Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
83c06b7b0e380e79048f75f13958aa8d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
83c06b7b0e380e79048f75f13958aa8d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
83c06b7b0e380e79048f75f13958aa8d_JaffaCakes118.html
-
Size
460KB
-
MD5
83c06b7b0e380e79048f75f13958aa8d
-
SHA1
f9c2ef0aa06276f6f8e90636d99e9733d5d358d3
-
SHA256
38da5e869773a35d6b2c7666c97756b95847af7024057abde0927c65d8dfa78d
-
SHA512
7a53ad97dbf3904235090aff98423b10fbe7515d42fd21751ce22eed8544aba412367f15e5c7624c9c34d745abbf09bad5f4074b8d7d731c1a65892efaacdb6b
-
SSDEEP
6144:SXsMYod+X3oI+YNrsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3H5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CF71E61-1E68-11EF-A5E3-DA219DA76A91} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ce142213baba20f2e42fc5b235e33f3521795b65ac1ebd10e4756410dbbe7449000000000e8000000002000020000000fd2aa662624182353fc3d45bd4de469126e946f805a4608323f4fa8c6a70e43d2000000055133906eabf95e3cfd9cd642036a61be5ad9da0f9fffbf8457158000ff2381d400000003f4e5df40e8cc474276b37ce65e035ca82c0182274c88fcaea609e09dcc2c1af38f0f280108572c8c089a8bbec002f336e996b6b527466da72160d1a105fa8f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b581f574b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423223665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28 PID 1632 wrote to memory of 3028 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83c06b7b0e380e79048f75f13958aa8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117ae49b5d57a8a7678c7d6e750e69d8
SHA174d34b9ad60f7e3096cf90696970cc825714ace9
SHA2565c70226d613a9d0c78ee1b3be279fa84f2a564eb9925c0e738edf6efe7926bc9
SHA512a4ee9d5d985de03aa093f2e42edf14ba83c18ce03bad64893baca530132d3f961745736ae59c71ff60958e63640bcff40e704245cd467e5ac516d37b5f6259ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2b8a37323a29283386a15a47f30516
SHA18fcea02046589a0bb5307ae055889afaa2e2b816
SHA256373837c6a419318fcf529e98c57e36fb52af97c6456610e99f8ca40c1371bc71
SHA5126848087bcf84c5aaa9ceab2357f6ec915e1c11ebce9d6d8f78c0dfe74ec59cd26881618b0f69ea8a6129705e37c672c426c5fb09d3bd3c52284973c102703b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1793c05a58928eb54787f24ca6874bb
SHA199b064069200433254f26530487d3459e163b20c
SHA256a50628edd3cd3b0e2eb825f5d56947c348dadb357b3f5a370210fc5b8cbca4d1
SHA512a4ca4e31b86041ce3c0b2cbe437f1035a77f232e7b1a2bd7d86310b6a592f0b2a331dc6e4818e4d1facf9693c4c7c8c589d37b96bba09a6f7dcab8460c7e5a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57602323d31f2f5f95974f110dcc091f8
SHA10c9314dfd6bd7cfb235a58b65e28a931c7ad0dd6
SHA256bca08bec851c3cd1619e90d7c2506135d2a5e7194c83103748ef0082d3c9a133
SHA5126297c707b2a38b5aa559b6b0338be4f4c06f151a9121411a6e63190cf051cb0d08e808ecd475a3cfb8b5f00d5c2989cbf44af5f3f0d8b53b1fe075200b5b5489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f437659849c4b52848df3d1f8931db7
SHA1b44ac19b4341ec8da77575a867cc774dbeb1f225
SHA2566b9fceec95b0218b57e5f085a3690bff39d06bf61359fd9ff7a09bac8c5cd412
SHA512f24f109c21dc438e90e0140d00f68df7cc41172349ebcdd051ba9557d2e8d14fd175731afb7e13f3cabe37d743a3468de239d6ebae7a6057a6773f7e67c07a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582766cae68ce4821491f5730bd42365f
SHA1eb0464612c8cb5d17f2534bafb546dbda678495a
SHA256656e9313ab4afd461a409b72e0d4a4189fa84825bf7459ca72887df1c4f8d48b
SHA512f7a5b0a6fe6b4ed3507059c13d425261dbdf8bc92ab0b18fb4862cc46724ad18df52ae200be4c5797e2ae11bc9175322225fd90696059262adac0f658d0dbe08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1df268dc228a54347f58386719c93cf
SHA10c9f97b81a3a0df8ab87791988ccffbfe95f75eb
SHA256877f3fa16bfc0a245315eb266e475f89bb1e6766d3be38dacbdde0af2b659bad
SHA5126cfa69236d9d30f01a01bb7c0d512098554b1091b6db7b7d73fc857211b19ee4f133be7593090207b6befda2a60dd22eaf45d71027c1d09534fb3bd214b0c13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f10b59219b9361f732627cf09a6c098
SHA1e1f833b93a9fff59c43fd148a38477be81655941
