Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
7a3c36e32b70e6760e25908f2f641d90_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7a3c36e32b70e6760e25908f2f641d90_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
7a3c36e32b70e6760e25908f2f641d90_JaffaCakes118.html
-
Size
74KB
-
MD5
7a3c36e32b70e6760e25908f2f641d90
-
SHA1
c97048c8e46eaa43bcd57b20332a3caf233938a5
-
SHA256
ffd3c0abbe89d64aabbfce293708fa93626e86ef592d00aceba77a4c437e13e8
-
SHA512
af829db8fd093954f39a20d1d3b5255e03225578d573ba07c08f78d015449b975d34f66ad808483fccec35d90277d0a8d4911a041e324e5aef4eb8609a09b8fe
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sX6Deg4GAGmoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3wTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45176F51-1C5E-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422999535" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000754a98953b723fed4887028f4ef424ffe0fdef1b8dd0f05765957b79c3d45d1c000000000e8000000002000020000000f3298c10ccc227f16cbfc447612913045dd71a17220220cdef364975187f71762000000054e22080075726355dffe6ef750627ee7468686f6cba946aaf1d8191494fbc654000000013f18e4f67f64f4341a09a4d6177538bcacea0804d2d8899105c8de39cb750ae635e26fa9a92402e3fb139a6eac44f27ffb4c12be8505ee500f9c1e7ebe9da9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e033c6196bb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2968 2932 iexplore.exe 28 PID 2932 wrote to memory of 2968 2932 iexplore.exe 28 PID 2932 wrote to memory of 2968 2932 iexplore.exe 28 PID 2932 wrote to memory of 2968 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a3c36e32b70e6760e25908f2f641d90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642909f3ccea528855da798f447a1c7c
SHA111122cc99a8b2a945d53c00b58d4aa3e533fdbab
SHA2564cf9dafaac6a36166cd1571aaa397d59426acb71298403942cff1edde60faedf
SHA512db085746ae553cbe8969f37fdf6c0f8e275d4066edc2ab48db5fc818dceedad19f16966bf0956385aef1b41bb31149ef76833cf9cb733a845138fe1e147e04f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144dc95a2e02f4f66bdd738cdd9fa8e0
SHA1f8f26907eac1e53a199c08228f5264475965ca11
SHA25659009b1b596cdad25f242e9b27e08c4567d7ec1ed4b9eda4529d092143d68767
SHA512039e61cdbeef97a53b037f5be60a5502142824de2ad5240d91182b6144167c222beb8fd2504a24a2a946c0dc2ad49093a93777b25c0826e83e00bca59de62215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53485adc41a6c6ac53874f0b7c0b9a122
SHA1fb3ccf2d2dbd2b87ea9e62d1fcddb611a0870012
SHA256b9d910710cdb463deda2776da99919bc81684cc3811cb83b0d7f5ceb9651faec
SHA512fec8be8a81540107c64dc8ebdb8076ba16b657105fda05505ef292403e637fd95ec2db9bbedca183526e5e4fed050fbc634424d01339c424abfdb8bd7744d5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b9c4cf7e3e67e2cd605a49453859ff
SHA1b40f4d98a8f1111ac35e4c16191532329fd74dd6
SHA2569942a2515a220364bb2734ad0ed739a685a07f25c9a1aac5f1200ebb25cae9b2
SHA512d3b8aaed38d4b77babe4a92080ec2d72ee84b78e51f8eef5f693fef8150e21738afc78b9bb487dd5d81de2f90f3f9619d16f2029225541bdbb2505975cece01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b68c598c1cb5268a0e9256a742ac90
SHA1b35a6186625403b3b29300f1bfa1c1ea7c0b66f7
SHA256d3993d002c6b5477b12b95820980f9513ce9869e5775505999ee5a136f5b3964
SHA51237244a85657e4c527d6056040d170b51314f4f3aced69cff51258d0a76964d1f9a497096649a2f24a6a9d0d3b9ce001595b08ca53df7c3683055c311b7e9cc19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c58a6775660b7f4d72d5347d68f915
SHA1118e8843925ed54274ee5529400d333d397cf22c
SHA256c1e0578b3165208534cad1125427da6c508644d2ba3920572754ae6c22d9dc0f
SHA5123805c9206a397159a2be2d6f8300af52f3de7df537e42dd18e33724b27a3d5c69eb2d98042d58de261720d1c8b3258d069c76d2610e4d75d45bb2141e3d4b97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5497ce938cc9778062d2a894fb0447bee
SHA1de11b63a81d5a0a30e378f7feb7445673530c869
SHA2568821f4a73e45103e0871f5fa271a064a758e7d2df29d07fd95865b2b802e75fd
SHA51294f2adf20f9bc8287bffc6e293f39cbed5706d3d14bf8c7fbccfec5da419b02b43f2dee7386726d1e5846f0a8cf9ac0b316b391e8846d8292b03844566ba33ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a413fd5c9ec97536d6d6a8ce73776b6b
