb49739b75862dbdb4236b02
-
SSDEEP
1536:TIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZ20n:C20YRG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14653B11-176F-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422457000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000007524ab56b638cf4e976b5cb1f87181853b6c26be4a68587b2ea357bc9d68c1f5000000000e80000000020000200000008f505390d161d40386b9efc0f0067a4438b8202f0da1a3ba0d699f42ac564aeb20000000a0116e5702667f8cde616fdfb6e5d7489c61a84c8725c7a171192ff6df2048db400000001a4e61902477eacb2284999eaae31ac5e6e4a344a725cd097e644e16d9ca7afeb13ac972ab0749ff63ca739a42546082b4946e69d54b1e6b97c6d300d512e54e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003f6fe97babda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2432 1728 iexplore.exe 28 PID 1728 wrote to memory of 2432 1728 iexplore.exe 28 PID 1728 wrote to memory of 2432 1728 iexplore.exe 28 PID 1728 wrote to memory of 2432 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63529fbba60498b89090f275842f9fbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52effd2a976956fb8226936b820ac756b
SHA13f3827fc9b739f212eccca082276da9d3fa69f5f
SHA256641b69bc4d1ccccfb136aa8c1d2767ccda51ab0676e84489c16c01dd28e00bbe
SHA5120e8f2be626f9612aaed960389cdd9ca781892f92a8ea1f478d72f8060ef9987d1b28c0a39aa1874996e92d2ee7607605c60b3aa2b7ca121174d223096ab17f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd48097b7e3a872192c434c6a0af70c
SHA1e6ea5dda5650402dca0c5cc2f28faaeb2ea2dcb2
SHA2562d4b7229f28ba1f43af12ad12641c42d388d6ec671a00062c4b2c97228e17563
SHA5127ce72fa06375f2ad9a389fe2c318e15ef374d8d3fa90a9848c4d26672fb538e0cc03fd1d643ee90c142184e2462735745132061d336b1c604144d2b5f2de5cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f731345284ea0f327e7dcde690e3ad86
SHA10252c160993c0b8c71fc967d078261941641da95
SHA256fa6aa75b7cc9010ce9fc89424efec39d3a461aa1d543a51db7b62524b62f623d
SHA512647d3880d7fbcce55a2b1d4884573465bac33c714b50132cca7faf536cd613525e90a63ba83b17bbf3c7407a2d32c9c54594dcfcf40488974d52fef126146f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e11fb4f54e7257215f4151d6e497431
SHA1a914ef346a7c00338d331311df72b4d9ebae700e
SHA2560ab6ad7ccec0eaaeb35a4889e24410a28e932279d0defd1683dc0235aefcafe7
SHA512219b5aaf6c5ee9d37a5bcf83df86705ccc9bb17fdfc402204b8d9a0610238207afced3ba99f2c456ee7cac9e865bf4465fe84562443fc0a596db679585c16157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a42ea24552bf2d29b399a6cbc8451b25
SHA1015a39e73a0a24f7b1f6948bc96e2f2a961cbd09
SHA25659f54751fe5be12878777d9f833ff864fc4cb001e0a0a56d8ab0a7cfc6911682
SHA5122421ced97a59ed508206743cf8c3bbd7ea90a9f044570a0ae933b583f15b9cdb184ea8c1dd43933c406f9e416a1e03d5efab19b4a71ad7c83067528f34ecfb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c56603497ebaec32cac4ecf7d4b5b8
SHA1fc6d4e0a9f87fdeb4024c357eeff078a60d350d2
SHA256851d3e2623e4a3ff5d509d715c140ae6d251387b60c7e916c1d9dc2ef629af73
SHA51266e3ecffe81822aed1adda4724a1931c27bbed69acde06394b3e30403abc54ce5ae6a342e0a46a57ed7dd852b00d38ae6b55a013b37b680cfa9b1b5cb74e62ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fbfd526b5b73ff2b74eb1fb439d39d1
SHA1d3fd9c90d947e7bf9d24cba1945168c51b29c095
SHA256b26e449a0c10d4fcadfe4ca5d3c0ea9251c5abf767cffebc94b9cd63a8436728
