Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
68871bff031cdf89d95d3fc8a22dd201_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68871bff031cdf89d95d3fc8a22dd201_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68871bff031cdf89d95d3fc8a22dd201_JaffaCakes118.html
-
Size
14KB
-
MD5
68871bff031cdf89d95d3fc8a22dd201
-
SHA1
f873cf085ffe3ee720cc357f8e622193c1ed49da
-
SHA256
ebb139a34aaa450fe586181c514632072a556059b5bd265e0484890fff548b3b
-
SHA512
17f85ffd02705eaaacc9ac957bf0db9a247b6cd0daa4ca43e919ffeb6ca35830ec902331b4a1e90075d231fd53d400c78d1642192d4d406a248e5b78496f5601
-
SSDEEP
192:hXIOEuNn/BAXm5qOdNFrAiYvxAj7oLNYi2MYzpLlCe004MnIzn6yDe+xt:hXIOEuJC8siYi7oL+LMYek48+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f62748583f93b848b01fa00fa282d9d90000000002000000000010660000000100002000000063c0e7308b7e8567c0cd28549b299eade09448b6c954b1c12222ac402677e770000000000e80000000020000200000002ce9650acf511115c4da8bf009d96e127d1df5178e4d77b50cd10c5d6ce0e0f4200000003205f264f5d49534005a8ec19bc9b625f30ccd27aacbdb4f8220c6dbc348319440000000a8021505e4d5eefb0892f9a05632e6c631f104a54bd799cafc26e38068058cd266856f6c3defe9ef10eeed82ce5057323d21c13e615b3bf3d8011ba741194d00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106d230987acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422571718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C109641-187A-11EF-805C-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1912 iexplore.exe 1912 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2704 1912 iexplore.exe 28 PID 1912 wrote to memory of 2704 1912 iexplore.exe 28 PID 1912 wrote to memory of 2704 1912 iexplore.exe 28 PID 1912 wrote to memory of 2704 1912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68871bff031cdf89d95d3fc8a22dd201_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5d8e0e108bd3225ee4823e2501a9c59b8
SHA190ee76ccb7a8c1cee70959c25f1cfffcb399aaeb
SHA256482fed17ea597c86abe64224786bd51836c64071c1047ca970c09ae96185c1cf
SHA512d7bd3501cf8a9a5d1f8cc34c5bd88af6228f40c97bb48f58cdfdded4775769d215c8029fb9fad8cfb27628e2550092c1bd82574f1218540c4288da141d581d48
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD502badf1fd8ac9b1e0fd0b672cfeeec0b
SHA12fd11aaf9218875632374ed71370c1a11f8c8dc6
SHA2566c96f14aa97a0379bb16cf749c6195079ac4d812ea271facbf9a3927dac7d76f
SHA51241a2a6697332d4ea07e13d056cf5cb39603adbf9badceb20af768a351c286e0b9258f5912000055934e505f8b37e56853b2936b8634b78def7844b2333173513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51536a908a47cc68e9ad05cf175adac8d
SHA121ae579b6a5aaa026a57edf1c001be2630366b54
SHA2567b6fc2b283e8ca7fd6ca6bc269414ca9fd4550568bd5524b52be04f0f46823b2
SHA5123b197c5ddc925d78ad832ec24dd81381c499386b704afed12009ae06cadab0def0b00a0d754fcdc93df1fcc4f561ac2e3bc96c7464531a632647e4b94055b9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae935cf99282218339ad70b320cbe2c0
SHA18bb06df884fedb4dbda4a21c593b1620108b167b
SHA25688f513a71ca8a1fe1da21d13229ffb63f622d46e9cb810a577f4f71ec75d6d3a
SHA5121753640b40249ebdacb2ca5b13a99d47d48a27c60662a05379190866ea096b31a24f7bd2121487bafa0d85c24948799702f218c6f90687a1fc174384458cba58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c1ce13dc77e3dab6ded96402f661b03
SHA10233af3bf9844287f4d0486218d250d8da127d94
SHA256bb29fa00015fea7dfb209e46d0d12f170f0da80594546371a5ff4e5314490f7b
SHA51217f83011597425862e6c6d04b7d32893b7a9c5450b83cfba09042b31552c4bab79d01eab6aa3e626c963713b05ea869fd83af5e8837ca209eb831a4a669f3aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad6281966191dae705e22520af6d3eb6
SHA15e716065898dfec59032aa276d920c953136fbed
SHA2562fb52b30c544a4ed6f3287196f3453576c30365b084550843c72afac840887d8
