Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
6b71743543c4ad42b40f6917bae67af1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b71743543c4ad42b40f6917bae67af1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b71743543c4ad42b40f6917bae67af1_JaffaCakes118.html
-
Size
2KB
-
MD5
6b71743543c4ad42b40f6917bae67af1
-
SHA1
c493936c307cd04dd3d9fffb6cfa65f1a9c1366e
-
SHA256
40c96855ad9f8534ed5e1fded782c211916a91885f3e585470babcaec3b81e36
-
SHA512
43707421a3949ad6b6692d09a712809756787e6a280aa9fd24436ea0b57856a6d01c4bf76a3324bb177dbd78a39142b68711351bdfbc9f190d445acb335808ab
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c3d17c28adda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005990b8889af1c348ad85494a237d49710000000002000000000010660000000100002000000082cedaa01c4a638f68c5ab0a2c9598202b884749c1da7b1e121aecd35e820eeb000000000e80000000020000200000005c90246d9f70aa903367b224821cbeeb764a0b680f31574fe94d4551407ac68e20000000a08aa0dc1df0ab3db4a548ae50c68d2b40ffb88ad7f122b9ea13d0af69475ea14000000008c08019dfe0e54ecc641995537657e628a7928e993e7fa5fa1cd29c9ef511c6fdd31ae0078683fe238effb69b3a9aa1e257b7954d974b7c7dcd73d9fba56554 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422641088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B16CD5F1-191B-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2504 2252 iexplore.exe 28 PID 2252 wrote to memory of 2504 2252 iexplore.exe 28 PID 2252 wrote to memory of 2504 2252 iexplore.exe 28 PID 2252 wrote to memory of 2504 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b71743543c4ad42b40f6917bae67af1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56898fffef78bf0295c5228097d30ef0b
SHA153964da1981aa48136f4857c3050d84375c502e9
SHA256aae7bbb11c9659813cf6c3c41525fa92da8965a70c0bd08a75c42d94a074807e
SHA5127d4b876d4510ac99ab3423c4bfe0cd862234fd7bf5882cc4d82483d75afad450f8eee1aa9f7dce0cfa7ae20b3a1def53c747947907b73e01f3c6fb9a2ef02003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b32ecccf8b364d221e8ea8541c1863
SHA16ef35f58d88463f985cfc3c3317e40b69ae6b672
SHA256820d37d18033bfdf2745d3b5e1d17ba70b748820272307b12efc5e495a40cf71
SHA512c29010c998f5587369c52a0e0ade5ef479fae1ebfee80602ea280d41ce3bd1abdd5feefbae511f6a75fbf5c0e29e4f2a98b736416ebb217ebc8ad134f33b82e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56d23dbec5c28eb323bd1f6496b2ffa
SHA130ba48d304fb14013bebfbc30a7a6a321426d50b
SHA25696a5092e132588fc1af2cda2fa9c2197cc08715792bb82daa78d02594bb1a4d3
SHA512cc3a15c1f0bf5d1993beb1bd3b85eb5e00d3411b75ed38dadb643624e7eb6cabddaccc9490cbc4a4a4fb43f4d04b9fc0b52af76e58d1595501867b5ee37d2aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5305bedc4ad37d27d0e78943ab619e
SHA1274ae88bcb024e662011b58849240abc23d4c0e5
SHA2560e1e2afcf90371a6e58de18e585b56027d8a6284de9731f69dab5d36700c169c
SHA512d5ace167b6b202c90cc4ae7a80b5d9ff1bc6f225a811887c674dfbfc72f3f2f3a9b86855c6e7418c89fbd8b2767b005d50559e65060cbeeb0c4c5dd0ddf267ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75c34ddfa33e9f5040c971dc255d4b6
SHA19048ed84b562d76d0f067bb3c460438650fbfe23
SHA25638d5a82f0c97473c285a00c4ff093661ffff8cc7d33431c7821295056f2753c2
SHA5120853b7b45f2bc5f0bd579f90aac826447c9253b6271d4d80de6e5d1a29c4ebb0b18054f1f3a989409c920869027f3f1b9a1711e72c0f6d744b0db76844d6d52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51959f0d31e1523c1522a7d40aebe7ff3
SHA1e7b519309f7f6b7a53be1d72cd15f76b43f6d924
SHA256b761ca19ec7697f7fc3f2f16b76cbb3ce36fa7d2091891055a8a9b2d257e61bf
SHA5120665cf74c4bae974000ea8c936c0e2d44441e4f452d2a78eaac723fea9d677cc706ad25bcb11c791dd52348c173c142fbf91e2f1ff0e5f00e6f287222db52a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9253f57c6c5d44cb740ad7429c163e7
SHA139a4e8011f979cd8e17b09d204a1ab87c4b884f5
SHA256bd1d71c0516a2ebeabd38e5b0cb843e6f242b70325e952ccbcac0c626b142c70
