Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
7d28f3bdd8fbec235660128072f35e0b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d28f3bdd8fbec235660128072f35e0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d28f3bdd8fbec235660128072f35e0b_JaffaCakes118.html
-
Size
4KB
-
MD5
7d28f3bdd8fbec235660128072f35e0b
-
SHA1
af2b5a38f76cfc2ff5c2e887e4a1495d7151f0e1
-
SHA256
3f71fd0f808af40ad3c488a1ff1bc996640651719e4773738410f599611aea1b
-
SHA512
e40ffc28b023a5f9fce4638e2399df9f1124bc2855858611c56a93240d38440962579c0557cab10dfccdde2ab19dad8c75ad6db1eee3b7cc308b70f7978767eb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oQ1v5jm9:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d53c95101dd41a4187c856762727c1f0000000000200000000001066000000010000200000006c34be1b0d8d92834dd40e7081c2187e09becd92d5d29dbc2cb01c7086da788b000000000e80000000020000200000005e48d0588cdef3bf807afb9ecd6e24dc045542db5e8e4f6646b4f3ef88f86a3e2000000013168c076e3f2b77e3d7053dbd04cd6eca14c298eb359915510025a28e81e63740000000173b998fda280ad86fd547ab60deda18115b6969e6e1c50c4775994db2520588ed6dfdd0e2869325bb7e5352359a764520bab9852114778f6e68f3537ee5d1bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423065591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FB3B771-1CF8-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006f79e404b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d28f3bdd8fbec235660128072f35e0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5db2d905c51929a46fc795bbffe7f91
SHA125ee10b1103d77dbeee7bce24b3292425e789313
SHA256d7bdb1d62a5628e4f553d86541460ddde11bb5146f70463a87ad33de9200fa2f
SHA5121c1acb5b9e70d2c37b4dac9f3892ed46f26bcb262ff9ab080b35752b9d7c3354370d778d63897f3c539080e577a66de79a3b636d9ddc4c0b8fc1455cf46879a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee8498714309ac73758707656ce2a1d
SHA19d0c99f1b49decc26b838408e21c5884bea0de0c
SHA25624e7a2793566e245766d0dd664448ad8f75c473c7d0e26cbe495b8c85cbf79b9
SHA512d2b449840d66cfd1c900df7a7eeb4c921b3940c77d829ca0da8a92906ea7e68b6860b86df35fc16ae72025b3251f92ed237f1ebf47c4afe37fc1653e1d6fbdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee853ad5203158bc426af7ec052262f9
SHA122a94fe2d2b8873d66ff5dcc9b7cf7586afba3c6
SHA25615856f137a7db01d7846660a82b605c935c068dbd0781e1a0a6916457f617e9f
SHA5127d69b280d8d11019becf8229e1402e665c06b83b3db05d3260ca1a8605ef822a1d00e6e09d56dd145d40572ad0bde16b7c5b193818568cb1acc37ec875c8b4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bedb2f6c5cbe6c9f6a2596cbddb07378
SHA18abe4f24e4230348665dd5498793c25bce47f4d2
SHA2562d92349664c752109d1e7d6c5e124753c13e92a779f5ef92ea9d79f4a5d874dd
SHA512367e0f2810c5b1724087348c6e41485ace07c5630c40b8bf2a869c15b727ddb3205e9367b16f420b5eb66f172b95d72ad773495f72f0bd125cdfce022b177dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb80b873d5ec2b765acef470c7bd4c36
SHA12ebe3c2db4b4b0439c725d5b6a4dada7939825f8
SHA2563a695ac2f3f3aa40734664b6b694fb10aff6a3f0530e9b86326414e60efc1892
SHA512e447da7aab46ec009b280ad19c484a262c9a97ec80f6bb04a5e5258439089ff50988bb4441109ef4e8ab9ca787474938bb213255c998435e9b64e0c4b4bb9610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6915dccde405ec36045f68d0c55d91c
SHA11bf50ce508d7460c4b7e0bebc85ddacee4d20899
SHA256a2e9b37b09f6990d3c51fd20b61cae1ceab4a1459125801d70efcdaeaf5f1331
SHA51239db65dc0be3dd307911279de1b900ff3c22d7cd9bdd57b807fa3e597e170f1fd5843fc40612bb0eb980afc61d3a98490977ae84112e42f254968a9fa073d9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c21704177daf6f2d5115158d189d66
SHA114331eab56817fe361d815b932b3c23d61ae9f45
SHA256a03a648807a69ca708e216e4ea29499f03700a68a39a907364b4202a1aad16ed
SHA512d89561e459e66f96562f1439d02f2ed00a6763b6eca27702d9e2dd19027578be110b303e4201ee22751ea64998ce4f540fdb9f2353cf115c143a39ee13466732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6431357adbc6e3ac0e7ab820c3e85b2
SHA16fc7d3bb8a77f8431d2c3000e3993f7848f4e2c1
