Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
72d33915d47220e78514891021d31481_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72d33915d47220e78514891021d31481_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72d33915d47220e78514891021d31481_JaffaCakes118.html
-
Size
131KB
-
MD5
72d33915d47220e78514891021d31481
-
SHA1
ebe7ce1a52d1e882a95b868d9302166548ddd83e
-
SHA256
f421e641a7668288822c0b4ae5a835337be734960c11d1bf36ff7b4733cab1be
-
SHA512
75f49b1ea86c31fe5ad48b2af52876cb60fef5092b5bccb60c9e5fba89377ee56870417defd90a4aa859116c6b39f628bb85b03bdb068860e0b151b439b966d3
-
SSDEEP
3072:A+5kpEb29JQdfO4cDfGvgOoTKuzTIpRyHr:szTIpRyHr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422822625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E7C6151-1AC2-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f5630428fe2fa2b5fc1feadc9aa9887282f126a9e0999b6f094a821d782716b3000000000e800000000200002000000060328d92f72f953969bf3f4e53348ace26f3b7e6ed47abd2fa2462de31a55b3820000000b61536d6f0c2a29c27f5ac57efe34d9d46236b90b3f96d043ac65dac23a6d4d440000000e5925d12a67821c17bf84e7cf06cb4e47de3d07728503edda810f0bbe32ee7208c456e21cbaeae7997b24c93ec331f9f6b09d08f3515a351352ccfed3c29c31c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02a0c4ccfaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28 PID 1932 wrote to memory of 2172 1932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72d33915d47220e78514891021d31481_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525ad06eb396e0eb621b11ddcb49d1968
SHA12feeff53c3e9946d8fe6fd6423379e359ba4cba7
SHA2561368ce0e02c440de9e9bcf7f76b1e093bb81ff27842ab9f3a4c894e63a734a29
SHA512256a471258d0b6b79eb7db1dc2ffda51a17f28838956f241e7bc7e5e9346ecd2c303bc9a3501e78dc2520303afaa569728b960b558547c459134fc4a74675df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508cdfef6da45905a924a33c2ab545fb4
SHA1711b55944fb8c6cf1bcd6d9750b494ff0b1a8813
SHA2560f005813a6d7a835c254f10c05ab569bd921a93781f4ac738adff909faf99032
SHA5122d40b274baffc6389da9da962598e803b260bfb6bffa017f24f5e5bec0ef5fdb6861640dbaad5e453d2a02dc0d21a0cea0aad0aca353e29af49c94d8987bf6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acddd7c3a98fe1faefc65dedc8789a5a
SHA1e1b551e7ae88fb721a62189b185de536cda55282
SHA256786e2354289f23b3f3718658dc3a74cf4039962a6d97ec8bb43ce2b07179ce3c
SHA51292df92182e9fb89952e980d0d627dea36e6d87845e0c51ff28e54cd67da00da4cdc5d073d21da0a007c0a061227f616244e6e18fd3b5424687c4900f029e55be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fba9612144d406d2654f480e730b30a
SHA1e6b6755ad93b4be7c3a8e687feb9f29ad734fa7d
SHA256758f842118c9d107c8c872ed3b399d94f3b6ef4a172e5f5e445c1dd097fdb8e4
SHA512ff4f45e6ab4164efac737d588a72c340e1223b65a22bb9ad3e2d0f805eb172641b8a4fa3baa7093cb77cc99fbe018dcb184044374a4ed08b71c03106a70130d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754b813bb951ba263416e99a42dd3786
SHA11171f4ce46e9d696b08174896deebd07d4c8206f
SHA256f8e3963cdcc6579629fedfbc70d2d62ee2bbf37a995405c324ca5cc599ffc057
SHA512294f455576c9e5e699d24fdb3ca75c21734660cb4531cdf04cdab53ae031708588b274a5058eba8395d7a3786c54d77daab7caf43add282912c3f1c45491645d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad9b8d0f9b117d60bf3c2b2029ec1d8f
SHA1c778a3077624a4573c7fbe264b8862965bb89dfa
SHA256e433cfb7f8a41c5f3b3cc1072f12449725b8fa47fee3e3fa1548333bf49c418c
SHA512a377b269fb05c832e71b74f1b0d0025d502653ee2e99a0db2a9c62b46e12de84a141143962cef1b90ed3b926fd0003817ef28f97dca1e7efc3c3d01d830c817b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57139ca107432373a46f2c32c87d32671
SHA11b2c671b5badc20c70790ce4ee728f1db5dec4c4
SHA2566b29b317296983dcda059010f40cb869d54a87c4477dc859e720cc9021a59134
SHA512f9fd0be933759b3555f0cda037f507b3fc011b2b81148c28ecc9c26dc0f1c93fdd48513c8dc6be2ded4fbf68f1bf655081e491f465c9db73d196e49543a7aea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5a15d9ee6d73ff185b7f37cc15079f4
SHA186c4c993a0a13314a8484c1ec920c7984b558b4c
