Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
72223fb9814ffa8867a4e84adb2c1b10_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72223fb9814ffa8867a4e84adb2c1b10_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72223fb9814ffa8867a4e84adb2c1b10_JaffaCakes118.html
-
Size
105KB
-
MD5
72223fb9814ffa8867a4e84adb2c1b10
-
SHA1
779f7208d6848a8b7eeb6a82ea391e03789269ec
-
SHA256
3e9b09ecf554fc122f598c6fd9b19f36f9e4f0e9c62ebf9ce6c9e9b75f6361b3
-
SHA512
a12fd1fe7ac6a13b85342a7f1274839c7df87a0f6acbd514928a2c3902f15ad261b04c7aed633c9f71f4cffc8667a9dc24a043107913d3314896a4af4bd612aa
-
SSDEEP
3072:R96/TUcuUFYa6rkqAtKjfDkVCj7+grPD005K7oH:R/UQrBugrwK
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a96c06cc4d273d4fa8dfca4e9103dd6c00000000020000000000106600000001000020000000a4a11792988e9d0ead8cc7357e48a859c51c3b9192bcc500ec1c4c6c75a2c793000000000e80000000020000200000006ef30d671bac5bb504c7e67f632fa031f4d8db8437e2a68a23a331d313ec6de4200000006d910194f8c4dba8988cc7ba361de376517970e3864cc5bfe5296c33b5f5a0f140000000ebe0c617b483b7269547e4f6ca40b086d4f9489dd8114e395804f2d13861a7489865694dde7e7e5c78b70a8a274f4fd2a715a4dc4aca42dc3f697e20ce408bd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE5E5A61-1A9C-11EF-B4B5-5E73522EB9B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605d7acfa9aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422806550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2904 2932 iexplore.exe 28 PID 2932 wrote to memory of 2904 2932 iexplore.exe 28 PID 2932 wrote to memory of 2904 2932 iexplore.exe 28 PID 2932 wrote to memory of 2904 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72223fb9814ffa8867a4e84adb2c1b10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c44f2ed0df8ac827b89fab2ace9c7ee8
SHA1faa0d0a9df949404e9db1ed426d33246abcd598f
SHA2567b97df27d1bd68f6bd42abc320896ef69dd40714c4021ea4883484949ebc7142
SHA5129424a3164622aa739a744ba28f8b5c7fccb5b843ad158d40befb5e7f6dea311c77847c4d8148c88c5034274f11ae7984c5067973389876e7d5140d4330e9ec03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50934af85e73c87f7eef501c0a700da31
SHA1b801eefc32258c91ab0dd98944c9b2c65f3b18e0
SHA256e86d4e0ed22570c51c37b933eba998f3842d34316ca256917863251c919e479b
SHA512a361ba51338964689f2aa746b2b69d2f590b618da2037df077b9e8d57459ce94acb3b2877806d213cddc30fc7ab3373ead4c08d945bbf1251026d99ba21fedc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a52411e69721e7f7961aa8c1cf8e600
SHA1ab3e2a9c6490013943d9f64ba17afe3285730928
SHA256b74e739de8f81aaa8996801d3c48aae0d73a078d30579fe0efb7e63b1039b11b
SHA5121c0877adda0da2f5ee6d28bcf4eec4a87082aea886f6b445f47534d193d933ce2a7eff3cc112449d4d9b6c141a28672ea93f67da908b05e881153cb7de57db80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e988121a38c9409dce6b561b6f5530
SHA13f11963c73de53958f93eb310f63ef45d9d68591
SHA256366bff47062638737e1154d6af11d9ea65764a32927df5904d8e7dd62e83740e
SHA512652c3d725c2572c9215ffce4bc7884ce4c13a7e9cf4615455b3de3f33c71140200664c007ee0c82297d6d7269f805aa0b5f587f5b63a6526183ede9225c4ca43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8bc7c1d819b48587cf35575e41bce9a
SHA17f813683531fc60c8196c0bf54e838bfc639ac12
SHA256b91ac11e90dc53430fed7c0dfe6a71ee7ef6b29c6cbf03d0e32ace24fd22cc4f
SHA512f7c522aa4cd572ccb695405769b2c2c7102055ff3bcb62e5c4498ce0dc7f50aae93a4423c829db9fd462fbdc9a716e9affc13fbaa26ec68d49b27da1f593117a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54107d3c05c5b5a4bd3738ad445b553dd
