Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
88b0159753e0808638b301f77470f68b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88b0159753e0808638b301f77470f68b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88b0159753e0808638b301f77470f68b_JaffaCakes118.html
-
Size
461KB
-
MD5
88b0159753e0808638b301f77470f68b
-
SHA1
f04fa35273aa39004bdff7dce52492347da338fa
-
SHA256
c4798838d716a5a77ba34e37375561a26bc16185fb8d73b10733197a281a9111
-
SHA512
6b7609ea357bfa8acabdde8314b9cdc0130292a806fa888261f26a50b32bb4057d3a0da7021afe7e57a704be1927b287a7986c03ebdf9a924f76d8c2d5d3fc05
-
SSDEEP
6144:SlsMYod+X3oI+YisMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3+5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD942A1-1FA3-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423359016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000433b06eb3cc8e64d9afb6b2c7ea1621200000000020000000000106600000001000020000000273442c1c7259ddd284014059afaf0218908c3ac4967d6a11d456a6467dc9b06000000000e8000000002000020000000e164c291d7bf407f56e9e70a0f9fe49637b2776cfab21a15ed74cbb2a44b535f200000001f347c575f5c2e5905f2acf1008c8d27e6bf3f2ad6784b9a2fb252f8fc00f88b40000000be9602dc3821b6b4b9f57fa1555f1a29c1a824b3cfab0d3ec8208440267b01a009ecad1a28b951cb442b66cf197302eae2cdb39e5a05c047b40a5ea621c3e534 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09f6e18b0b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2736 2340 iexplore.exe 28 PID 2340 wrote to memory of 2736 2340 iexplore.exe 28 PID 2340 wrote to memory of 2736 2340 iexplore.exe 28 PID 2340 wrote to memory of 2736 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88b0159753e0808638b301f77470f68b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0bf2bfac6df6aa458fe5010be77a20
SHA16b4eabef28aaceb999cb9f4fc5e7a9aa4784548b
SHA25664fc333d2c4bbc632ef9a2ac277a00007e69fd97e01224d977e7069aae8ebc5b
SHA5128c1a81c70e6e18b98d5f6b80e6409bb8c9260b1fb9dbcf4b71e3fecdbda929023800e13db902fde37cc5f21fa359618bea1c7877e2859c670b045cb280ba7929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d173da8f9798f85ca1587b046e85c5d6
SHA144a9cbe233d2c4078a8e75e504befe2df934b365
SHA2568fde54891796e722d58b35b6eefdce77370579026c9fe9fc52216a1c5df65e26
SHA512a6f8261c8a8f3d2ed660f7988d2164e19c3492160983b94d0308fff545f6e25a97a8e34e7a04444a664d335d83a4ad374fa6fdb24c8f1951ad86589667658f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52625eaa1a357b81fcec1e9cec368a816
SHA1f8345f2738217377dfe570e5575eacb02e6ed6e2
SHA2562461c7bc25b5fc4fbb15c7c4227540b3c5a386c98af845882046b71de8f69615
SHA51202c7b9d7a1292967248d4209720fbe6727128121c15422a3474db907a561e17353c3f941779a2bfa88c22ec9627e6d147ee3b1a5686670b9d8691bad577beb71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9428b511f04131e939e4d7a0b5f21b
SHA114d933694e4cd1c640db73f1fbd9a2c80edb6ca3
SHA2569d73491999f0d10c70b4eba25669f44f780f067b9697b716189b9502713ce989
SHA512f44139adac7918836992c0f15aec7b0be3f8b980cef6bb6ebf3ca5f69db7c58dc530f1a935c1b94f58612b9497bcca8880b75b614d178f7a0a40c5dd6de60eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac46ba4e5819a1a6f5a370ba3a78d42
SHA18b4b4cf8d2bc7fbb53947cf59621504aa0e527a0
SHA256ba5fec4e3d8835edc38d0acf9d7c389b1df08ad3fc6dec7210802a5d78d472c4
SHA5122e7471259abdbff114e1a2ca9968a6882dd1d59f2c1448ff9ea6f6bf95a7c1ff2c18c9bfee6e9ba5a1811866a949ea16bb447037d5932ce0239b7444da267a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64768c3616d3b925d3c3317ab5b52b3
SHA19ad3c46b017f05d1422c6af09c4e6f79b6968a95
SHA2562b137481dcc5a50d4db7f71260907f879d90e2f779cdcd999c4208b637be158c
SHA512ea964c0206d625a2bf42abd45441b089d2a8262a12eeea56c2b5c58a8af45307644d6722f6692f297030b6a5492be1804d3d83459d25cffa68c981c962a0b76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb26060ff6b3dc7c2f4c7c6f7b39167
SHA1dd18a69a8a8b364f121e15a6f24785d838eef1b3
SHA2568ca544a91b220e3f1a57d6a4e74af6128b0fc28d676aab23f88853290323de39
SHA512cfb2b3373ab6d0353104463d35b1b2719111917c8019cf0df776b2ebebb921f2452eb0627cc9b42a809e1d3b034ba3e837dd2aaf12bc4bc8997fe2abdb37a50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f798bd5ccbcdcf92906c608649d6290
