Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
778d4c266fae10a8bbdbf95edf386c0d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
778d4c266fae10a8bbdbf95edf386c0d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
778d4c266fae10a8bbdbf95edf386c0d_JaffaCakes118.html
-
Size
460KB
-
MD5
778d4c266fae10a8bbdbf95edf386c0d
-
SHA1
d79fc46f48699fbc8b65eb377db3612433c55ebc
-
SHA256
5e11c69b85946f6760964b80913aa70284f3f1020f0cfa023661af139bffd6b3
-
SHA512
d21b931d1ec68ab62f6b7934155d80bd68042c94cea61164a86b12d3a511a875d9da4a94b4487c37aa866ec02959bfc3eeab4d9dc5aebc671a0d75d023a85246
-
SSDEEP
6144:S5sMYod+X3oI+YQsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3Y5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{536711A1-1BCD-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422937283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d538ae68520e5b4e8210fe2b664041e2000000000200000000001066000000010000200000008575800fb2bb77e786074c09ac3326540d395cc167bac819e4874d6202b2a210000000000e80000000020000200000007f0dddcbc8ce9c5f3d64563ac98a55d519e6793745bc3f082a1b81b195330c1120000000d9603080dceddfc86f436dcf6d4eb5c3a851bbaafd4341f05790988751adc75840000000fc5f8ed06f11e36e9f7dc436c1e204fc807766f10906fe3593ec134bd6f2a7b4efba0b4c6b68e972c32c1e3bb330711d68c606e70b598f2ac544a182adda6b74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b056f32bdaafda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 3020 1568 iexplore.exe 28 PID 1568 wrote to memory of 3020 1568 iexplore.exe 28 PID 1568 wrote to memory of 3020 1568 iexplore.exe 28 PID 1568 wrote to memory of 3020 1568 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\778d4c266fae10a8bbdbf95edf386c0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54747f98566bce84f6299a375ec0f642d
SHA169eb1b04eb1277ab61a0918a284a40748f1af464
SHA2563fb1e4465077edc3bfa5398cd0e48dc6870b807e10d6814f4bdc52a0c5d6ddf5
SHA51217f7aced452231e2ae48061bd36b74bfcc15d3382f3a83dd521e318427b6773df4f038a6f8ab4e336da54e2c63f88315f9a03ed82e9b39d851a0922b562340a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2aa05d27a49770e41cb0ba85962907
SHA175f8b9a02b65378dc6a0c7d91894b944da9f93fa
SHA256c697c5562b83a39760ad53c89929059df267cefefd1336bf094f5649fc007ace
SHA51215446b2299725829171467138d2bc61102b731618ef00e5d01f730ab206d3edf9cef75435eab73eb913892a62a74bab0f73249c796f7046dd1f03b39876c2f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85388b6b5db4d15c7784417a106cbab
SHA1cd39721426df7b4098318fe6ea01b6a8e289b108
SHA2563514a7382bb426ec35c9c57aacf9c77fb2bf92face0c333437fb572378eae3a2
SHA5121355398f5a62340b4677810f517d86be7716be66acea0fd2d06dc682a66f2b9df123eb8f440fc15118f8fab7e4b46a8426e51c7efc5cdc882096ab1f586c92c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d551a6e79d5e4eb327da1255291824
SHA12cdc1da51053083ae7fe5dc11ce3ec2b10e02514
SHA2568ff965f2b12bc689b25214d4d4a85132ce4378c18291c451ff2c0b5a7bfbe3b8
SHA512196f1f6e87cea5fc07158b6c3fadf520b965caeb129393d9f74de47b33680f7db76d590a85f38947b632f76ec1ed5c77ca8716e3dc911a55d13cafa713707b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380d3d4668e2738de963f02ade1de031
SHA107830c92ac242f741f84d8b647fdfbececb17f2e
SHA256f96098aab8dd380dbabcd3e132eec8dba0137c5cf6380045feb5cf4001e0f98c
SHA5128e75a9d817c3d483ee22651dccb821b9a27afd1c570b03a19368dd74e89ae505f7900b5e1956a8e8a0846fc1d5aaaa02e787ec6d58a937c67d000e48bcd2afca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572105dfac552d9a92b42da7a6baf46c2
SHA107389b6ceb290d51537b4b7f642ef1559c1d7c1b
SHA256d60db7c7ad29a39edfccffbca0341ff217f04ff037c9b671ede1db70a8020d40
SHA5121705b302485bfb37004a7c1b90d24caf8c6d106634c9cb6283fa6c5830552119c530109063406c274d7c7bddb869383d0a212edd0df66687533d2930948c14dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c57061a7a6f82903dd7d432fb1f6fa9c
SHA1e18c4f75cf5ebcf94e6b866eff743016c4d46d0b
SHA25698039a08bb857f4f64317cd2541df5b913416ca41a33653fecd44009beca71e7
SHA51205f26fb7a4db1fd7523f26e282bb2f08e2302209ce10d150a4a357968a093d45c1644a05d67d1b159fb82d856019faff389d350e5bad5c25e94c6da3f1449c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590149269156cda838c1f38f7feb909f6