SHA1496b641531be7edf0a16075d644679dd50c13a42
SHA2561af9559a0ce7ab5f58d54009711e09383cab3b246d9deac98350c47aa9a967f0
SHA5129fbd0063c56f89dd5cbfbcf34890d22f4124237d71fbd5ec2c85cd843af89aa61c874eb0d48e5e5869c17701df84ef39eb124b0c14b4abdfc39886390cc3ac1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540be4a71d0d055f3698a55ea16e7886f
SHA10f711c66dc2d51ecd4e899f77897ff8ecf4e2a75
SHA256ca60f078e5e23b967925adfce361a8d3fad3f2542ec1ed33006972bd1f81e236
SHA5121ec55fb06b89324e3edbc49ef8c82d8a8eca3dd1ecf65d108a54c0d0cdccc85a8a5ee33bea4162166d60cf625d1a814d07cd8059549a5e79f3996d3db465e557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545284ff674e42a8bc91b609c7667ae2a
SHA17eac017b0c214fbe74dc6593f21a39c40cef59a3
SHA256bdf2336bfc30592f882e5fca2aeef1b839654f15d7892a1bc9ab18d998ba33c8
SHA5123fc1f4ec4747ee10cd1946c56aba0169bf163df8a8c6ed64e6ecc699258b007793c9203e87f533974fc83b046f0e126a6024971c3db6a96c0d50e2642e87ef46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8e0be02e0f6fccae012be3aff5ae09
SHA1b0b3968f0b4db9d679e513f8d0cd47f96b1ae3ab
SHA2566ed02f93919a3d1283374d70061de1a8f401ca48f256b0a8c80f795b4a17c8d6
SHA512c0704b9bd8ed1b0f7d1c49566196172fe3185742b490c53076dd5b8f083a820a8e0bde5bb2764d8748944b16a2b2b8380177cb913a10ce728784348533804a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54635f6fc5d5296ead701daa15630fae2
SHA1062bc86da6c024229aca4790a3e32122ee824b66
SHA2565b3c803d6cbba8405c4bc360e11162ca8bc9ede2b28d467f55edd59e9bf0339a
SHA512775d0c42707d196a56a93149f4f28e76335017c265802a205e3b6b4617e9271fb5b4988ae56fdf10e6e47b8d6483216f6f075ae8086e49d85ee1130b4caf5cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87feab2c043b320d626e61d00ce5d97
SHA1cae8136f0cb59467b4cc91bd8eba18207ed7b07f
SHA2566466acb2f94ad5dcd94256f3eae4b009e01e4e4245753923ee71f5ce3f2a5e98
SHA512625d6e3222fe85025fd598b922d2e1a99745a7868b9c5da9d5ffea6fa28eaeddbcc1e7dbcb7d4275a4db28ec277e74c20952d26c153428a56bed375021436543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6c7278a3902044177884eb072a69cb
SHA1f7e8b5fa881997f17aaa4923a0d2663b48af125c
SHA256cb2b16e3b833964b663c036753b86a1768d0d658cdeb638e8b63fac2d215e4fc
SHA512fa77f9feaed70d79c19b13fdba3ba7527212cabbda435188e71102c434dfb36002335cb16beb007967d717713dcce423a3a1a205d3c97b3f9b7ceeda9157f070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d520ba0f734e3c8d5307fbd67d9c67bb
SHA1c0f92574fc1b7042ab3a6507cba4049687872349
SHA256bc5fb0a8ffe27dfe268398eda121120f25660e9ac7038aebb1164b56bd1a07f8
SHA512b9cc4d5a94cb51c6a49097bed94f9ef8dd995b5eac4dbc3d175c0763b5099b82675e6c9b504c00237648bd7ff6051be7b34d0a6ddb4f2d544fc0ecf3a6349b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58951e75f78485c11512e8ff140f7fa4d
SHA190cb3021c5f91990607891c98a1ced470a332a0f
SHA25665793984fe0f9950714f199f5e2099671ab70dd575e15c88d1f47951b5c64754
SHA5123f68db4e2c0c91e191c02fedb67054f64d3477290188840daf5332ca505d2c20cc8241898115d13ee6352899c16725cb884fba8e540d4e869029c6c9412c8fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD525b92b50f5e54b28724b1344f9d19179
SHA13d5326e983603e0429af788e16f4492c17da75ab
SHA256ac1c4cca1851c63b45052f8e97d8572f6ad196889fc76bcf0e2fe30236b1f7d6
SHA512a4d4e52ff47d8ebd3a87de71354e9f1780fa2c4d5eb14d771ba093bdae38945dcafdd5c09f7f1df97b9da60eaa3267d6cd04d2b3cc09ccf542a2436f7714689a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a