SHA5125e07be5eb7c74304d6f3f989056bfc2e60e1818ed1cd9f350eb83a76b6935de656ea7342e37b558031d8105affc891cc0518b4f921bd6adedadc9d4de10bb2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46b89606347ece620db65623fde868f
SHA1d9867424b6d81a6147c527e5e6bbd4ddcc5774ee
SHA2562c419b29b576c4cebe6aed03a17c8adcb4fe68efc5b166c8172943cedb429aab
SHA5126172b5a119f5ffcf98fee9d2e5722192e8ccbb878ef962a66f50156bbb3fb1e5c9baf23baea71c0a74476bbe74a03ebc75de35648d648efad017ee823b596614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add03438be0a654bb700bcd990e63434
SHA1f8e0c44b8138e4d317f77f42f60ad878aa5cb121
SHA256451ee1c7434024c48d2e15c958f495b1b77e86898d7a8e14df71d1766ef05232
SHA512754ec1911a84efa3ffdc7ea7ac30e6ab4b7bea4ab1fce609e30b1d9c6da815b90413818fdbc242a1266bd1182ac97c006093b55752ffc6d6e31eb196230b5028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1cd4a99f3688769dd40dcf7e92dd32d
SHA1335d388057dc87cd368f70f734d5963e0b1a8f8a
SHA256ba00ea4ce1c3ae370eda608e51782d6b25db624f32138dc5c5755023d68cc904
SHA512f10629535f419f6261ab4c9dccda147144a6d368ea5160c4ccafaf14949073a6e4eca4d15ece67bdedbd246afcedf6191dc66a26c5bea0b9eec0301d5b3cdfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907f27b01d06bd58cfb743aff4f4b689
SHA15a6485e03ba7517a951c6ae086714092010e67dc
SHA256eb29d8ff1dea7a96fc719fdb27495a7bccec7fa0c61f43a7d29bb1b68f8cb1d6
SHA51280112f3a46590e3282a896260a1ab62fb90041f3cb9aa740208cef43f9813e1bbf303bf2aeac15551172c0ebb1482862375983116000f0cf92881fef357202e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d30b39b389dd7d5671fdbfefb47b1b3
SHA1623ff82ae40e8933c5202676e2acbbf909bb9795
SHA256a270b648a9c9124fe4bf62ea92c79cc1e085ecdedaada98b4d60db78422875b3
SHA5125613ba7cb7344d091c8314e02e5bebdda0ad0903f28e42fe8eb1a7c2c4f42995575f01475deb9eb1b8f81571f01b91894349197bef9de5c5247112b8766b7b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d02204a77c21d757cbe084192ac134c7
SHA13247cffd2763fa9f7b3cda24f2b6933bb6565212
SHA25621ae3e9d32ed42a3d7420729fd729ccb98e9c0b91ee9c83d2b62b91d66e8d282
SHA51212b43eb545d9be5a2466ad90119240988589034f32fd6533b46d0bed64c02f82b3d20022f03db5d877baedf3dd8d7c3433c45b18814428b3b707d85aae29f304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555425294b9a56b6f09ce2e312dd2ed9
SHA183f75ddfffe2a9ab688e99832d89b2ca60549f54
SHA2565964dacb86a305c0ec7f245d3f2ec34f803475c4989656cb27351997d24d9019
SHA512da01ea262b4ae800e1184661041ee99784cb1fb7ec37f005ef9b23acea5d96bbe7868023e1fcc34a840a57f6d63fe50733120d72096401b9e4892807b750e3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b803e33dc7c62f430ba70a6d40467f2
SHA13e1da4ed84920852314661d02ddd02ff029a83f1
SHA2562e93e7db59df89c99a170ad6c5a8829277db0f168c1ca010983bdd4cd316745b
SHA512d5493db689cdbb3413259bf59ed889fe1e3be70d4fc8e257476a67c658b746de040890f7ada949a92a232e2d5a70c538734e94ad19a836f987b3b922886fb431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD525b782091391c0013ab9ded522bc3b52
SHA14e2a4e6ec52dffae8c37417914ffd3abd85c16ac
SHA256187c856a3d52b3ecd009dce02badbefa6cf9790b43f5a4bae4fc937de77f7959
SHA5128da03849af7aeda86faaa7cfb2cd4a5ebe06b05ea9f4dca05d0b72583fdc7db6fb7321baadc29c5939c6b0efb76cae6c562b9edc0b61ab0838497c4cdc61fa44
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a