Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
67603d48d0845f303d20beceb6e88f93_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67603d48d0845f303d20beceb6e88f93_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
67603d48d0845f303d20beceb6e88f93_JaffaCakes118.html
-
Size
14KB
-
MD5
67603d48d0845f303d20beceb6e88f93
-
SHA1
69fa19840a54b4f76c16a1eee3a186c3ff4d2b8a
-
SHA256
63359649905aa2dd20c5365c3c066a1ee7a31f25245188dd0090da517f4ec740
-
SHA512
4d65dd0f337ca38c1a42ee1a19ad803c6a85ecfd5b2b5c3eafa5af6a0b86d388b62a58d57637e8403042c844d255d4e303e386d547102af2ed1c5654631ae33c
-
SSDEEP
192:UWBy2zRNlNzQTUIVcZuEkgE9H6rj1KayZXAZRifiGFCTI0CdtB:U72jIUIVSKF9arj1KpAqyIPB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D89E2E1-183D-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422545599" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f6dffbd844341444ad8074fdbfdb383d000000000200000000001066000000010000200000004907186854b159dc5bf7912c16eae00731f367c6f5b217fe41352dff38f63d89000000000e8000000002000020000000e8f104cfbd894da8833f1761ef20ccedde1707b2adb9d2b210aa3ff882e882d520000000962d3e75eb9c3dcda88197b1b9d7073590e17346e8ba3899494cc4265cdbc05b400000004e62d2afa44814c96390fe02453411c083910bf758467294f8045bdb3b23f647299f473315cafaa24bd235158704f09fcc0656ea438ea06862a787d060ad5c4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b7ec704aacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67603d48d0845f303d20beceb6e88f93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f9658aaf55ee6fd97cb0013b0b8115f
SHA1b97eef389c803889bfffc6c44111f598f3c43089
SHA2566f9d5231c356ad87ebc6c464c20d22949fd6e48b75afd3af1ca6225ff02436a2
SHA5126ee4bedbbca3edfdfefb4320cf8c17ce47fe299bad6d6f295f53954a944579219271e56078f5e499cfa46a200683046fddeb026241bb52d0eea7b36f3fd8cb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e8c8902d6ce6236d8c54b7f03e18ee
SHA113e5836515d58b981088fb21e04a3ab6c8dcede9
SHA2567a586e125fec58b60ef73537b799aeaf1f8e713b457693dd2917aaa4eff359e5
SHA5123f94a038731598958329e9299e3b2479a548f5333776e32905f2b11e54a8e62aff101a2f12fe5b0a948ed24603bf914a0b012f9ae0a0d4bd3d8d6682326b0cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa52d537d1ea2ee643a976cb17d717ee
SHA128d4bd97c7576c6bbc0e6fb2d3fb35dba1ccdbc7
SHA256206099f096ec408c8fda098b55e24ec091c36b7810cc69cb25724bf32565bb2a
SHA5122d1423da41d5cc58af69d042fa26d3e76982e45a1cf158101408cac7063f3ac547f1a934078b422a0b4e225268d561fbdc019b704809bb96da70aceb3839ab6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54078c3be57fa2ea62825d7f2e3e37681
SHA11758274c78243e2d6fe1978c853268c7eb43ecd9
SHA256b338fbc77f55ab45362abc6c79ef453d24026d1b66ff838e50748ba5d21da616
SHA512248610f7818762404ec229d00d2d736b909588bc812d0a57a28877fa7681a2d776a498f9ca171c62cf29150562a3e0e035cc49ffa7df44dc19dd287e1a46b02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2cc6ac41ad8a1850b8d8b13e3335ad
SHA162d82fbf86ed255f7cd875fe8ae4f10c5d9779cd
SHA2569a3682d1421ffe4479f9b8ec22ff31fbb1206f859d189c5b85b5e133abbb30ee
SHA512273bb5ca809ca9572b0ad80f8827a8d63c698785f98194f06c7dacd2f0715c246d55d844c226c684fa18beb22db24fa6ed9de6d116448248fbb2c7e6a3947367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2c710b395177ea9de1e4d0bf9263a2
SHA1a4e460b6b28c7dfc01164c975b80cab5d91c9c01
SHA256b239a25602d1b24569be8aa5d31d714f1c6a26682c77bcc60c007df6bfad3acd
SHA512f5249ebe8b7266fcc690e30feedef18daa238924cd8966aba8c3b16f3884fddd7b1a713bb8e92e87d7617aebfec06220290bf0aef51f54f1c28fcd1561293965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5126e0460af6caa7cb2c87ddb3e02738b
SHA1bbe8518d0a3d723c7e335bd44dec3782b68d217b
SHA256a206c5fd4333ba20efe0365a344fa841900b118434b6feb6af096422968dd30a
