Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
7fc713f9684953747cd4c310b1ed8767_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7fc713f9684953747cd4c310b1ed8767_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7fc713f9684953747cd4c310b1ed8767_JaffaCakes118.html
-
Size
63KB
-
MD5
7fc713f9684953747cd4c310b1ed8767
-
SHA1
2614187495e74b3a14655b9b088d699aacb09462
-
SHA256
e3eb798170364464faab2520f01fa86fdbefbec5fccd538b3d34d40ff85ee9db
-
SHA512
1eaf1eddc59250de126cdd2fa87d06be59e0839b351aa2932ad7a517463f985bfece35cbbd9f4c98b482384c3bca99fc952c637d828006239dd86dfed1f4e6f1
-
SSDEEP
768:JizigcMiz3sI2PDDZf0glJm6f5H4oTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys/j:JqFTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c9c19eb4d6eb179c0276da0091193b2480fe032a62391c5291f00bbc51ad4f79000000000e8000000002000020000000536dbeb501fdb7142b99a660dd7a233eabe93ea5062b9c396cf7d8b8cfc86cc220000000f9a91c16b711d4427a5af87f69d4fe88f1e87b0f83bd31ffa22d0bdf965cc3e440000000a029adbfc0adc0803d4721de08f0bdd3160cfc688d2ab27daeb4cf70e82f971cb7b99c554865c609ca06b47d183560e2c6e793074a313f0d7ee4478a8ef532ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ED21BD1-1D84-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ff80e390b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423125716" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1556 1620 iexplore.exe 28 PID 1620 wrote to memory of 1556 1620 iexplore.exe 28 PID 1620 wrote to memory of 1556 1620 iexplore.exe 28 PID 1620 wrote to memory of 1556 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7fc713f9684953747cd4c310b1ed8767_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b99a3eaf4160fb60b5bfa2cbbeb99af
SHA1880aa69a80dd929d0b14e8a5390414d3081eac7d
SHA256d10beb54404499f21297ffd1fcefd8f79680da0d3480fe22d75945f19d47ec33
SHA512f3b199c500aadc7fb36515f41a96e8641534ada627ad00be2321e0f6ecf86ef2654c2309f2b5e9db9e9d541cf926a55e40ddbcffb586bd9b907cb6a5e653e3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52842dd8396d3dd7270f62ae36704d1cc
SHA16aeff6bb64a6b0eabd64a0a782017c6a1b5b3703
SHA256b98c2ab1209d52f4584e23aa886be76f3e75fb4fba14cd38585d91e72fa8d0e1
SHA512198409e0cd5d683293f22e8740d8071e71beabb0ce01b46bffb7050b7d8f658d53329905c85f9b233bbe5044e0597e9cde991d50db3ae6f3be87b3eaa512a0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91e5c66e530327ae8d874cea6b153fa
SHA1e4592e577fbed8e215878de985664af766b8ff26
SHA256e84c953535887e3b072699ae1abf07220fcf09ff1b92418058caa6bbddae6ef3
SHA512922e7078b2707c5a400d27bdc76604edb5082ff20452b6efe17e8378d03a4e4d1b0b95fe5929a51cb139bd938f834d845074224b573a0dc42bf1e25d3ae950ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab30aefdcb2898423a674495fad44f81
SHA118919907761db4ebc138f2c18c092c1cbffaabb9
SHA256e20e760ab9a5ea4ed9032115b76cbaff0d81ba1867490c75a43fb023daede531
SHA512e4bcb925969565e8d9cce794bb3c9f71428947015e29b54add187fc7a20778f2f5ec89f577b6e7f9bceadcfa219dcc1120a20bb39881469e8b1662e9f2929576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b5e6732de85bfa5a661c014e7fc2fa
SHA10d6b08cd94b5cb61a9f48bd33d7add2f9469cfef
SHA256005f4d4aeabb726f0365ea47fb135e8b40324208f6bad381d6318d662a836092
SHA512d745cc2d0f263c8ca008b5bc78aa611b97cc1a0f634e409349dd7e220622a5b0346810b8d82a585db8c9a5660cfc1c11537d99fe2d896d7613cc38d29ee0b3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edaf53225d3ba9086158f6f854f03fe0
SHA12fa37c9c78c4b4925e2cfc2c238e0f8e7bf1f5cd
SHA25651fcc1607fe1f9c042e62e8c18663b6071510d93ce90cf78cfa06d60b099edfb
SHA5128c7585ee46c66750753f22cf953961334e87b54f1af3a6df32ec25dbf196e6a094171b3f1b0e3900841270753a2b6b72172863f2771c8f8e3b691a6087085334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59010832f71b8e9fff6929701b766f8a1
SHA1b82eb8dee4442c5649c0bae15ef1f30d9992f06f
SHA256ae1d9527c28c0163e404d08d03a82bd07658e653d908a4bc9baefee5a2a715c0
SHA51258cedd21823be846b138f2dfe2b146840a3aee919c1c2de9327cb0f74f87d3bcea27ced36a078081ed4909bdcde65e2a1b4c780363272f4b9760786682b452ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51442862a6b3a02b49f76d00bcaf500e2