SHA256007f407bbf71ee437262e4a1a75a5c4e14c6e65fbec920d0703a081d62c72089
SHA51298ae602f78e068238e10d1f55607f4f70fbaa13b9974077989d77ae85611e41eaaa3f01f6768ce10a07ed9d64f78ff40495243049c0b11e9c0c1a936fe98477c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c13b95d1aafecbfa58e6692a04ec8a
SHA137952071776cdc65d406b7c84b7b3b1db0d4ad57
SHA256d746c94d224bda443f4c12d88768ec908a7697159d5c9e501ed84c8e98ffaf7e
SHA51286272480847c747667edc58ce10b5fdd24036b8fc08e156ae25cd109783b6485f7a635a3655c0e77ec2702a8f5d303fecc3c9e87b2cae47f7fe02b6decfa30f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589392a75ef96d963f4c1ab10504924db
SHA11a310eb3e8f319dad75b0c5b3056a28c365a719c
SHA25668486933a761759d0462128ac6ebd2fa9ca4c7652f738213578c559ae7748afb
SHA512fef55323dc8b0670cae7c80937060d330e61edf166c59870bc1b858e01dcc75263335ab21d284e6bf4581ff2cb829232dd28f49b107de98684177e226c412e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557b00d82cfb227f872eaa04d5f362797
SHA1163abb78e30e6463989a365b343ca3c1ae40dd5d
SHA25692ce019f4e301079745a81c6ec7352d0e6e5b3733a467d123db4ad9bc003b97e
SHA512868ecbe7da24809f745cc1027229aa965e3a0ebd6a52bf399b1417ba7a8224a697260e1a963e675307e7e75f54dc144e2b315e424db396505c38b6a3917f69f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4930236c1e807ecad341f78013169b4
SHA1c3faef48c25f612097481ec6eace3ac06dd721c5
SHA2561fc6c2af046da72f8e41af271fd324c1bb7525482708fa29270cfe18079e210a
SHA5124b0685ed58af64f7ca428b89d02c831fc9349c8882eac0daccd5eebbe1119f0d14ce1428dd476784f155fa817e27f0020d85236ee149677461c6f92dc0823244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525594ffa7cf5988de6a70b955a5c9407
SHA187a3a206d5e85c65577cd3a066d2d7a628606abb
SHA256b2ab4368e9f0a961b04ebf8c9312983baec4283dad9839b8cea3ff491970e8d4
SHA512a50724427c094b8d3dfaaa2230331d90f02eacf6ad79f5e95660c21db7383f7d8b51f43c54964aad3f39ff7ccc2b3b80eaa6e740281f956e9cacc41f49f9601d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b21562228089cc4578d1d6bc9d6036
SHA1e4c0fae34746cd98365ccaf989da45b6e2a4dca0
SHA25680b384f0976970fa844010cfb2e6c1e18602d00b8a161f53a5858afca140ef4c
SHA512803e92144e0288c758280b96fc5f18f9be6fe8924932d3667e661234162455e9d8baaadfc75cfd9fdccefad68a7c2557c75a38ff24941c7ba6f5a2298b79f3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557481d0d7f1bc8833a9f02f9a86c2eae
SHA18de7a39f8247574f4a5046c6a3907bad7ae05f62
SHA256bfabedea35fb50b4f59cfa68e874e0e04541d62798f05a3fde4cda18ee2b833f
SHA512da19e15dc69acbcf2169cc5ad10f44a8254abd1050182868cee5b457e9b02e5d1f17a263cc2c7b6e479a741a410ad6da01daff3b3fa2f1a958b86780a57d246e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59856d5fb86ebef02a925bc4f26cf7d54
SHA13fb30337272ca425fa2f67d5b590db8816ce9d11
SHA256adbc72450eddbdaf21bfb006d167b747171965fda448960d9319b2196a9614bd
SHA512c11ee302acc696cdd8d852bd49d235dbb1394a53d732bc3615ef5e7caacfb8dd3bf7c0ca056741df7a0efd0da2a1d2d656a9cc7e508fe0fc86325f03ad09bffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d66f1fee44d8aebe7d40cb79ddfbfa
SHA1fa26ec05a3ea271d95bf55a8132b09c8279207b9
SHA25629fe3b7836e888204a14a34d5ec32dad9f84fffd44a49142de38e019d929aceb
SHA5125b81d71a22d3af5547509604f216fd236ea45f34eec4c436209dd575ab53fd81b52a31a3987f6563eeb0a580626f5a602055822150bf5ebdc1eecfbf534bb19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527f6dfa0f2f24553026cfe845b4e6062
SHA1876a83db07db5004b9ffa1a9ffab3d8256e58998
SHA25651661e8679fa7b3e7b59a76a367101dee03b19df321bbc2ae99abd8f397ed69d
SHA5124605dd7c85f3de64961e763cf9b5e1c124a8f7f0bb2a13813753941ec12c9d8e11d619d38e22babbf80535484e97a7dbdeb85b49d5fece56b56fcafadc904886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a733734b42e0328c6740f118ded5581
SHA1169c8ee98bca56c3d03b37aa9e2dd38b1773697b
SHA25622bb9be86a30f0c5a66bfe87429879600af60fbd278023cf461160bf5262f362
SHA5125e19846fa574a9cd6c126178e2e5c14935190a85cb577a6786cdc94cc2c758f827cdbfe593ca6519df8720ed8d9a885d3003682ac6b7138dc2bc3dc67f3bb129
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a