Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
83a9d194c66d8afe3dca2db4311af95e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
83a9d194c66d8afe3dca2db4311af95e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
83a9d194c66d8afe3dca2db4311af95e_JaffaCakes118.html
-
Size
14KB
-
MD5
83a9d194c66d8afe3dca2db4311af95e
-
SHA1
99ca2b540961cc25b3c140f1ccd454408244d1f3
-
SHA256
a1def94595b436135860d3c6c9529820965e81011e3d891345462fd60dabb3b1
-
SHA512
1de7a52a08b74e7a41a0d5b720c4ac8449f82fdae4c39a322a9df1b7491dbf15a45e34b6b5b438c5f669916176940d26aec6851fc5f37ad26fb67a122ec90e04
-
SSDEEP
192:SBuaO8tTblk+0kvoHbx2NMib8UjeZjpteewiuiMZ9EMTAxck:SBBe+0B2NMey7+4MZ9rTsck
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001e583a26f4de924781872c081f5fbc4400000000020000000000106600000001000020000000bf15d5e7d73939696a735cfaeddb253678ee23313496457f3ea86a534bb06699000000000e80000000020000200000000e4cadb81c1ce6e34d3cbd372dd2b4aa271a76f8880fa4755e2a90e11cadc64e20000000e510530d54ff1c1268f6a914676f78a3d79c029c5aae45dd0616f96a83ca75cb400000003efd9310fdcf7f91e099f107a98b603273b873a6b4d151b532ad28d677802962014ade11f4c46cf8adb3ffa76551825fa1bc05ace14e4270fbb9ea0a48636d61 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f1cd5d70b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{888D7C01-1E63-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423221699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28 PID 2364 wrote to memory of 2112 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83a9d194c66d8afe3dca2db4311af95e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
503B
MD505665cb942388bb06b8cb93a203a6b97
SHA1f47c00c7a8197f8cdd805fda8a5784ad349ecc04
SHA25645f3fbba5ba49d0652a39751f9cc7e75319d76eeb9281118baf8aef34ff3bfd4
SHA5128b6d47e1a6d7ebfd29c9f9d9d6d64d797735559c3ba0c75463db0aeee9644467f6faeede62c1c2667336e79e753bca0c3c106cfe3faef31cddd3bb6d70c94dff
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5ced17b0075bc2149f8cd4660be5a3ff4
SHA1a4c9c4818b8617e69e2785a5e002559f2160080b
SHA25620c10c8780a1b2af3bd69fe3f512abf14937e2a43aa8b39562fb922ff838e19b
SHA5128b2c4ef042dcdda24ccfeec0de5797c8e778135b3b58623bae23fcc222f66ad86f6399eba862cf53cb80ac83ca66c4305f66bfadd748b93680f16d6af899fd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5240d56d2c565d4d222b46970e0eb95f0
SHA1462d0a1fdd25e312e110bba890b349b3aa025a32
SHA256a5d11796f779f6317fd489027bd20cd4c247ab2997d7300c7dbcdc7f749d5019
SHA512edf6afd76b163918b8fccd2731e59ca13a231c48ea9a2a1a79443f87c6e1ab32102835cea25a0e416581c2405eea4b548381e970682479c0b9ee5600c08e753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a38c867da2991d04dbd575f17038eb8
SHA17f844ea3c8dda0b0c8cada43c6ca8d782e6c4d8f
SHA256cdf050247ec8cc5ec23b51e7336576ab4f71d736b98e30cb3606f9f87b7d0dec
SHA51270386c19d23c328bcd826434ecc39fd11a1698bf7c84ccfccaecd8a8ffa4a72176b358cc7b07a408730fe66d5ce9ce33009574cdbf62330e85b8702a8d69cc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3d894d11e87a961bebeb768e3907fd
SHA1ca730a93894a22c6ee9ca31ed4af43cb792d5619
SHA256683b224d88e67bb4c096f49bd82df053ac4f4d746a2e6c1c90537838b9e99b3d
SHA5121ea6e528e4a6ec5469b290b19282bfaec9c4807b2506fbf847de8cf5ebb28d3c123e96ce06a9e362e4c4840fcb45728d439ab160066d92f8150ecc6019ae74a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4448a07860fb9d79127691581d6eb7
SHA1e38588cb3f2f26343cb5d9e2b463ce19c867efef
