Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
7e6e3f43c7446cc9569448ee3a654bea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e6e3f43c7446cc9569448ee3a654bea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7e6e3f43c7446cc9569448ee3a654bea_JaffaCakes118.html
-
Size
13KB
-
MD5
7e6e3f43c7446cc9569448ee3a654bea
-
SHA1
4b15ba24c3dce69ea822e9509ab71f29788f885a
-
SHA256
f22479d10a678951cd772ccfa791e35b8e836785413f7213eb96140d211ea49d
-
SHA512
c79bfcbb9be2bd3fd60f44abebe1736bccdb449c3e32019066b9ae5a13e573306ab551174e43811c194d44bb54760a8ce9ecd7f4944daea12765e157446ca413
-
SSDEEP
384:TfE/4wIrFCBmtyTzvCX/YHeleR5d+EXJ+S:TfE/4wIrFCBcys+d+qJ+S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423092746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7099641f44b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AA61D71-1D37-11EF-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a60e7a03951b1940a7683b6f9a3ed618000000000200000000001066000000010000200000000e27298dbf5fec6368493089b73cdbd519c9a7a9a72ee39694d7ff2df975daed000000000e8000000002000020000000dd5d54489344134c2322a69f522d6a3b30d4fe5785a1418891c48c35e550cdc920000000b378417e317686c0d908b67f462aaa89aa5be180dc7c19b33179c1a03ed8ca8d400000008b49db7c137d279c09d156ab5d2fa4ee7dfe80fc7afe2ab9ba290219c5b0f28e8867933999fe83fd9379ea232253ced87aaaed29d5614b816297891c126c4e9c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2612 2188 iexplore.exe 28 PID 2188 wrote to memory of 2612 2188 iexplore.exe 28 PID 2188 wrote to memory of 2612 2188 iexplore.exe 28 PID 2188 wrote to memory of 2612 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e6e3f43c7446cc9569448ee3a654bea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fefdcc73b2bbaaf645d2a3ee6d2d55
SHA128a076d3b4568fbe286f51ac46d037c3a4f33f2a
SHA256dedf266a5d020a406e3ad5d39f0cfe393a275261fd7da8397661411c8e17e3d0
SHA512da33bb7a02d476f4b95d919bd54594203583322c66d68907dcf369f5ad7501abd34fde6fae8830e32380cb2666575fe19844745adbecbfeca7ebc720368cbc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4e7fec1b63c68014d799a91e6b263f
SHA1d2c90a6170cbc9d1e5a7eaa3e1201aeda996e71e
SHA256a6a3b8ec6a903a3ea1aec3a0fe9a94b7713a00b9911927ba97eeca86be1944fb
SHA51273397b2706d88b3329ab9a1c576a23cb0c200cfd5d6a13e080f976efa21c3a79133561fad60426033955987a10d4c9e061e89a14cf3f6e149f6112926413983a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58480335ff583ee128914507ec3949e1c
SHA1d9226b9ef75565529a3467cf7b2cca8f014eefec
SHA256e23489246468a64998d18825882224641bc3d43f34263bca8762896944836cbf
SHA5126f59200d6af71161c64d663847292cd8097f87bd6ecc59d3577e2bd85fa3528750cd58a58a3c701df7927dde48b119fa930622506ab09bb5c01beba0ae5a12b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cb9b6b2f89eca09fc556ac48553fe9
SHA1da1983333de60c78c8190f735d88075357b3b040
SHA25689f939fa0d9956b86d0349a2c124184b35400a9b1f0d3174bc55a922625c8a1a
SHA51201579db6e4c54bc5dccb82f0146b8d5827af5b60a0f30eec08439dc66a76350abb99cffd562af112be72d2d4a93e03bfd7876bced017d95cba7d83bd7105feb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bfbe05cd03b5091ba2a48664773073
SHA13f07c181fd4393a61ec6c7778a59b7d64424be95
SHA256b5ae6d24686fdab4a3dec89720a616eaec7180eb2539fe197c19855305567132
SHA512b8d622cb21264a7aba29f200f4f69d6fb45569de42f51619dff4d90871a044f2fc1a95e55080e28a7adcc362c92b92b72809f08736e7f7c274cf2216048a1677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd384b6c22316051ce7a5804c3e6f993
SHA135ab575456dd67ea6950d7bb65db201c55aec437
SHA256bef7da038e7b0923ede67b8444a5d92112b8ead450cca70f9e56106647220d27
SHA512f476fce1e904281076f71e483409c330a03f6852fdcfa6abf095d1fd80c4830349867c742487c632e6dd004a3b992250ed0eeb3945435dcf6ad232daa68fcb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2a0e433e2dc7a4b0a66f3d40709a21
SHA11780c9144b28875f4a61d25f6639acdf9b7f685d
SHA256b9e843b0cd56ec514b0d250b729cf85ed8cd9ed184a466924c6a4902749ad5ab
SHA51288914b414f970f41d4f430d21666a082fec88525e79db40aba3d0fff515dd517983ca302d14c048c307095393a8547e8678137475d047f08f5fd0c6edb90ab80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952d702d1e4aa21d81adf9bc6ffab059
