Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
686e9f670c28d7e6002765435cb8f75c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
686e9f670c28d7e6002765435cb8f75c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
686e9f670c28d7e6002765435cb8f75c_JaffaCakes118.html
-
Size
4KB
-
MD5
686e9f670c28d7e6002765435cb8f75c
-
SHA1
8cb493904024b749284fb9c29b2f4da60d0161ad
-
SHA256
d10dc2a0e890887c2f3245e2c7ef5abf5311926edfc7e292dbe6a0ebafe90409
-
SHA512
5a4b0c6d366b237b715226db964ae14357a53241d45d863a388dda380113a2b12688f8767c45e8383075b7f252e60631d70e2e4107d0ec34880360df3fd0fda3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ojd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6020a58882acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4253401-1875-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b332d3aa9e0d904581602b4924d6d8b100000000020000000000106600000001000020000000581f352a9cd4ed7e1a2dd3bcf154bd77cb206ad01def1e39a8f7cc18ace9e2f6000000000e80000000020000200000006b22e2e4f88c8b6bdf0ab60bbad94346f7cb23b1fc37c8667f34696a04757bbe20000000bf99308150f2f19aa6c1a8345b28f235fb224c8508edf87427da330c654a78224000000018e8e9de8ffd90b8fc16abca6a4c6d4737cad16c945b15fcc63c1b1860d91393289708e76a060d6e2b159052f892095df05cb5a1f29eb8717b8d77a9398686eb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422569796" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2860 2756 iexplore.exe 28 PID 2756 wrote to memory of 2860 2756 iexplore.exe 28 PID 2756 wrote to memory of 2860 2756 iexplore.exe 28 PID 2756 wrote to memory of 2860 2756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\686e9f670c28d7e6002765435cb8f75c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57829e1d9149214f4ea96ce09f657c50e
SHA1bb823c7f2eac6dacebb2ad21bd2d94e3c5003a73
SHA2567c8c55d798ceec3162e0d91e22386a0baf1d8e6c77effd7518bd6053e6d76922
SHA512318a8f61659127cf509270b5f02b79046d6eedf528cc457af3f94d6c7fe6ef896def385fb410b522cfe1d8b2d002c21825a9373674d50d2388b6ab96ddc04f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185e042735d14521f2fd7debfa2d4915
SHA1be2c20f1c4cea25a3ede506d06f3b61f0a324c78
SHA2561a3e99ad695f2ff13f0c6a044ffd387899fc34d2d264a727701e50a273a19d06
SHA5123eb88d0a5d6d338b2244c7030271434f4e4585d2fdcc29c1d95f69740d2bd94537ff1a7a257ed32a95f4cb63dac0e016b6a60aae3e4bee0a33fb0a0bbbab2d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c6dbb67eba495a92c4b5841ba4f86a9
SHA11f9930559f877b5666f036cc6b09c8e2d8b78ec7
SHA25622b0ff0f0852db44cd98631b6a3e602b5c2d02deec5c6e65810643846dbc3db9
SHA512e188da60a7f3d935d81d10132f9be54b4c1fff347b59a9b4f91f80adb8da850dca2fd2090ee8da573a4d4309392f203199434ac39d37a0dd5008d0e04cf24c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c5aafa1c8d793b6614183a1df2ac8e
SHA18eae6f75e6a1b68033af7c0d21e09724b81f5c33
SHA256944da4b71e2765fe60a7d5b86b75b49745ab9d4337e4a256120615fa1018fdb4
SHA5122b4b62d263f34dafdf986592b577f9b38d72e7936a2ee8db8b3e668ae75aeebe0a59cd7ec565da6675095cedba18a946f21bf16616140cc5417659884d680c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0bd949448c32681ead2b24b1d38af47
SHA1dad03ad4a1c909433248c8cca7eb01d1ab758d66
SHA256b240dac3a95efd095ff1b9ae2009310e79f21b309c42f2d096fd88d885e3a77c
SHA512cdf9db57c4cb6c5010b2ce543a9ec2b7c4c8bf2944bed2596161c4d3d09323b3ee07112ee56a4b0ec40aec5acf076f292f19af54266f2bdff40a4b62fe108d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b37e7668f8672e012cf9c0970e5258
SHA1901e5ce16fe44cebab95e7c2b8286f22c2ff7ca6
SHA256c4d3835b4d5da7ef47d11e713d949f838a2ccd0ff4e75d926fdfc8412b11b3b5
SHA512befab31314589cdc560394a523b68037cbb82eb530c2b0fd703277b6b6155cfa07a73d63cd296950d6fa1f7f928c2263f3802edd273d3c41cd72665944ce3d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537675ff85773bed8a9574600ac352e08
SHA1ceeedfb58abceb035a128f2b01318b8efb424476
SHA2567d1f14227a29c23a5e884e2722da7ffa38c0f019c0918ce14ebdc884e9041e0f
