Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
83f6de1f54e41da164018a7fdef7ac0a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
83f6de1f54e41da164018a7fdef7ac0a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
83f6de1f54e41da164018a7fdef7ac0a_JaffaCakes118.html
-
Size
15KB
-
MD5
83f6de1f54e41da164018a7fdef7ac0a
-
SHA1
dced3e95fb7b93e897196a6bf7969beca94264d9
-
SHA256
4f10bc68a926a62ff5cfcacfbdaafffa900198522c956d914436fd02046c8eb4
-
SHA512
3d2570a7f2fbd979a0c54635243acd95f162de097da9b99c8168a160aded422f3a1377672421a406a803e2e5f01633499f68d02292a082e4dfb31c1dc322e605
-
SSDEEP
384:CyiPlD0O+DeQNNUQ/RxatQFAi79y1wzuMNg2FlAHvH4QpfyFLV:CyiPeNW44QFAi79ITMQHR4V
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f8563a7fb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a18174b2575a5ef3f6500e7f2a8198eaecbd1b783d85b9636b0617e47f634bd0000000000e8000000002000020000000468e0fdb807a08713687f77b2546d2dd6bcc7155c75fb89dc9d1c16f2d4249b4200000003945217e4df12a7ad24367b0169a0d58b6f0371acb37ca9d9daede22bd3a2e2140000000ae9b9cfe86f6bd26bf157d66ce0b7c8097189c57263fa378b99da91fc88f58662f8dac4ab1b55bf74e502a6c94ac085db3085b27e37d3aed33534ce7a02d192f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65AE3F31-1E72-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423228082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2892 2136 iexplore.exe 29 PID 2136 wrote to memory of 2892 2136 iexplore.exe 29 PID 2136 wrote to memory of 2892 2136 iexplore.exe 29 PID 2136 wrote to memory of 2892 2136 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83f6de1f54e41da164018a7fdef7ac0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce22b10b1ecc8c94029d4148efc42e11
SHA15b0c5d6f024bc55135b47135bd47df2fedf7b6ac
SHA25610d3c174d8f25da4f15c75e54c3f3b99ebdb840eae41bfc02ffb008c74ed489e
SHA512f275d5e95d99e5dcbfc58e5f6b5d21e69a28f53d23da53b5677557761a11786f93e5f47d5f7571ab8c7854c7e0358f50e96f9fcd0a12d2eb8b8293e0f1669c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53821ff3f6d052dfc90ab44effdcc6e5e
SHA17b564cf3a93076be92ca89f64c99ed54a67f2609
SHA256fcd4f7a74305d411f85c1b048fc40dc2b9cfaeda15da0aaee8d84c17f3f9501d
SHA51259104f22f5df9bc916766f9c0c332676e3acca410b11d79163fbf3f73b5fc84398324ac064878780937b4f3cb6e880ec35d5d6078869c9e5827dfbddbd7fe6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58593b10ad40d695e4080aef07b6937fd
SHA1d19f8b869f588de6caa6403ee7f94cb7dd4790b8
SHA256f025f8619bbdd036df6c7b9b93d86d2a0148203cc5a9bd681d3555aefec415d8
SHA5124fb5fe719363b3586fead2bcd161d1794b83e73dea3cb0799734323a472e84c9525076b0119c64c18e833d238ca1ba4751a7cb2fd4cb91c96f49bc3bbb70a03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eab1613c8b4c88ec20a30cebb42be42
SHA10d8d075c5c21691cb204fed5b2ec958adb13e5ed
SHA256b4430bb903bfedb7f2994b32531147b3625fc0a5502a3efecb1ceba0a070b1b0
SHA5124bdc2ad827944e0141a9d20b1e48b2c3e1f345b277e84f254e4973eaf3ee712ba89135b544ca544c2a1453a0253226edc279ad0302fdc85b85db2ea22cb25349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc666dae38b4b95d3255bf02485d666
SHA1d27a4c13878e31f0e5567d9dbc6240734d4fe788
SHA2564167c1825cea39a47e69cf8024c14e822f1840cb31e088cf1ae8212da564b76f
SHA512a28e83392008f49d242192eb93078670b177ea05e619491a3c67229f2243886d13e17743f30f522877904dfd6dbc5f85bf16aac67b51c86f461deeafa58a8ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f71c245275e7d6c916d1628f62bffa2
SHA176830611698eca463d6b2a6f9b03e9ad0fc50562
SHA25667f739e46f599c0d9c4389ec8b91e94ab4030c2b12201a83301745d9fd919255
SHA512c88f936bff4a2186aa7338dda29ed5fa7ed570e98d982ec51f26fb827d099f9388e00bd13ccb586c793563477e84924fccb3690fcb264938762b49343c7eac1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b659acfff73551782e27abd990373de3
SHA139544da9f8482492cf42b9c5df843e09af2f67f4
SHA256700890d1980cd4cc6570f5cee7c1095bc9e42f22b7ff59d62b0b915d23610183
SHA51265c5bcfc325eebf33db559762ab6bdb8fce9d7476f9fd163283f100f186a268d709609e260598453832cea09629ac0280b1169853f2e9efacb98e387e42b9b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57f45c61b8adf02fa0064216d4d0339