SHA12921903f12b385f69e1a4dd0feb92e1dff157724
SHA256234ae27853fe84be5a619a9cab00b9f1860d0f5be0933c30b9001320377f73d0
SHA512d6e8f69c650db454b42a6e76ee77d6390dcc5cb46f0e4a40f63c0735a71ed7de93503061526a4dc74faf784f79d805dd7b0591c94a4d741e3f99a07784c7c9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96ebbbaccafefcf0f96945b2727b39f
SHA149a193aa97a9d6ef896123124c4c4dcda3346e91
SHA25638e7a247e5de12fe3d155406412695f82901f69452adcb247d1b67285b5ace06
SHA512106c905db662a16c1bbcf16eb6b5033bd206035979fcf084e13e63d2299386377131404c944d701f7b9d10159ea901d248c2f7e08263e97275dc3fc9fdebf3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69f7220dd57631631043d3609902d72
SHA1d9ad17b1ed3a5b70a1fa062d463a99293ecd4982
SHA2561a1b966f642e61b030fa8bbcb2497f6c3a72febedfdf810ebe9579bdba225b90
SHA512a972fd9c9fcc8ff5b585ef9c18d7ec41bcfafeb76acc7984a535d2c0970283b180cc7067265e4158a041a76fcf7671be068b4ddd046b26364a25d9317c12793f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e563a350d40f0ba0c6c793338b86841
SHA16956a45aca566bb495026a7964439b836f353573
SHA2560fb35c5b047f0f43a8a99947d9a7d3ccceddd488d7676cac964266cf6e8b6b45
SHA51241b1f6f221ddde1958ec59813a23fb28de53fffef1ffe4bf8185d21d85a2a75086123f987dd43c603d9896ec75573bda8f97a1a2d71ac088e65be373ecad9f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20dfbd50d05fc386b790ff5f88c4e48
SHA1626eccb805bc4cd3a8b21b78ef57a0b0eaff6627
SHA25615b83f0ee81a827c0544316de1eacd5809e0c9705bc2668532d2488bfd528841
SHA5124bc36df953035d27fe4e441ecddadaa6e07dd9e50725ae9172bcc363005cc1a7fdaa153c401e49c2909743344c1936dc6d1d6805dad0d69e1daaadafe0170148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e522b96a80ef6bf4c2dd1d6d0fb8b17
SHA1dd45724996ad005d9dc71a19dea2dc8825df1d69
SHA2565e0da321fe947d8faeb7419ab5a1f5c0a7a2b8849b293690e2840fbc184fb58f
SHA512ce1182af631e569c6ce8b55046eec6c0e55acb938bf9b235855de4820b0e8808d1ac93af45a0d52f80a6654a22beabc49239616b02a35a13b2f849bd588bffe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea45ef5c7a12fd2707f228f1be01b02
SHA1b517b7ab13a43df3abf51243f7477d47f2593515
SHA256bbea484b3b35312f7691bcf9fa6d33501659948bc4ac4d32514c6a0cc16c6894
SHA512e5e545d227974d97dc225defcea946228c4b242fdf219fbcef3ad46580e1e1a3918201de21c7992e04db893ee1e81d43e059043ab46fa32291a4c31c47cde09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115e435ef1ede85d01ccbde53935002f
SHA18a0d4fc7d4f0c38c4cc0e68806cc9cac700b14ee
SHA256b5a7cc2830138c9b35bf8d18126628eb4f6eb7b051b376c3713225db45bb2b9e
SHA5124bb48824230766d2e5b9c1a8038ad3bbb9f4a262aa3c82dfcde8125f2b7300afcb9f9e6a7927cc3c00db97eeb0f73b191d1490962cae9fb2bfa9983ea6ef516e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87d39a8ee36ca2fe1152fa4cb3d20a7
SHA1ea8262723945d36365bd4440f30aed40b33fbb17
SHA2564ac2c267b1d8d733c6b12f8836c47858d600f285235b772c4f6b667424716b7e
SHA51224ee288cd0fbf2fab64816d1273d7d0272112a062764af13bbf6a6316d73fe718ba83bb6a2c349cbefc261e5329c657a65f2db3f06271f552e41a9dbf1b36063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57a2a0a43f30a0ead64b02a58380d95
SHA11b0135008b2f350560dffdd99c8477d5a21c692c
SHA25660055acc8e8b69835d55e3eef62754d9f7444ef55ea4030e0d16cd8f5ad65a22
SHA512b3946beae6f7eed73edc7f7e3dccfc712a0c7a7461c0b5dda09407361467466df6ae400c625dc6a62f6de0e00c16b1c6c77febc9a712cff829bffcc2044fa525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50788f97e2d7acfd1af04ee2fb5590fc8
SHA1acf136f781e3d451cf06a2e6df2861641313bf0b
SHA256c9feadaa32922b47e5b2a84d5d3a3e8d53990a7a04bc59f855558beb18cc28ea
SHA512f79a4e17a137d223b853f5e0b8091bf8135b72b97ad81a00242b66e5642a71a308e4546735d1d86be1e80fe16ca36305d5eb50ae7999c2f8421f6bc8e1cb8135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532e4edb78474b238bef0bada08feeb46
SHA190c993f02c8fb1fa69aa8bab5d7a437d1ed05b55
SHA256feb84cece3291c216f208eb0ab28460fcde1637a8dcbd7611d64714d4a143871
SHA5125bd828c453edbca94b54c755ea6ac5c8c36c1491e7339bdf3bc8eb1db4a9c54538aafaf9b4757d808ac26c6299456195f5cbced2db73e927df0dd959e6d0672a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a