SHA25639f84bb10eed5a68bce9d74bdb63290cef1816f20ead5ec63349fa54eeeb8494
SHA512e690fee2814fcb80add9aa0ffa66f576c03043b95a768a308aa26930aec07a8fc9d6224e6f2446872dafdb2b45090991838392fc62e818884c1b97bb488db5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c429c156d81723c70a6a61026f64e8ca
SHA135949cd6276de40256fa0bb1a1df6f9ca3bb11f1
SHA25657536fbe2687eca229f8cce8c578df7deedfb3f10cfe6e551aa2e2ec38972438
SHA512171358bded4e159d5ee5221a8b34c92a50d84a8456176c1fe8249cc9ea2326de845c1d263c9a410cf58942d7bc1792cfe72bb21b99192c413f0eda7f8b5d04f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76b7dd9fe3df03c30b8ac32cfd06b94
SHA1365866904775bcff7912c6fbd3615b7eb0ef3c08
SHA256a80baaed0cffa9cbff73f453d21c2b698d293e2f6afca537bda7eb1b1771a979
SHA5122bd366dc227745262ca8dfd6bfeada2110eabc545b3e80a6763b5678e6b1defdd704b6292b5e4b086ced978cc00233d0a028e02aa0c77b696caa9fb0df844ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07d92d7b050e8278ea1a73a44c8e4d6
SHA15f8f46372afe740e6aaa5eb0691bf558689b6f84
SHA256fa7360882706335f80e961941de1e72cbbfb0e618034433960284b3e2657ce83
SHA512dc34d1f8f106fbf8c9888b54b502b8214ccc2b1d2b829d1e7c68f7ae7d7b22d983e0f2a51b7ef7660c45e3f6e21cf1262edae56e00bf09555940c52780d4bb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cf15dc6953806140f295fbf51494f7
SHA127c486ce6410e47266a7c86a4d822c6c31d9c537
SHA2566735b1298133c4ecb9a9cbfdf8050ed91f12a64e5c6b2e861350829fed6f6664
SHA512a3e0a5d11225e2ddbae539cd4cbbbfc044c5ab7d007d4543f2a0833634cdb7498cee700e683db95a308c4d6c7942e2478975c8971d8dad15950bc9c1dc0c1671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56409d666ed992f31f0f69acc13468b18
SHA114b6afbc9fe88cd00085eb7ebb09df5977e7def8
SHA2568015126effe475bc239261312c41762d81f43b6e8f555e0141c0700a0ab878a2
SHA5125302feb589a31489c9a8162bee54a772433059353a3c7851a5289b24830719ea8f9722e1150256e51b7e5f09156afc6585cbd56fe3a2f0fb40b193c0aea2cde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56060c0f52a5cdc926bd1f0d39dfbc9e5
SHA1675dc256c4562848fe13c89e8bff92b74de7dbe0
SHA2564b42df9536c7aab73fc5829ae7801e63bd649e7d31c712010d2adf9414b0b8e8
SHA512225a0b4e066db09da8fbde7fc85bc62b5a795a67bdb99558b0b768877d469c2b0af5958f90a505e57bcd1ae344ceb0b2703cfe62b8ede97d3968d5b169539d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529982933360ed76211f80e430f98e81c
SHA1e689bfd00c3878204fc35e5532ef9a0c1db8669e
SHA2563e6d6d561feab49bc9fef74b1248c1542c761ec01f4f16dcfaf294b39702565b
SHA512ec9ad4a5349f8b8c358524d55bfd55a6e3ac613b91190726d0c97c10a93d8ca530f52d48d182706cde18ea2067e03a65fff82888c656a4083e02f184cff8c3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b8fc696c37e7e5e88f0d0b8fac3b1d23
SHA12dbe0d6dd0d41e8a772db5fcb7c416a15acd5daf
SHA2563f477486eebc9597637275b6832cdda9243602f47dfb039f00032e8810485bcc
SHA512d37c7da11955dce79dc444b9295187b80d72a324549b45db4f1a365e36dfb7b2e28a29c70019998310df7c1b4568f6d94b065fdaaa864e99d62cebaf26eb046d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\stand%202[2].htm
Filesize1KB
MD599287242e9d6fe442adfe95b9df40f5d
SHA1865baebb72049c0d4033d7686b2943e9e6267c72
SHA256733fb26bdf34012886e18b0d03e8f165dbe40d2ecf9ab57783b85975d1136ff5
SHA51269a02972730bf3f8171b0ba037e1761b997eb155bc8a65dd61d47291db02503d45ee53c4cd97df317d485d10b4d2b2ead67fdf5f4d85c8360edade2568901aed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\jquery.easing.1.3[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06