SHA1cf4787a63f9aca373c07d120440cfa49a3d3286a
SHA256f3b9ebe18e8b5df9cba2620969e70a6945e2dc82b6d6654f7849601e4364ed7f
SHA512fe355d7af294ae4f724508fdd96379eac1dc2c5aa5e225df0aae7719a2b3a311c2128731636dfe0a37db34ff26ca18b9c8d1b5b5d3b978a13da364e878572ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc9ce6004b1240172cd42157b017418
SHA16888354edf32fcf06e46a4834810c141c1dbd081
SHA256a1c751501e91b0c1cecf2b5f002d2ec79c6d9389086d47c27a2c954fd554ee75
SHA512c7f072f56ea6b422f104471150f9bda7caa2348c9e5047f245f47434d0f93fc86c140a373933ad00cc3d6d61b8bbaab1a0ef2dd5319e486cd5f5314dde7943fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e88ddd908579a706a3b959def18c322
SHA193c64b6503f00ec2d3429bf5e647b4bb1f98a2d7
SHA256f82ecebf26245ea0832bd84eb173dc418b17a03c3ed3bcd7bc961e4bdae4caae
SHA512b3e18480d3186b3cb4ec0b2f16d552d1072b1d4239f70158f1da1462cef7d214176a1d20c38f50d74becc420826121d633fa71e6399a071600865a15d3d825b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d05c6cd5e4db7af64d3b36572891157
SHA1a8fc17fcfdb0a533659b8033c99f30767bc53bc2
SHA2563153a9b0244223fea3a5811e99c18a227e93499645057ea9525af2ebf80a5253
SHA512cb36eec37d8858bbfbf8adc729c06cfe30dbaafaff8a70324042248ecc0a2e6bb139166d6e0eec62b050abde3d0ee7c565b3b552ae9c7cec9878435c4bb4bdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50985f695885e85beb8e9be2d21c07ef0
SHA17962c148c20c89a003ef8eec07bd2baf8ad914c6
SHA256a84a19dea98a790d579406cd1e817361c3da3bc174cf48c9ad6bc07da2338135
SHA512367a63b8872b63ec3693d097343e377cda89a66a20ff9df422a3254d93161928635a4abb7132c8b42dbb78cf602ec7545db2b6d7d37ec950d7e51a85ecf644ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd09db046308f6b8377bb423a786af25
SHA1466dd5782071440a46d2a53b26f0dbf82395f534
SHA2567553debe37934ab01f1e1e38ca27329254a1dcf466318983484827bae21d158c
SHA512d6301f61c988443a0f4f87bb8189a5e9a2d5deac0fd6384d8d75a95e4275124fd35ebff57b8b5565cded2f539922d3a172e292f65b64485785b65147c90194d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ace59693bf5c84e334f0a203cc4daf8
SHA1dd36892a7ff3c9f228de9ca0ef19b1e1a8eeea4a
SHA256fbde94ab5da5a4e81dba368cde3c57fd66d4b62b4e6fc3b07cae45d1bcf65633
SHA5128f8df820cec8971a04912b9098322313c82e2f47325356b7830f757ad0bf73b7473e69b69269b976bd3fba377f51899c401f9bc5c8754361f538f66a518bf46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36b1b6233eae6cd39eda4ac2a6f5de3
SHA19f03fc06ee63d25981d50d4f6e10884499ee893f
SHA256cd214ea8d4e7bd5eb4bfb2d33e298e2f74594ec2d76f330fbfe673e0ecfd32cb
SHA512cef06f4b72168e85eb168f4963f47622cd7c0fa1bfab5cb38ef0057ce3c4a4e42c92ece4c88eca00e1d914c9ab3250c339506357efe59124ac47da5f554b7f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57715e0dd865e572c07cd5a9f73435e94
SHA1376503247138efc48fb98bce67a58f5f2d79af71
SHA256404449fadbac5657e4c3bd7dbe0013083af3be5364d8cf955f89c6817e9893aa
SHA51263694a9b5908c95e94859d61340c1b644fdc222af546dbf205c0a6edb6d53c1dd6ad2442e55ee9c943a67bd0d459d2eb78ef37dcff80974fcd33489c658f9920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ab9a18f81a092412dd75d95fd9512e
SHA10e8bee881324ab90395f5d7d7c33af266cb33759
SHA256ca75640e2d5f07d7bc19c48ece6854e7860f2e2dcb6fb74c35baf34620110a97
SHA5120bedbf81b5d41159d77c55e4652f753ee0e7d8db0b61ba92f8a5e803ab61c506be0ff8585c83b82b721c44f7ac87d1275217a95bbd65792a4f91a511aef2353e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f349cb0d0b449e6eed2c7110065615c3
SHA145f32d50085e54fca8ee1d594147a28a2beac813
SHA256968e98cef913465314de67d461cebeb93eb397fd383b1245efe34f93d47ff82e
SHA51286e41ef4a5420ec021ad178a45a9d79f67afec0432a9db399cc85c52b72652150c8ddea4aee26103bcddd1b531ae085254cea5b98e3328814957fbefe960a428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baaf6f2664711f2808d69ea70beef304
SHA19d3546dc480ee784b13d3bcbf011510cdd2298f1
SHA2565811558b025dc704ea61e7bd06c069eda6d167d64ab928b7c6e33bbf747d61dd
SHA5121a8392c368995b3675ad8ccdd1eb45ac06c6b43d7968037dc185453c46b2beaa7a71252bf1b279a4f09d3bc5243d348ad68b9c0bd0185408ff0656434728ddff
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b