Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 12:30 UTC
Static task
static1
Behavioral task
behavioral1
Sample
842cc5972d15dfd1ca02c48fa7e16b4b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
842cc5972d15dfd1ca02c48fa7e16b4b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
842cc5972d15dfd1ca02c48fa7e16b4b_JaffaCakes118.html
-
Size
3KB
-
MD5
842cc5972d15dfd1ca02c48fa7e16b4b
-
SHA1
80f3a810200b38f69718ceaaf8ef136f9cd81c8d
-
SHA256
3c8fdb5191fd60a5007acd7c55cecc6593539b96fe402ce2e1aebba0d6e55a28
-
SHA512
35e426758740f7fec465a9277e6159248fb8911c9b5cf37a455df8a6bf5a35faab0a9207aa641fdd17f840265aeded9007262fa251a8881c2fffd40be10061bb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fe47338db2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E9895C1-1E80-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000efe53aa3516afe04eac88f89262a180b6361362cd63c77308b1aed137779391a000000000e8000000002000020000000ca785199a28d71aba4233c97005ac18a62e65efd77e1d2a92af7e99a817e65bf2000000016430dd9482ef42177ee2aef0705d905ba4469041af8b57c417a2127a198c51840000000592ef6fc5742d0f36f2f59e9a8926332a5376e8ec5262a834ab2549c95cfd397c595b36dd8a59644acdb920a1fd03592416e90cc34ff63d3a91634ef3853dc9a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423234084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2016 1764 iexplore.exe 28 PID 1764 wrote to memory of 2016 1764 iexplore.exe 28 PID 1764 wrote to memory of 2016 1764 iexplore.exe 28 PID 1764 wrote to memory of 2016 1764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\842cc5972d15dfd1ca02c48fa7e16b4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
-
Remote address:8.8.8.8:53Requestparty-nwvqdtumtz.now.shIN AResponseparty-nwvqdtumtz.now.shIN A76.76.21.164party-nwvqdtumtz.now.shIN A76.76.21.142
-
Remote address:216.58.213.14:80RequestGET /ga.js HTTP/1.1
Accept: application/javascript, */*;q=0.8
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: www.google-analytics.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
X-Content-Type-Options: nosniff
Content-Encoding: gzip
Cross-Origin-Resource-Policy: cross-origin
Server: Golfe2
Content-Length: 17168
Date: Thu, 30 May 2024 11:25:01 GMT
Expires: Thu, 30 May 2024 13:25:01 GMT
Cache-Control: public, max-age=7200
Age: 3917
Last-Modified: Tue, 12 Dec 2023 18:09:08 GMT
Content-Type: text/javascript
Vary: Accept-Encoding
-
450 B 259 B 6 6
-
548 B 306 B 8 7
-
864 B 19.7kB 13 17
HTTP Request
GET http://www.google-analytics.com/ga.jsHTTP Response
200 -
190 B 132 B 4 3
-
464 B 259 B 7 6
-
412 B 259 B 6 6
-
334 B 259 B 6 6
-
190 B 132 B 4 3
-
334 B 259 B 6 6
-
190 B 132 B 4 3
-
799 B 7.7kB 10 13
-
799 B 7.7kB 10 13
-
1.0kB 7.6kB 10 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4e58c00aa1f74f4ca875d98631eed3
SHA12fcf69c57324d7f7324cddb6621508171ba8408e
SHA256a99b9e224e0079db5b8f0974ade0e79e1628faee7556bd4405c39cad2f8252b1
SHA512aa1fddca4a55531c1a429b01dc5fb95b870183ace43f287f331084137be40aa972931ad06d3407e395945c17c3062a7f8616f2725453952a62766eca19d72f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f1e307f2ccfc89d4e83eac9b7b46d6
SHA15fbd24d7518bea1714a4f76f27b9aefc277d839b
SHA2563f910168c468050160bc14444f2d4e0964170efe9a7594562c9563c9d6d524d4
SHA512d48916bffa776737a0d9b2c201d4fbbd618bb6f5e1f5fcb5ad15758abecdc2d67e71a2c74da466a3b1954611222c955601e45420bde256be8c408a4bbbeaa99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423c5333fb6c1b93025747df2670f9f7
SHA11d5d8870199a33e13329e56f1da6a6df8ae47630
SHA2562e536dbe1750b711eef54184a568c5609f99360e29aef4d98257a867d0183c87
SHA51279a5cb0820db124b8fc7bef59c603c8af53eedad60792db71becdbd4f20e28f8b366121aa6225b976fae69f66f6abbf00f9a0274fa0e52fa0ae4b85855f865d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c31b604b52e11f9fff23569b64e7fb
SHA1f38bb05e3c99d660938f09fc968828731fa60c66
SHA25625e83683922c5dc7f3e5575f867edbdd902b6eb1cd61180f9e43d94a97835986
SHA512be14b347135ef325a7f096de6cc77c665ab31e845319510a94ef59df5d340d813c1a16626e010bc7484fb73b17296f489ee7b0b832cc65435f52c7afcd09e12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573eb230e4ac8d353a6cd35e98a590dc0
SHA15bf804595f722441b1ed1bf3a8131a4b3214960f
SHA25648e14d3a5af1b3e6ff6bff80e304f7ef0610e01f4a882e5fb99e9fae4f4f1a57
