Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
803450781c0a05902e71b801824eb3cd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
803450781c0a05902e71b801824eb3cd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
803450781c0a05902e71b801824eb3cd_JaffaCakes118.html
-
Size
460KB
-
MD5
803450781c0a05902e71b801824eb3cd
-
SHA1
2a242561aadc9a572b856a9dbbff34619c9f6c45
-
SHA256
c143808d809d03750482e473c39a88c410c64a5a0d5eace3a269b32ebf4826b2
-
SHA512
a786f136123d22ce215822982227f243335a568a0d0f9fbc216ee7799f6e65da3d9aff12d71abd3454dbd642f73dac35fbf8995faad4d2d0c7e94a229915c39f
-
SSDEEP
6144:S6sMYod+X3oI+YVLQgsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X37f5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423135495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d885004c727e024daf584faa26f3b914000000000200000000001066000000010000200000005f4eeb1d9cb83fd76a2dfeb5042b63e2acfe16b5e95c449c22f76effb5111245000000000e80000000020000200000001bbf5078f590ab61545cf3a140a1b3497d37fcf5322eea660d59ac8c47ccf91320000000a327c2904c913f90e6ef1fa931e971a23a978396342355788dd576f9ee371d924000000060dafc6a31021ca53848600b7608ff972c315430dc4cfeb69dccd781ed49763a89d78f013a55490f11d415fdaa801795a69b2808dea535149786945290c7c541 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80eba8aba7b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D303DEB1-1D9A-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\803450781c0a05902e71b801824eb3cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54feb17bd333c529e824ae19c45d88470
SHA1a89c1abf2b38b58e1e789bfeebe62be4d236f410
SHA2568fc2e1a48f86ba9362e72fc44320537caac5121197ca9bd074bc719589a91f8e
SHA512ab3cad97b4161ec65bf1aad4a130cd864db24d5414874e17de30cf401022cdfdd2e2e7c717227d8c6a8fa67faeeb516f32dcf4f8d7710ae798209cf87f0572ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc5307428db16aa865d72ced8c88b28
SHA17556ae8ee90d4224c85733163de0099ea0b7ae51
SHA256bfd14133fa524da989ffbc3ee5c69b7fb705799e236fb746707927935ac4d27b
SHA512297e94ee90437a46732f93802b28330029aff6c39dfbdf0c1abddb8477b0a990431dce2634af8117e3f2690c92387d35b260e33fc76968968ecd95bb33359b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517810fe105ff2b18ee634f0428253999
SHA132ac36876ca9f868ce341db1744a1989c8413c20
SHA2566898cd0c95f6a9736e3676d8167f14211b569c0bf0d834ad87271127ea6ca4b4
SHA512283852ce6fde74964345bb5ee69de46b9efc091a390a9b8f5b57320332ba2335494f8ce90f4d0184177150b558b6df7b5e0ee4bf8b4b08bd3847302ece5dfb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e48abbe45d285fce9a0d744b2b8664
SHA186ee47bdf50fd0085f92ebe6c325cd267cc16c90
SHA256a8595f1972e8162828d572a385b66e7f54d972f21146fbe2d2cf597bf256595a
SHA512bed616402fbbef0887c7e4161562be2f49d4bfcb8d7ffe507ad5632d958d0ca790f82d712c49879ac319bfd89474f423069f1d03fb1fcd47767f73204595d209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58917a828ce3a699b286fe33014131d2c
SHA1506bc2ae0623a8c615264d36011f1746ec337ca3
SHA25683cbda05a410d22a3940c1cafcce4bb2ac53d9a4adfb1dc68efa1d28a2354b9c
SHA5126d5557174a8d846078a850a5f953abc464c3c191637da3251fef50c3a4f1f647cd0be90007d6e8f251de7b3ca5447c241aefd1b6aaa2e2697d0566e0f80ef5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57f52e489c071ef184c7ec71bab8568
SHA1bc04b0e458398fc94104f6873d926809435d4e6c
SHA256c21742a6739de0e1540015e09ec4dd7aeb68ddc7370df4d80908aeb93455df50
SHA512359532fd6801aaf54f3d09ed60e7958dd7e845d8a67eb780e9a038fb833ddd8a96141483fd781afc531915b16ea724f49bc717dccb367078cc90ed4f5e9124d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538435f73ba256578420b78acda28a45
SHA1411142272c6cd58047d33b60667f785a34e1a38c
SHA256aabe1018ff07950084843e61179c46bd2f6e0e070a0386ac4d1a006e08cdaab7
