Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
7a2f586f8b347eadd2f685b62c64b6af_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a2f586f8b347eadd2f685b62c64b6af_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a2f586f8b347eadd2f685b62c64b6af_JaffaCakes118.html
-
Size
31KB
-
MD5
7a2f586f8b347eadd2f685b62c64b6af
-
SHA1
8b52274094b5459f7717a66fed8ce8f14ef21851
-
SHA256
695493f989d11e2974a8549846317a582786352f5bf4839ab287db51666fb417
-
SHA512
c464700da2e28ee7d47518a481aa48e9b12e57bb711874d7d9b8eab76e90e9a70bd32f1bd916a665ad0dfe5531ec5fb3a1579d6f29da4f1486d30b11474b4b6c
-
SSDEEP
768:2Ylt9IXlerrlQIcjsdJhLEzX/mMpKzO+OpkAn0MfrKzYIv/fAUe6hZ:2YlAXlerrlQIcjsdJhLEzOYKzO+OpkAq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF7327C1-1C5B-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422998425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c071869368b0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ab090077717549d4209fafcd0d8575bfcfe754be53765be135ba06e856f85d10000000000e80000000020000200000000a321bd96fc98e0ad0acdb0f35902ea52ad44a121ccc0cf8a90a12bb233c71b42000000072991e7779c87d2146eac8e7376176f8349103d48faf8f4b1b4b97dfc16380d240000000a574df2edacea821b4d455e6dd7eed0f5a8b7be42fcbec85db35574ee4172c2e1dc8795d53d03ae5ba973d1f895e1c102aee847711dbe3f608e5b54f5839482a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2696 2232 iexplore.exe 28 PID 2232 wrote to memory of 2696 2232 iexplore.exe 28 PID 2232 wrote to memory of 2696 2232 iexplore.exe 28 PID 2232 wrote to memory of 2696 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a2f586f8b347eadd2f685b62c64b6af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14e45c9ae601c52aecd3b55d091916e
SHA1f61f43c09247ebdc428810e69c913490d4a3d63a
SHA2561ce07148bf563d10cf0ec3314a31d903e5e906e74902aba7d14776233317bffe
SHA51266f630451b009ad46b97166fab70d94557d635865afdd6486b715ad532df09fa2e5ea5cc96b4d09a173f28daa6c960a489bb1a761657845831d786b3e20a1597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be4e9ca787d94f9bf4ff57fafcd401c8
SHA1ebff20a9c1b16dd0d932bf9c0f333df98f61b6be
SHA2565e9f0cff705a6146a6740ccc6c308bd583e6a44df45ca25b9af3a8e209510504
SHA512dba3db1762a46d5ce8995a5d5aed6bdce6f7bddbff3bca302ceda80bd78dbf5717c8c80ab8e3d04f3e357ff74263e8565c71999bec48ddd095552d6b26fdff11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563bc87ae48354757407d13ad4ad4bfd1
SHA135939549ad05144ea51b45e9c48d4ae0369abfd3
SHA256ce7daf374ba16e130794e9b8a39f3f87f2a83fc990615be6ed8e453817d77a17
SHA512205655b712735abab573dddc7c1ee1a625387e55c9807fae5c464a112daa850f1c0931cb8598f0b864c15767c5741ff2197a807ffd6d7a2da30e1c895639f572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d4eafffd703965856d597014c1dd17
SHA17795b72172571affa215185179b3ae214cb205e0
SHA2566285d9e2a3b0dfdf0dbd6c032e338d45ff27449cb32a6b18e909a37c6174be98
SHA512cc19c6af0d946481aa8c99a2b37b9f5d68344f8053c9253ac12f576b57f1fbc51743e864ee9fef61a43d56537aa9a1f03f6c8c686dfa7a62001b7ce3e1c1f8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bff7fc1cbba0fcc7374c0da8c7b7cb9
SHA1d7a9a5b8b19dabebf36f00937b4728212cfa5ad1
SHA256c0a081a18eb36e3ea9b67b07455a4a8257b1adbeb7b91032a72be415e074e7db
SHA512274b2fd2bea916bbbabefafe99073e07e1b3f54f56ed769d5aff74266baacb1d55bad04a0eb78ee5d657f423d1b710cc5925a6edaf46872d36fbb435c8175dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5915c177f54f9f19e97bbe3777459bc9c
SHA1e38b767fede184abe57ea31385487fa70dcb4914
SHA256250aee55b3efb3b0dd6648ce31585c5780c3ac2a0af67e0c34d3e6765a5daaaa
SHA51240f0042c53b81d1e078524723f4a762d25789d952a7225f1dc46822a33b945e7fd46e5fa7f94e2468519b19b3e379ae8ceda0da2542ea2fed78132a81760fb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5fa1278c6b5ea94ec5710a88aec5d1
SHA1e44efcedfd71ab46b4f2c5c26384b5764f9cbc37
SHA2566588a4c92d65b8653cbd27d149d335724eda85b842d5e56488567fd204a7b09a
SHA512672fb5c0faf2f502929b3865f433c5cbf366450be41907cf50bdbfaee522736f3581f3f1ded8abaa013444ba5b7584fbbdb5d6781b99411a509fc00714f84dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2a622c90cc3197894982d3ec3fbd32
