Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
6657cc67781f5a9f0749175987e8be08_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6657cc67781f5a9f0749175987e8be08_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6657cc67781f5a9f0749175987e8be08_JaffaCakes118.html
-
Size
22KB
-
MD5
6657cc67781f5a9f0749175987e8be08
-
SHA1
4210d840bb29d68d1b78dcb886c21f3f200de640
-
SHA256
e5dbad6d5ddbb17ba3c0fcbb3accc5a7eb9afc5767fd6b87b203a3434249efc0
-
SHA512
e7583a58a1351ed0ed6e44b056d5beaf31e7c35f63da170770a549c8507439fcf2969d4aa89c543ce7d7cddeaae8977b5d832734b226e3ee3ad7f8c31c721cd4
-
SSDEEP
384:Cue52631fZyXtKsdJygaN30LhadDr45F3kV7E2Pa/0:Je52631ByXtKgJ5aN30Lhur45F3k7dPZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eed03af263e8764897d660d3f862f068000000000200000000001066000000010000200000008c88080e125a2de25524a3691b76b031d24c7c3b46c79bf3920b2a8df4757dc2000000000e8000000002000020000000dd3c6412b29956220aae27f9df11547e1fd96ead0fcf193c8545cfbce0a3722620000000b2f8e485a0dc1ea4f01fc75e971938d5d2ea185f18e8717b7c212a1e27b2436b4000000040d2f416add693169feb577c9e738664c5029909ae66a24507d71c586816a9780f3cfd5837e255c53e38082b0dad0e328f9e318c9b52e8906021d8e9bdf6312c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f32d1513acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26D95371-1806-11EF-9667-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422521887" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28 PID 2776 wrote to memory of 940 2776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6657cc67781f5a9f0749175987e8be08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c689a3bb422730f7aa16fbf83fdb0d
SHA17639090d7916e0ff5337a9945256053afa5f7657
SHA25613d485309a031fe9705f45666074db337af3af48d30b89e2a2314a8fa05297cc
SHA512c571d303cac6558f079d01f85d9797feb62f255b43dfde9a5ef09bc484e3b1ea27465e195d3c73e712d2a470c703bb0a2990a972af48d5a7771390043c09a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5578f1247afd723bfbfc670e4fe811f9a
SHA1bd0ff9d06ace00744889f7b656c7c50aef077b8b
SHA2564a9069fa794bc7169414a0c190862fed0571e358a0fffb4ec07e359b12b88b6e
SHA512a70bf051a2826e760982ec3640a1757b87c4ca8007daaac04caccef420992089260c65f76af99b93ff206ef4dc9a43e809cfcfe67ef72496a5ae989613558a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58033639bfa9693bd6a0fc0d182c55a5e
SHA11965db9b9d2d1f89d8b21156623de1cecbdfd86f
SHA256d46622984f1f317be97c520a05a505c180c28afd99b880068e2ac1d0f884f865
SHA5126d118154e17e777d9bc06bf56e3b8705e0611fa8667911d1a570ae18ad5e905cfc0c73acc9eb9da36db176160296c838d4868ea2de56c30aa3ee8cf7fe5feef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1908ebd59c42482bcb9257756dc8d48
SHA116553c28df47d45052566a4550b24dde88903ca2
SHA256e0db18286b7da046b47bb0917aec4b6168bcdee7f8da44cd4a30885efbaf5585
SHA512a6db92aee0650d4e0d6236bbd3a25e70557a6e1f0c1584de750b9744e9d9192433a22a8696b126836d8ceaec2ee8a9bed6aaf231ffdab9109e14af0c74d7c188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8eb0decc776c4c120dc37bc3c2199a
SHA17698087dec17272c1cd006f69807b6412da7a880
SHA2568e7fb36877bb752084283f02ee694cc4273f70b3e949e6e2d93ddc35772767a9
SHA512f12d6cfb53bb0e0f5bef995f15802a9939681c53111118edd3b6db054c796569832e59bb0929305b7e54a6c78a40b4b4be6f39185e462504e226fff3361442b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de32213f892490a22d3876edeca7387f
SHA19a57fadd2678491f9559d6b0fd1c34aacb23ac91
SHA256eabebe525fb0edb5f701230e3bbf0298c90012e6b49e0ea7a6248511f1e49311
SHA512b0a706f1d58f5ef185f150185f961df02b4485a2bcf50ce71e98b2ae8bf5191bc2bb520f55b4c6dca0b377ce4624a265796453ddb131b110a641536ec167d8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f435624cc34da98293c757ae5132bf2
SHA16784fc9837a180b37e2a291d73b67886c717f63d
SHA256987e7c88b9283d18daf6863eeb40acbba3a651c1276298254f5e54255c9b703e
SHA5127f901105ff256e0cadbc05516f04ed0214c1397c520832f2ce549f112bf8a00d8af759597030f694688c99a1230f590c4e4f247a6db541aea0e2f14eddf1cae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b26e3d1c1f48fac62a0b5199829eb1e