SHA51219dbba5a67cb725327d1e8782e2da1c31a808edaf450db1f18ff637598b01fb1c50e6f8830f162852b7aec3534adaba075537aaa509c779fd879063df7e0ad94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51febee39ba282e570b8d82ea582f55cf
SHA1ce9f8cf8207dc52669a75cfca5b7b0f70c9491c8
SHA256fd3410ecaca6bc5b6ef7af14914fd0db932f57257e87ce06e34e58917b36d89f
SHA51289e808ebb078d6215df661ea7df0254b5c10173b483828e8e4e1226bfde3e5d46b1588aa1826dd6f1cab1661b401788744fffc94aba409761430d6ff780498ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2356261e0eebf4fd58b4ed0ddbc5de
SHA17913c3a8c769c5c0100ab809b5630a211314b6d4
SHA256311d7e3e518295ea466c131e8da9df8f9e137c9846606b859ab5d5691ba1e553
SHA512d30786eb5893fc29961c05163e4a91c4a6bffa2cab3a438154fd0727a42742259f2435f281cd326df803528ee7f664520ac09aafd38a0d0bfa9c20a477a4172f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49c1ed95599ec25ff364623d219c638
SHA110e0703eb7c54ddb257c76e859600369aa9a7614
SHA256a43564f8f2f71f9a3dd1960ae79fad79f3622ad13a8e9489203c4a4c68934bc2
SHA512f7f2e9267e4e40f4616a44a16e3691772db1a76ddae32f80b5421d437f5c3f72a489483c84d4113dee85fe02bd0d93ea35e9667f4f88e7235f2abeb89d94649b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f5d35f1987e013a5731da6f248262a
SHA1b9aed1d5eb7bf859660dc2722235c05a298dac11
SHA256e2c71a680c985030854f8d0220b55db97f8995a69baadf3899860774c9848f22
SHA51298e3ab32b34f58015f894cd02b4b45184fc404f1c25f624489eb82e39ae5cb8d49d8a8c411eb22ba8617e626c99c5a07e4a5fee098a30b8c8aaeb567ad72076b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc8c374ee0dd71fceddaf9356ba8b8b
SHA13ef5c725611a77e4b9b07d2639c4e20a1a71e0dc
SHA2561325bd7e4a1be8eddc1ad784cc6bbc10bff66324bfc2bb6c4aaa6a01404f4233
SHA5123aeefb7987686d8fae7e985b03fd8b2d7baf79415ab3654b5268140937e16f446d60b7a8d7a3ac899c6f15d9afd276d3ee5cced0145265d25f3663e0ba13b1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a229b22e57b16684c6dcb570bd95f910
SHA1bd360894241a290765d61952e10b7538cbff6f89
SHA25682b5fc0afda9be6b03a4c214cbcdffaec131e30e071d7c0aa90ff4c219b8b653
SHA512dda226916fd6c66f816b8f3e7212deb37f1abbfed0457c0c0b987b0b23e1d87e5dfef9415c07ba07970598604a97a796262743f789c489ce30cb8b461603b6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea04654cbd9fc845877c6f936450bfb
SHA1b2f4591c3919ca4b9f7e25bc151ae7e34b3bb44a
SHA256abdbf8d5d31dde4c51291a7def6ef1373ecaec00c2402e8c27c7ac9b86f85c21
SHA5120448fb164f10461000b76f9599e24964c39a80e98689f64812c646c6d5cb727b7b311e93402d0fb6b416842daae2917b3a13b380004e3f7e2fa53b0c458cd856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666e0d37a5a79fe6ad93687bfebf211e
SHA1529d221f4f97ace6c0089f851489c6b115ec74cc
SHA2561430f87afdd075f8362252cb2b0a0045d737a63fea2d42895264edfd14cde244
SHA5123d664edb6639756170973d251fdfccb30eff1d09b953333a0b87eb3cb0affb6a3a6cae5110f5045fa97c6e9504a02afd24c1bbd77e1aec1987db4ab46db8d266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1eef9d903f2729d7db9f91fd5e8a396
SHA13858f8676d2907ad58b900c8ea18cfc5c1b169a9
SHA256caf59ea238e55e50c0a81153e24dabca4b3a8e3a548dce5348473ec8a5a52f76
SHA512a6b2234a22829ac55685dba5d23698be6ebcb661ade4c40d9841cdd9a7f78f8c0617506e2bc5bcd1c29768b6d7e0486399edcf58431f05be2d88e28185ddfc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6feb17f7fd32ec0082ae344f419b5e
SHA113f50a8d672cdbfa8b8453fee736783d3379c159
SHA2564bcab05940031b75f4c5c08c8a7700ac47aec5639163ff40734a6a6426480976
SHA5129cd49c37e3737a0e8f7e02c0836084218118ae084010f350ab6d0be2fb1540df2d59384b573e9b6c53ee8c22f5643237bc32cb08c6bf403e7417570a635abf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8f18612be51104e386e4e646cd2072
SHA1cf3e2cf6124832218052fc39660439094eded0bf
SHA2567267a3e7568247e752758f55d149d49fb54e5fee81b9b017a631366891a64f08
SHA512fa92b5a468c241922ad8a4c78a7eec7aeebbf3173f3ec7d63b8d3796006cfb0ec6dfcf28c15a3ce5b9a36d501418fe112b37767dd3a02b6156e383fc76b814f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b