Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
803f33a554c533ee447a893d89f0c88c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
803f33a554c533ee447a893d89f0c88c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
803f33a554c533ee447a893d89f0c88c_JaffaCakes118.html
-
Size
87KB
-
MD5
803f33a554c533ee447a893d89f0c88c
-
SHA1
33a8e698e6253e2d15929d6e18e313e33820a574
-
SHA256
0273fcd532377fc0c41457908dd2278eba43e1efd4182db248cc22a015cca7a2
-
SHA512
a13365f3e4c7d694e987a4e43835454ad4b2f8e2019264f6cb7f1ff72e469a35319bf6b83c4adde1cac1e76ebd562f0aaf649c63efe834bd1644b6be5929fd41
-
SSDEEP
1536:SEQOkFWYNPfmhvXFGIrhlg2kKkVocxRe5gm8W7/foBy:SJWrhlgTw5j
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1650B651-1D9D-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0be9f06aab1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423136467" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000db2c861c3d65944e9762761610fa361600000000020000000000106600000001000020000000fbad69f53495007c65f4227a36834029713ba4ccef5105eabde94d53477a8a31000000000e8000000002000020000000ff23c3f9f896b98ddb883ec86f338dc101aefc38654476b1c3bd180d947b1d1b2000000078c12d1e77a1e6fdac135e783c5b1de761a6bcf18fd8a7bbdfe18d7b62909bae40000000c22c58b75be25902016c1310d4aa5288f7e76ffe34a36cdc5114119425d986a094e0b2be8b88301f6b77311a49bf7a2cc004eba35643e6cefbb971433827eb1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1648 2124 iexplore.exe 28 PID 2124 wrote to memory of 1648 2124 iexplore.exe 28 PID 2124 wrote to memory of 1648 2124 iexplore.exe 28 PID 2124 wrote to memory of 1648 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\803f33a554c533ee447a893d89f0c88c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b295487b5fc6604d06d423054bf2335
SHA11bdc702dad145e1b16a1c8d2f0ff537602c227dc
SHA2565a8868026a214273301f9a55830bf0ba1773f9ef72aae47caac615916de43ebb
SHA5120e4b96d25d853ca2503239475aeaacfd008ad29509dba6da93131db677220c37ed9b43c2acd52140620f57f48f2807088e32b30c961d739e8240ae0c007ed2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59893c89ab85d430463a0a3050fe1e2ad
SHA1fa490d04de2494866d39e043ce52e5fc37c469db
SHA256e64ba9d9d676a48a800ae026a7bbc28a309f189f82b2144dee66182d3f49b071
SHA5127c80a158c467b3bfa698fe919061c45081ef5ce14dda6cd390c36bb25245b9634a8baa05f5ba65e4aeccd4a0c1931b65235a2d4810811f29dd9c3016024ff68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56e625a32ebee8146cbc42c68ad4402
SHA11a10a7cf58016879c28231ccd712026478c39aec
SHA2566106420929ead32a9263043867ca7426bfa7bbcdb91cf01fb60b09981b1921a6
SHA5125c92d57e2a1a154136af7dd8b89368f57ee1f7db182f6a56dfd0cad24ce04d4a2fc8ad8d2f36b006ff30c84faa0d587977ea7e444e197f409199146b2c576d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da974e716314adfc9fec53b1c7bd805
SHA170cb9e863060363edd056a06322b003dfe38e176
SHA2561d7e4bc7983534210de18be4afeb1214f364fc140857ccfe54d749d209683ea6
SHA51259e8a232448e657e9c0b1eb45f4c68e35c0e27113bdb51b9363856458e116a63e75d16ec07a8786c271abf5a05cef2139f104a29fd84bd963ff0486ba8d678a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50067f2658c77a54fe6a046b5cd6d6113
SHA1c64abde1c4ccbeb6f2c0f924d524ac0ac7c68937
SHA256ca6908aec12d3acdc22bca5dd6263b17ffcf1850b1fd8e19d00f5d9519af3b25
SHA512a04131c252bd999a3790ab5ec0f1ac537da2fcc7f3cc9edc43892e2f650738597f45edac8e114b21709c191796e85d85aed8a4cca8ac2bdcaa39b9f64ebda484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f8797ac10428d6cc08955a504dcf31
SHA13e0b247e1e95fa9470a38eedb7e352733c770b18
SHA256b3b5de39e8868e0cc705277fa53e3037dfd62310cb7697a8e24ebe8c639b74a3
SHA512fc178b382d9a52f3c13a229b8558ac19f822d01276202f763172432d18ac6f2498e00763ea09d91ec453071334bbb772ba2a5daebb3ceac8969fe2802fa3d147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac3bd5a99163a910fa9d6fb3cfb28d2
SHA10b7e404d9d119b6ef81559992a443c63163c6e0e
SHA256d4282879878f7bceecb78f826af79b01d5466efb9270784857434c69991dc876
SHA51234ce6dee9e697c621ec96fbc5f8d568355722c6cd35bf8da6deea98a8f654eae72554c468489f787425a28406afd5811e827f77781c7a1f4175211cada4c990a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e8bed5e53022f55a2e90d7124ddbb1
SHA15f26d51031ec3e41d7f8b9b54cf22be6b33f527e
SHA25663be3ee74e1efad27da5d634b87e214149aa9818af2f6be0db17572cfc410e38
