Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
80f453678ac6ede5ce286e2819945f26_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80f453678ac6ede5ce286e2819945f26_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80f453678ac6ede5ce286e2819945f26_JaffaCakes118.html
-
Size
15KB
-
MD5
80f453678ac6ede5ce286e2819945f26
-
SHA1
d0a5eed78a2e1dfc7e556714ed64fabf57c67e4d
-
SHA256
bcf216d8a29520a8612d2f6a7d8b143c9273a885ffa935c408ab36477e43d3e4
-
SHA512
88e395b04f5973bf0975a2f814649583ed8e062c2fc2b5a0933cd8ccaa6906118d0bb54e8a111eed28321209a314c01fc56ba95c6669eb68b9bc9c9b40f4ff0c
-
SSDEEP
384:G709JbUZDUDqlfQYVeoh4K208Hi9Jcee9ikTPM9wm:m09JAZA+lJeoh4K20rfcee9VTPM9wm
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55DAF2C1-1DC2-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423152473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f3c2d6613a3664eb535f6605971003300000000020000000000106600000001000020000000696c75b9bb329f7ffa93a598e5ce789e1c0428c591364a3dbc67a143e18d69cf000000000e80000000020000200000005e29562dc63107502a85a054c861ab55d5bf3d08246a7b89e8d59a83363d66549000000091549d3e9264896cf07d755e2cd9e142574d3d2a880a0daede90254fdd71a0faeb6ad86608825e1135013ed750d7f6d330f51c5164dca281e53e731073b448b0d6cf2839afa187e00718d41e20004ea732a4fcd8431452791a46a5234306aab8cce8fe15e71fa686939513efcf44e1335ca0d72b9da976f0e7ecb7b37b2ea0a43e3603ac849a4338c96e6a64bfe4349840000000bea2a43827cabe2bfb5f837d9e88f8fb7eaf57bfc9d3e6a8d1dbda234fae0ecd375f3613862a86d4749ece0057a1eacb70cb95d5c45e788ff4a9a0d0cbb42219 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f3c2d6613a3664eb535f66059710033000000000200000000001066000000010000200000000b3c1cc6ccd4de182588bdedccf7cb0d52b25fe00bfd85e745b20b62b7689240000000000e80000000020000200000007765e544afc7514cdea4cb2f03353a4d15f2dc3af7b8a02bd2080d9081f69eba20000000c3103ab88f306513b7cb40c66231578ffed2db1e84bc7b9903a7e60c111b6ebf40000000c3122598da4a732aa9c8a85e6d8992c4510c989f8d4c7f532cbfcbad01c0746329e2eba69cfb5605382b99b336b5a5033ead33c496d71c3e7ae0eebdbce49d7e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04e7d2bcfb1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1816 1096 iexplore.exe 28 PID 1096 wrote to memory of 1816 1096 iexplore.exe 28 PID 1096 wrote to memory of 1816 1096 iexplore.exe 28 PID 1096 wrote to memory of 1816 1096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80f453678ac6ede5ce286e2819945f26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58aeb8c766c391ae14e9e1b8ef30b8be3
SHA1ae2b7a9ccbf3cd22b94ee4bf74e7af78af4854ec
SHA256c43589522faa282bea4caf9543907a69f2fee06c05af291041a86908b9dba100
SHA51251ae617ba6ccedfdd7bfd85d51ea693671d13908a3ba871874bc956959156b7df6f6f0c9e7e581b357444cffe19edccab3a6f3597d15c226c89d39c92a53643a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561937e3c24a5483e0c1524833d174c16
SHA11d160f52de4c6b37b0285d8d325aeb5a9b99fef6
SHA256709249f7664f95108566c507de4e755b906a6c5933f03d6bec8f343c294fcb73
SHA5122d2318cee9c35c6f20bf72262efdcaa3a7740c100b3c92a21b4f6ebff5816848c3c71aa13b654fcd18cd5b46d2e3a90170cd787a4d8dad89e9c05afca3a10828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b78e3be49f1f3a437b589d1d111479
SHA134285cbc49c17e2e1fa2ec19b45c7eaad2f78978
SHA2560328f4fb64a37a5919a2052666ec04fd3f32e251e1a09858b2fa44d1e1172893
SHA51245519e49b58688785fb6d543690f29dff6606ab1063bad01525931e28ea19becb205b4c09c9190611a2d95628df975d8cfbe6e714feb8bda024553e395c4563d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1dfe2e0b107ad5a284d270709b6b32
SHA1b4d0be1299a49a6f7aa07e1aa3c1c16e26688585
SHA256d710bff822b7d8fc9a6598b227471b7c86835a2d26cfad97fe444bc5b81ae43d
SHA51240c4e9511425e2486bd994375330a26d6b1c94dc762c7061f2697b28d75fc4c9eb6f519222f30483004f4d6ee8b412e92531298024742491bc7e7972fa960f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce1689dbc1a3217114e8b007394358e