SHA5122b34b715128ba39882b6502793d254ff81dc40c296b527d2245e7938883dd2df5ac4f085a08396f2df6e1e1db82adabf7f842972e56d39f4b743cad67468ae1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52071bc05e520789e7913588211686c27
SHA154a3ab39bfc0663643254bb692c3e86dd45c2088
SHA256d3f64e70746d8e36f4e02495e79bbadfa367031cbab7c54b3c5b28ff702aca34
SHA51294c1f1f565677ca199fce6aa8b7e395ab7560ddf9e9a9af1454eb4231ed91f649178b79b9f2f1f11d667343e3429b95f42169093d482c85972e488d1ffae1f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b69ab6ecf3a1058343ec642737f3cda
SHA109cf56f0ddd3e999fbb7b67c3aa95ff797736928
SHA2561ddcab9ced635414e2684cdfb1c56e73337e51c080335e0622eff25b662f4281
SHA512bfc1bb6e4219096457eb3898bd6e237694f08d14864978b2383ffe978453117b08d9b7d73b9ac91d65344a6d48091af56f21fd69903a1dac02bf4cdd5b2b01d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f853b0d77acbe216161a8b77ccfa4de9
SHA143a486a1b1d3ea6c06566a32b58aa6052ae9530c
SHA256a9dd56d2b565b0a170c834643a7e238cc1a8ae790daf8484b4bfbcfccc2d7cd4
SHA512668f48fcc7646d6478f8473c362b4b38e0c671105692178b652d0ad77e7b3fec44038d20f594b2cde4167b6c7b324507c8699394878c6f24f655a6fb447485cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c9f6be26972dcda907a1abdcec0a85
SHA1239b6c58e6604eee1fdff896c1bea7b045afd261
SHA256274c0a7bdc5418a4bb41ea3b2bf5b75ee8585f12ec72d0da69bd3bde7fb5fd37
SHA512f0f736d79cc413688dfc3152228042897bac53aaf74f0bb4d2b2350c6d158af81fa1aa85cb392b92c72aa4c420d8e761fba3cf9dc1e98b6a50ad0e8e73e260fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54922c2aa8b1fce1700c291a48d03b98c
SHA1b32b18a6cd806f3bb5a9f476f3098865db69cf7b
SHA25648d29e0dedf01445682408aa4cc85ec35640a28ab2fdce41c40f63d22babd755
SHA512f26b8f514b239a7848816e62ab7bdc54fef2c3139a315ad591307a5d08954659664c1d05811b5a80555b8a9e36c25c69b4523161d9a7d09ac45d7917c413f7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ca0c2bd7eae520d774f87f0e336671
SHA147a33d0f0ea1c8bdf79b0cfbfb225050a9506e78
SHA256705eee384ad724fee93c286983fd4533c02846f86b61a47782cf59a5e737b9b3
SHA5123fcc12dd3e3a45f31d0cfb73eac10d7c41ff4a90bc890c4e0aec4606c79faea6bce4702965bd7a8b111278f13cf7c0ec2cf9d6fb495c5b352b72dba0ac41054f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ffd94039ed6d502b9a5797c33d5accb
SHA140572878923f44636ad765007282799b21c64971
SHA25621a1a1bacd5ed7b38cbc9446fd822860122973f122a22c78382604d050b375c4
SHA512bef257776efc51280560a33233251c3b923de4f341f800f7d038c7b46f9e7337e91c04114260a9df9e032313469343b06065544bc4d54289cf473285ab284675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543fddaee82fbb1fdea96f4b791896ea1
SHA1d29178aa36a415e41a603a8f2443dd00ff39955a
SHA256f6f5f096dc01af86450053e7e54f763eaef0d1bc076b774ae349ee4d69758e90
SHA51282278942dd92594bf1818141e3a2643d7c31534efb089aa4c74986fda0253d3e29f136e6ddb9abd8b87a7a8454b5d1933da83ab639f37380af4fb4c5f574fa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cfdc662799efc30cd3b829ea8897df
SHA18dedc29fe45b0aa5eb82f5c2ebad0ecc25c4ed43
SHA256c35d8eed85865417fd565bba45fcd25231feb5eb8c5c2802988777c3296e54d6
SHA51283f985b412eb2742a24e2708d694b85fa1e3d792027b87cefdfe96032c40d69e7a90e9093f370abf24add091cac74e6a044a7e2dd750e365b5a3f705a9e23c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e420566df370a56d4a7dbe15505ea84
SHA14922d47558cc0ced7be4964b0ba4af7db1c566e8
SHA25686acfca3430a49cdcaa13a2af6a486d04ceeb7d302914fd892733a4d4c09d38c
SHA51273e626085a341c624c37ab4c91e13fa948e9b76047b9bb8bf3f748e7aa5c51f85bedd8a36572ff0b6e764ddbcb2aefcabbc1b5f04e54141c0c333290d1583a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fd340ab39161d1b2392732c26214f3ac
SHA1f84d9d9b54e1a2729a2e68e02f35b3286c21b7b3
SHA25643e8c189649028ba8d13d5b676f3cb30dbf1ad4d21da6011d245c4356c4d2420
SHA5122cbcd2367bffa7e9dc6cc3da931eb4a29af0c70a150851e4571b3096cd78c15f028dc588701648ba54882f357926eb2dbb6a2fc723c54c25228efe774532b50f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a