SHA156da930bb05873daeb88875c3d436ac9e993cb78
SHA256aeb8cd1afffced45ff239445d02758e438d0dfe4e2f63eb4924fc6ce2d855d48
SHA5126251856c6d07a2e5b433e38ba47e0a2d800d673202bae8729cf256c4834b9811da1b8691ad4d3f402f7b127166c81edc08240e741b60ecd08adb030d28d97d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a7b267e59739d974b37b2a0754102e
SHA10071e9ce2e3fec1ec1954050c65bca637770a75f
SHA2568631fd8b452620bc1bfbfc07b3c29c3812202e763ec550af778e61551a3295b4
SHA5129b156f906605ae5acb417b9cf0260b4614663d88c039b1818622d061b3d07d431be42b16ff72ba021e0de1068b2e00777ff25f0d3328fa5c4f1188107fa44ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e6816b26f8a2a5fec4de24ccce7891
SHA15cbda31a20a6ed7aba31e054815b01472ee9fe1c
SHA25635a57bcf3ce1b7dffc5ab2cb402185c0e750465295198b49976b5a52044efdff
SHA512012c1774cbb9a5fd0538cf2213dcce5eb1c0705ac5b7f041936b4336577602cb7cb77e98cc22231f045d4052549d0feafbfa87eb0d6d3b430dafbde993d7610d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59879a2b732d90c498f8b9674f67f8cbf
SHA12a167fec8c6735245c4e6c5fce4b5118db3ee808
SHA25609136c3d888ee34bad57ee0ca86ae81cca33f4aa75f268a6f0ab9dc7930a7981
SHA5127b16a686a4252c1a94bc3f6818b2ab88381c319637325b62d009c889f9f67a445436aca41eada62f0d933e84f5c595cf8a4cbec95c8e2c4ef21c760eca73409a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53903342aaa6894ba0d0e37e0d963f186
SHA1c3136a68b77b4c1f166bc71a2585a5ef99e027a4
SHA256593934d5f65514712c6be9c0c6e10a28f182a54d7e0df00e3a877111f8df422e
SHA512e3d5f4e2e61fa528b392ba95c6e852d571e74d31be1288a835c52fc757c3847842683c569819627a4e6324bd475dd34f6b306aea3b10fbeaa18fc2a05dd4f72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a824525f1481d2aabaf8aa92e6dece51
SHA1813ff2a0ca7f538167109132310594dae4784d9a
SHA25692f5e7d2608a3e0ae4c6b35c3df4710facaf5a46a4515eda3f587c191f983f9e
SHA51272e7349e7c2f48f68986fd1c0782bf4b1e58e54e27738401d211901e65ad94bab676a57fc57828e0298e6a55433cefeef1ab7df2eeb108b35ceaf9d281c43f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa01ca35aade134eb904bd06bcd2171
SHA1bd71f874302e21264d1adabc7eea8275147fe0c3
SHA256c2c6cf8c09ea702db34f143bd4be4e32ea741e98731df6cff07582234a50f8a6
SHA5126d665e86cc3046e2934a9d5404e705991e87f1aa18f001755accde44ebcb5f9b2b8412e949a1e75f584ed327e2669157d72b35d5063fb75f6d459232d449e435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df27b591fa15f082843c990f083711d4
SHA11494e87a7b633253811efbeed79c3b173044c2cc
SHA2569bd417c5a25ef5fa727c2a59c2ceb304bec279b839c4bad108d09273922848b1
SHA512d038960f447a9ae34aa3ee6ddd1cfd0d79e2b8fda6e6f21473e644b8820b9beba60fb6f23428a7f31a25a47c32a423814ce9d96d90953065f0507353309ba963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae0571871730ee488d37a8771655011
SHA1c0b9b8579baf055a37a01b98ae9ba51e31fa6d67
SHA2565a7b748ccb4e111c972512210a4feb23b758f8aab79f11a588a21acb2ed2297d
SHA51285e5ce8e88bff01a1a142c4bf805768e6a5c5978898a1811fd7e9c611754f327fb63f7b2aab62dc31955efe3edbe4000a15348eb787501d57d64070d42128fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524516d5bf0a4324f6be6fe644fe1777c
SHA17138d54e402d01580fa7f96e62cec3c290fbc0d3
SHA2567be5fc4ca4f054622e98a019ba20d4c2addbfc74e52d472005baeace9031b2b6
SHA512f136e62560b381931f68d3290fd01ada83673061c00fbd5e5accf639bae1aac03b6a8549ddba8255ef85a7fb1ab160663e7b5fe31972bcc6b02f50076ab18b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2ebcb14f5ecf4090ac8d96103397de
SHA1cf74f40698a9f33f76b468760d23d593a57cae98
SHA2567756cf926959bb89dd48ab91881641d862740c8477ec90b093fb022affda18d3
SHA512b59de1e838c11259167077924a8821d7cfb16c83505b9b60f92e7658040463ee9120cd0fbc64fc3d4c340753a1f0022522d108aacec552ef34acc9297682cda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947f8bc2f9e35d3ae4db6ad349d05240
SHA1b5e240ca69bcd53ddbcaee0a29a5b175d68d9b8c
SHA256626fa57933273c2847809dece164022f6c3ff2842f5e6596144f33bb6a8353a3
SHA5128b02a75b8be5e1de37d855aafb6c4a3ef4663e4e8f13a988f84b7a69f7c6158dd9a756d0d196fd367751dcddab95607345e3b7789bb4021b7df379179c3cafa7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b