Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
8389e453712570490cfb87e1e1bb6f87_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8389e453712570490cfb87e1e1bb6f87_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8389e453712570490cfb87e1e1bb6f87_JaffaCakes118.html
-
Size
67KB
-
MD5
8389e453712570490cfb87e1e1bb6f87
-
SHA1
b4b098f9a641a23311beadd5ec6f152529b742d6
-
SHA256
c5ac21f4ad2ba83ec94fb2efd2fbb945f2bb95f9259409f3b6e1fcdcb479e856
-
SHA512
ada6aea048310e554b9e6940d5dbc752798635b9c123ccf1d32a6b7726b3150571dcade5a3e105483939c843a11dc3c96eb17f4b191a2ba83b95ad4d0a5404f8
-
SSDEEP
768:JimgcMiR3sI2PDDnX0g6wJy6AcuJoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JE34feTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c87f68d563c4bb4db77be625151659f600000000020000000000106600000001000020000000273961fcaa17c76ae6898e2d5a8579dddd4a3872116b6d9c442717c7eb8f37dd000000000e8000000002000020000000eb135e89f921d9226ec9c239e601ac29bc14c4cb36e502b1d5e1b76713e58890200000001915c0e62a163096d18199c47431d0eb7061dd8965c6044e59e1eb5d48210d9440000000395dca34b7f1ed5ad1036b2f0a42a5a7ff2cee4cf3fdc9571e499aadbdc1c83d90d34d28627e7d34c9997de73814a5e0f9655762eac51c35bcef7ec2ab5fdf0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423218698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0967e6069b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BD1ED31-1E5C-11EF-8ECF-42D431E39B11} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2936 2012 iexplore.exe 28 PID 2012 wrote to memory of 2936 2012 iexplore.exe 28 PID 2012 wrote to memory of 2936 2012 iexplore.exe 28 PID 2012 wrote to memory of 2936 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8389e453712570490cfb87e1e1bb6f87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f659fd1773ce736108b9f0d20bdf16b
SHA193d894c83b7d1237fab97eaf63fe2c16fb98ca01
SHA2560a9a95fb73abec7b8dead77bf85be0127bc5fa0517a0edd6b2e9fda407502793
SHA51207a1b5eb7c9366c70bcc2ed247481ada4973e2469e623a250af7b897112cc9afffe205a9a67d335d91c2810c847fdf098a334e4762f2833a486b0bdac50daab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535abfdfb558afe6d20c402e547e0ac9c
SHA13a1c73d2107c275d9f10f7b594809521e0796be2
SHA256d2e9f4e1b98c6bb4a15504d5028fdba7515334f0a24d00471e649a6b271bcf1c
SHA51236043d9781f180312475d6967084d53f7fc1e4f790efd2000a743121148c565ae3875b6afd4e9682ef91ce6109a98202f69e5796355cc81c7e25b82f0612c0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a465ca4bda5ea3c4afb1fe2b1961b5b
SHA1aecbbb5c344bfcd47d8537abd5416e3b00aea8a0
SHA256a6355389eef750262886cd0ce349667c44001fdd554627fe32f265155ca9e448
SHA512e201965aaf07e4cf2ecbbac775df0c0ee7883a743b11f5db12810603ca5f69392b16ae32cc2c029e2e835d20bb9ba27c6f2a1bc0580061fc1b580fa66c08c2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f47e6b72f3f76f8a1e0b8da1277bc5
SHA18c1f2e7ccfd39c910fb8042a5369474f9a24294c
SHA2567df48010f39827c476f1d83dddcd56a9ae7ac7b12daf6b12840e113ecf66822f
SHA512ba8798ba3980b24bf07af2c7b005a651a6d5a296dc97dae7af11f7c1e9042699fac21624d5e8860f5fd154e15b860753bc7a8f6b926eb41ad964996132cfdbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12750321575687ff297c4a8a1d58464
SHA145eb66c97e6d4169a156980f77dc4fe0eda5f5c3
SHA25605e5734de0a722760560a8f07032fdbe74daccfd21f9d1f899ac102fd7cb3984
SHA5127511fd5e0e4937e8b3f0b4fdcc0d7a2413f851253cc201d1f7f94e1b3578842aaa569c709ca778afbdfdc36a42f008b0862eddeb4c859766ca712bce7812256b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f5e4350505e3345ea17d01144a2e3b
SHA11817798a4124ba2e722a44a101c731697b4e48e6
SHA25697b71d84d95ec7513198cb76d5be575ea554f5409e6a74ff661a78e0aeb52d43
SHA512f51fcc09831384271fb4605045207f7b7d71d75c0e41a9fb7b48a14faff8336281542c051e7dea5e316d223288c1acc8eac3d85302926424eeb0bb3a608a9d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65440db6ae9d7c09f3d862f65989740
SHA117ca7b88d90f7db3541bb15015cb55a55737649a
SHA25633f3c624152b90d01c66792ac8a2a76dfad272f06d32fdeb01582bc849e84061
SHA512c76cc01eb2b272489801702a8109e2141a987636bdd916fe10834590cae69be8ccd186ac063f9c6f2d0fd4edfe0b2da02235b22c290c436c35132617468e3850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d0fb36d6b932c4be2af023d5cd017c
