Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
84f0cce8bdd5d5ab2f0e7a6969c4e5e7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84f0cce8bdd5d5ab2f0e7a6969c4e5e7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
84f0cce8bdd5d5ab2f0e7a6969c4e5e7_JaffaCakes118.html
-
Size
734B
-
MD5
84f0cce8bdd5d5ab2f0e7a6969c4e5e7
-
SHA1
bf5ab4ddc25a597c29352832c0a693213f44de07
-
SHA256
e46920f30042291964d88003343b5eac7731498c87182e524a7013ce194d1f63
-
SHA512
f97c95d64800dc4302434970b9b2fcd5fed60164b2bce0bd6f5c19a157cf45ab0e7de8668075e95865189066649d7d95be9374d008732a8d354da2142e8eaaf6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008c65e2113f2eed87febd82c63f674903d24b3a841a366e3de8a145e25df461dc000000000e8000000002000020000000030626bcfc4e4407314e5e0262a9fac39154366d487517c7f18d7b5142fa947520000000aba9b89a8feb8f12711903b5dd132845e5432367ec8336894ed336ef5907cf154000000084ff07c57f11eb7d203d05348d214094c430559cbbcc7c0c2964b50f3c7724e386a40767f2837e24a8dfc3d39c34059a92a6d79494309946f8b94e5a931e7e5f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423252743" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209de7a4b8b2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000091eda3545d73bb73941c7edc94b431ad5f56507f9e9e8d7633abc99fa0323376000000000e80000000020000200000009fdafd941b61d554f96b9e7fb45d4dbbadd18358a4830479901100660803923690000000759de9f025e5ebfe211b9f1552f910b273fcb9a2a203e0a34f339d74d88da8227ab5aec716c1931d28ccf6b1645bd32daa14a17d3ba1d0ead71fd18175fd1e8e231f8a1fbf2f302cbac4f918d6fbdb3407a0d6ab2a1e28d328784d016cabf6a15e1e759f8fea850cb71d106700ff5607be7a04102394c697c3d27feb77cea56ac4f072a0b579d2b13447e2ded86dec8140000000798e0cf32d9b62c017b5aa2c3555d42c55ba9466bc53806a0eb6c4a3b8c89b3442248ae39ce38bba142823f2636a77d2771fbf248a6f6e7f0203a080a3a5b6c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0390771-1EAB-11EF-AB01-4E87F544447C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2648 2056 iexplore.exe 28 PID 2056 wrote to memory of 2648 2056 iexplore.exe 28 PID 2056 wrote to memory of 2648 2056 iexplore.exe 28 PID 2056 wrote to memory of 2648 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84f0cce8bdd5d5ab2f0e7a6969c4e5e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4c692592326f7aeb90c6ae9c7328ead
SHA14681d0875bc38e09b074113449e77cc1d24a1852
SHA2565b3ceb58ce5a2771f7ff27fcbd6f759fc3623850179d5ae1c7f80566b20eb847
SHA5129353f43131db939e00f23e45d7547aa2e0addc28f4374fdfc1b3449a38579d0a218f1914d43b48b8fd7a554b18d8cd3445b98754cd1513051b2c1d173f7b43d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc41538cbe5c2fc51e9f0d934394e0a4
SHA1a094410646cc29ff22e4a5adbc21c51db1b491bb
SHA25677a5bfd806904ac7a9e91445e3809450ba14a7ca8c8ad381275a5cbcaa99cf3d
SHA5122b6bbd96f65845354f13d91edfc6c539c64b98adc8f38c6af1e691f0135ce91fdbd23cb71f50d2f3fbba30d60537cf1d26084a4443304054db550d108972fe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df3d79bb7651c7b3319ee3fb1a4e8eb8
SHA13b733673327540b9eee46dea37f4c107689c47d7
SHA2568cc43beb66e6bfff1baaa9b86ae24cb3a179260f20272dde19155943c13905e0
SHA51261645772279137269c75cbcb54e4360842af6fbbaa36aa6c0e60db27285c058f754ac98d029f96d651a95e180372668e3c9c35d198f9bfd97b76a239f17ab1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e7d1978c35eae0bf8c76e2a53d01846
SHA19329c18622a9ed3d413b8a2d7e85579953169f95
SHA25621de946765afb376d63f135b1191f4f19e2520d37208c4fb868f91cec2f84b8a
SHA5127e0236b502d4b3a05805443c6d450f0ec14d407d39ad8d6c54b4d175f505524b5376bfc98f3b9779ef5a6bb7a88c2884b4f03960d07544793d9cc4ad2d87a0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51890487001d797e05d0133ab6b5664e7
SHA1c9aa356c95cce5c2ba2e511ca68d7242fb9db887
SHA25608d907dd855e4c612638d16d38b4cd07332852a9ec87ccce750d62260915ba39
SHA512f50f71812f38df1489704731c4b40314779f2777ab24679886284ef5602cc83ea1e1c2c57f877c4e4986415ca7e53b1145b74fa0b90ad65ebc03a462439ff19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d615aa199150bf0970e7d13306cd5608
SHA1628f1bd9b2483b9c264434339060d4effbed3427
SHA2561b501968d52c78f1e788754555d0f02371711eb99c841ee60de1c08336804390
SHA5128f8894049ea4fc1f37d023141b43df8bc3772abab2e6ab7b7bf42014f4c869beb61b243739615f06f5b18d6c13fdd468e412a168b1a22b01ac4628ac0485a168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57dd0a0192b983cda0d73eca2d1cb115a
SHA1915857b360324057472e8de2d058c970a5b55c3c
