Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
6dd0816eb056f1835add1014d54ec430_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6dd0816eb056f1835add1014d54ec430_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6dd0816eb056f1835add1014d54ec430_JaffaCakes118.html
-
Size
51KB
-
MD5
6dd0816eb056f1835add1014d54ec430
-
SHA1
2ba63a4ba154dce7afc913436a02e3189d80d964
-
SHA256
e5a4d8961464798aa4fcfe2b5083e0b1edd4d4bc27ed0a5b4b3a3a470b124e2d
-
SHA512
9c9b4e2910570e25e8be546404be54e726f3a2868e1dea4e5b6d3e7ae2eec500ef822dac1b9e02a1a61dff8a072175d0c2092a7df1458b663c277600b22b9ee8
-
SSDEEP
768:SrYR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:Srl9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422699346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082736ff3bebb384aa03cd12a30dc4eaf000000000200000000001066000000010000200000005d02067212ba021624f0b2932c04e76932367b7e8520ef0cc91931ae66a2bbf4000000000e8000000002000020000000d52500253d354ee6cfb04857be70b5751e151f115fe4ae6c8fdec683492912a120000000a4edc317ee48c9ef557eb37f81a7abde188eace2b97037983047008e314fe45b4000000065fb0f62587e997db6d82034b947d6915b136a71417a264d12160656cd7b22d279c333e4c01b4ba94c82da24c1a5105bb969f1dcfd09072837339b06a6d24e07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405cc018b0adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55E32581-19A3-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28 PID 2696 wrote to memory of 2224 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6dd0816eb056f1835add1014d54ec430_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be08261d1c8194eb9d7b8139f5b94587
SHA1760d9a54d08e5a9fe6280f3f1a68b3296f9dd2a7
SHA2569b9299acc3f17c662b091ec4979a5742410b2afedadcb32200fbca91f8c1bada
SHA512dab7b67e3b2bbbde7508881bcbb8fcab006e770a8d7f664f0ec69bd776c436ea6fa3c50356e20a403ff1ae2e7af210ed7023ca6889d19c6ca5431b2909f73352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57789e74c2be72f6839b9ef6ac4da9256
SHA1a15be92ba82b146572a6003c82c9366271ec42e9
SHA256f20b4355cb62071a2d51bffcffd658e3dd68d27ec351170ccd2d5c4d0480cf76
SHA512d609d79a9169ad53ec919d4df021037e5cec53137bbdebdf3b3a10a702c6f877b5c3eb90a20b1b6ea1f2b5295e54e457f55bc278ad19e9fa1f6501b460ec2a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba45f784f88436fe90f67f7a6779118
SHA132a4bc9fc615cd985a6c30a0fa8931b3a69492b6
SHA256a213812e95756461794682f95847245f7f87be0ff740cffa649ea970da04c0c8
SHA51234885708dd2467bfec3e75e10fbe33df81a05453d7ab153751fa212a9c74837c61c8020e44ceeb42beceb9aa3f3dcbb0ac577867701ea9ee1c03f3066e730060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab835fec709b34bc53c0d5cf423eab0
SHA14c21dd97f6e47a7703aeadbadd6f222d0643fba9
SHA256287790ae0d4f8fd5d293d831cf9d44712ea108b26fdb724e173c2b89cdee57c8
SHA5120f9bcffc734339c020249a056200aacd6cff1f0967a797ce70e04ca3e69496eef2303b20b7fca16cc629f86182384e2fc0b81ff5b2160607a012208f37a7a43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ff99e272f87b6852125a6c9467f60b
SHA10e6261db860844c41d84ba1f5fb82e9007a4401d
SHA256fbf732d9b582dbf01ada341b53e26df6c3100fb71b38f008f186f5e08f2f846c
SHA5127849ddcd5f031fdac7fa9f3fafc6b9a15778787c71f7d21d6e270f2a3c3636fd9744a68c6b940c31e2a9bef389733a13b7e4ab0b423aea8446cf5eb68a573511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2bc6146b81c66da434f5434ad61e52
SHA109bb5d963af01078c4ddf5b4a962d3ce09237dec
SHA2563f4f7e43831c17fc761e60b092bf5988c2fbf0e43852124b4c6b76652629c740
SHA5122dd947ee7339940c2d42dc47954a0aee7d2d727c3c365f25a446e924e2122388d88dbf1dd25d1fa7edbd60aabd65aa306a4d8d318fb9c68682f9e802b47ffd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd57162243b834a95a23218c0a2de7e
SHA1e1bc024a5e9dfca791db579a7f9d66e1128a666c
SHA256b4a72f7ce8591853efd7b3c128cb8307dfac1a5d2d484d9b54cbfde8ed260038