SHA512f927ee94cb527efc377e03070ee2d397f359b0be9269968dd3c1bdd5fd0c55000f70f1449cc5162186d8f7275be337ed75e66c72f12149d756025f546c84d8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfaccfbce1aae134b55e34cb06f6874c
SHA1928b7877f23d90c05d51079829c2863abba22879
SHA2561c4d4d5f55710874d32c55b423efb5dc741aaf51d3c738291dc0babdb953e6d3
SHA51225419824face462cef3f06464b553a77a1f280bdb86044abea0720f00c75d3847a83c67f9cf3e00f22d2a8d91c2316cebf3d851b7b27b54a26592f6b8ecce082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb9ad2a8d9cd982997a2eeb731c6d33
SHA185dc4de3a710371f6e3f7a0882a41ffc6c93caf0
SHA25688afb2f4ee010748c5e40a6cdd64094ef73bf8b4cd396a874317c69602797aca
SHA512921437cc545e8f0ef5381ce149815e9f5463e7344fe090289c508a2bd4968664b1e25914d2fa60b5bca63b801015c2b0f5411607beab775055dd0382cf34ceae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f05081b20108d73f23b02095945fc5
SHA14dbd2403f21290307e995fe3b8b7b5b6f4135cf6
SHA25668164e487447cf506ab0e5e91582050f5ac3836bd8003af1d7b498e7cbeb227c
SHA512993ea62e7ad31781d51010d6eb4ec604b6f443f0c970c3f57580cdc4ed2303dc0e082d3dbec8682ac084424faa5d02e8e140ee138b4ba19f949c640ff23b0e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51888758dd20a455b7674f078dbb35572
SHA13c5e27d3db7f723f49c33217ca3be79765a0aed1
SHA256ed78e7908b375bae8156febcaf98256f912c55042889e432788af808944f8560
SHA51237dca80c8f91dfbff758112b1cbb7f17c92cbb36bca963815fc62dc156356c23bffe28feeab21687352cc40b4cf8a7a10c0c00ee46390e63a96efc18bcde0706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5749d580e217e45d0f64b0d38dc3ec972
SHA188f51c4cc8e0bc079f79f6cbf5abfe8d5d06cac5
SHA2567f9600d04ab26350b87066781f8dc93777c2822caa395252b58758fb7f4f8242
SHA51294160250a67a43eea2f4bdd2744e3675ee0c2847b387250a85a9956a6d5e69612c5e99ff3042d28d1cdcc31f3c5f94ba58a2a1f2461b816c02c85e8b05686a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c931ada84ec85f083cef53dc49baafb
SHA1cc5ff4bc0d6b463b041031885b63ea5db563bc12
SHA256c6d49de985b2ef98e3589448bb97324ec79e783382ed012d496f6618d0c94a8a
SHA5126c73fb2866c4be696c212d14718773422c3fec5302f1a90691bf9707167a7ec3b82dae190ad68ac9d08e831471256d6bf7041959ed143ade3d603534f005be77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565cb30009fcec51a48fd038708dfa5c4
SHA1e980f93ebce28a49bf96037e4a0c3ecd8636c162
SHA256e09baf6a827a3cc395c28b01426938ee19d1cc5460451530bea1e9efa411c9d3
SHA5126e66b0c2f2acf898c2dbb959f473d80c39d71e01d4e049e892973874c50a4df014335f9d40eff353e6b05fa6248416bb1acb0fe64261c757febe294b1a9f7d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41aca297d74ab248a29a8d669b70f37
SHA1954b591a0cb21eddea8d796deae536eabfd4b778
SHA256994fca53bea3a84a95725717426c7f22dec142255ee0615ec30eee7a29c7a1d2
SHA5125173a8ea5f2e59d114bfb6ed4034659de80b46ed458af29317fb2d1d250d3accd20279bccfd1f385ed46e2767f86349df84d50736313a7656145ca0523cfc243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b037169ae653f40b69c981045364c885
SHA17c50592d7888a837d8aa1fca0e77cd74d3b3eac0
SHA256d7260560559ccbf693ed8a2728867d79560e864c2138095fab19a61686a55040
SHA512508f5fe3346b2724348fc7d6d0837f6926af12bb075cf8fd85d9f61fab3d57ae3a755c1fad27f419d5519d7d904b12b9881778c519b241beea0199dcd8981842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ab36f4bdafec52dc77b7860bd16010
SHA1ce9c2a99537a65a3e550158d1b4a2c63a5a4ae0c
SHA25609c10f0abd2855b2e64804c293cc59ad935526b38b23f81f3c7c6cf29057bbb4
SHA512b56d458b2ab04135003d8e8a2190dcd8a0d89046e5e1f345604ec76454b7599a69cbd821c34579245ffdea16bec8cd33a0cb388dd3d22db58c83082c1d1d8789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7985f34741a7038b3348161dd72cc7
SHA18389de0cb74c006fee499fd01cd0e81c560874b3
SHA2564c14b4474c35a65cb475d33dfc3429860bde4afd1eb354ec54f0bde089090278
SHA51267a65251d82d7807e94bef321d0911396c053948034b0557e1bf0c6b2332d8530fbed264cd3475c7c378eb356a7adff3a83e1b63650c4e726ef270a2bfcb64c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a