SHA512dc60b203ee66c2a63b61ea0b704b18081854dc45a6500ace3dc0fcbcf1f2c52bd1cf174d0dd5147d526d99c0160959ac3fe3b3ef45f40c8197ee4806c06283bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86c3c6fde397f1aa5ac906963785c9e
SHA1fb4da4e829f4cbf971491c7ba6a2cbda86b737d5
SHA25667ef863be67a00c5156a382ee9d0025911b63ba83535de6eabe583501fb81bdc
SHA512aea4904d4472a19e3ee94742bf95e1f7b1637dad5adabe5f08336f8355e24e32d035ddfd704a324e2c8508ca265d1b6d1d48caceec4e5b1ca190d1f5923a7f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0c1ea25f446e0c9e8f4d702649f820
SHA1621e9548a52325ed148199eb81ef1c744ac52a21
SHA2562e1a6e35c537e5af3c34328f04f64a0032973c9bc7178dc546212ff8bed598b9
SHA5129654f8ed52d9bb9be9b994e354e5fb1f432544ec1a42160145d736d4f07a259d907584c1a74ab7f76e7d8781f452b7e31cff5aa1cd6da8a99ca97a9ebaab1621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139f1263b17b06d581bdc9c755e35ce0
SHA15ee47a340558131d34d53e723b3b14989b5a3916
SHA256d2da16ad083c17a20e3f57a332a6392623e88f0f7372f79f74623cc7a9376c21
SHA512260c30e6fcf869ac607ca6e4cb441113e6411072f4aba3b2ad77df4be072b24fe212e7b6de455459d70d7e931c70756ff704d7ed05886a0ab6b84ed218e32c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8b8ec8641737a4c8b9cd6cf207de0d
SHA1e8715058cd12453af1106b36c064829b041a6067
SHA256915f47e4e392683f12521d6f6cf6722cec939e25e230f8898be90648874b429c
SHA512aec00390fafacb16463e2786213549d6936034a2bb763092e7f8b688e747ba1bc6382a34f10de33b81bb93ca846a6b8755da50f5f8862a3d3d2c6360b4923463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125cc2742f77bdbabc545ba4c2bcbfa1
SHA1c9e8f5446bc08b39f1eae1a6fa499490348aa93e
SHA256664359ae210e61bf49e44e7d3e5320372233780be776b5be8618338eb71e431f
SHA5126c093af9f2ad7bc381fc356a3aa5991f1a580e8a113aca57bcd5caf6e2a885a64ced6fbf405c69389bd9d2e06ab5afa27885e4a5f5d334ae41a2f5846bbbb0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63a5c1aa5804525284219cd5366358f
SHA1bb4152ae5c49d258fab93861a184f949e484f266
SHA2569eda2c054771fb6eb0b5234d7e2d8264e9e172da1937c59ac876f71547d12b7a
SHA512257dd7163791789d1beba07a01afce7d29c472046113bb809000ced5072589b3b97389463ead63364ec182c2a4d663e89691185caa2edefa65861432e4690630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef002eb44e04a675d3a7bf9e5907fb6
SHA1c8649ea2ec34f5c4bc63fc934fa2779eb7df6ba1
SHA256676551325302b3b56b7249998201cd754a42dd889aa16c97fc0f681d7ee707f8
SHA5125afa56a326f0b81e512e0aedd85be7de1a8043c7a07bb03592fa43cc9402daf8773357ab276cc630444de95fd910873c79d9633b394086ad4f4194106d8bb287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0959113ef258a4f0221d5ea1250125
SHA1d0732d8b8f1c7817461432d145f6a340c21f75ba
SHA2567d0c36ac300a7c04feb5dd14442397674df71061d4c75f2dcb855e0856871820
SHA512f28bae738317a23e1cb96f642d814e9a6df447a1bb16b970cfabdea59ecf3f9c35f6955fbaece54d1b363f24221f15ec40a30022f05cfe20761ab883c0cd42c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b7f807e5be78dcc5afd8fe66af38aa
SHA1a3a0eedf21739f12f3f6011ebe833e5268e88a0e
SHA25651c34f034640d04a4242295b2ff6e599ba6c3682aac3ad480b92be8e7568c0b8
SHA512175ef5dd0fef025afa3918f48e6affbffc496edde0d6d1bafc08b32e475f85a3f92b104618d3170752f37599fdfa320784af22cab79d3568c32f4ee134ce541b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57000e7bc0f58230a3d25f0027cf8bfe1
SHA1028691d44f2f318f86351794388d5d1a7efee0a6
SHA256c3132e164ec55f00ba27a73ed1481faefebadd1027bc149b43b2d2bf3756c40a
SHA51258591b979d0f546e2c75f0da37e76fcc2291c88a2805595d69162c1e91384b0d2194d566e42c139b529b0bc6826e2e7c4c65cefde6be7f4d7f76aa821d6202c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffbb5f93bc91709caa4979d842f0a10
SHA1970b4207e5817a0db2a16f2cb95e97d1c47f26b6
SHA2560c2387899f2313ecbd49bbce064835f9eacfa25da7eb1d35198488f713cfea26
SHA5120742eed04a73546ffc799bf55b2ce56ab430bd58759f17f8970ea97fb073e207f9c7878fa746e4f58fdafa6eb0427b45f945c33cc94764f007dd517486f425a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fc26e0cd02cce7cf41caeae16255b7
SHA10413bbf2983d930c2a63d3d4e2dd7da3cf16bac9
SHA2565c4c76604bc4489220c134a80751b712a24e8f16e6655da778cdfdf52ce79ca9
SHA512476395e6e12ffc32bc92ca5773e656711ff298e2d0e6f3c0fff0088d6c3404d275cbc2133c7cb45aa0564bb6cf38b61397cd6563939e06ca919418b5d1d9a6a8
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b