SHA144353115be68696d030c832ad0bb982b604c00ea
SHA256d42cd3085f752d1a95d4c6c0b8324375f7b98c0846858342f70f0b16115db541
SHA5129681954d4e2567413ae50dccf53d2029a8ca9bdfcbf585c7d9e823553284eaa783920f5ce839665a19da8e5f17f336ebfba1172f646b1b00ea871e09edf971ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290fdd4696c879e5906d4aa4486e4b74
SHA1e3332e55133ee63637d464770f99b869120eca09
SHA25652995a12e770c863c5f33a01f39b762d502a30d4d6fbc4948827b96ea9d35b80
SHA512cffa330532101a643ea4bcdb6889d7dea79de7eb6e350452310a222921a49e58893fb02c0ddd2a41804078e1e3bd05b6e02ef12717b907d2a54a03569ffa1128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abc55af9df3da9172cd0b3ff5ef0dc0
SHA168d2fe8714fe844384fd8b20f52994d249d7720f
SHA256edd90897a0f7328517755509559d4f0588c99bd605e9b9fcf12749ce9bb60a8b
SHA5128a7102a25efbe2c34415acd1f120f63dcc010fae4c86fe21a26c03f10a6baff2126c51c0247d1be5b6e0adfa1e494926ff3069a80b5ee8715e0f8911420a437c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b83984d5b22e54d41614f619a8f820
SHA15478d32b306959af03cfe7aac13db395dc25d774
SHA2562d59c58b92da96c626e981ae42b60352be121e15b9f401329ebb3981b6f2e7c3
SHA51219c91a530ccaa2e4f41df90d706c2acca76e7aa9e2a31cb937b612efb92b774bb0d1390b3b6bacf05afb32dd59cc91f4fb3bf2530c0a73706c59a5171586f399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56836a695ca5f97507283970577b17b5f
SHA1448134e8647aced40b331589cadc2b5cd9044605
SHA256356ebc1ed873c8f23e9a7d5a15a6cf33d0d4c409685e7dd7c0dcda2613ea8226
SHA5126f5a4899f8c116e808b6d68434c7fcce7cde4f89fc389373781dcfcacef08d9be05cf985bf77bfaa03031cf1bc80fd2f9151d6e3df7d4c6e08134cc5d562a4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3b17c9dba51ea4b0e106eba0a37398
SHA110f1cb2990ce9298a55cbcc0458d65c868033e0a
SHA2563f0b6cbc5746ab2c98203e4dc77d7c1426ce7661305260554d73db502d4593be
SHA51299727461061616a50e020a256ac1096b31e9e0d634a75c6e8c031dd573120f98316c9f6ed6869661ba6bba6f5eb1a60dca6ab3da0136afcc367a7d82ccbb0e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5932eeec257c414249f935a14acb6a922
SHA1d471662b793d609c32d1f74b2860f2a970b2be1b
SHA256b4ba3686ea92fa94e4c539dd01a2188305f6d883bfec86be2b38701e805f3a01
SHA5126029bcd48a11f897f793175c5e11488ec9e91f97f06a8e003bb764d2bd71a86fe2326852921ee96ee5a864fb629adfc607046d6a51d251fd13e5a9efca36b48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df81c06b2222386a70e05aab74b58ae
SHA15b65f7d25dcaaa8021a4117ec9fe7dccf1090bb5
SHA2563e0cc0361bf4d516f52c40a9b500b8d97f05701c6e1f2c0eb33c1845822bb999
SHA5125f72e22d60f6eb04fc001e9b7d01d3b1ea4d49c28076074f74200379b7a8deb2f58237bd8545529d77483554179c60f104f2a2f1b5e9b8a49b344bf70c696424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586b895f53b6cacb8a1ee7b88772e181
SHA16ccc596cc63c21e518b7284af12ddab007b79fd5
SHA25660bd50b6f31e68aced832f0f357191c1616b251957c6e0835a647938b8229330
SHA512f2053ba5048488036425d13440080de0748becc97c5f7f0c18db44b31b5b1bfb1c427dfd1aaaf463f1324cf87baae66ffd9e54812a9ebc2dcd7a6cdf8ba9f167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa49b064c621342739b7f275bfd3854
SHA14cbdc6b92f860337f92df37fba374af6d64f16d3
SHA256e4857dc0dca3c249330bc4437422a2b29ba938a1d00c1524bcc8fbe8abec1b24
SHA5124ccf04f496779ea2cd267b17b22334b28dc913ae5006156be642da86f82f4f0acab49cece97d03511182ade6782f09de7c2c76cc2ffc0ea10b9f5999ab381aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3885e42d404ddca06f1079ed01ae8d
SHA186a388224067375ee2e7eaa082bd5ce0f016247a
SHA256b7fef6d4e063663ee19496ad224e13dd681d9ddd5e1b5b824597dec3e5a16bd0
SHA512baef6c0d00cabae8fb06f05321a83649e6cbae58fe2da171672b89860014215b5360f4857062a8e5b2db28de6a6a7eecff9224fa2ed845c7144452fe74712d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da10935dcf96da003ade1f85652a10f2
SHA182fa1b74ee466876932d490adc62b451f67788e0
SHA256afbce9c83a3f246744fe5d72ac9165dcaaf192f9d0eff168bc405f1b041d23b5
SHA512fb102bcaef173590937346b4139f8d276dcd2c4696bf3981113f3dd604fbb0dbc573cf4f123742c1ffc656e9ba3777a0894e39dc9d18837e09b4b8eb4ba3a989
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b