Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
8895b25532b359e9b9fcfd8aab115c7e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8895b25532b359e9b9fcfd8aab115c7e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8895b25532b359e9b9fcfd8aab115c7e_JaffaCakes118.html
-
Size
2KB
-
MD5
8895b25532b359e9b9fcfd8aab115c7e
-
SHA1
a04f66c26c14bdb6795bfb81fe609a441da8ad16
-
SHA256
1ddbef6c8396342ccf0d0a340a106873bdd282d23d21ad81b84d1726ecf8316e
-
SHA512
c210386036164fec3a6aef82956f55cc1ed5f11edee4504de310e3a593ae67d35e67f25bbd18c39d3d2b991d9616a4acdfab98e24cab1171dc4010e5bad6a2a4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8097548baab3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B67BEC61-1F9D-11EF-A18A-FED6C5E8D4AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423356637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000a9197a1e66bfe71035fd7a977be090c10adfbac421a0e4fce6d124a52e641463000000000e800000000200002000000089d2f50064b63cfc54fe2e61c8dcda143e1deed124f8db3b863e5425e4a27d4e20000000294ed4210765e0e6c5233a5c2f3041516ab3068e714d91daa955cf0a7056c3c4400000009c6636743cd1c7bc708ffca5920cf7c2f534ce5350f7ba97298ebda2a5a31f802d00bb14169175e2e84a320d3836716b3819e67c448ab1620e1138f5096c0c41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2804 2116 iexplore.exe 28 PID 2116 wrote to memory of 2804 2116 iexplore.exe 28 PID 2116 wrote to memory of 2804 2116 iexplore.exe 28 PID 2116 wrote to memory of 2804 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8895b25532b359e9b9fcfd8aab115c7e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde1dfdc45d63968be99a00943d7ecc1
SHA150287a0526fb56179dc8862f94dc529620fd731e
SHA256c712113529b9340d3eb5d3c507c6a454c4c6c3f4da649c839f3a273e96f3acec
SHA5125eea5b421ad94bdd8388a6496c1bb76ef41a9149ac0a5ec4cd3fa21f8164fbb04d141eb70eb58c23f569037a496ff15f28fbe2b83a18603474f03250f5ac555f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dff1f4ac13e794d9f4b9141488244c2
SHA1da2d5212a28bc5e27a7b75b6e122257e97710561
SHA25632e345ddc86ec3f134cb86c1d5093c8c878bb910878726868f7a563de5f12abd
SHA5126fd05caa48e69e9c2b36f7ac9ccc4040414297be4039df7deb6223429922f69d124e5e608bbe09e397babf1e7629bb87f107cdc6bc921f2be8c7758b0fc29103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21837f3c15e8bdb56cd49b59883cf70
SHA1a9134078bee9a7754ac9233b275dbd0a0f65fc38
SHA256b3b36ac4a022d4f17989b84714eb80d69c3401b3360a071d936be3c2add8fc87
SHA512e072757087f6a94d71c3f054226917d0ebe838588da06ade9547639a56e7a145ad27e1111726b6a457563c2a4b5c166afaa76d2d73a163ee2b3cdf98268fb5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4bc7c8de02d64e156107584f0d143b
SHA12b1dc10535355c45dd493b78433f5a1d56196cba
SHA256507f7024c01f276108909f8fcec16e51e3b1cc79fb75f7bd7b1d825aba8c7fa2
SHA512d1592edb1fefdd52c79890c61758a63634dde600988be670bcf04c1b0dbc13374c85f5ee9e946a07e8dea5e166ba18f7832896c3af34c531e9a1c6fa28b3bd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5745fedf982a871f0929c2514a3d834d8
SHA1cad7b79c3b1060de5a2b3fe24431721c0c09bd5c
SHA256f263b1d2c72d7ee1ba98a0987e69341ec08c5883e55c2af321ed1af060d8c7b1
SHA512d336816c3c636c7e8f2d0d059c624045d7b2bcfd1b1c7b0bdd14660d3b3f15c5ed1065acba8f2d4291731e497e74d76a6f9905a54fcf239d30d63704d11a8945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc58c8f0664ac58b4e6fd65140be2895
SHA12300a5fd4b735b8620379f496280e2bcffea3d49
SHA25613520571a7c88f79f22f7edb615557d0d8d1eefae86487868ecc5accab47277f
SHA512e9ef2f476d08d701cb361e502e18104c8a888619b5b5c16d634975a8252e60fdaeb8369dd10ec78c6c193ae5d9280ecffaae0a7aea6112db4f92208c35742bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59888563c325d996fa0fcaf1c258c0d87
SHA1f0decc8941ff4b925eb55e96710f7766f8d12d17
SHA25668a91bcf38b99b2502f9e9d2932088e19fba06837e7311ea8586d681b4211104
SHA512c1e18f7683cd30013a927f495dd184d66917ede4599ae09056e9d6d028a3ab39386c355f3c26695fbabd2e9d15f33eede5de7c60c648146c9efa785e1cb7dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b36e2d478400439e38cb871c53ce2a
SHA19abdacca731d5f292cbb82a8951af649b107add7
SHA256b7646d2a15cd5b6397e2e6ceb771494378aac1e7ad94184b29221e6c6bf4a051
