Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
70b5f84ee94d802add24578a08a98dd1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70b5f84ee94d802add24578a08a98dd1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70b5f84ee94d802add24578a08a98dd1_JaffaCakes118.html
-
Size
101KB
-
MD5
70b5f84ee94d802add24578a08a98dd1
-
SHA1
169dc8927a154180c9f59b4212ee9d6d19f87397
-
SHA256
5b3ec0daa86cfb47275cb2d3591b95ec1f04a62a9ae75fed63eb4ea2491f5a16
-
SHA512
b4f296af09089e80591b884fa0fa043770423539462d0627a19fca13e61d6a07f1f28392c6fdf603cc22136c2075e83880ced1355a627ec08740d581812cc8c2
-
SSDEEP
3072:2YE6PSs8zCrJssOYGJ8+kvBxGfrO8IInS:2f6q6
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000478b24c8afe9da45b21a81fd49fcd84c00000000020000000000106600000001000020000000bea98be93815ef2a0de825ac15110f780d9663d874c6fc9f7419c8e2e01e7465000000000e80000000020000200000004493c5fcff7356a3218f000ea6afd2d69999d77d339dba7aaf64a3867e5c4a0f2000000008623852ac350d0c384f1171beaa6a1e929c55c212104a20cdbf692e360c3200400000003b232fb88024536a4f311a89913113853fc6d800aafe52ddd5a7154b976fdfb7ac23e1fc90002ec691f4d72be939840d18af41c2f993091226934534735b86ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301d703c53aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67325741-1A46-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422769383" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70b5f84ee94d802add24578a08a98dd1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a47173cbad568bfe3c47bf9c6c06449e
SHA124518c22e2376702bbd01808e2fa832777d834e3
SHA2567e81a7c06f71653968dfc510c0ea4c511922a6b8c9cefb76bfa9e09a0e405485
SHA51275bd2d498ffba1f586269be6b95927c152026bd1a74d880cc8cce0550ae61d9f4c621c85e0fd9b621ac3c3fb0e656c662216268579019b708ad1ed10b5d39379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f206c6834d45d773251debee02bbfc3c
SHA1d757adfc3bcc409b86ad17041b5f4ffb9927517e
SHA25652e52f35d44b9e0ff0eae2ee05d529f77a45cf4cbc63efd4a67f896e56a20267
SHA512be689eaa820090fbb875ad6581be8581f4775e1da89342501723624eb42473ca112bc7f9dcd54a1188700c9b00a5d00fad79b9c6df5c48f28f7bc7d71b80666f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819e91db873c8f912ee63d01c39a209e
SHA117491e37e845842047f201f7a582785dcdd72be6
SHA256599c595d011f915f7f5ac6a69eab1b86f5b35ed9aca80c9ba347f1a4a14ab2da
SHA51228e7429807b8d258ec0692d40964a9ab1258e710458eb0ac4db11b6791627244a9530b9b641146960b53769f3c5f332978e06e6b9c9c5214d1f7c78c221c1bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058d539d1e6470eac99fa6082c4320e6
SHA14edd89ea8921f8f66345d9de07f403c0bc108d50
SHA256b9fa3b7aed8a2178ebe8f75e49eab31f19a147b8a64e72e3eec3278856caf23c
SHA51284ac21d8ca719aa124ac923ca64a6b51025fbbc657af34a85ff5c8080ce43f75e7a1aa27021b61d23d08656dcda6f61aafa9a75bfb0a1a0ab9bd53c275010f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b193bfc92d6a4dcb25f7abdf1dfd5aa2
SHA1ce0e23da6fa4b20749eb890ce47c1fd0f64ea9d4
SHA25602d947ce8654bee5255f296a54617bb09f258ba310dcdf76a002dc8b2757173b
SHA5125c0cdaa5c3b29c17791c195a4cb3deb35db08b6b3ae5d7de4329b2b2e071398d46634095e7a0a3b126c765f6971f470aeaf870ffdf991727a7d03d4382ed3c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea4d7558c91029750e7207890fd6e57
