Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
641512b92840a85c09b9aca71862c7b2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
641512b92840a85c09b9aca71862c7b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
641512b92840a85c09b9aca71862c7b2_JaffaCakes118.html
-
Size
350KB
-
MD5
641512b92840a85c09b9aca71862c7b2
-
SHA1
03c0a67b5a4b5ad115e2bf61382c5722f78173b4
-
SHA256
478b72a65d5970bcada09961b9434df3509ee0a50dc2b66964c8717e4bcbf086
-
SHA512
5ed5107423b9bc3bfd608960181793d00115127a14b439e0db793769d624a448a23b6debda6fe617189134221822a871e3a3a21277db395d68f60ba63b5b7b4f
-
SSDEEP
6144:SwsMYod+X3oI+Ye/8sMYod+X3oI+YAsMYod+X3oI+YQ:F5d+X3gS5d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003baa1691fefb0c448cc43c48fa26d24b000000000200000000001066000000010000200000005a6a3e7ca4ca017466ff3d8763ae0f173e9513165e5c542bdbdb0884ca03d987000000000e80000000020000200000001f36181136926a60fd38fbd1e8cb0e5b2e8eec84b3bafddb1f8194c12bbeac6720000000d9796c9d61e860ddd08d24158f0ff3556b7f98d9c780f41a614f829ce3ab94a34000000082940867da362ed8fe56827eb8b0946137cb2dc345d2537b24e0e7790a4e28d31110adeec853738f3945d025c554c8d17f27e3bdb5f8653e70486bf8ad29ac09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D32DC31-1794-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b079dea0a1abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422473094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\641512b92840a85c09b9aca71862c7b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef068283d406da7120a568668a7f44da
SHA120e23f7b49ee69a03c183ea8132cb741d287738e
SHA25666937bea4c788bf76a928326b2005aa700df4c50798c1ae47b3385fcf6170727
SHA512fcdf019d60316d893dc43eef2a7031b5237a8144c1005635613457d7ebb1494d4af9f3fa9b631e60c646964288650d05ba78043925d2f0d134ef1db262ff12c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2e74c65cb70ebdf9895e47964e11738
SHA10081367c14f99f469dcb3820e4a44ff6afcf114c
SHA256ddd10e2642a25e47e19ecbbd6d2e5dcb71915f4b65ee552f189e4b7288ba4f51
SHA5122a93d3faf684fe248182e18d4c7dcde5e4a38e08974f512d15f35821f7ee226aad1799221d26d4c547dd3de3ff7e0a2b3cc83a6a966e5e114114e0ead7b8c8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509cacfece516e78b473100fff3f42757
SHA17632b8a1c9fb5540e44791377f67d36b3d8b4272
SHA256de2f006aaa1440a703d684e0bbd5aba0dafa643b69a858e6288270c9c6558977
SHA512da519f33fa8cdc37ad3d2c70fc5ff3aff9590d2a7b3ec612c28ba93527928a7b6f777af12bd7ea87bfa6ca99c8bd33c1b5116777f65b83484e628ba350b6bb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c9036855bc2e0fe39a7f6f16a6cf50
SHA1591029367975e68c25744da1abc0f70586a9771b
SHA256334a32683b2f2fe4c9a58f713cb5291cf8f4ad6d282103ed3b1307443d13a010
SHA512d062e72e43daf2270066a7ea83e137add5cb013d1d94c2056ae4f7dabd16d102dd26a08d1692d5ebec8ffe716d8b117e5fb6ce175f6b4f240ebe48e3547d60ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7eedef94eec087c374d4fbeb3b754a
SHA1f87cfe7885d4864ed567432be05564a957829acd
SHA256f71f142fecd1b7a7a7a54171ea65fef888a18694b003f8c542980bc30be4d043
SHA512a3b00859fe253b93b1418b1d3c81a507d3db420a4da33cf813a0f4c183abc3bb0f418c2c3218dc1d3c1066e3453fb63566ed0d4332b1723c1e4fd0060dca16c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551bee1b532e7471828f4ae51e37a4be
SHA161986fe874d22fc6dadc5e886ed3b8be5b5cdbf1
SHA256530749d61038891ebe1a220fcfe2a4bb495ee0ec80d2493f2adfd19d717300a9
SHA5123297bb052eb4541137582a0c8b15ff2bab845e67b88721ac530c18d9b7c358660dbc71338125057f694ce361d643a0a425e28acffcda53ccf8fed38161e7b90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5467897d9d871fe3e71d253687b6098e9
SHA137d1fac69bcea40ff171c3a7193a53f75b4fde87
SHA2563042f1c96e4848df6b84b51acce9ef197763db332c605c222504c77a1e7336a7
SHA512f88aca1ed5908e51c5f901ccc07ce9cbf825fe7f5cabdef1025bc60e88a05ce14c2a0d74387c2bf923629422335e28961620b69d2d810dd7a1fe56ebf7c3113c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f917663a560a64ee07ffdd48a78b41
SHA194aab25136801debdd2277090028229633c22d3e