SHA5125cfc56b800f598bf874384466bc9c13b5c517476c9d12316c385071c243f9f3c4a4270ab40881e80c17f330966130e125bb2684a04024e2d4cf7a2c02c7baac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdddd62833f4b01e9b2ed1c0ae2e40b3
SHA1e5e2ae3af28310f96bc3d872a71e63f08eaa8b0d
SHA256c50317c141f45d5d504208d2814ae611c25f891ae4ef1bba49a609603b69e8d4
SHA512974e790af37a2083eeec69804ea16eacc6685b18d356c9326091821f6596cd1c9704d4bf319c4de78f9199d2f36f77b7227651896943e8ef55ca1fa3b33cd4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e66bf00e687206cb5d657002ccdb2f5
SHA18ee9e4693f4899b37b1e90c14e54f236508fd7e8
SHA2560fb383a49a24c74c918eb148ed1878eab30e2929c7a32edf36f8798232627111
SHA51229de4b92ad30e0beef8a099b63e7e36a54e172a8c75af3aad4fe0b745b0fbd2a02c218d3fef11ffd9d5951d7c6171d6e7f3c2176788a3ce93587339e547df98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5501c7062a50781d0cd2ad2b332ecca39
SHA14f85c9760f06172ff62cda49f2fcb29531cafc81
SHA2565e51de8b3e844a9b5352099f020942fbbf14d17d7691198209c6ffb5c21b8fa8
SHA5128a69a853cb4ae918d8b3fd7b3c2d23f62e4a000478c95142fefaa92d2e1b03c732f071754af9d81f0936d2ced2159811ffaf49890506e04d9fcfacb4eb1e9393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd20cf4f265cdae6dc367313251f2f0e
SHA16b8a904408b4e3135aa29f354118afacc04e1ece
SHA25625f5452fbd093804c4d3e26d9498253287b2baabb29e9839cf31e73da1e7e874
SHA512281779a684b612363aba4dc7f7de326ace9595cee555c6bc31668e2f07d8385295280216c338c46a9470b4c378e4c570da9666c9c3fc50bad7415e939217e7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4fa1912345e62127c8965084e55cfb4
SHA1583ed45918d533e35705b2c0e931b18aceaa07da
SHA256a87a3f3f79ad9d62e002e40180fc68f7180023a8b01e232bed20e56922f73444
SHA51259b21e74fb19dade3464505bbe2c2f158900315133498e9ff7de0ffe1ef99738411eb8019d5df28b704ff1b2db3cdf844a8cb88686dfe76829341fa0d23e6f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bcc5d1754a95a7c90ca733808cd4dd6
SHA1367d17b8f9fc87737c7f187004803883b526a76b
SHA256ef692fe9ea7e33a29faf3de194fbf2d35248fca76dad101a393369b423496fc2
SHA5129840b6c0304b8ed480688514344ce9f4a8a9a9edff0c3ae0d1a6f49011844f73c47bd19a60588e831160fbaaf8f6a440b211f43cbbb0af6e5453e39b92d01158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8314c647cbc480f913a9739d91f72e9
SHA1b9fea99ec782b8dd550fa0290a74295c11daaf32
SHA2567c66986234dca860124ff4ee89157bd82910c55835c5adb7b833d79cb7c47813
SHA512cf0671c9e0879bb37afa56ad8915d8b728a53d167471c2456ce157182c70d241588f8295df72d35e2ef0bf7d403c257872b4c0542f6447885e82bcc0f83599b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d660c10294d1b40aae131e60c9d4a3d5
SHA107d58df19920e18c8786b868cea8d47a7936627b
SHA2569a3469641daa0c78068e3a011dd027b79a35bec895fe3de743e20e31b0248dd8
SHA5125d01d666eadf13e73fb3042ee2e512d0f529a447e64555757067a744ac2c34e7e491ae865636658a202de34408ef2f0de012d8f6e06f8d4bfecf4f418cca8f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9515e2d01127fe2d5f6f9f1ff4af41e
SHA1de603f8d385b3754390c9de108f4362699793dfc
SHA2567d8e50fd8254a7644e08b464127fc9009e6949732e03b89ad09756526127c47b
SHA5121d85b221e415e40c8b456b6f9f986d9876666808769ae0ce184a294a01d0c220ecaa07428e9d27384bca42c31c9eb8335cd3704b94068456a46ed5da843f2208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4874adf0cca0f5d675a2401918e93f
SHA1a2c251ffdc73862a01eebba99746d5c584ff28c4
SHA256d66b676adf3fa4eac217839e13b27bb976762664e0cbe73c010c6db4dc08b7e1
SHA512a9df80be1ce674801128629480a449bee873433f40dfe8f309e73a73d1dfb4bbf500c630ebed9b6a798f6ad54a03dc21ca48cc60793488d0af95a5f3096a576b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798bb346f765b6aa6290ddc4e22c8c26
SHA12742fd5af712155b6e3acd914714aee14cab3973
SHA256953a9c6fb244a73eff2bc02c8c53139e586869dfd979068082a1b28a1053c8ff
SHA512b6457676ad77f1099023d2d3812e532dc4e5fa44da38d8b9c7bee74e95869147025fafcbd26e7928f0e63d3c3d47ac894e3bafbac714217ffe53d5ebde41daf3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a