SHA183116bb991fcacc307a9bf4bff72210c9b111705
SHA25604c474e8c86ca082ffb8737700ad8244739dd9f824f953eb392e33354ab04ce4
SHA512ca026d50c36a91f48e4d0daec09c4dd712318330fa9b1a76531f472e9ba6e76fcecede5f326042f87969345f3472f003f4fb09030cd211329a73e2c38d214cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abd71d730b8ada3fb13b7a1df872303
SHA1f3f3517810e97a96794fc6707119f3bcf33c81af
SHA256c5208e88c7b4fd816dc56e306d66230cbeeda03e2b2be5c8586f1f13b7ca8161
SHA512bcbe33d9737ea0293da5f0175b9ed12c257dbdcb1487ea2bcd1e528dca6c4ba30613225a0f10f06053180ab054a1596795ac65b45140e2c8a29111c32fc2f238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b232f30d34361eb6766d400f39f5a1af
SHA19f38ec47bf022fa660d1a4e19c3bf6da58e0a070
SHA25693575f824dfbd4236b8560ac0cb246ab7d0e21c9c5c3b43baf23c256e5dcaade
SHA512f52650f9f98bb92b4100afabcf69ac232a7cda3ac81338b024a4c37f4435279a4f4e734819a3e1b1208b470e3b5079fed11e4ad4dc97a9b603eda9782a16fbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3f12786d10779048880b5a0cba94df
SHA1cba40ee3b23295fd123113f4e2f394d0588a2b1c
SHA2567147025d1b88ea847cc2a5203494bdbe1bd3930eaeb942be597f90a5720c3d3a
SHA51242b689bc5cbc4a1fa9f3d71e037d8aae09b26565b8c95fc63eb12e3483e0742f1f93ce02343aada999d7a3d4e34ef291acef9be99b183af9b5f26e430d088e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bd921268a44db9f8ec6edc33ff271a
SHA18d27b56834a4cf7b0506c6261fcc3bb585c93be9
SHA2562cb22f2d3b4341a67cc4686ca568ab985dd59ab4e7ae66d09f9d442405689698
SHA512d8c38676731efbdc39f97a828ca6bf48452a86b33a32b687abf47cfdea7aa9f7aadefce7b45e751dadf0f4fb3a486602817f42a4a20b2e97dd962c94af8e0307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de9eb25bf25dcf467e915d848034f99
SHA1014860fe92ab9be5df64f3ed7945f5f1cda3eafe
SHA256c1574846022693bf646a116e9378f7544a8061303a619ec5c1acb600f22508c0
SHA512160fe90e2aebd84740fe05dbca6eedd48b9204356c6f42c2e675ef68d1246b0fe3e7ca658411810fd7d7ac8c148c36d08aebaf949ba37686c798267842ccb91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0ab2c94fea1eea721a2fa4bd585529
SHA1b1bf4af203cf1d76be502956297110cbc49e3806
SHA256963afb1e2043aeab16eb0fd6cda02e1f578feb642b5b39e110ce5d6d9ec39931
SHA5120a07480fecf04ee5393f5c53aae84c24054361a250cfdd09b95c84c1ed4f86a57b867953e36bebe9016046939105e678be7c6fd885bdd4119239c198f783ded1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4434f26a06da1dac4c4d1fc0241c47b
SHA16b33d374cc0cbff7a6b628e4df13ff241cbddcc9
SHA256bfa57bed5e25e1e1132e26a52691427c484ce66633b66b03a406adc94aee0f6f
SHA51258797bd9c771e0a79bfef295d1bc3b6eacde68a09f58e92d8bdf282465cf556195c900ae31a27e921eff20ce258b26f4acaa7b130d428104f91782ad9ddd3c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a29e9c4758002fa859d666fd7360164
SHA1aca1030461f37d2192abfc4650663f56c5772b1c
SHA256d82e88c570250dc9db3ac901109111cb5f0e0dff20bda77ccb6266d69cbf6ed4
SHA512badb0d4d0e3e026aa6b5db63574efc2033fd1535342f199eb3a59234c9b0da3a69e695eee97007bbd6bacc8571926d4546d7bd1fcc9a52013162b633a3a6ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041b5e895af1338c9669e61cd59e394a
SHA1ad698ecd98ea3aaf4c83b1a34798494f03041562
SHA256916a9f1e96fac55d04ad97938725fa1330a45901e2d4fe458cb1fd64cbc81dfe
SHA512dfbdbb95fe6c357f88f2924eba4256b0218f756871757bb6cf43b5bbb858fa1ecc041c3f35ad5b3bdb8e977ccb5c29678a59d02cf0ef908293e34e56dcf3df71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a4c7318352f835e3aa61e624a69912
SHA1bfc4545e05125464c0f721f15061043a78651d58
SHA2568ed80cbfcb77cf02a93742df8bc92915a8625fed2a849df029b964aede0c116f
SHA512fdc135066381ebebbc90c5f0a083e14b7e6c111594252cc194bda45d875f8ece81a2483d2664e47e600931982781b381b74a41a62d55eebddbb927300d5b35c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51832449403f67c83e36c350a9ae623c4
SHA18f6983999d209dced6c3e489f07bce3589ba77e2
SHA256595404d2854ea038858593e8bf0961bc1c64b33025b4cb15cd364a7c084e9f48
SHA512144ae90991ccb5164f92e7d26dff0131656541347cd9e6e3a6ad5817cd0fc0ebc86bc7dc3b845bec70a1dd2f0f16d97d32ccfde45092064bbfc1d6a0a3d3d48a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b