Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
842bdbb1fb2d585d484f0828d1d97913_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
842bdbb1fb2d585d484f0828d1d97913_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
842bdbb1fb2d585d484f0828d1d97913_JaffaCakes118.html
-
Size
4KB
-
MD5
842bdbb1fb2d585d484f0828d1d97913
-
SHA1
5a9361c46107ef4104a2dbda438a3dbc7b87008e
-
SHA256
e397c35ec7ed33d16975291629a8e182752fa9ce271a79460420a6868c3536fe
-
SHA512
04059f7f9632fe4ed5c373cd0cb93e3076623dceaf2fc19b68d017d3667ce144719d3814225fd676a86311069db32a3d85adf39c6c7a0e01b799f6957146c615
-
SSDEEP
48:t6Pup+HRmR4Nizp666OGHjDVoTN5glSzViNhDUOGwPDcELtwDxA1Gs++SD8/gSDr:tsuBl666OCo0RNJIycYcxNEEaTEk/F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001c641e972ebd3c9c65a1f6f9c7e89959ceb7286239242469a6944fd6b044baf1000000000e80000000020000200000002fe4ebf7eda1b091c2621cc445b41ec22140c59a2d80dadfa44722dc7e99969320000000a675cd62838b2402bb0bcfe628a79768100ba67608d4fb22d6643bd5c9c0602240000000d8e65407238e1d428bc801fc3deded6c01258c457244c09e995b19c5eb6eeaf4ef57731f7702187b158d34b288c05d9983c64d255ff4603bfb71949cd30619a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80431d3c8bb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67882941-1E7E-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000070cf1d04e11ef6639ee7107d36bee5522d60949aadd047338af8d7f97ecd6ff000000000e80000000020000200000009dc44a4affd003201a50a1625b2276f7bf0d8c0381182adee21e6ea4392780f290000000fe7f1d9fc1ea183e038f9826701cc2707b67e6d01ee8c00cd438dd8a6e9d66ad80fb12b134ee2ddaeece110be917117f70dc68edbb4bfcb9bf40299d81d3f0ef0a80c590d7648da8791928189a0925aaa597ac201a60c80c864773cb30dc02250ab7e5f93cbb377d6ed7b2f2bb15d5982e522fe6c41644a8860b9e84143a27364fb4463a1cd36e3574cd007b31034fc9400000004b48332ad589df46c99bf1d993be2eb24af71b48f3aaa26f90d7104278b029343a2ee5216db5bf0f9596c940daea5db2833d970b7328d0d10cbd3d56b1208c84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423233241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 492 iexplore.exe 492 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29 PID 492 wrote to memory of 2140 492 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\842bdbb1fb2d585d484f0828d1d97913_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f8764dd14008617387e3eb9d252d4b
SHA1d22c80992ad29e2be82fbcbb61b7f8193dadb691
SHA256298937b7bcba54bc9d5257220d4e58392a45fb0c2f7ea7ecbbd691dc78896764
SHA512b47cea270c20658d27bd7616de76c00ad322e7deb946e21b11a4502c3edc1c46c1cf04a49a2c29723dd5d3f2f8c6286d25c92e70cbf132550593392594f99b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca26775e01d2b48c4e1257cb7a4250e1
SHA1588fbc9dd2867b7b39e812ffa885d98f3a6c341a
SHA2561746ca884f7bcff537c9411403b73f86ca67963ffeb44f1b7ef6d538f9a97af4
SHA5121b8d6af598d5c17616cd639fc9685228ccfec86a81c71c8c32f5d8e1886efb32bab77993d2e91360d5227c2fbc25967b4caf2346465521bbdba2f235d8531326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8636a760606e2d44a43709818dc9f6
SHA13f9f0cdc95f37fe506399b877e87afa34811e903
SHA2562cd85719c1626164d29ceb411e02356d6479b184cf27c25990698df929fc6a38
SHA512c24dc1e4dd27c20c0eec70f7c5fc100f397aad895c16ca09e051eba55169dc7ed4f60d107a31e4f8721c6baafa8703084aca62fffa82dea1477e97107b39e566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59142a56475a78d1b51148866fe8d935e
SHA11b51a497d2a500756ce57468d76b40616e896970
SHA2565444edc07ccb4cd55768aa9761c801c94294729b17efdc487a4c565126c33efc
SHA51204238f616d63cedb07e60404c962aa75f08a69341b3588e2bccd9dfef6d9f2cea8cda46a721a8c2670ff36c8e8f7fa2766679d8676d1ceeef53898268a61f7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51702f9e6ed237a2a7b6268d6b975cec8
SHA1ae16d32c3bd42afa7348ee568ff3c1aca843d14f
SHA2560449c8663d1f904f56b3e05457fe0fe574aa2191b753809f88dafc127bee6751
SHA5120e4abd4d7b33218c18f0046d8cdad2a99e092c450dd6d6750e90fcb8d5e0a7f5083f836f915e4b62b294f32c4e646341d4b0563c86fc1ee33f217be14e84f922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd2e996ee6cc00fc4ee5ecd53b437c4
SHA1665b009dbeed120575d35eb9e49ec5f0beeedaa5
SHA25611bb822e76cc85135d3375582315620b5cc0c2a92abe6dd1eb88e1ae1bdc6472
