Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
8274b6498857ad1b437c3d813bdd0473_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8274b6498857ad1b437c3d813bdd0473_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8274b6498857ad1b437c3d813bdd0473_JaffaCakes118.html
-
Size
24KB
-
MD5
8274b6498857ad1b437c3d813bdd0473
-
SHA1
f7cd41020b1d2e5342c30bd08016b11728423650
-
SHA256
3926131c2ed7968e0449300c28991a967d46105a9c6a57f7a309a7ad46c3b901
-
SHA512
a7ccb8c46fafc785df468ca70bef20c3232b468f0b8b81dbb6a26150dc3e2ad077e5e476bbfc16077659e575d348b8bac349dfc64ff3499ec0a8dae61e33da84
-
SSDEEP
384:59fn9lM+VCRF0kQWUaqAmwrH7Gl7fYEwFM:DfL3VCn0HWUa/mUCh7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423189613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D45F0C71-1E18-11EF-9034-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007e9204dea24d7d45b4afba4d52c34d3b000000000200000000001066000000010000200000001fb15f2eaa2387414ccb348f26fead444a6b0b3f65b31cecbff3f036f939c1a8000000000e8000000002000020000000b643ee15729386add4771f6c84214092f76f5d7c592e971a74eb078b1ccc6b0c20000000f0fde48da4ccfcbe7f386b7e6c4f45723b24c90ce2c9bca6fcd445775ea03376400000008ad6660744e3c1817bbde384e0611df3ab4ee63364cdc9b35d50baeb979b78f63e6fbf30c40bc9a1bb16f4a529aa8aeba63d4551b15b5dcae20f7173ca871ef2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e089f7a825b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 912 iexplore.exe 912 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 912 wrote to memory of 3060 912 iexplore.exe 28 PID 912 wrote to memory of 3060 912 iexplore.exe 28 PID 912 wrote to memory of 3060 912 iexplore.exe 28 PID 912 wrote to memory of 3060 912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8274b6498857ad1b437c3d813bdd0473_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb566691e6ba346f012bbcbfa242cb4b
SHA17ce596509b671c484c769ce0be20dcdf8887d555
SHA256eb90932fa3542d156f6c33f3464a397ebbb4bc8efd0e6ee8f534df39a8f2e22d
SHA512e3d4aeda224184635f6530f971a604ba86fb019edf356ccb669a0722602c88b582dc3933538a11d05972121fe23a12833db37b194bca7b06a66c942fb459d6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094fd853dd0d3106d03b9682253a49d4
SHA131a689f323579c114cee1548bc98218158f65d35
SHA256f0410c0cc8e1eac3525967c3c409665c43fb422c52291dba4687ec982080ee93
SHA51204d6fde1c0a37a3d1bb7ed682a26d51341e6bf285d303590fecd14230c7cd62aaaa03345f755e0524b96d91445b32b4e476dd398668b7e59f1a43048012e7dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f89c3e027245f9eae3d7041ef45693
SHA19f2f61938ad53f80430cdbec094233537c7897e0
SHA2568e4f1b2d655db4207a4b8d31360d2c78ed7e088214f15f6812cfa10b2bf0812e
SHA5123ce3aa9b39cb8a1257ca7eb7132e544f34ae3ced2c43974a9fe12fe16d9e7a1dffbbce7590ba1e5650681ba2499127172c38733d1dfd71dd2816b1b828c2006a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e154342f5f4f2825fdd63882493e00
SHA1d9130aefdce19edf7b88d2cc4cca2b4190b6dcf1
SHA256aa59d2119b074c172b2e97b9c4833d23d82f9175ef4d1c183e8881dc27c22aec
SHA512a51aaf4caa2bc6370e70287d7f66d954e91557d2a1a4cf6b1c01f4597b3d5a325b84bacf2e83dfd2b67aaccc4ce9d17145a08b33d242b2bd07f56efd38ae9b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb938d89341258ff600f2c2c849542c
SHA1d666bc9828e68e74db2893c1475570f97e360881
SHA2567fb37307e16b472221f248db7ae4d40b072dcc7a4dd0826701da6bcd27c785dc
SHA5126595a41c211278c28972eef46d23cf93b46b1e0c981fd10ce350c2ae6142fa623843c70926011c1f358088cb9289493a8084063d3da067a6ae540155e0ed0803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a9adf1e94586b039356f4a0fe2c095
SHA12b0d07b1a2bd9c6c151c15bb8e4b1df2d90c3bb5
SHA2565ab0351cee5b667c4f1580d513a550d1006ac23e0514e7f9b2ba8249a0126a58
SHA5120ce2e7bb6e60436069808938ca6d403bcb980a17eca6858b18aaa6a6d978538b74172a015d3ea89bfd198443d7d49b0640dd3154dfba1d1e784397907d386212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02cc09001685739ad134b370c3af822
SHA194871cfa9629ac5b0d2f655b241c91861f7e9b5f
SHA25690b8b514dabfce3e57801f3ae9fa849f9cf743301ef56fff44ccdfc8e52d12d7
SHA51233fcd0a7493b69c1f5eec32f1f73d8c2c9360c158712c13d5232079e5f7eff72882d95be756f4e3b6dd7c7cb969c243dfd7083fff1f581a5025c9d41b663f5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad1dc9988f9aa7dc0a1aae719487d25