SHA1bd4162a3395fa5561028cf39a04d678a82895733
SHA256760ac37e1d6b05fb8a8350d25f0c55185cc74f3f6e9555a988237f902f057fe1
SHA512b81710a2f38219109d16051d7166f9d4623db87c00a4baed4f46d3f08e23e2733501c8d735678d9153ba7fe540400760c1816b7c7b2dfeaee94cb65a823e5264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd97f5367997783c9827c01407fbd700
SHA105f0248b66d21632f1a6c8b621c74baead20bec1
SHA25642b69129e1120bc3f25b4ccd171ef177307778ba48ee36dce89301f5e76964ed
SHA512bb98c4341bde6ed1785cf522de9fb5003855dcf4af241159817eff97b48d2eb24c29f078129306d420767855797fe936121f3d9a3a30efa53604297f0452b655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e6e4462c1d24157ed844358e7925136
SHA1564181cc51539c8fea5417d99127448cc7fa1999
SHA2568928718b55f4b1d49dbd7636f2e9673f24c18e8bd3a74ae1ff67d9615f9f40d0
SHA51289b15b7c4175e6589a06a58bd554b335b52fad7f8e4493fa4c8c54c72620e72dc5740af17c12f365d7021295d30c0fd7bc5d11bccc0bf7305518202306584056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdea690c96b4093e355bb888c2ccc55b
SHA160861838be0445a7e4b5f27fd6f4076dbe803292
SHA25635a1103b3443fb683b2a7c5bd313d60e1cfaafbc0f0212fe3361328ae87b3cb3
SHA5120973f2fc933fd790dafa8dd4a115595b3f54dbe10c3fb26d73ef1c4fba1710e394d81159f33bd263f3c4738af16f5b8a6c86d5a3a32e060e15a566437714a496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523082a980b06efc254ab0971e00c90af
SHA1f10148aa4135d755727741f16a4046a4fbbf00b0
SHA25691f95d4dc3d6d0f10480414f2b7072f8b9449d25aceeb70d7170450fc8ca57f7
SHA512f24df2d24336d11085e58bfa8d4338de8cb96c4ea7a6480b37fb8efdf04ad7ae4e20c3ec83b1a0989b2465d924875ff36b2ceea470754533e1dfde0e3a99d5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec159adfaba688089011916323c593df
SHA1d38c1305048fd9a9bd97fd479096ba276ba9badc
SHA25608b647ab842935f90af39e6109347a5f9dce3845faba8eade9cf2c0df99d5706
SHA51258d33bbb54ac1b68c8723fdb21e351cbf612647c1e65b984d64f85f2523eec61377e221bc17552d3fc42c405c41a93b0422ba8bd16c106651523b318455e51fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53457d2c615ec78340027d871b69ff830
SHA19af48b094133adb24e71542c293d2baa6179d902
SHA2569c6625fa7cecd5f9a08c4e84b368083d9f9569f247d6433bf06d908e72b46fef
SHA51222f1fedb38af819ca96a8659262058b06005eb62977875154d4c8b3f678b741ef606016aa018c1267353ff20c129cd55bfb8b2b13819c4b7ebdd00851b14b7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50932541968d7ca22399e2524362bae91
SHA12cfe730d5a4cb99955d4e08ab33eee931806c3f5
SHA256987061b1eea32c20ee3b0bd6f0c5b8697cde07863ebb258aa9e13fce8e888818
SHA512b996943b37b4442ac6e860c886b0c898fc42bf21c7121f14ab62c4b1a181b3b89d652f02e3ffb12eecd5bb23190a7dd801ee0be403cafcef3911c126cc272062
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\recaptcha__en[1].js
Filesize522KB
MD54668e74b2b2a58381399e91a61b6d63d
SHA189ebf54e996e46f4b1e26f6dcda93bad74fc0a1c
SHA256b0e3acc54460721385d2e472dda7288382f2766a06b38d2e732d034619f9b929
SHA512b2ead3410dea89b658bfb0ce67842569641cd6c29889ecfb223a83637600b82b0d2e55cec26750593359663a22896f5da91d3df9f085c204803cd646a7cabc28
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a