SHA2561cdc2dd2e18bd7f0eaa13983abc3043da5be379375150bf6c9c1794aa51ddcd5
SHA51296e46597af19967926fcde50acd120a8cbf494d1ec9a9c08b4100942475ab3a6f167dfb438534f2e1ba8467ddd21be68a0e7c479bb1046ee8d895f283dd9e7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54847980b7276e1371d9b3b9814780df1
SHA17d4f33042ec2b414509dbd39b6a0e2314f79d17d
SHA256c16975c1e7e82fa6c176f8904404931d58883bca805016791bae4a1ac6f5afe1
SHA5120ee2288816b8ce8c3d6aa7023ce3033f39fcefab2fb85460541c64d6babeca8c97b1688cb5f809df4ce283e80c434f20305584109daab0b125b657aa2e430b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5545f38b2ce4abae20a01c383c0dacc94
SHA1aa73357c8bb3aceb431922d06b451b2903de2c25
SHA256ddd0e84716ffb6f09c39ad4d14cff732fb75c3568cac455391404334dfca4944
SHA512cdac507237e8f3391c5a3b40268df9b30a86f8ad8e1a38c5a8e411cad369894eb325f527c68d00fe44b9989f371eb87d94b86c5bdeaf6c91835e028997d6bb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e0354d848616194e4567fd89a7be038
SHA12cfb5aee490398d7b325f252ee4f78e97a2b0754
SHA256776837d5b36e672b0acdc3581cbd5765c1f29c60f85d759b7d70bf8ccdf4150d
SHA512254ea71455650772d5c09add5b66340b8c178ad85635360bf5827db863366b4f3552c39b403a61470e991621cd8b164ac5e40225e7be754f0e98859d0b815e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546aa455295382d593f90bbf4dbe7effa
SHA12c1f06bd69f89b30934bd5bf66301d28e5f2deb6
SHA25606768b74a4209e355462a5ad13e4d64719a1346dc444692c69549aa860d4c4a8
SHA512ab6efbe6ba59e343b1d9be42ecc808a46cf48492f1d8918ba664c495673bcbacb27cf997d0ea546bfdf2c747b97d0c0a5cf64253d9d761d206def66cc046f953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52530b69c44983f588a74a02c736a682c
SHA141c991487ad5790886b0ef726bb145b0a3edfd88
SHA256715ead08b15319aed505ec617717ddff23a1ce23d2b124203f2bb96a7197abcc
SHA5128517d53657268f75e9a095477278581786012a8df515dfdc3c250c500dd6bcdf20ca21e0ab48462039043ba4c8d21499f455286947aaff5a471ef0ed7857b99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0e230a86f59dba6b185fc20d0f666da
SHA18c7f3aa97579603598c745e8c3e96c357ad1efc2
SHA25662166e4f248a68481671b9de78d4a8810a97a69b1fdb64bcceb895610f510fd4
SHA5127eaf0996316c9328466a0704afff15569ef4fc11dd64a213373f8f82c5f9df2c8096c474806e541489d7460bec4ea2533194d0a8a0f23c96c71110d29afe12c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6084843d041afaba736909a59b08a76
SHA1c8b3e429af133d4c105aa42f10f7c893d57d8d70
SHA25690990ff04b9a50152d5b098219555ab1be8fede0ae3b0406eb014624c4dec3b3
SHA5121bdf9b6018c1ba03530ee6bd64b4bf246a24f882ebfca901b5a2514f39785ecca895f909c8d677515f9caa4a1a50fe990bb025289d2cc608ce3ee07e18ca45a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f9003fde1db4d19ad3d9b04e815439a
SHA1360da9023a362a6fccaf991959c9485c2df1d7ff
SHA2564ddb49cce801c0264b92af51a208f7d528b494edcc0cc1903cdd928871384ff7
SHA512c03ae4cd8901977655848b1b0cb5d2597634c838b313c3e42a336b0dfc2fa69bb55c232e60da7b116b3596120c3335c825ac93ea402aa8c57a976d8644e6867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3302901454af868a7ac948a94bfa127
SHA11aca07f5e5e3b9326846cd6fa2780216f54cf231
SHA256023a10a17f4f20af6d0ec9a921e0b2239a3f3618c0451b3a8e8c6c54f2ebc3c0
SHA5122f104219f32853f4350dc73362a73ee94226f80beee6811fbdf21f3e772527d1c88b238cf676ea2ff6542ceffef7ba6acd2138b210b027422067da29a9eefd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579801952bf36eac125b23e39f9c0594d
SHA14c16d77438e453d6e3416d21c4979b6f3313bf8d
SHA256f581c4833543fbffc3dffac926755074e0292805d4eab7c81945303bdf3c759a
SHA512870387215a4133ea0ede14732635a33c5df630e785e8397b9ed8dbc52c4233e859928efc95c8654cb373bb3b976a3f95fd4f57bab1cd6c986b9e641f6a585721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d787bf9df274b902d3f9483b03e8eaa
SHA1094f2e501e26fb9090db0e8300d9570edae21536
SHA2565c532fc08f0ebb118c7eb206a17e577fe406d30910d4afb1f032eb1065982bf9
SHA512d869c7db9fedc634bd097c8c6d15c7358bebbcf122d1dc2fa8ffa4047aca92070ec8116b9ad663917bf39ec33f7f5be96c496a291c9137545f3e4460951d934b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a