SHA135f0420afe3d55795025c81ea784340f5beececc
SHA256497af8d7dc6bbed07504dee2b590f49134dcd576e60e3fed11947be08aab08e0
SHA512983f958eff3c5348732981ba8b442e3b02324f4ff3c40e477c107e2c1158dc923940734f0efb64c3a732ebd6a9f85cbee1bc1a27e28b5e5129b34810433fa4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d9689adf03da8f13d215d34b16a67b
SHA1e891906055291fe54ebab47f85682724edbdccda
SHA256ec44367255597ebea918d4a52ffb5489c4f479a9fb680c0c7ebf2f0c9c3aadba
SHA512aa5d28be65f4060d0e4b7cb7000c9793079cde41f5a8b264cc0f9fb657ba30c0009864172dbcca28ad39928e294ec5ec8bd3eb655945e8730acc34c9acf554d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699d254b254c8056c32d548fe01f8e75
SHA14af9f8a163c768fbbbbf25347c940571ba51f93f
SHA256e9dfa8139585b09a08b65012cd6ac452e3c171f04392aabc7c9f34806a0efa4e
SHA5126d64ffa3f6329a69aee9a1db4b7807afa960ff55cc1d4b0ce9c0480fc80466b04e6f08419115029ce48f6485ddf458e568c146f63fb080561223f7ede854408f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb9d862e3ae0a8717c10c64a6f0451e
SHA1fbd1cdafaaa384427a3f2df652e96b0bf1a96719
SHA256fe57f8a9756e56338267e0960b12b8ef0fb05531a6297ee77b15e85000051468
SHA512fe73e77cb1766f01a93e285bd3dd4390996ad250d1d656bbfe517d8c0e93e066643cf056474e4f06362943623079f7dca59f695d3e1e45a07db65230ed0e81a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3b92872efe88a96730daab74f7cbd8
SHA1a33c98010a8923ed86539d0911bfd3ec8ff3a17c
SHA256933bb964ca24764ad8bda9ca004e749eb6b294ddf0d129a0cb9dd83f3da4885d
SHA51212afeb1a387a44aa280ce8abbc5e761c5ef4460d23b74f442d52eab794d27595ffc827fcc5fb46c137cd3644f420d9c5d5c01366affab7b8adcf43cb0ee9ea04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e1108dad6478f366553831f67a95870
SHA1ea7cf95d54a696449590f64bd3c5787b91f569b4
SHA2565c4e22e016820d6390769b654b1020dc9ca18211ca303df6bbe9c05c0db337cf
SHA51224e8bb59e38dc3df46750f3335221635ece4b478f4c42d939de4394ba1ee9c7173402cdab7fd93539c3f6324666946e878357757dd3b566fb30de59532782bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e1121e4e7020782b1c3898c9dff372
SHA1c9726b8ee8849286859a48b6c7ca0af31e9901af
SHA2563b9cf1d941ad04a2875a8bea2183e112d93275db81538eba126f5d19586d0589
SHA51213f411731d45a1e6696e4978fe2009efdfd2fa6622469c39ef1730888be0b435e3b731f3d15590e710114a05c2855e4ede3b70d40be4d2ad06b0c6314655b3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945645076e45e78657c11668420dd75d
SHA19c5061d30d1169fdd671419b390e2db14f76b55c
SHA256cb47afcd747da49c6006764d2466ae743ec5d0579337ecad9098d2f8fa3d1181
SHA5126044da9f1cdedd0b2c5348ccbeea4e550f5fdfe6f79c09498ef44deca1490361ac807e79b2a8ffd94c8df535ee19d0c6bbbb558dd9564f9a4556120dd4ba9118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca8ad78206cd353d4c698ea503fd30b2
SHA1e4b4486eea1b1371d9aec95687dc11077f2701e6
SHA2560fcfa49d267ec1ec3dac24e4aae116430ca02cedbd74fabe0857fc64296cc6af
SHA512d66fc35d3ea8580c136c4fc647e7c4980bfaab66110a8b2b8f5b0062bc78a7d7fa74ceefa1bfa47d5e240f4cdafc9d73a82f3ef5315a2ffd343dd8b64d0354fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58adb3339efc877de127f755dec94eb8a
SHA1c9445718199df1f49fb6f0c2be0d475e9c2cacea
SHA256b2aa4b77edca79a1a49017a8d1c158467741dea7a94bb50664ae8bcff8e19e9c
SHA512d83d05cef011916226bd0e122f43b1e1197ac16108abfa69d61c833eafab870b519e70f7cc0c3211439ef2bc8bf1fab6b2259c0f5daa2885f5c7835ca6d77c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0c4a15dca8b2cc319075cb5192ac48
SHA115c4aa00a86db1e35c2e3e9800f0ae696f6885ab
SHA25604688c9fddf7c7f3a67acac8f788f5c64980caff35bd23825a93cb90d20a5fbb
SHA51245de45389140f33dbbf033e86ce87fbed94ab4ed138202b4f2f8a2b0b3d981d864d550cfa2b375b2d36ff6551d30a32726a35fd7c9d81d4c46fe359bc0185761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f80c461866bbb257f3b80870b1fc4a3
SHA1443cc46e5ebe2452792c2b73423d2569fff4b439
SHA256d22fe9542f18218d8650bf31225f9c5deafaa9e989738c64ccf3ab696a3d5cd0
SHA512c98b7c7bbe8a95601a3ddbdae888b8a9c8852a25b6125ea9d7095db50e7e5b6db0be2599e96035457deafb39706767bf000e5be60b1388832c9ff78681fdd3d3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a