SHA512f6a19a14f04438edbc9e2ecd01740377e5cc41cc076f7340d763585679c1bff1abaebd3af2b45f03fb02e4656884ca5e57e3aacd7342a132a65d1e5b6f3af736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5d5e795d901becc7e67cb0da372c97
SHA1f20a51f8f62d7747a0999d11b2941f29443bd03e
SHA25621de4b8cf81513865df85c4e231c6cd8aff8286cd460e2a12a6e16df41b25744
SHA51249fdfa07ebdf006dd7cc565e3de33992feaf4bd12d388ddbe260c15c93d92c4a0b5bccbb5284ac2464876a26a93ad53762eb41fe22c3aa3a125d9f6c3456ad33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638787a1194abe51364f249e08bc2b39
SHA176e9749b5c08435cb4fa3cbacf702337f2b79a12
SHA256c1c62fdfdb07703a8b6cb2a6958d2f1114e4273b137cb129092ebd9428a95258
SHA512eb54dec0163f5ab8e2b2348fe273e8b994cb7582b781558b3199256c6b72d162c3cc2f861bc51011060296b85ac60eada6b447676b9795462612e9248a5581c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b8b3c4156b3a8b70dba45be91fdae1
SHA1f17683fa6f5ba0298cec884a8f93a80eb2284588
SHA25667e81a64c0fea97a037983296ea6504d2520a2f7c1bf82e8f548546cc4282cfc
SHA512d0b23311d1ed374af9f048e71dd077649ce1ec73b6953b8d434a906f51d7a74cfdd5a6bb8f0ddd5e2d557e9fbca25c6723d2e9426a056b32a43450e859f91438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ee44dffbf31d5339dd5c82d9b656927
SHA1b5201c3f07aa6df177eaeb92d4e761d5a7e4c5dd
SHA256918958c834e05712f3293d373a01fb82f61f7d2aa76836da21479883ce7991aa
SHA51237aaf932725a402443f485f0624d9d794fb2d1e6cbc8e75acdedc0fcfc4f11e9eb935eacd0a25156da195ceb2095fb890bc7f2de11b965e73ebee189e5154d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab790cd174d15e5520bcb4287dabcaf
SHA12c06b5558014bcb7900f9a4b3d7fcbb99bdcec24
SHA256cea6f4fc8d11bdbc5e4c68f9a6b8805ccf4817c032cb2fdff9b313c63368a0c7
SHA512de8eda4dfee034bfac0641010ec161b93205304ca8f7cf8789e85dee20e720d0c1a44b3296e19af4b3c3cc0564a0f39abaedf239092fbaa1e42eb9a85f73a03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590df638c7337901e500ee2af4a83318d
SHA1adc2b813f088c4013945da22cba86ebfcbfd108e
SHA256001c6dec9328e23eae8926ebdbfa283e25d5fc859ce56c2d2466f9c1d084b25d
SHA5123b9dbe4c7716ab24a8fc269cdfb4445631e499b26eb79094f30ca507f75beb6dad8e27bf3dcd122f3acbff595721aa87ad55104378ecbfbae5d5bb79fed6c77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9911a01ac9a4141cd66a894947e6e83
SHA1925dd01a480805a046cf67ad99b0901f34a77745
SHA2563368a6f0d0815e8d7240d57ef91e6b2e96cb863067b42a92e879f6cf1059135b
SHA5126165a59d07c27959e0577ce80558ac0a568a28250c4bc0e3408db415b7f2d53e4ddf63ea5b5b4ec26ca9e7a1d22efb8f25c88a1329c89228770f4d97738c05a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9669d6c87f6abf69870d87929f3e106
SHA136ab4c0a937617b49e17620cdb7fc54073329d28
SHA256f17be122500190416402ecccab27211c47a0f72792e86b0f7dca787efa7b84ff
SHA512bf6f4afaab8649560a6d492f419ce8629d1ac09b2de8d890a1fdf3c2fc10522edb9759754fef9d40cb311a15e307a8139e10f64ab7250a07d72b488f453153e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f288b06841b3ba018b78a2d2ef5f009
SHA10cf5ac5b84bf1d8bf0f5e3213d6481dba29caa47
SHA2564ffd9bac9e1247af04ebfd101ae939e7d33fcf0b30d94d4db297ca9aacdfa698
SHA5123c02c4f29451730693a4ab7ad2fa007a54ac164ab6d47dee34ab2fd7e9e519cdf6d8f795c89c160d59ba2a414773fe97f3dafb530bdad84634e126d5e0ab00e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546552fde5fc4ca048b579368dd7fa3d0
SHA13ed61b8463b25f6936c8e07b773401f58935513d
SHA256fbd6b9b8916ccc798258bb62b38401eb64b9784f435af9d2c63a7c24a7fbaba6
SHA512526ab9f45990cc44a92341518c1eea5709f47d25411f5d766e4d4f87d65fa607ce559fdbd0a879667e9806a55d06b71b0feaf3d0f79e3fc1d9aeeb2767305023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5137ea076a7788dd1f8d3acfbb860306c
SHA1cf35399ea15f4b2a3e10a8027595bf282c10b687
SHA256c19727afacbde0813e1ba958c73c59fb888ab932741c73b990b66c6e5d1e5acb
SHA512cebd2b901511221bf2df0c585cd4073bb852685516532ece9e0c9b905e79428fdac712689655a68ac24069eff8b94ca6050419bff755860e4b0cf6ef6b851d4f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a