SHA1cfd6b5c1877a6ebfd2f54c21accb747bc25e64d8
SHA2565eeba6bbbe1074a06cd816212692561a9b86643ffdf7ce026e5dd1be7d9c17bf
SHA51218cd50ee442859748c1e2358c9e9e1387f50fed4b7cb5614a0650d3461de2c09a1a18706b448ed867ea6d403d34f26219d7b12bf6357896a10adb6fae1d8b4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35a65c79b4b03eb3cbc3a3bb14b7ddf
SHA1ccc5bdf4b0a986f4b23fcfa54a7ec092e2468f8d
SHA256ded8c0f8a804410ea0432e8071e7b165bbf497bab1b06ac958c9f83169fc1dc5
SHA512e54c7b384647522e21b0c10913a9ff89ddb621d3c2e9c652c2dde2e2162365c769568415313ae439080e455e49f5ce2035ffe18e0c16cc3297ec5ffebb632680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553002bb1b5b08e054ce52482320a7cbd
SHA1683795adc9f3b49f0513e8c08a61a6ae9aa972f7
SHA256e48cc4eb36de6b4bd110641a9b2392b7c5194aff3f9e8b9d12e513472f74d480
SHA512f10089fbf80674cf00e6720872a33a75da736dbaa3af760f27054d8d073d8b19df079d511a867edc056e56bba69d6cda80d98603fc7b788d62eddb16a81e50ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933a711aba38e630d7d55d451012c161
SHA18ab469d1eca10d17117927d71e6bb64e497cf7ed
SHA2568f8ab6b915b85e159a8647df164486fd75ff2593ba6fa79d551f87a4c5981457
SHA512ccbc3463119ea60f3ec2184a36c253f891fef1303e88ce71cf6031f6741d81977d26b51f6514054adf979a6e992aabe157ab32f9ec3ce3a0ef0b0d64959b262a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db712b1966ac87a934e1def04557188
SHA1fc4016aad676118bc6a6dbd610e8ad36a56efd91
SHA2564640ac98b4c83f635108c24c03b1fdf8b3142fe0524bba6ea9ab500cc5c9ddc6
SHA512c9ac96e3721e0a7ee0219ba5a8dc559bb462ed6b265f72d26d97fd1475cc9e4fcbbdbbde1bf9bcbff0c1d1183cefa20594a8399e76b7c47495b15727c3f9a7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bb9f4dcd587da88e1950b2f14f46b0
SHA10e1c666f303bf73dff942cbc6efa11f6c090e196
SHA256e6a41ba43cb9f1aaf48cc861f919eb25bbd01915bb06fd09181d2f6833fc5c92
SHA512e2352707f8c67b710eacc402ab21728d24ce4d3eb935feae570e91b3ba23c29c8a11fb97003ea7cfc8fb3aa88b7ac5fb5035eb2af1f9130df3a8eb7d9f8d9028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedb26f6f0d5283d44557b5288e9e553
SHA175ddd748d2678df28858e92dc076ad383a0b3cd3
SHA256fcf1f8eb924b98d16ee36d4ae8e967ba810ff7ec127c3b185377a5d88ee47847
SHA512b287d276c24134b6da94743c8bdd2752b6dfa974b24f7a36d05a47c7240654007c6a5227bf8ffba6703e424f41e6b2187d35b31abf6c0f32460dfb98266c706c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d02e587f5594ed43474092a6f9a1291
SHA1c0b97e2d99d90f28e1c5bdd9ebdb9324c85850a7
SHA25673324ed9f988e712aa1f08ada803d59378ce7d62a017f7fccdc0c4dfd5340483
SHA5123918854f8b27a359c780ca2f940348ce805692fed9f8d01658519b844eaf59193bd8ad592818d0d7d75f54484e8a411e356b78bdc3ccff9c186abc83de26bfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042dd848614f6c575f2555ac6a520626
SHA1d528ef4824b2a77e9ae68fceac86abe77d91f22c
SHA2566169278822ce33dd65c1800d26fa9d81601ecc5d642ba36bda542f0e57edfcb2
SHA5128a9f2eaee8f6cfee825f0162509258785cdd1a097a8833be1b3d2e155692b6aee2e02ca5c71f67c6c681f84250eaa6ac807849ad3c6e5661c745171df430e1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912f811a76b06a7ad750ff3930d7f03b
SHA1e433474a134c666e59871a35dea527dc364a0087
SHA256cd3d41f17905569cfc1e9212d7bddbf265b4c34e43870452c3794eb497a26d0f
SHA512a6231c90fc65dc429ce76438d1c548790b2e3f8e158031d1501b81a6387b1c7a1d0e17c944d91681b3e3a599e755bc319e576bf9108cab252145ac9c4a6727ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b696778eef8b1e6eb040af17c761bf8e
SHA1b9f1fb43cb4a839bd3d9d4558f7eb21f3d24fb6d
SHA2562ba5e4a0377cef63c37cabeaf6d015abea1a30ea3697d8e4f1c0ad4779c1ed06
SHA51277bd71f0bba34bf679d0969d6503c8d5e363acd3c91c7a165000643e3c9711d4c2d024afc175985834427f74857099bd25ed0245341fea2e698bcb0de0cd5c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52155059f79b3c30e5ff40541eb62fc94
SHA1dccce402ad6103e4e640c7351f2af9a4d3f4e311
SHA2567ee36b6e96bdd757f625644e447edf3c6d531056cc2a47ec2657e85a54949ee8
SHA5120493c6bed6dc67957814e91de4398a6b15c9b0ef5ae1f6aa19a9863f067faefa9952436cfcd2d54a1c9b748bf29227f0d3490067fd62218406845e89272b4fa3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b