SHA512d281da47147e23273e33b3476454919c4bc8c5ba5f9aea9c6f7ece6a959ed98c455234e25e7aae26a7c8ca5f974a449658d3b7862d9821b80eb1cc7e5bd22ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89daeaebb3858b62a3291bc0e00c8e8
SHA1a355455a339cc3dc31c3a05a7ba88c5e63e1ecfe
SHA2568e56e68c1a1ac23d27b28bb79dc7ab7b64a6fe300fb180ee88ce99105bd2c527
SHA5128819a00dfea716f4b53b12f28191356230475d9bda9534028bbccc25167b17cf0f807e845a69ee1f9b75702f89c474c4c32517d1eb841964cfc8cb3436cfc5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856e409b7300e565338db17961970d6f
SHA185ceb382c7a2923d180300e620edcd026a63b1a8
SHA256cffb2cbac7322cac08f2ee343b56047516fea1c2caf799aebaafca6ebee1bdd4
SHA5128ef870e75ac9a8a9d113a38ecf236af7a3f77837a7bf49491f94032ae83c973ddf2fda905267a87208db66a0475422b0b94f1d21b870f172ca099e718a14a3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b2e82fb98d006b32dc121f4f093ee0
SHA1669f498018ed19b57f4f1304d91b508581df016f
SHA25637643b2258c9f25f1778750a4fedacb3c57020026577032d34a1d809cfd32501
SHA512c343cc5c5df6e82efa350a5a23eba08b05ab56513505c4c0c4fba3d7f9b7d451d9c02e24825d23e16a00f575363abb834f2cc1b2e95fa9bdfd01036087a866ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510edb6901272c5f5703e972a3cb9e14b
SHA160a72a88ab94f0416d5f64830e5296d052c6b07d
SHA25664fb652ee5e359c22dad4db791b589b7661f95ab5e02f116021e1e1643afa6ec
SHA5126f219822ca4602d081345c4516466466953ec47977e5437e1fe9f4ffae0aa932bf8a01c1450bd5c86341ce36f2d7f7492ae41b7c78c8ef0814a326af422895a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b91d8db972225a208f93768bab4b6d
SHA16cc3df2643c1cdcf92909623792e56c8107d6347
SHA256b6c18448d189ca3ff8c8ad4ce6950bd532858581867f40c3744ecab9f46cbbb7
SHA51296113432c2df41d2330f16c85bf1850572b5ece9f9a2751d6fc9cebe2ab988958c52298200f88c68510e9089c28349ba3c7c07323420aebda46fe7215cf3f7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596ae51f977f5825148f76f4eb2679f9
SHA1ee907cd5f1cee71584fe406b2ce548f5a965aaf7
SHA25631e4696681f6847f91fa2315808b55c87529226cf1e830650af40a2f92875527
SHA51276372ac32233c46aa7a12b6b822e6a117346aaa6dca2f9b80aeb54b96e984752687ae24ef576f14a91a263dc7a3d5f7e607d6066167aa254f785227bb6abc053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fda81c618871baf5e1a75c9c9b42968
SHA1271a3289ee803a11cd18fc5f62ed3d044321fc89
SHA2569e87bba9df26a27bcc19c681be2ece8f096f73deb33bd01c1f62bf68d714557b
SHA512dea2de1dbc8bdafcaf9a6a595c4ef21ed44066cec6962c48c7b12002b6e084b028099f6b7327a6418bdd53c9d777b0e4d596fcaf674894f1b9353064eb1a9d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261d714a59a4417b9fc4bfaa78bb9ccb
SHA112d4d3d19664432ff0280f42ada9e41d7dc97f7a
SHA2564d9b2022eae009f534c32e2c84f75a9793988e88ea1fb0e0044f93209174da14
SHA512fbc5febf3893bcfbc2d284ce3b130e2a3f039e83b57e90d0793642450569272a3e51e7260038ee38914fca5cf71c1e052c4cdafd83b968255534589953a6a431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad03747d271bd3900875c0f8bb417f42
SHA18ed893f1c532956da2aaf375cea9c39843096b55
SHA2567e240111d991feb158745f26f95f4f2028edfd8ff701b8aaae507fd739d84ba2
SHA51209d9030bac5010f597caa3856e35664919575c6a2448d0a9b9830422584aeaea766c287ae1279c8ecdf553485964bb83bb5881c2806c47f314299a70a52b645a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51518c0c0d3bfbc82322599af7c9ba01a
SHA16609790ac33097894faccbce057ce404d077dc51
SHA256fefc8e2145baabecaa66d43cfbafc71673d9e391a3b2b7a6304e54061911c0b8
SHA5125e93f5610aa6be9593232532adb481d43a21b4bea4b9dc436fa2919cc9bdba340007e674ff50d8bb7e4f5327314ea743a245ee704f6fa377579686e2922d3230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1816c534e1f18626c4434cc2cb1a6b0
SHA11cc6012bdc229042d12c6b2ea566caac28acd84b
SHA2562b7c7691293fcc14672efc5bac6620489f35178651e82f36142c9617e5790a01
SHA5126ae9e369c2633da935c4b7170caf48fe39f38f155763747819b7608e8fa92a941a97fd2682854e79812059a189c6e9ba09375f7abdc675f1818c01757edc78e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b007286fadd7085e6e4f16dc6641de27
SHA1f40c7412c563013cc55c3b0a58b5c77ea2ce6acc
SHA256655cba42c5906b55349b1197c2b567130430dec5c1777f04cad09a5c8d88b60c
SHA512077d00de885a6244cec836fb9af27db4013faa8dd446de53a17fe1f5042142ae58dce8deb2f45fa740ed9a4f96015bf23050da6dff5d85d3d3b00a5be425bbd7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b