Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
88764f9366cf20ee8675d3ac36e16c24_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88764f9366cf20ee8675d3ac36e16c24_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
88764f9366cf20ee8675d3ac36e16c24_JaffaCakes118.html
-
Size
4KB
-
MD5
88764f9366cf20ee8675d3ac36e16c24
-
SHA1
72f90cbb698c0a35e7eb602e8088c32e8c55b8e8
-
SHA256
4be441d654e0e985d0e443b482f52ec04ec34533a6cf90c89e89e419e5001bfa
-
SHA512
9b8a0b6e46d38f082ea8a55d96b88a4780529ae6c064e593b78ebd9e641bca65080a92cd9531f7f5fcc4d6536ae6d8ba69cdaf639ac1584af36fdab251af5688
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8osvcjd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423353905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000099918444728c1a3c9e0d8fe4ace6e15bd106a0c95dba904f13c598d7c847effe000000000e80000000020000200000002fc571f90bbbcc487245eac1b8ac9723e1bdc0893ba55744d6f47df6ecf931c7900000000efe433ec9d37ae7ae776275cae6614257bd168e488314782959ea806662e08964cd0c0cfdfff45f7aa754ae82e31d987ac94b2e147f950021ead00338587d71aa48d3a42ed876ce358dfe39f6161f3247462be288f3a29b4b1c375186decec67ad77a3bd7ce4810e685cfb02d43fc436f3890a195d2ee1569e51c32d4ca49a73dd1cba13b132e1289dd1668c577b7f740000000b0fbc96b24f12cda3f70a62e147cc57dc51c748430b234a2c28456baf0b2b4154cb97c017f3dde0488b6190f0e47beec579655d9988530d7ed73d14339c1f355 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3016672da4b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000baeffcbeb152d008fd2bec2f04e33c9af359c4b8e7b70934b51fafde2a1688e8000000000e8000000002000020000000c50856b17c1bae70fbf1caef29920215e9263b5f32166c1df104085b6e9d1a5020000000f2b02172fe746bff11fab9e85be1e4df3d13d0e728ddd421bc9da8e1563bcbb740000000992a28384421275a74a43850e822267c4cd695f0606c5d0998458ed7bdda63f1aa13e3b8ce67235f18fa7abf8d55eab3676467ed380c98bc6d6d654c34900a87 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58E2F3B1-1F97-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28 PID 1924 wrote to memory of 2032 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88764f9366cf20ee8675d3ac36e16c24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f042512244868dab42800f69eb10e8
SHA1591e550daa311585155d38bab311d174fe38b701
SHA256432f29d6ea230e02b3868524a6881da8d50caa542bda6f4065c191af5e77cfe5
SHA5127cbbad82f02e9c54f0b2ac90d340b29db3d7e678000a50d6d03d007c8e9fb27e76536238939c652fff131188040fed8b6cf9a93f3b82f2091b808137d2838000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f79bad626eb2ca2d5fb86dd72c6f204
SHA15c10d5d5bcc04c970faf7d8542d22b8ec595a843
SHA2569f0988aa022ce8500b95751df2a816c7607c62c3d569e581a8438c7f5fe1c0cd
SHA51212b76759b50c9a000758e32d22a83a9555d658253d2ef1f6b9e04796c7cd5fc85f513cf067aec216cc4544bc26e46f9a4e4c660b92c4525b36adce5aeab56113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be35c80f93e45295e6fc03841414b41c
SHA1de15efe0b3ae839f763c5aafb0569d104d7e8a18
SHA2567cda875e04ed204c3a9923b75198e3676c7338eaec55667885b82df856867016
SHA512e9a2941d2f6747119c1d7270f7cb61c573ea9bc6cc47d1a1f64e73b634f0cdf6d9b382a4f67b15c05dbc1ee82f739090a1e3155f559c0b18d1c4494fb438adc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425bfd5ea3454ce056d8a452df64bc76
SHA1447c78b96cb8c45325c780bbfef5a102051fd3fd
SHA2566234507b35544ab26c8a91a96e547b584a7601df86da19f6f97b237d9d6a926e
SHA5124e2bb4d49d4a7c4f7e261cb79da62488a766fd9e63fac219110cc5166756e1c516576b6b03de2b54e0b17c85154bd99e7645a592121c93e1b385437ca6ee1c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b42dc7b85204925bccde6d3a13a12e
SHA155596991f5ffd2d4e12fccb2df3dffd582c814b4
SHA256b45f23b29546e88f26c21b53c7e81702c61b0b730f4b387614f199c676f0735e
SHA51232346cec854e135a2fabe9702e3c97368465da57dbbdef5534cf912be277341ab45b27239f18b04df40d9629303e1d02fa78b79ec2785ba228d078d52c6ffc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3831f4dec0c8dff97b3d3f08c22c24
