Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
6bc4677a2da4ddbbb2fce9fe4a0a48c1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bc4677a2da4ddbbb2fce9fe4a0a48c1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6bc4677a2da4ddbbb2fce9fe4a0a48c1_JaffaCakes118.html
-
Size
59KB
-
MD5
6bc4677a2da4ddbbb2fce9fe4a0a48c1
-
SHA1
103f23f496d476f2cc180527d48286bac521b5b3
-
SHA256
87f835eaea6056ff13ff5c2ba029511c7360f94103daeef9e3ed588f0fdf0dc7
-
SHA512
941e1ab9a8addc3d68ffd01e226d94d3d7336dbc6b3600f83c939e1f8206f4a5fdf94ebd38c37f91abb1505cdf20c21f37b6a45bc7c4c9caeaa477f63411fcf2
-
SSDEEP
768:e6MrZuiPlgbNRj1Du8reH8PKA03bShRjYhRrUN5lEXxHgRB4hWrCKYbLyDBAuRDj:e6aPlWXIuRDltpYW7eU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409345bf39adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8033B21-192C-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005b8ade641b2914f9fb81a064ee1f5c3000000000200000000001066000000010000200000006da7fc66b7337b35bde10c5ad13d655034e1d34757034142211089339644a1b7000000000e800000000200002000000088c28a1bba5aa4658d15c20ba76ca103652ef7801e25471dc96f5cac4bd9f0e2200000007049aaa1e5e43e280a48b79135919a07658313e0e7a79923f779a34a409171694000000000e8ed9bfcc4201156bac8904d796e22f2e39ea343ca7eeefe319ee11ee2e4a9d5f9c5ea0488ae2a98ff38f34c5e8f482bd580ba1eb86294943da4807b3e6322 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422648481" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28 PID 1032 wrote to memory of 1028 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6bc4677a2da4ddbbb2fce9fe4a0a48c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2737cc3c3722e8d3b9d132ba721e0fb
SHA16b0c4eec66733db345d21f2a7b867573e81d5d5a
SHA25676018b81670c4b136ffd55f7498c00c2d6e05d0efbf6db2ce8392d50c2515613
SHA512ddca9d17c6d8e962e5e17b8596079d3c0df07386f3c9f41b7cc7d1ce659965b2720a0978f7441b70284268957650806480704f94c942d984515a16733dd88fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500f477190d48fdb67639280acb5dc8b8
SHA15ae6770dbd8432334b10510dd4e65fbd53d78b21
SHA256e8ae7567d6628855f0ba4d6eb73552984ec93c7e68eabbeec868958103106937
SHA51212e4eaa82ae5ad2a9ea8780a32cca617bd427e378ecdb5fbb28f4ab947d024489b31215949231ae9d31a1c6aae07a5d268b2678ec11b460072b6456d814030e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514c1d4161902607a022a0fd8cc9e8776
SHA15fbc7b37c4a2fd578c8855e7f550e405f01ce72b
SHA256dd38ab79a10d9463771335285d9233cfbd38cf17c7434d5d3b1c99eb6e6494ff
SHA5123b13745a8b8da2b2a68764d1476f41c1126d27b770456bf4577ceb29e16ca8b9bcf961ceff2042e3fcc3a116eefd1a122ea659d43573c31089815330601c7750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ffc1ffb7bb33d235c3c951d1ea40b231
SHA1c2d0092748ef854e6c1c0e9b676c37c82e4eb59b
SHA256892bd24d5adb51d5d9ba1deeca6925574a694b58ef884a504897936f91763317
SHA512da449539934402ac1cdb422fe30e748695e4e003935f4f7e48795c167428479ab657fd800ab4a9069100dad8611a79a4c4caf6c30d79d3099611304831a35f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e7dcfef216b79da7b94b87f0d8c76d4
SHA16f73c916894fc409286c4040e6b6a9b35e2de052
SHA25632dccafc471490d7a234f206d9ba9558bbe1cda9c73d7775392dc9efb940cc34
SHA5128bc940be99ef80a62c0ec207e01efba96023853692660520c6e6f2c3f2973db47951aaefd44e5f5dc0cff752defd6e30f178ec29943fa70dd3f2d7b5c3c7a4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe7919edb3d7913f8773c77b3ce0730e
SHA1bf9e1c0d0a64cd9f516590025e42ffdc23a356f9
SHA2565c3f932ef1ca1a96ddc386c0d69b3866f900fa206d8c4577e8545595c5c77e9e
SHA51208a02c559db48ccf7f2abb55ca6f9e7ef4f7877552c34a0f565e20e4db8bc5796e5d05aa5e4afe319b9e7176b9ab9f1d490b5b50c11d9ac111a1c2501d5c9594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d4992ac461fb959557609aaf5b0adadc
SHA145a55c62c338f2ad0ac4e33f43d92ed7b6f90c1f
SHA256b902f4350e3e2c9c66e122cb72e741fbb6efff2c093a117bce09b34825062bbc