SHA15dd7d40f41b95fec4ed82d172e0463b26251d174
SHA256d605812341744d0aacb62f439192c282e6c20c98a3b3e934bf55d8ac963be8af
SHA512ffe87fd3e9267eb9c916ac322e062a0891286b514603eb0bfccaf0abf29565a21fc4e2a1bf96b92b0d99e88acc06f446301e3a6c37dd280e357d509b54878597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d933b50322b69f4f92ee8454ef63d077
SHA17d0c9ba578c8fff9241e0805172748da92bd0e94
SHA256cd0a0bddcf711859a1ea34c7a2b0d9bc85932f9637907c97e0ac3ec959f26171
SHA512830ef99dc00291fc8269a6dffe2e857e98bf24d0b86fa678c33f38e9839cc14c9bdaeeb6ee922432c46b668e1dc7139f65ccae30dff6d4bce0aa5dbb22e86001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c5416a9add8b28ad873bdab3281f59
SHA162ed15ca5d1cc156c8a2e9f4a4402d9ed7a7e386
SHA25643d9075038e0b4ba3a8a2bddda312d3ca3c3229d603c3577e6fdaae27bd9448d
SHA512a33d4f80590fcf0c8dd4ff6106468f0dae62f0485c4b097356980915015652b6c03f331ea8168422531461e1ea72d5e85ec4282ce36e821bd1ddef2e2f3c10a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664cd1f99523036ffeb3327ee1ecaa2c
SHA19dacc22547edc24f480db5b1e54f0c1721d2e3e4
SHA2567fab98e8fa93424d10914c9913f12ad0a9f61b74d78dd02126893aa07355cdbd
SHA512ae1090856fcece585b0c8a7235acc93bb62da344eb9ded362d7e4f3ba0899593283a7fff40d7267b31178c253fbbecfce12f38ef71a6be0fb5668910f914f63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d3feb15d21c9f913ce5ad71a26d11b
SHA1afdad4eb3cc41ac1e8d159760787ecd15dac4f7b
SHA2565b88172f162e76729b346e73758552e6b92a4e52c66ea6123deca1399cb817fc
SHA512b9e43ebc0f5416e0c26a5623b1c8b12e47ac2c836e15105e1a78924c1e535b2bfddf27d213dace683843b80075d760cd4d6b20182dd34b5153e04848436b53b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873cddc2753e16cf38eaa389997eb463
SHA105093c30e774c4b929b78649c1643cf10944113e
SHA2565c8f7a1b11be8ad2467de3582a1a036690855c816935e8bb20fe39ef6b5404b8
SHA512665487bd8b3a18cafb8a1ea24ee6f297371f356f506812430bf2dc41ca877303604efa627a769b83e3381c424c776564fc38803d34705562c52760b86552bede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58046fda300925d9c3eb4011ff073d83f
SHA1d0fd9e26c207f5d36a6e7c36be5e15a9e122d5a1
SHA2567976275a0ea4a895012e223851f71144be5f8c9ad7816c14deea7f449e9044b6
SHA512480a50d59d42705cf35536f6231909af03767788239fe57582426a8ab985e49526458c690c557a098794db10c1b08591ca47a105dd897d08852e021d1ecb8a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e9436422a021f223a36da4e6bcca7b5
SHA1fc0fbabf941abf6bcccb1ea20f831a1f4c572d0c
SHA256a03177fe00c0b4ada0212c4757dbdda29f225bd531127649b7a54b8ea8dc5c71
SHA5123cf5049f1c5991e187f8d0f7c77f17bc46e95fd383ffbc11a8a2c0e39d7f9d63c2346481d4a101a6589520d97e147a176103487f2b7e0dc480c2b34978ae9278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9354553dd529a39515b458ca7c2220e
SHA1922a08a3e1ad1898905c3ef4c5b0e67ae89d2262
SHA25658e5777b46cfe044438fce2fa425fd630554d65181ace131372d8cc1ed60b530
SHA512df5dc081dd1775f8ffb137870f2fc9c547ebf8bf7a3e0f08d8b501504ef204c36125620cdc063d48585ea53c30bd47c705d519693793b40aed263a2db059125f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51b03179de704a3851a70b686fc0760d7
SHA101eb83333d8e73664792d6a00545c9bfb28fd822
SHA25687b4b4a3da6771e43c1c7f164786ee6b45af50c9af971257b2502fa608cc379d
SHA5122dca36633ff759211a0806ee5241c0b5d083137ebe9c5e01d50758b212300578d2cf3fcd168cbe58e25ffb5d96b32ee2c3dfea826feb81d195809a33cf396de0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\font-awesome.min[1].htm
Filesize224B
MD57b6da9a33eab1423c622a3733e13799b
SHA168793ca185e4982e9acddd42ba1ebda357216f7f
SHA256859a4df61667eb07a2622b69f39a8a729f9979871917b856424fd491ba56b0a5
SHA512eacc0d5ac4e0ef6e511431d7b6b5dddb6c380bc28a5730342a43a67c1f3f072ffab377a808abd520a863fc3d35c2dc92cc83e3d40a9285f825b3f4440ae27d47
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b