SHA15e62c75464b111e7c6032494a742f013123eb3ac
SHA2565aa80dd131e7b7a0d31323de13372074a3748cbdc2d5d3f2cead73619c51b3da
SHA512e260588e23dd53038b62e1cc8bbbe452346d65cff465391d78aa346a8d2d42504d50b299de240b7c4f2bab17f1c1a5d701742595c4c882fe6c2eaf26b30ec4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5301d7c861f9f510092f2914f9c5817a9
SHA1c9f5d4ba68a2fd9317fe288f5900420fc138cad7
SHA256cdbd6ab18493eab33ecb9dda5a038ddcf1dc8cd4c3495e9d675fc5bd30b20845
SHA512cecab05e7d3405c8c380263d7a15ab407aad2c73dd55859003f3ab50fb0b5c65d5a894816da9a14d383d41b95bbed6833a731b7e4094b48b2717aa38155d5e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0cfc90cf9cdca4bd5207fb11a0a97a4
SHA15af93ca94c7df2ff7d03d891a466a8aa7b3f0f98
SHA256a928cdf88434c302a08467d12f73ba8d1fc3d8b33c59c1438a81f0ec86691b80
SHA512bdc33f0b306db36586461c81c58c85ed7211c60b8d7fa323df60543df2bfea01c98c54a905ac1f881ef4589497d1f7d125ba52b266542fa03007aea3767d40ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855304be81a953c35b660693ebaaad1e
SHA1adb1aefac8bad4c52d02e4a7ed5ea09c31cafe1a
SHA2561141a5c9057d4955880ec16923b400165ad314076bd7f3b8e905c231a8639751
SHA512c6a791959764062f61cc7b5e92485d378388e79dfff3112c11bf50d7518a9f807b3b85ab8fd30bdfec20787823f346a06636a5e622d0295b360644eb139c05b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e0288670e0d0c9ad05ffb19312110d
SHA17f379c16bdc5228b6ef769f3eb75b4a6a1108a2d
SHA25662805e480bff2fc0c4faca33f8a40894218f2b5ffedbcc0c4dfd29600c15f606
SHA5127dab5574d60094b947972ab130152b44990aa08d690b5d8d19be719d18f6607bef7969ab77d5da7e2be46cfeddcea148917cfddfca0224db667ddf117f8ec2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51502dde395564e51a9aba35f859bef9c
SHA1083be90b78742b37dafb8fc6b14372cf1f4dde6b
SHA256750e7237cfd175762ba35e854ca546b1ac591fe697aaa2473ebef76446ec9a58
SHA51204479981cf16000e577f03adc79292fca345f28608d864c3678e9fd0a7fcc65f6212f14f927219c2d6e16b8bf842f89b1e1280ddc342c524a27f8ee8914cd107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a00b411d38c9e4b1a04eccb3268f48f1
SHA11b7dc88cedcc8f3a0042d0886641ed4a1ec1f48e
SHA256d5a8c4cca24fc914edb6d4cef7962f4ecf3a2a18d016fab76a184222249d8f4a
SHA51230a58719cf07963bfab2d92226efd8be70352ca7a132b82dabc897dfcffa994865163e1bf9ab6367c3a0df1c3715760c09525f5917ebc876b8b89c274d0cff50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51625b837236af683e0396b09124dab6c
SHA12d31aa566be7347c80178f37df2ee40662e9dc41
SHA2561f9afb717f338bda86c8b342ede7d40cabbfb57f65ef30d4fa57608b2b8aabd4
SHA51277ba9b507f04217f6756844a6913b373306be2ab6c58c99e6168205eb6ea87c2568149ade1b7b4377cf5606e7d5f3df8508ef187fd3acf6a2921ddd5239c8233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a07dd19cbad957ec424196b56f82f8
SHA1a47f0b3f5615998892392c02dafbfcebda5517be
SHA256564a07c1abb0b2ff3c4affbf9c7843d4caa9bf24f161a6ecf12a4951649960f4
SHA512fb42ec20784b78ce6606894fc43d9675f61c2bf598a0ae390762e1b1573b288d55d7fb6718ac577b00ae97b8866bea36ed8c290a5ff8428f0e122553fadec3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbeb089d98a0913e4585f541759eb128
SHA11457e87d99d1d55ba657c01542005827bf8747e7
SHA2561cb03a5c4aaf2b338c00168568aefaab8848390a776458b3fd83d0700bb06f6c
SHA512d9cf60e9857f8c4715ff120997de538f00e806855453066dbcbf6085ea5d2c10235839a4afb7f531e4a7dd68425b6a3265acfd48477bbe5f98b3dab0c5f82b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d6dcae65df751b7be1861cf4c026ed
SHA165c8d82bf0f7aa9ab629cc416f95f40690711cbd
SHA256df7d98afc756780a52d4e8972da186835c06f16be4dccde3080f5d6e2813528c
SHA51294cc4c7ffd58e0802ce4635f553b66687a56ac8e7e34b6d1298789c32ad44c300f699376988133d3754ea962c704ecfea28d13729d45c7a65593153d8aca39fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e01f6850ba3bc34f74fd080dee263651
SHA11b3bccf9ed05ac7fb7fe68333f3367ba3a1ee19e
SHA2565b2571da8489e87cd7609f03acd138def0eeda6caaac13419537cf664d1d5570
SHA5126000b7c75c0886e690f25dbcb29dfc929287aa7fb8e4bc72f2cc98d19c6abe91b9c0abd55ece9117383586afc0c7497b33cfeddc33d36dea0195fdcd0696a267
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a