SHA512d3008df9ca961952cf2c0b4aaa6f3f740c0eddda8692fc41c530c05e184c04e662339d6cd646bf6f375ee8d131fe5154d9f42937998cb88b54d600dd85220f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f52af9b1e3577b4afdf86c795a8355cc
SHA19b176270f13b081dbd91f258d15f9e832061e0dc
SHA25665faeaf9dce9b3189c139c3c8de012250df35bc9a5dfec988cbe0ff74189ac88
SHA5120bbea7d5b29529b6f93cbb201e2f11586f5182feee210fa34b8cc967a7cc810df4ab29eb82ccda5934101c35e092b7f6704aa3b502d4ac1c5c8433b8f2d24697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c6bba0e9b40dd94673753848f67aac7
SHA19946c4ce5474d123ec5d046811d5626598545e20
SHA25613c4395c17197bf7e4a2310ecec37dbf7070986cbe857daf9eb0df74727ae0ce
SHA51243030e1c593f91940aedb1b9cb0aea3b9517394b09627b298680a169e3ce4882ad77f23092ab3337a8975140ae0febe4ec7d119f2d05de7c8242e8c88f73e15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e2ca1b42e0e6dc70ac9712752b38d8e
SHA11834577c90d803910dd1722b9aad1355329f2fae
SHA256d46c9d12aa732a69cb283970fdda561d842ec6575123e3c033e4967e2a9940c6
SHA512dae6dcc6326b197b8020a3a6c7a4803b384e936e2b5feff3922526c2fee3fd065568501baad888c19a2a560ae3fa0c3dbe970815e60ec30e22932f7a878c21b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5f5cf178cc918ead57b065793656cbd
SHA167bba54597420644a0cd7a4173dad0727c016bed
SHA2568a0ad0d72633bdf91a6abc4742a3d4a0f3c2b4c48a5f073b18cc6d5da23a9ce0
SHA512a35dc4138d347db51e03df83c268ca9571bdc8c764e7d69a51b8d6737633936651bd171a0717c7c4840a03588eabdf5ed59f752a9b89ee5c3246af607a6e5ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ff7ee898a918e9d324c78116566a4cc
SHA1531d84f6daf627b3b156971fb7f0777dc539719d
SHA256f6b265218bfc126f4c611e582e96e315f033e019f5742384b6c62667320f8867
SHA512e2e916b25e4a58cb8273d60f800c9796e935de7e46cad6693c69b7912f70953c6228cbfb8aa1241ff051633e78e1e29563042fc16258b3d3cf5c5730f0d36832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510785348bc8c077ada070a78db77876d
SHA1d39ef4287ecdd4e840905078ed760c0fcb41a6eb
SHA25627e5df13ddf1b5430a4171284af1b39044312602b7dc3b1cca112f383e962353
SHA512a1c0760a1649bfbfa315b7c6e7aa39bc9c8dd05348a784b9358c4696983635a31bbae741f666cb2f064b620ec20d9d1eb672041d71f57c5a1def03f1617a1f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585f60fd0c2686ba7f630e9cf218ed9e6
SHA1bbd9c6a76755ada7abf3431b70ed448453073044
SHA2561ed0fca5d5a79bf6534b97d1937217899d7a0c4347af3fd83cf2346a3b5b0c82
SHA512b0425373d79dd1331196c9992fe5d07cf7c2ec452133e8575d5a947c4c037f2cb93459a215fd96d5a321c3b5a2254268ad884f81c57ecd3058c35883f2fa545c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a992bd499c83e665c82fe2d57295a1b
SHA1f9aebb6207da1e291b591fabdf1a2e656bdd6d18
SHA2566f8e666191329131f88aab9c815e07cc39b128bd2d7dab50359fbf6dc860a5e5
SHA5129fa1bc3b09b110914c459d1be375cb747611f1243138ddb60aedae1fd0866cc3dd55642d24e1ea71b20c4ab5d5705a8bed94aac58c4f9ed1ed76b78b88aaea0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5588ddc976561498eacda17368f4850
SHA1405ed4e991d0f274a55aadb5313dfd16d6bec1cb
SHA2562fa6287c01ace2587d339b13b0e4a0117ed05f0cf99e1fa989b4af7a423c8053
SHA5125ac3ef6676d8244d3590f64b1498a4a3fe808d29e5ddb5d3cd19202ed0b743e652faed52ca1dc819dc40e2e371cc8e10e4e27de1c4d812c7ea6a3294f3f68246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50442de7508582f2bc2eb3b7917b4f158
SHA1fb60acaf3f2148667a4d02fca336d02f120e3b5f
SHA25647d66ea7d0c5ae3e6730640a866299aba2b5015f743c7179b40f9ad253c9d28c
SHA51237ca984c75e642114f4c460b7a65f6f26a6d994fc8d89d3add9237d41d4d84d8fc325c32d6d3418474533c47f029536db144da4333fabcd44ef34a1f8696fd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54593ed3dfe459cd916aeb06b1766e414
SHA16bf36b0963380dc91d0eba456d6822d5f9f68a9a
SHA256481210ea7523a9f2dac30ce1173534ecc3af40a2a328c99870d0cbc75f75a965
SHA51238716a901703f4d37e810a90370ef9a67f62730972c18010ddb9a2416bded44ad05a2b420b2afb57fa7438f69ade1f20bc52d3b48da00dd7ad2f2fa5ddd62675
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a