Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
7cb34530a7a79f3a7a217dbd9eda3d94_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7cb34530a7a79f3a7a217dbd9eda3d94_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7cb34530a7a79f3a7a217dbd9eda3d94_JaffaCakes118.html
-
Size
121KB
-
MD5
7cb34530a7a79f3a7a217dbd9eda3d94
-
SHA1
ba6909b54edc162e4308a65af7523ecbf8d8b72e
-
SHA256
d7160ba535d486cdf20f0ee204ddd40077dc133f724f08a3358d847cf2929a39
-
SHA512
80ee725203272c7a2389c0c2a4cc753f426ae97625a6630042a0a31f6e458a02c251b31e964242ed6c4abd9a508183f9af2249174e7a55e9280720a35b90a08f
-
SSDEEP
3072:EbZkpFS8ppVtbp8hDWsGr3LEmSZzFzuzKa+8O:ckpFS8pZbp8hDWsGr3NSNa+P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A6B09F1-1CE0-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423055459" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2144 2456 iexplore.exe 28 PID 2456 wrote to memory of 2144 2456 iexplore.exe 28 PID 2456 wrote to memory of 2144 2456 iexplore.exe 28 PID 2456 wrote to memory of 2144 2456 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cb34530a7a79f3a7a217dbd9eda3d94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD519210b33f8175b1dff5884571e578759
SHA1e9a1bd15c3ff53a8287f89a5387392a87e70fce6
SHA256505834b6e5c72d68aac4858b875d1c6a7119bc1753aeef703ea31ed8858f6742
SHA51266af1ffed252707836392b90ea4b76f81be482a764c458fc784b4610a1555fb85a20de7fe762b82fd125128749db887e0d58cf6feff078b1c718bc0a408039a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c7f2b37d7a292ec943589757b7748af
SHA1379848c02ef9ace05d3af6fe80cfe1f935b8d927
SHA256e6c5b21e26ab774eb1c0e739fa01a9fb0b76a224e9ac23dc6747a7eb743b93a4
SHA5123ea290ccb08828744d80ff94cbaca2ef53895968224b4bbbc771618d3cac8dda12ff4da5532822d8b07f518fb9c722f6690b5430a82b9b284fbb7e741fc91237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1fd951a9f77b23c66585676c64e41b
SHA188599d2b7be459c265797e7239f470d1fde193f2
SHA2567052a7c714eb11f8b49a3e6c675ec85e3942b20ecb23c6db1e9b22d3449c4bc7
SHA512f3f16e35e9315999afcd47bebee68afbd831c273366c1f8e214d9f4794858f5c243a7d40c8aede4127579929114afb935dc8c5a9e7f1292b2e74113761239d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064019f0cb283bd55adf17482b5a34e8
SHA15ea7c2876655feb8fbc45224492f4ed91a1df3e5
SHA256c4e30d7796904af35821d2ae12af44e1ed7b45d4dd55047086df813fd023293a
SHA512f025e4aa4cd3de5089c301b663c32fb9da2cbb74ad2b79b35eae3bb55010e31aa7b26bcea6be9535ed5917b79973c9347a41a17641177d1017e2a1c5f56a3974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13d3e7cd2e7bfb6d42d084d6ddfcfce
SHA1e87d50b40d82b038aa675c94ecfac20e9cab4fcc
SHA256cedec6d761e40b039792df246c918f895ab5b3759f2bba385473c738e9793f8f
SHA5127d63613f63b729c24d15c803e7846e93bf7466e13d09d9ab7a12bbba2eb74e0821ff67272764d02f89d38db3d2706e0ae2337d8ce4232318607df6d931bd591c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a700138d353d581aa2da3b39899d10f
SHA1e692d50aa217f7ffe45c48232049412f8f606c3b
SHA25604a609e8a0deb0148a9046245c5af0fd8b81f0c0498991b70c3cea16eb7d5f87
SHA5120fc2b3fbc99dafa72cc6d219abd4286b49c3b8f0921fe416ef2b7159be64dcfe226b95917a44dbca6f957d1e5b9e76f72ea304c51547118e6fb0f956b255e3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33376483d2f1bdba1414c6d54c382d6
SHA169d935c98444c661a68558de70fb15f6658539b1
SHA256b353e0e7f5d69f7d5387ffc64134bf872b5b6aadb52c965e59beec8dea3c16c9
SHA51291fb443e65a19afc8665ee1cd6bd92ee3fbc584d66d6a1fc2ed081e14cb618c8e24191ae2fe35d594c8a04d97c6bda9a7220ecef2693cfcc561bf37ced25fe84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12a1ced037cf4c3bbaa288900050248
SHA19e6dac18c06a02ea46dc0e3674c2083a28b2f2b6
SHA2566b386264fa6dc574a9f7f04b7c0c5b9da1dd234a40539db73d69981b4b6dabfe
SHA5120df3dd61ff7433e66b866fa94d474b388ce2f17751a949b4e2703abdecfba4246480437df99ab5f58b8f05818dba375beefbfe0ae1cbd24e51d528f955f5e825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418349233696a76b93697b429f56c23c
SHA1f109a2da50e0708438f423417120d58ca3de02d3