SHA256eff87aea69ae12dd8acb7acd5866a2f0cf47433d8821d0e5f4e121f7bedb2e53
SHA512eaae4b5d1300d27b0dbe134be1c201536f95f7e190e9af7f0a4c0fb0704254d9e35c55e87675686683d15376e379793d6726123b6f875bf11abecfe384e94139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f64e297690351b96eccb03d481d8c2
SHA1d331f0e1ed2ba7db2e0feadedeb3ad654b175b85
SHA2569aefcd533d18ce976a4353e25e5150d6c8814d1c2698b85509889542b58a8631
SHA512eae1fa790d98f6088886d94e3ca1f2f94d5af1f3fa0f7bdbf1d892080ae09926cdf11a64d18d63655e8461db394d7e595e94fa10c2844232e9725fe9d939cd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f029c269d124777f1ebfd6fd758c57c
SHA1b94c13996f9dc9bc5da4db6f2329c3d95a676e65
SHA25632662987b8923ff02d50c5908ce0e1c58787bc62521eb29a201cd39167a7b471
SHA512da4d01f3f11807020b154840f62d19b6e3c14534f69941dbcb4322458e18a58dbfe2926bbecc1436fc55b2331a7eea1ac777ce18da65591631c8442105c76257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6633a89a6fda3e2d58d042b4442ec1a
SHA108c4a1f5d2429843fb6561c905d825233c5aa6a6
SHA256bddad1b5f208fd00faf748da65072bb7bbb0426201b762745a0d68d88781612b
SHA512fe1d5942fbf892e4b1ac810fc6f6245bb0f1249350edd3c93dcce828928ee126ccce53391f91afa6af67c630015eaa1bc6c28f9c835bb48228a5497316b929ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ca79761fd85a40a6ecd74d52e6e44a
SHA1b0a2dd5671a12afa88fb5ef06992408103720241
SHA25613c392a4c522afd4f88769b3acd8907b9dc67a38a6c01e50a7cd3d4bc4d3efb5
SHA5126a0d8b572b76c4c0b51cc3f455c9e73bdedac768f41d669fee156638e789c458a103b8275ec5c228b48e9faed5ce4a1f9308bbcd046e2cebbe2faddf7926ee4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d5c5dd3466af4f481fb47010312be1
SHA1548c3f267591f44c4cf3f45f688d528fffd4d8f6
SHA2567bb40f284ae3354ff5c73168b8d75381bd3063d9adc4bab57d99ce80b4a4125b
SHA5126f8a9795834c2c9a21e80fd41514bd6be0a9c281b44ba6ceff90d3498fae044dd8930bff2e853a3734524fa17a18fc53881f792a23f50de7efaf325333134188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df1628e79235dca5266b441153a28b0
SHA1f14d131dd007adeff169d93dcec7b3859e504c08
SHA256d3d72c30285e3fcbc447d936743af2aa7c4e3e333256f46a5656be8d3da72590
SHA512df2319a1d830de0033a196020a134c10033702250f5792ad0ff95ca86d0c1c04484bcdc11ba3ff544e698b4c1b8894b7440a0aa86716f02170925b9c4c297413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5904810a9594fb74421c9eff2bff8dadc
SHA17de698ced9e830d586484a6766e25c7e84cb1fef
SHA256ebb434210041e40536824eccac8c696613975fa3e191c199f5517fa023fbfc86
SHA51224d5cacda02a7b52e1b4596d2ff2cfd5e4c088738735e4bec9a7c194b74a3eb68c58ae9983ec3d5d98eef1c2221102db0aa81a4f14e86f4751a6d4dacf7aa0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529959c14dad702bf1209fc6797538c4e
SHA11ee117e54db3d443b832d778e07339fcbe784962
SHA256117c7a571f28cb6250f6a0571c35e8364ced508f0e864469b3396a47998dccde
SHA5127e39dd34263068d1a5abfd256f9e33780b3c7d03bbe3fafd3261206e2a14b3aacec11060e23b628f559e7650d1fda7cc45b9ecaacf8c67514d827c5d5d4ea3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f83e9570417d9123682906e3c02ac05
SHA1e63718b865b27b8afb39cd2e87135069146bb54c
SHA256ec32b569f33997dccfb96411f2d9241e483c6def72371ede2b964eb0b41ce3e9
SHA512b64840ac3669770bde6a3418da7e6643010223f5ad3f39284219e9b48558de8c0ee371900622e77ea74841780ff8579d7dc28e4e0669101cc3d52f6802205d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5041a8fded64ee165acef70dfb6b62ea0
SHA179b8f521f52993b2b57ac8334c9f24556b6ea9b1
SHA25646f33e5d3fe8b82680d85caba57cafa5198e27392035caa75093751df43ba79d
SHA5127557cb8e0073eb2d130e2593f63d9e49deacf8ee9ac36a75beba5b9929b6cd55bc3dbf84b39892ea28aecef1bfb8b0b937bbccf07e50e9a56484c090ecfff09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b41ca2b11f2916cb806c02ccc1935b
SHA18864056de613c4cb62d6ec7c82294f2c8fbcd150
SHA256a15e728c97a0a92801ca789de291a83710b66da2bb389bdcbe4a141501d57120
SHA512713947c69e6994bba685ee9772ff58d43250fd933f73af0a6ab45b63657843e3eabf137b5dd8d40717b62d18a0fe0c97763e4fff1e7f36c850726e80bb90200f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a