SHA512046cf0f71ef4af6db3cb60df1b51eaeddf005b25057d9656eef53b8b44cbd03c5cc7da830ac2cbea7e16818137a57ebe4f1c4c415fde2a01552da830db9adbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39bae690fee2dc7866507c02de8ef99
SHA1fdfbb64808a8c19900a3a03c5b45c83e7bbd0544
SHA25603ded36535182048db1bf558980efbf9c593d2e9f175fd83e6cc359e75ca9845
SHA512bc8b7c2f6e42583397a90139d9a65c58ce22b2ed259a3b8012f4f363b21a6340bccf83b45672470ed8498a82c5197e1d8fc6d56f294d67bfce020888bc8cb497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0b42168d0d133705554d58da58edd6
SHA1c3320852309f246320ae7eef967720430e029fd5
SHA2569c302c5d2396e7bc49c503ed83e6580da6270e5c6779ebc0389671687d0b15f0
SHA512e18f93af669e68b5fb1c55c1002139b09531fd686c27fe1fe7c3a4641ff5b6e85de05db02e293cc82510d74200a9425b5688cfad979d8079c5a78352916b4d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c043a72797cae6af37e2fa8cd82d3bc
SHA1695eb1d83e7b8c07167342dd921d1f41df652a65
SHA2569ded84c9bee903348c528aa4809a41816af18c021c14759cb63ace97c2b8cdf6
SHA512ad5aa7a9bdfd00fcd93289ba1b7cd306e4763ccffb1b32605e38b8f51f6d6bcb2f87d47772e2231b255c2c41731fb99818997c331d38d79853846e86b83a62b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a2f5cc3cf593e35a48c57f7929a122
SHA1daad139499394c109b06a94baa3afe5a41a9c7bb
SHA256b9b7cde52f393281b2ede0633258455e3c4958dda727ea90e545c0fb30ac7eae
SHA512aba31e2fd01301b54b6bd73d66f7a75d5e8d75e44ca7f259831a0be9f3dff50f40f227f87f71f43ad82be927a9dfe79247a952e29172ef02d66ca9aba5fb6c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104f91bfd771fe385e36630c8e016a68
SHA1fd1a4e1d54e2469cf1be19e64de4c3fab0fccc2d
SHA256788b2d7c35239c8f695c5fc03c7f92d707b50e2e21c9f2807ecdaa050952a656
SHA512f10e1d03c4cffdc80852aa8170a154e3c31786b55912c97008a5819d348d74970124b858088885d869d4b0dcc00b21b2e67803e248e645847c0315536698c682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96c4d7a45a618ecf90c8371951452f2
SHA12e14d662b6a403159297e9312a819279fa27c948
SHA256c6e84fef8be81b2365930b521d0745787f395ca328afafbe71ea32fc49889b57
SHA512f7c761f30a9cb971c1dd1bfcd3a81ca13a9e467d47055b1e8d641b437a83b3685163e381d43b27d012796b4efde310e402a8f55fa2eb0ae49e9ae649165b01ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91f6f4ae289c01470f3f8c1429a462a
SHA12b8d68bfb929b540a3935493e8d0d49cbda18611
SHA256d703a3ff9f19d294909f4769dac7642075413f098c2979668dece067176c1d1b
SHA512e70ce6ee0ff9c42b6cb606d9f9d9c13d559767c82d00345e1c8bf3289697e260697bb548108db2c052c4af183f64970aac519c25a93af89a317103c3127e09f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59855af556dfe0fe9e8b7724bb6a0129d
SHA1dfd1451d34c4b3e5e1efa66783e77b1961d58164
SHA256cdd25e81dc99cd7ff23559b1f0250428dd2793e9ab54bc7b3fe9b954f011bb63
SHA512e65a4c1ad8fabef77063b7825361d29407bffe5fcd57637a410251c96f6a7fd66401ce607f4354c95cebeb1484fc1c8f73cc77bafa96783ec2bec2c40d86ee01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c1485cca28d058d6df6ad6eab74611
SHA1154bb38cb09cec4fe2e1a8a3c4a849c3af71cb4f
SHA25645229575076cbb294b9bd04a18c891b6fa69233c060cc10f541f1f98dd228bcf
SHA512ee2d5d233e142c6207e9c50932bc2667d22ab5e5f9fc007d82f488a34a3109cb4f30694cfa20803971eb853f2a7ced7d64a46dfabbc85f7fa7db055081847c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b536f193da394a4d79802d389e6ef78
SHA1d54e0ffa1c7fa7586f3ba90a782a10e8aa965267
SHA2569d2358b0a63162d732ef2740d181a8a0548299b008d422a200f8129dce69c4eb
SHA51239834df14956bcd2201397709eb916f334eca6b9ffa03f38fd71f7a0930dc3fac8a8cc5c5deb77780f989c61073484f87dc20ebf4cd62da69d463ace4b933339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50e57191d6c0119c2ea1c7e1b4ffc4d
SHA1f5c052344fd8321bf9fc1f9ccdf45316f2988946
SHA25609df670fa74102059163c8c5535db49b805b89630c2cc0a95e5d35488abb09c8
SHA5124bfdea257436bd341653ae1cc6f2c57f31e56599e9f3fbe3475f3eadb7ffc779f8301b2998dd10d417ef2e0e343cc21321559ae0118ca6db6205a4a5c796fd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565feddad308f27609b6b45696065ce9
SHA1a8f938d0be14c25c7d2edee7b0482d276f0b901d
SHA256a60ff1ca2fe88c6029895fd20584a5653d45b0440f3c1b8d06c77e3a9cc3f94a
SHA512265d2209b2934c3e66e7bc0a27c90d2527640b735f2acd7a716663a29a2372ab712b687087f7e9f87e1220d10922559b8e5c579907a380f6d40afb92568d9295
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b