SHA2568f18dacda098419d7bb387aad0cb6ff5ab2e49e09dd97d1edfd69b706007c40c
SHA512c08418c2f5b6a42a3ecc52432572756d479d4185ebb4a0cfe7e166b7afaab9867873a64d5ddf579ce0063a29cfda3792e98672c585dd81e0c4543e2395641376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b75b9a4578a132db32f04e1e77514a6b
SHA195f024c4f453c46ec3b3231bf3850576b43adfb0
SHA25628f3e89155a0059fd2cc5232c8e9de20e3a1a2bdfac6518c9ee5897d8ba97e89
SHA512e9a083995b3a5d90800f6e2b91f99f04cc523a3c0b369266d459fa80ac3e615fcf2c060a46e922211066c2a6bb95927234dd50f3fe86492d992321822bdcab20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5553039f1cf64f9053dd1316f803048b4
SHA1655db53883cd3b597b3b274aeb64ce7adf87ab11
SHA25687a169e3cb913bc3f27bd3548394216a8c144b0bb1dac0b133a4794e12b97e04
SHA512a56514e2b85d9d7f91b0010de2a7751664e302d9c83ed355b38172ac3a9f4d93f35bf3e46b72f3824a8baf2941266a368720570465f2f1e45222dd73231a71c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc63491953e16f88e1a030ef51f3c017
SHA1266241051baba2a22fe9ec5b1db5e02377b6f3df
SHA25653fc739116a96722a3339780366178860cb2ffb7731d5ebb1553865f35247784
SHA512eb35a1cfd44a5735d526198882dbf3b3af345b7460f69f378a1a0804bbac9449665e4b9d6fd0202c23e87d0d764ab193367efd444936d1f549ec4a02864ac579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5074e93c88fbe3e02fc5af067174a9f30
SHA17cea061e5ef86919a44ef1029c5c4698421ff13f
SHA25617b2d7377583a9b94c8346bbd432104645563f440ff8f355d8d0bda49b031ed2
SHA512d80cb19305cf0127efcef92757c473553a7f956dfd6919d92493047ebe64eebee655ba695a5cc08bbe311b2122f77366cef91f333844ffdf57e864207cd68277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db8db598ff4fbe6ec35ccb1dcd5221e2
SHA17f359d9296a9b46c96266b0539e853765134095b
SHA2562270a4724e94bff4dc7391d33aa70901269586c4772cb62daa00667ffa6019e5
SHA5120ef4242b9cd080725b4a0664164870354f21b6b71b950b9021981b1f448cd1457b65e196a471f9811ffbefec1d877779f987855c56e6ae451585f5be168bf23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56fe0d4711d2f3b6772403b1d45d0a7eb
SHA154480780713412931985e8631882eb2ed82a363f
SHA2566974e56447971d2aae2e3c6b3ec780c2ce4e1b8bc5760ab19893e9c616a6109e
SHA512f92d2d2cd631253614d153942b19bbfafb4cc9fa83680469e8c7c2a88313e506656fe131cd96c0e2838e35e320354e04cc6497224d2702c1798eed0b90c391a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a54b70a44f71d150138e89ff28e37a47
SHA1cccbdd446238438ee5a68b1b52e05825da6e52ce
SHA256f9711aa48dfbead766d46a27e66522827644a2833d2468c48454ab048d4bf53c
SHA51205c8a09e7683d57efc71643ff66c4287df60180a3e62c9109a69ab1e5b05669f794149405efa24b7cb38459bd8977d4a81b1f96021891bc320ac599511c787b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f54b83d2cb47e4b2e5729c96419135a
SHA1e62941511f966bdfc8d73f1007018773213dba93
SHA2567427ffc2efd70dc1f12a8b79e89404900c07ca3d70674b4b9446c6f6a8f10997
SHA512ade7c1cdddb86bd81bd3eb5aaa83e6ffa0feae9b78b193a5f617da03dc8a31180c23c0ba40f781631bf589263e5a9e2cfff1b774cead9126f84689acb8d3d693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530f1e00f4795de2ec8fc9c2f730ee630
SHA1de79084f967478aa80e42ae2538797f31ef784fa
SHA2563863978f28ebf5d740c5bbb78b09112178902cb3998a1924ac138aa75dc58043
SHA5129106b3f829e7ecb868957ca931cc6ea9a024c642c815cc8b9e9a87ce148885054f88918fee0860f142e2ef3f36787300b23384e724fef008d7c114828b870c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b48fff63d93997b7a5afa03517b61317
SHA1e4d424b7d965840818057a68427de7e684ea565f
SHA2567a4ebe21ea53fa658a0eef2f921b25d50a2530f210fd4d66c360e0b4ba256509
SHA51249720af77cd746e8b1ad4df54ed059bc7b0d10ba9eef27fd2ce1b240cd5414dc28261b55f91d1f5bcfd6d092c2632f4e4bae7ab2ac7bcfd147706ebe467329bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef1a69743e9fcf49b6afac07ff025f04
SHA147d9d489d13bcc60ab07207628902496f14cf862
SHA2563531d1f2488f58f6582a19b77303ca6d7a3da66c48cae3824f3557881630406c
SHA512708e7cddbddeaa6e3a4ad6e53f69942ac5ac48a9966089b52cdfbf3acb982ed7b281331235d47bf6d0ccea30ca7c003a99874e32d5cbef8c612eafab67beb533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bba69c0d92367fff2e0b4c011ea8551e
SHA19476de031048db0785e5924dcf62ad9945825b1f
SHA256e340b931210914f6f7e3d5674d6a2efc6ba63d8c2edffa67f958053a2dcadf55
SHA512e309718e90f5c8c39fe77860b0b7ed0411a0369dba2ecbb6fc20accf4ddf5e51ec25cf1f08bcd70db8b44efa64ad5b59c33f56f6cb63ec03e82227b0b844104c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b