SHA512ccd032d6860ea02c7bfc8d72e21d2a3654fbe6086e1ae1a4f98040bcf60e010e15d12c608408b0bfed2b01d722514a53eda598e92f07f4cce51344019d8a14c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd7c12b019cde9d18ee1a16cf3633f4
SHA127a18b8f17b26e1d3b1055ca45b8a9abf649c07b
SHA25612819086d4c1dedfcc5d5c82644b0eefd75a041059dfd4b4af1197b28070b84b
SHA51225b97d2cc93f6a44c10dc69ab0253e995859a66c6a296eed93b1ef90fe42506dc7d90adb66f1d1ce5801ee884a36f199599bef991e459d08f08a906521f0aa4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e704d95594c5b6172d858d1c1774482
SHA1d57d21354a4d9c8a1bc88c19443b8ed3e421ef0c
SHA256464931c0a1cc97fb5277fcc4e11beef332bcbd0e31051090bc36ae47d39ee170
SHA51256a9dc52457d8c8c25fdea0c5a269ab30546543b9a53671ff7e81479f8aa99767598af6a663df2d2f49d5c527711efd2913ca8b1ae12575fbdc3b0f4497422ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a12ee4119c7ad5199b1a0ee5e15a1f
SHA1f9a985f8d7d10a3ef3e0a8049a4f4bb9c8fc12f7
SHA2566a4f4143f273ae8ae88f5c2c19d2aa1ddc243330580c7f1179cdabf5b467d6ff
SHA512cca120aae3bfe90dd97eddb0d2cc46515ac19ac34193bdd48d4befdcfbf4d2d458e26bee6c4f51af5c566585ff1f07e5df0426298920db79f8d1a7cf808708d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f398cafc0c3738d95e4b7adbd039a49
SHA13559836b0dcc4744c91876c5d8a226867e262f66
SHA25698860dbbf6c5bca45c29d1bd0f13d336011cf77a11d8008d1ba9c8745ab1e721
SHA512f61ba13590512c021130a83a96ced83959a0829ff8b1c50e6826c4b1d449df5db6cbfa1b8830fef0728eada4ddad708144789e6d94f38b36e2eeda481642a992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270bd12ba678337e1ab296f5f6bd092a
SHA162a4bcff7a753005ba32a35bb88a96919205ca53
SHA2560e711b34eb5f7a7d15c823b029a7a20584c0f8bf95239a59f012b03f3c97134b
SHA512ddbd2c2393d07ffd2ad7543a63b039685107c6ac9d35f6245dad1e2c10ba49d24050169acafccda85567aaac9268330189b461bd4f1dd66ae8e2ad33af86673d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc53401a9ab63032fb983ed11ad5008
SHA16efb12427924bb5307ac7830042efdaf93cd522c
SHA2562979c68804deccebe3b31e3248e82f705976aa74265e631194d33bbbccddc3e0
SHA512ab5c1ba69e7cf28aac5ef8e0ebbf4afa8d9aa799765ae3e87fab55a586cbbcae63fbef880345411a861f207c71631df0e4348ba302b22c3a962aea94f7285503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a2cbfb0fcf943fefcc3fb4957d6517
SHA1507a373d73f5fa9e986065278689bedf112214ac
SHA2562f0f78371fac1a6f0076549cc067c28b2724fd1af5a1668aad9d313654633ee9
SHA512d6743ee8cfea418a99a9e3cbaf0d746fd037f65308128edba6fb3338fea9cc0f2b2452339ae0036cda400b8119d340663e41a2427e8fd247d0b842fff68cab8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e505ec963fedb0c7eabca435c9b80937
SHA15befcbbc093c8918f0258363356346b111c1e803
SHA256c17477225bb1070068abfd81b6a9b710868a68f07d08cce11128607018ae6bd6
SHA5125f885088dd3cbcd27db0f304a145fcadefe0372f836bf5155cdbd04452c01c50e794cb9d436a8f732e9dc9817849a6849c25f522d1554f914484b3e1fd8125c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5ef8e44dc7126cc069439703ae210e
SHA1693c1850e09c0d9a26bca877cefeba50633f9481
SHA2566a5a909be6862ce8fac3fe4f6968861af2ab9abb7cbe92e643e10744c5bc6ead
SHA512717b511940387f73de60037471f4143e2e93080f338ed81e05e53676b214bd1e37cdbc1536359362e53cae08ce818227b6029e5d36251b606c98868239ec418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee7207ae628b353c58bc70dd956754f
SHA1d7cb1d0fb1f9ade416f2522e5e5905080d5af809
SHA2567eecd7467766b8f750d8bdf1ec1b35690404da9737cb233ad359ac4fe9f98a1d
SHA512411cdb728d48f4d68d8e76139016a9541cf7af6658e661cd0afd71c3a6c72824ec6ac7f613cff1d1e41e121913a9bbc6963335c2e5fc064229f18cbf3d1c2aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f156a4ef441942a2aa7a8e1186699b
SHA15f09b0f008d04947d9a19c3dc16b5b5ed6db87e0
SHA256b0314f870145f6d23a16926968b60cbed17b76ec6911f0f9643beeaae2bccb8b
SHA5122194c1814a6bec3a641bb5ee142333b57dce6cc26006db79b4e1691b9e79794168d44d0af7a520949cbf4e9d6f027bc1bfdbfe7701bfefd2d9d370c9fd9eb366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129fd704f603e712f5f36f93a12f561b
SHA1e2c9315c83b8c3788fd26e04eb7ecb9ec5d2ac7c
SHA2566271a853657282a41df3906563bf9be24bed63c9b53045cf0025b3826eb9aa05
SHA5125186305d1ca0674d93e8dd5534e688c316332e16d7ab934342d9ab00f2a1a473406b0d6cb9cce0733252e4b6308b3114b1cff2264560b04f1ea3ae6b0014619a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b