SHA19de644a9b8ff2bf24706b30c8108b5a5d2cded0e
SHA25638371b17b177ffdcf5652180b20bbb624ae7b9d321f13589761919656434c9df
SHA512978080f18fe57cebedfc23d06ff0fbcd7a8a24268fa7167a9a069bf2d3e250fd99f046a9fa8a6a4012fc24465bb8e4bcbe234d0bd7a700fd682423c367b15b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c12af1ad26aaabae7b6e45b98ad86c
SHA198e5602cfef3b86e74daa85d6478803ec2e35a89
SHA2562f8a5147fee4f33e7171b2fdb33cc7481bddddbf06af79b22b885c92ad6f0ff5
SHA51206beccaf5c53927c67eeb4284f4f57317e9ed1887aaa1272f03666e700495d9007bdc2b850e63aef063c683b639e8df4fdf4e563e07c11e7414afab0ac0e1bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a8a0e0de7098271ba3669ac58245ef
SHA16e0f79e71226f9e067f9395c928b1572afaf9773
SHA256c81cd62a090f563d4d8c8f9b5fccd7384ef80af6ec91067fc1cd4be90bc3635d
SHA5126242a5a4bfc10850e6eac5b810cdc914abb44453deeec399181ddd5f78bc73a0e0b41e44285111f6fc7641c3aef66582784c154e03382828409052936454c398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6f565525a47301e51ec3b25057a97f
SHA1141d2a83bfbb76410709434ca89151be5c5d78d4
SHA256bca7d961726a88aa755a496beb33a957ae7b6aec546c408edec51eebab6fef51
SHA5127e2fa837af0ec41b4e16adeb29b544f8035ee2e9ff10bbb21684fcab390c73a7f4a7bf814fb5c96e7e67382258dc685bb43078f22b70cbca177711a9a081748a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5e9ba2763ae3e1027b99f99994765d
SHA19ee3bc3faba744d18d0696e2ed3f63d12c74398d
SHA2567ee49f770620d59b0892e68ee104e8c28b0aa30b7831e95280cedea4ae39ca20
SHA512f6a35335b104dc349d0aa3b4e5265aed4ba2dd1cb1e357fc6e3204ac43d7a13e7aa8ae786a5bd3a23120a3458f18427a77f3b38ef5c5cb83b9e32e3bb6273b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c939c7b86ee410b9e1d7a70dc24cf255
SHA11593d533c38808caccb382b684dbfbd83b2058a4
SHA2566a46ba0e88eaa800152b8941267b705a4ad72ff1bd76966327970b07299d4afa
SHA512af037509575d148a4c8c06170ba4b6e195ab1954e2579a3341f764c681986723a995a525b41f6faea037ad12152126964b1c06f337104daf65d512d180ce1fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b02ac5f82ebbf4fd603f9165d987ee
SHA17c6cfb8d7931c4661c7916e752aaae0157bf1a43
SHA25698751ced899b296917a89748fe2eb87aa7d4ccebe11b585223e73c0f10289ef0
SHA51266490393ed7e5944c785d4901387d5cf9a4799dec970a13349aa05e392c69d940af36e9b5257da5e4f58b60b08eb1d269ce7311d7a377590f1b58f65b5f05231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaabda1cadb3c06ff7f520a8b1fac822
SHA13384d0c1bc29e229d7c8c1aeb413291b0df5c658
SHA256be9295697688d4dd63290799a4068b785bd09a60d1b2e5fd148297ad7b3114e8
SHA512949323d30c0f670a58232b40a21154d32303ff66e31c378a4d1c1d7459f1167064939cf03e5ad481323b7a0720342d6622f7a418309028b8a8e6f7d781e9ab22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52096f6b6d4272886d9464762d176bf91
SHA14349420d1e8ad46dbf6e9b898a11d3ec1a4043a4
SHA256f8c8ed66ee06baf2de2bc48199b669f943ec956a8bcd61019048055c3d11650c
SHA5125f052fb147fa220a1e05c7156b2d374ae460f57019a8c36bfa243d058fc2ea643ec7e03dcebcea3648bae66ca69e742d964a5e2a1c167fd0fc3fd6d028a0d1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876978a44de46a3d14075533ec0a100c
SHA1af7d192348b9c4e6e6f8452b34cd02b338bb275b
SHA256b7325f16e81811925edb818fef05e6d4848fa8f56b971859f175fd9753e2eef8
SHA51250fbf75b9031833be774c9671b7add5e4043a122ebdd0329fe98c82a981187598c87f5183db304e510d0462c9234fdb143c5d671357db15204474b6c9fd3b4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565962eb25b1fc71b307382146d79e6ed
SHA1cf249fcdd52d5c8b0c700c2824b098280bff16df
SHA25682bac8e842152e2bc5d224022eb322255e6d6964024bd51e9e44b705706ec868
SHA5126160cd9708ceda8d12e197550e2403fd934ba535d4ba8df2ee3d72120a3e624088361c1f054f52035a570601aacf1d30399b93e639c3e8811593e39a697e5085
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b