SHA51283ef372004d6219ae65479399dcbfdc0356e68af1d8c1c0320bc2ec09c8b0ff29c87b2920d2d3ca6acfb69c4a4412957835da3da6cb8f8b4a566b8a1b0910f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a329703f9b065e4c3af46a758af5ee
SHA108fe5a0cedf7817077975597d66489ce7b49ce19
SHA25603156e78a49c8a09208ae315f60d63ff54bc75d36781cb53e9674a233a567f00
SHA512548fb1321d458fa15fc210141e7a1837a02d5982ba0867a4b4b8e0a8768491a706ad4906162d9a8be6f498068546133d040233d895bd5336d887d718c0f83dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c493ce011e556626d05714f8e56e48
SHA1f059adb1f77278d34668a9cf467510e4d32bd88a
SHA256fafd06dbdb97dc9cd82054416bd24138684eb699db37ed0cb1c67216c034c8d8
SHA5120083e6ef83e40af81349a137d03838745f743b8c45f718a6e43f2f0bb68158495b47d46b724d3270405d10e4b7902a3c7c4b6f06673eceec835f5302bd0ba305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5362ad130f225adeb26f61b9d1dc15745
SHA1190e36d0282482f93d4eae165ad74fdb598ef2ea
SHA256511131f99711cb8328c5de913ca08f69793c6a78543139111e4ed81c60b42c0e
SHA5125e6b190db10f136b87fc3a019c375ad54dc07b5e2b39968b59ef89d861927d4767f328de78f38a505feac153e292a2d800cbe4761589d73894755fe8413f47d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5441bfdfd228eef966feb0fcb42cc71fa
SHA12ba144d52e340266b2ddd9588911cf040960bf77
SHA256cce2ab98e44595519b735118f4a8a5f0fd759766ebdc58347c56990f20866c76
SHA5123e95cd6342a90920e492fdfd82ffc0f65db95f0642fdd6179e919b42e5cb2bcf10879097b135991f927baa9cbb65b00cd3516c7a607a3a6714bdd2a426310ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c7fc39a94c3413ba09aa4c6f762cda
SHA179c78ac2f99cb77f4a79efe20d49ef6aa734e2e5
SHA2560e478379160a4cd9f36c31690d346534cc452f48754a3340cab228f531d5d513
SHA512146964b09d901feb65fbfa2eb8a1e6b1365776edf8ed9b9005ee9c578c21be53cf25a177dfb366e461d747ceb444834ccbd31f46435dae71c8b0740adb957393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a7b24a0654a5bfc4f1d173a54255f2
SHA15a6a8e34675f2b59adbca9ff0c627f65d0adffcf
SHA2563d9bb4dd187ae680704b75de4e1caf949c11ffc8bd1a65be7b61c3a8392fb637
SHA512e14c1eb9a586065fd5a13dcfd9903a8ef0c89dcfed8fa9ccdf86ece3c965e414f0db2991ba480b1ca0e5cdccb62ae57dc11ad8a1617b8adcb08d46056e870c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39f50b0970a4ed316024eb26b2e37a9
SHA12912841b77113420f027e06f8cbbb2ff66ac267f
SHA256f7bea30a6d5b322c467632155f5cda17b95f32803c16ffe39194905b896db5d0
SHA512d7befc595b6c05f265f8c7b4a642f4755e3fa7497ee55acddf70f8bcf447751588b6df10ab0abcf6f1f730dd72408be7260c30db8d045cb92cf8751e44815e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdcfa1d4193b8781f5b72135d19f1d4c
SHA1401e3b422248f266a7ef3ab4f9ba651775967c66
SHA2563da48bd6f0dac8dac222f35de0a5c1c48581a22f8c9fb850340de6a8621459e2
SHA5122946cef5b9530930feabcf5018c5e072ca1678f23cfad7e15d05b0c7f3e52462baae52684e4ec93fa4d95da4fe2c013b01331e457dcf19b86ba8f4468f09a813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2978abe77b14859ea8b04e128dda5a
SHA1bfbb78ff67fc36247d4232f98999ca8d108bece0
SHA25654a71298e0508c06e53a6d539c60cd57c11f638ddd15545005a6b3bb888a7844
SHA512280a8246b09fb24f897dbe9282471550d89170fea44c73e38f1799884e2bed03c9d3917c5766f2767c76b7c5db5857a5617f9f0cfb04a16aa6ef71c83c2b4f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509e2f9c5df70346d45d590d6704125a3
SHA1b27a00ec070bf3364c27a365110ddbcb3fe5d6ce
SHA256dbbfeb7718dffd13854a76bf984c9e9c32fee0d0abdcec40ad999058f6f923fa
SHA512bc6208019fd70c3edd669f2a7644b56cdcecbac16ae582256d079753771b466be39107d95d828b49d733f38470af490aff1767fa7a22cf1fad92d8e6ff6af15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf4c203dbbd80b527172edf9fd987921
SHA1b348677b96c0c84947ababc289a393b67cf498fc
SHA256fdaa147a9d1f628c56970c23a5b433d0a0f4c2ce2478a6e3ae9c08cf2be265ba
SHA5129744c3379c5bab04d5baffebcd2f88c66986df274d51af19c66fb20ffc80900f95bb539828ebb5e6327106356c5b2c1d245ee2961fd64caf540fc49159b31d02
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a