SHA1ac5458a5d3003b9a1df2361d24cab6830fef0946
SHA25623835efbda1a62033402b93e0cc91c10f62bf9409bce5037febddbe288e7574d
SHA512dd9fcc0ac94df4cdc732d6c95b36fe41fa967646754427c3be312cc2cda2792f5be2f86469b55888548e37e40d022a88fb029a433d735f27856ff16e7b457557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572add1ee3fa51e3f116aabc0ba75ddf
SHA1e2b63cba461f6646f5bd633b85c85d46a3d36e3a
SHA25661083bfe016739b7e8887436b5f252dc31016f056a0fc8a3138c273c0c27c39c
SHA5122bb52cb9d559eef2efc7759e80f17ae307b994da51167670720aa5c396deb666f486ba1b239da061cb9d3f2f083a432f7efd1804d963056707109640103c1fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573775afa1b88a52c69aa987e80278100
SHA1f0a5929560ad247d1d7ed8f72bcb45cd7db3a3ad
SHA256c39d4b3f1159337de31b88c0b541cad72b7d5e4b5c5a2c1038e8f1bbfa3987e2
SHA512cc75542bf155aea0aa5a70ee8013cd5348fe180ce25f37e1d0f25a751e70adec746e148d301f196b83b993936d4adb8ba58c9128e6fcbb579a8d5180d66ad122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf168b57f697eb8de5a0102fac84cfc
SHA1b801d184efb24f0129aae998892abf3c51700ad0
SHA256e6456da01c555304f89c66a9b78d7bd3a93c1d6ed5059decb9fae996fa971c42
SHA5120e6f4b749151792385abd3a07cf861287881d9c0ef14f8450efc9743b7829dc8f818d046525b7c8399573d8301938fe2b658dcb3ac18700fe5289220653ed2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597456aeb4595e2dd808216259db1d719
SHA1531b9ed8120a4834e2915f70fae4a6c87401fc02
SHA25674733eb7cdc5470a03ea41ed447f41d8908c7c981837b98e9b72aa8f005b151e
SHA51246ebc63ed790fb3b5ecbdc5b606c9d62425f03d96aa46f99d25a6cb213e7a899fbd389a889ca67aa9746279470ce107ddfc5644e7ddff8fc4a13dcac89a7795b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec501b049087a60d936948e1fd1bed4
SHA160ed6f2d03f566d844d57b5c6cff8ef737f1aabb
SHA256927bedb827c975976f49a243b82b28e63ce7e9e5dda2fc0a2c86d4438106b4a3
SHA5121f9af862b17f9953bc72f9e74ebf0e71e0e0301424c2645836794f1c91db3ef34f339164e145473051542b1a085b9d22ddfad77049a39cac0dafcaa684d17824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a06b1be56352c8c09666d0f2409300
SHA1ceba493c0cc2218177a52ac6d36c08f00b206d41
SHA256a20e2dcb798c7b31f944afbb95ea0c6b51c787e438f851ad22ad93b08752c8de
SHA51286e260adce7a26c522e1b9b0e5556427f792c46493b63272bf87556612af0b8c6643cd3bbcb52188f6a9595009f400507d4fd6eac8e32b836bb2cbc97a49c657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b299f1dca48668caa1d007d7941de559
SHA1646b8708b0068b862473796a5f21cc1b0ab4b847
SHA25622555b478bb9d6d37ba852f83c83f438be33becd6347132f76ee910ade6d9df3
SHA512a2f3f63642ba8a1ab3f52ea16f0228371395c18aba60b6f3534d5b78a22fca22a5357684010a26f29b65889baebe973637099c2a4e14ccdd893371c9b0b5419b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da0f890b98134bc7b180da2e5791947
SHA18d31757a53400d33b5707e550378a4309d1aa43e
SHA25681ead531e5b8913a94b45e9021201ab28ee722e07ea69cb9a92e1cc4d4ea35f5
SHA512b5cf17d9fae069d9cf9ed2f26e459ca96559c7bbb29f2fbcd5155139a827187ea20bbdb35d5bce78f783b392cc3a84d790088e937f42799b71329ea9e19c201f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f22df049108e747acf4227938595d38
SHA18530bc3be8319421d955f5f76d4bc59cb6e57266
SHA256b928f6f1a14ead1b1e0620fb6ef41ece8278ac2fd0d17252710a5c06ce9c8c2d
SHA512c440531a563b6a3509f7b24cf3180b6a9c36601d43895c3b0e639db230672abbc48f5f860862cf6f33b18b0eb68c922814a627ba82b2b9b7f79b935b489624dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f984fc65a69b0a4ccac26b2007dae212
SHA14c0ef1db510fb8fb174eb3894a1dbb258de06fd7
SHA256acc2f480c98fd886ea0842b8f9f62bf78dc5338bacf37aa3a2c37b7063d0fcf7
SHA512cf3491f6878f128712d55d39e06134bbbbe09d43589be2e686ff9b2b166b00b8c0108d498cce8f09faafc9169ae02784c502caa22f929ca0a61e960ef9e9ab63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1b39e5d3c71839fb1a13d979f816ec
SHA1115ad2c620dca6461e1fb286a818589c1c4f40f6
SHA25635c100966df81f31c985539d941a29db887d1b8b2ea19cd219295ea2b75e9f76
SHA5120aea06124a7a8bd7bae1824c293fbb1820e724dd9b47b9ad6468b803d11181bce786d57a9b5df14d5f6dfb8f0dd79e159f6913b605e17a505895a14f7e25a50e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b