SHA256dbe87f48a4fd756c473d5251b48a5814f289d8faac54c82b4f16ac17ea123acd
SHA51234022dde54163632a16111c3779564acf8f02109779299eb92ceed1b823c820a8f52ca74056009c2009a7e5bba497bf9f4bbb598230866ef905244acbeeec72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1363cd4100f481a9e95bf7ab61dc0d
SHA1afde85fa5fe1f931161ccfe6ed5f56df59383e72
SHA25630d3956d821a609bbc921ae3e69cfad1805f4a7494f0e9717d71e4591354b94b
SHA512b07e9c71ede2fac52e2f3d58bcfee55702d32b0d33f597c0819e1d209664f172265d1fc9f4521ca7e178099e97c9a33d29df2bd614991ae4740982a4314e2f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b420d1c2519581930f0f958317636a1a
SHA1a1770f48df7c696d8ec577832e6a1a2565cb65cf
SHA256adf132c0b7f160008475074858dfd97fa7a8f23eed51f1332437ab11abcf8fc5
SHA512c4101aec5b6e6ada754b0bb7e7375cc9d0ce1acd3382852687fd25c92ac3a9f4129b16e6caffdee8a9667825fe005871b464a0456cabf6d9a444bf08c73d5e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515245de10fb5989e1cf291cbbff7dfd8
SHA1ad760b289226f27b07a3a258426d9be3f8e879b0
SHA256262a66a1d4130cbc0e302c45a364339816732192a282a3a36c962c2f82600c2a
SHA5125a90323d7ba3f4941c8b92ee9de0c2aa2b4b0767398cca09e0afe2df437412a8aeaee00be27393eed2e85d5c69dcb9ee2eff815fe7ef52f2fdede092a08819e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636296a16674e772954e6a5268f69d11
SHA12341e24855a80cc413f66c9e71cd47f3fe307300
SHA2566072e283983836b812cd29128fa46b5623f656c4cfe9b7c4904b13563c3b13c8
SHA5120236b21be6011a1373ad3a25a951cd42baec2ffda106819c6bde7b2469f4b67120ac1d04fd3e72cfa42cdf525f4627faafd0a3e87bb41db2193cc01f81aea046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ebf3d967df588d9d27922ea0ba7115
SHA1b81efce42b918638b0d2e0981a74c79139bb7e59
SHA256455fc22670d8274b8220a7f7d5bce4b6ae0b97eda6bc85667f090ee207fea863
SHA512d4846675f47b2ed0147f964a1bedb5e221e2d2777e36e4f9c81fd3319b92d38e0f3fe7846218c8e500590180481e0298fbead6e71bdaa4278de258c5450706a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534034a4bf43ca8cd9104d0e21f2fc441
SHA18363e38d7c0ff4e6113967f0cc2e68460518c766
SHA256d3d96a74dada0822c86aaa5ae184801f2abcafb6ce3159c60e91b17f95ee011a
SHA512ae7d49007eb703626c9f846946b75bc44e95788d8c2247b56865c3d88920381820139866bc01ee32897ee5b58233bfa17639028f57c00bd33566e7766ceee4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9fb7d8389add9878b2569492366572
SHA112abdefa1708e8f01179e0b1e419b38c17f0ffc8
SHA25630f850396efa4af644e45a82a6ef9783142df15c0ca0b573df6866d1567ac80c
SHA512212d08d7420cc555953b7b304c0eb0ab4be5452d3a0eb1512e0fdb828f466119d4cd76e990211c3a2dcd92218b461ca71270bbf1892bc020613743da29aae43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d17db14f716910765b99a265d6dfed
SHA13106db4f6d5a9bdbc784e429e89653f17adbaeb7
SHA2564e379ee6ca2ce982ba1308b70fef59bbf3ced030c06b00464967a2df215ecfb8
SHA512b0bb0fc2146198ee0461b0915b2aa2c202ed2932db75e74dee151546fe24a81fcdd0e222a732a483742eb62951e42d630b5eba48f6e6b282fd37ccc37d51010a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570003ae51704f8047ca60460494f935b
SHA130a617f347fc1495705f6c73c997b048b399fd09
SHA2568cb533d8c056c04d104743ff5a76952e06d26dfd18efdb87ad03846082d19d09
SHA5124bc28e8078c02fd8c7647d830ca49503ccacffa03ace36473cbf9db14bb34c4d9c4b3fb76d83c6d8884fc7a78eead88cc4179054063dbbb5656a277b801c5c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e98892ad8b39265b99dc04bfdd7dbe8
SHA147ff78b91940558c8d9cbd5fb46ad1069d6e55b3
SHA256622eeea2b1ceb4ca71c7ae91fbc6fdd48ee56da434cee5b15d7366d9f1021eba
SHA5122b9bd4b06f8497a692c3812b70eaf4c55fb9e22cd9fb3d237b1d8c5e8490728fceff68d98dbbfe7f528fa160919850a2ea012762e19931528586c19587a760fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8aae07c705f52f46c500edb96d4ffb
SHA19ea7ca82deacd9c852ca728226fdb8a11edecaf1
SHA25632ffea119a0a7b69fcfb3fe5fd4f27f24d0ae8ff1045d490e09ef02a8e32f101
SHA5127cdc3b4db305a8b9dd477ce0daa34aca7be21d239e79be8fb8e4a38a86bf81abd2536ac5b52c923c847ce5488e375ab9537ab27e437d874890bf74eaea25ffb5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b