SHA1b5c1b6c08be9b23b12d9ebdefa42bb231c6b4d86
SHA256522ce7285c91673eaf6ddb9bb04148c66faa1c55e5fde77e2607b4e3fdde8bea
SHA5129bdaca0aba4a3a9c960ef566a45d2bae1618ad46f1f60ee7a8bc630d0452e35e68e2bfe801d77e1b642f241d48b26692d990a3252137d971c27a6b94f5bc71f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7410db91c1011fb3bfde7c8dad5015
SHA1d92898637a58b276cda8dea5799153c1530cb43f
SHA2566bea846687d1d309b88827c3f3b9786a5b51573868e5451b09f778f6db7b4b54
SHA512dd47007ba042e55ed98559b37d5a7f713ee5d2433c0c82a4a060382bcf0eacc78da4da0bcb82f6c94db9b87005c0be3508fd5771b1a63f3344e368f045c00eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2eb3ec7627d7dfd8368941aa59c6e6
SHA1afa8f26a83469498795012eb3b05067e81486664
SHA25687fa2ed6d283cba940d454830aa34c1c71dc848b4a5a5d6d84c4a227c36cba9d
SHA512ed7c149d631cda204862f6ae38fc26c53dc2c09da53bbba5aaea170d60d26b2bbff9c6786aa87803935d1e9f6790122899eac1d7b52cea1c6f4246dc327461da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e8a06056995d9998845015cdc8bf43
SHA15025162753c8e18478ace68187591d8ce69a5c17
SHA2563362c0a8661f86258bb41f9584ba66d626a639031c35a5bbc981f32534bc9a95
SHA5125f10321c9f3502124c1d057666736c8b6ef07e1f76053b383610379756b05275d0140a8d6edc69e0721f382c75e317d8232e68558a90c0c7074d655fd8e3e1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e580bc42050417e58d851000d6182f73
SHA1334af3b8d9c456afa88ed46fa2dc7317a9e1355b
SHA256606268e718dd3a7ceb341726456f660d533d141fb2252cf6b53396b1049f3924
SHA5128b08f5ddc5413e021b9742b4733f59f2071152adb747cee5950a0ae28a44af76495f8c4537869161d50d1fa55bd62332c5b849e58a5ba740b1b6b02b65245d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee9610b35371dd053464eff000f4da5
SHA18fb5c0ed68fe3e26503e824bfac754752e19a96d
SHA2565be7b7d9a9adaa7131db1bbd5d1dc68c9787fda2adb1e7ef32b3522460ce3c9c
SHA512edc368d75fcc1a49d7ac00cd8f60686d7528b5ca9d08db165adef0721cb21592876ba11c646d64af1cb2a8e3fe2888a2c340a35ef46bda4f2b95e544cc258074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da29624359fbff1aeb3aa01343304d8c
SHA1d683f84992575cd4ac409a811f608ecab239c83a
SHA2563b76dcaad70bd9e0c3fb86583cdd93d5283febe868e532a2c9ae4e0ba99919f0
SHA512055773d7dd5642863a5b3efd97b934bfc2e49de117fab5fb91902f3e7c8b5b8e28e6c78cb205b48f29a77922d1f066f1781a22ffc2aef95d913619250dcaae3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59639a385bb67321eed7903f0d9f8e2e7
SHA143d3d0e6c23d86b4ec1e62d303328180cd71ef36
SHA2563e9ab0b5102a9fa6469e7f2bff29dff9dd51443f5df44843f91ebee621d9701b
SHA51282fccf55d4b4fdd9dcfd076ba914a725e01a234a68c31e460a3e95571b0aa57a6bc9a5395391f63b1fdeb379fb40817732fc2340b154aa6672f5ba83ad78360d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212ba6b5f8982df982917d993753137b
SHA1a0b42ca74514cfda62d3c074d54db54b08b3620a
SHA256350a213c6b36e7cf857b21298044b886bfefab5b552ffe164ea7ae64041d2825
SHA51289d5206e2e687472539200e80a381eacee2c120512d1c49f1f7522375a3f46ee020b0fe2411ead1266946fc1cf7a8263ac31765e7b2ee208e5ed071191453fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb6c53903c4030fa41df2a60734cc7e1
SHA1875962f1c122264079822dea8a3af15f5e73bc32
SHA256ad81956d80c542dee5856cd731901ee3beabdfd6374394e23dae25cd21cb4ce6
SHA5128ce6bb2c96f891831836c7ad6e1fd36dd10ffe31fae658f1da2dbf6480e7a363f56365903f131738a3487ab1a2d3074583c105b7d2d1aab49097de874c12a6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5313fdf03f93dc35c7ae57728204263b2
SHA137623a1ad531d70f085d65ea90db9808126685c2
SHA2565e1e1390d9ae7f9324f954293034259a3f9cddb0b52e3da1edc1e9dc9d6aed96
SHA512d608ab0b1d599d6f9d7284c795b81ec8c9b4615326a569de259558ff90eafb7dc287b2e91303a5a35c7d6ad38c9f37711bfa041cd98a0abf6b1c4c37a346c2cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\css[1].css
Filesize636B
MD593bcab47ead26d12d4c0e54b7030f3b4
SHA15e53cfc6c9d441b4efd7c3dcab37d5d9413898be
SHA256608c31426c4ee851c5d8892c8916e9aee5612dd4cc135a1749f5642ece0b2485
SHA5127a377fb6db755e388b1c1c99e79758c5cfd2c9c5358aef846a912c1f4126c62db06a40f174601a4c55898a39bd4c9fa1c4725df194bceca807aae935d98b0e76
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a