SHA25612143f6b4608d1df33e256f8b5a0abdc7d939d6858cbc5c7962592656775e99b
SHA512748177242aedcbef712740eacea6e77dd1728711c229deb862e118a27ce7d515b0d873a557640b15a8d875bf3f714f3a43b3754e4cbf928632645e2b74bc85c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52293c4be2dd62c30bd331f1ac4625c1f
SHA1b67e5f7a4efaf7bac40232a2e788cf7f9b67640d
SHA2563aef2e9145eff9f4544e76a2ec04aaa93366229cca82a2a17ac0e2f7804b65ec
SHA512d565fe2ecd703ec832899a3c952de1ffd6cefcb651e876742d1e91717f158415a0dfc23b89a31df7b0ca2d95818e806f6f780b8d2e1cac62ea569cbd4d6d610d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c28cdce7e683b44c2c41b0ac80ab997
SHA1596a09562c4808f0047555150baa81a386c0380e
SHA2564a9a38631ab8bedf9834ca3943b5166483f16282e20ac2faf73a9b66eb951edd
SHA51259535f1d64ef1406c9e6cd858c71eee00f76adc3a57dcccebf291e48e76774f0d343c5b5d1217f0efdb1be984c50ca65e0c5e1381d316bcd0637fa22c5b17f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d2df9ba62fa6a92ffeaf301386fe2b
SHA13d50fd09812906e043ace12957e8bcbc69475eb4
SHA25696b0f570ce8eef19fde5b362ccce06c33fe763e4a66de308b4856f924d1cc79c
SHA51271888b2e92b86968cbaf2743f21f48e49967792ba4f273f7a9efb6be8f1b008a6f16f4446ecaf561be721adf18e9c224f38efe82db95963ce994ba88fdcae101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a677e569f6ab4fd23bb4830d435361d0
SHA1fe9bacd4b390508ee59ab32a5d3d3b677f14650f
SHA2569fd4fa065549499a7e1c7daca1e9b89b4f7f63b309ae3e0fc3afa41936663b99
SHA5129419786a82de04714720dd8ee96395df9deab78e47d54121a417460d4521431acae446f71d45a3044813b9917825600ca6106a3f41ce52e1d21fcae58675f443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d44e1fdc1f2fade64bccc28b85b95c
SHA1535fa2b2a30f29e8c61210bc26e615f58c1f0115
SHA2564a40b119aa29e69a94b9de22b23e38068bf3487653b5115ff0f2f665f7b8ed2e
SHA512c1b76f6d12297925ef4dd4dd641d4eed0fea39d623a133132937b42f3eb79ab097b1a497c4e751d454b55426a491a3c154a8434c6f454d261ff349a33d3c060f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528fd955617ba80bbc9b4556f1ce55d51
SHA1a3b022f6842a3580bbebb9ebc0dae8bc3d904065
SHA256a2ae2effa7aba040b28b16264ec42b6414029ddd1f1835577161de285bc49ea2
SHA512a4f6d86cf54316799fc216d4d84847a47ed2c3470c54759dc4f9a9b579846aac3c2af01fe2d7c3c3c686a50f413f50160340dabafc7a2d2269418a326625601b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2642d450481722cc1524c1159caf20
SHA14a483bdf051119695f63e099da1a4dd09dcef0d1
SHA256277a4b5946114918c4af5f73a90974a0713dbf5aa22d1e3069b582e35cfe8f5e
SHA512d7b9640320784211ad413441b443437049675c34340395bef8c3c04bfa1feb5f91780913dcf9e72ca4101d176ccb88677ad7c1fa57603e0cdd032ef4ba591807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e78072956c37928ed474c93b69e7e82
SHA141aac7b33b9f0afd7174f6e672bb1f05a8a4da79
SHA256a3d08926c226f959a7371ec1454868163ba6ecf9498620fb3d6b6b74ca143e28
SHA5120a4857165bf9063c79fd9701a33122aa88762f0c723aeca199cc767589febd054c7db40a89a451dfd2a7ef2c045e8f1b8b8dd90d5ddd2f233415613731f7ba6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9f2705a9919938402aa83c0d4e06d3
SHA1c9f7cf7f657fa173160f1517702c82c2c93a98ac
SHA2568dc5beef3b875fa04488fe1e5edb812f8e9647cf683d21edd3ad79bc769c9ae1
SHA5129fd2d3b49a990f96fe39d1024a21a792413290d3d61c4b508f7269aa46cf206ace9e43c7145ee7202fe1662bc437612ae19b1333f0d033ef4fa9a88ac6fce634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cdeedc3f3a0b17c0ea1b2319c3fce27
SHA128869397b6d9fc5e8f4ee36b0fc5b771b286971c
SHA2562a17ffb4454a04ff3405a0286376a79f7b1ff5d30979a97c04f4ea3d8212ce1d
SHA512b6a7ef1d14cd695b968bc6cf1fb11f307e81fdfdf143f9ea5b2db9c9603cbc282725771643f2e169711beed64be4d8d27524e09602ea0c58f219dc41bf44f669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ca33bed0994a28011c434385749ded82
SHA1513b70b9ba9a0ea59ec0e041c72023087a6eb872
SHA25638f9edbaa71897fa9c0245ee295b2ad6839568985c194985a5a0278608268ae8
SHA512aaa08079fd7b205a16aa48495ab0794caf94cce76620c8c7ab38c4a63e6680bc5e193610318e9707bbc6a1cf4acb8963e94f8e9c01af820f2c957b0dce5a3fbc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a