Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
857b7698c01c841adb45aa0d2e4ec1d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
857b7698c01c841adb45aa0d2e4ec1d9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
857b7698c01c841adb45aa0d2e4ec1d9_JaffaCakes118.html
-
Size
2KB
-
MD5
857b7698c01c841adb45aa0d2e4ec1d9
-
SHA1
0826934b45eb0e71e7dcc10a4f13a233a575a3e8
-
SHA256
09a172fc00ea2a2561d23d69706619bfe5fa7be7d2a0a63a62959d1b827b1c8c
-
SHA512
063e64ca000f11a816999f4c6b29e7cb3f1f1c2029ca66a79f5ba55519b5b69f9cacddd44284b035af27c4a158399c459c67de21dcabb7081a0cbb6ff0aaccbb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f826704c51d7d0b6047c02b835489976bad915a952a195e7c11e5b74e334c369000000000e80000000020000200000009eaaf44a089baf89fd74dfd633b0961615eb54a9ff58b9b9f4fa0f4541bd25952000000004d45ac0181f290d192b3e834c1401066466be03ee54773858f12d206aa01e734000000021f6b233daa0f3b16ef3bdda1015ddac8ea4ab7ed8e48eec1a602d6e82d9f2d800132f024c0934b92b2e086a14270aa8623c321f669b302c85e7d1039a8cbe78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423278204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b999eef3b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1829B581-1EE7-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2768 2140 iexplore.exe 29 PID 2140 wrote to memory of 2768 2140 iexplore.exe 29 PID 2140 wrote to memory of 2768 2140 iexplore.exe 29 PID 2140 wrote to memory of 2768 2140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\857b7698c01c841adb45aa0d2e4ec1d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990da1f89acf7f53d6aef982da327175
SHA19dbaec902183b3ba437946e286699b3a6b8c7b97
SHA256c8712a47590431b055cf7a73c0886d1f2a55c0dce63663e7de47d54dbe5df2e8
SHA5126a824acd6ec1501480fd7d85b9ef965d07a4d330340a73790534ea0ab6fea74b78637b396862abebc57b5b811e3f980751905ad399c6d100de76ee0c56f2ad22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26bedd2e3a1052a1ada0222e4fcdd2f
SHA1abfde101ff90432480998522f712446c3f5abc2e
SHA256513bf582e228f78d2fff00720857e94a40536452e2dd10d9d7176b64d12be6a5
SHA5127310da8c0b8116e74c68292f303fe82246aa80c974855e909b775e45f6f4c5499d1487fb045820f389ab7fe58e133429e1fa9ed63c0cfc0d912d7060a1a79e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa208747eec8dd6811a53b254e5563b1
SHA19d312112e041c78e819fac707ccd2259fa40fea8
SHA2566d1cf18e5e59a19848f805eb6a8fb0ae60c86ba592479567e9b7e7e892fda87f
SHA512c675e1a3fd37526ea203bca96dc1f1a1861fa02b2564f863cfcf0752affedbd69b9f166085bfbc12fcec6302ac5f3fc60255566196fa920dc18b3b1af7b4d2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cca0f86edbd06cc3056b4ab8e6029a
SHA1548fde808e58527a2287536abba3cd6b0bf127e2
SHA256fac9cfb54a5addb551b2144cbc0b36a1cc35cd381f1303f55df33ee876691335
SHA512a0b07452e48dbe70808cd367764205280ac1b1d584a591c77437957d8e1947eb6aee682e6291092f439cf1d9c069ad205a36eb1995abfe4425e6da0f1c86cbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cd7e1c8ad85ed4da28028e4d07b923
SHA1f6d1b2c1500b08d4fc3489276868c538cdc0941f
SHA2565ff895ed5f129f603ce0b04cbdf5ace8d952c66ed985a0d1da0a57c6b772f86e
SHA5129a55bfbfff0dc9df568e304b8da7075110ead1036df3a82e5d1b89a9b38543f735de664d1668013b4e8c5aae87d7f6976cd33fd3f39d9b80c400747e665a5552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52590b823cd1c4484b480e0771fa1d56d
SHA11c3ca25f72ef2266dd96433c29bc0b2ca9395837
SHA256ea93d86ed4050e6c852eb55f2fbbfb29d42bb88af2358a5bd3b4861fcb7b4817
SHA512997953925886151893c84f237bf1ec63ae6317f53aadc4efd4b362ccaf4f7a845111721763287cc0dcae08d6ebfc7f298ef26f64ecfbe73fb110ca9dbca4e6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac6fce04181708a0d63bdbb4bc9228e
SHA1bf56277e75b269720f95a883f5f0f36a948985be
SHA256d9639c287c731d806d3242f3ead8ffaa884663bd79f9eb0c984cfb212cd4e92b
SHA5128f370716e9054a635f4b5038542c3bd7d647f15d15ec7905ba4d7b88ec2232cad91ebf42e9b32cff2f24b77e7d8016d40428be82da1b7ae68889cb2493462a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b884a12496e7b4f03f2e1d0217ff51
SHA17ed1d9f7fda90202f8c59655ddcdde4156bab9de
SHA25645eb4ce624915d4275243e622ed8c013bd98ad8044e0e89f89e51cb337015474
SHA512b9e46ede15c4c71907e9e08505292652edc32c72deff914c28bc30eaba738c774b70aeb40e3a513cc3ba6eb955efeea946005aef0e2a5b9e7f4fdfb0ecfb1969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13f870706de7922337f0f5aefdea0e2
SHA174a5760d8d3081e2936f464609495c6984de4035
SHA2561ded477c8e921f61a412a60bce63c118d4fe2254e86c748796034f0f149d5a22
SHA512a7b9445fdf0781358b8c269e44b4c2277a188591f0dc4ee66773aa47c934c8eec5efd86c9e45a26b1792c8413e6d3c2c7d55e0860e483f1b2c15546e884c5624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54822e7a0bfecd9d9263f3e948209d3e6
SHA1a0d8492288a61deeb20cad0e467fee09a2629067
SHA256cc36739d5751e1109bb53251bc15995451250413c92d97c77b69dd6385e51214
SHA512a275efa2a090ae0b774991e50c7756947e0eff99a04a5c48b9f106518b6d2b2ad973c44201ef9b6a3c2960ebcd6a01affbffddf51378cb9051f244838b86ed12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416ea6d61597584d8071ed6f015bef69
SHA16e02f0641e7844fc78752eb67ece2601c976a89b
SHA2567ec9ded7fd71caa075372c468128716ac55a3dd9fc8233e0b7a89a658ceef9a2
SHA512b2074906060e73716f8701ce846483216147defdfe36bc6ffc4c7075fa9006abbd7f0d208b4799181f38f490bdb1da4695f7ea1c143890fc9aee454c659ee3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9bfe653d476acc236e8733e7e4039d
SHA17f5abdb4a4ef746f4f6f1fab4ce0b4380794124e
SHA256c667db511c15874334eee55062d4f087f3991e269186f94d0ada490490f9a7d4
SHA5128b91a7cfafab6ae2b99913374df17d80a6e8b9a288700c3ce0195fcac8e316bc3b2cf5be721236c8bd86ff3d8c7577cc0523cb7482bd7933926b7371676e31fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0131baee40c4361c1f7ce247726a1d
SHA1da5f2cd30c5ec10d51b6120b3f3a3ab82670302d
SHA256b6a199ac2f8889900e5fd42caad91cc431c1f4c743363cc7bafce469dfab95c1
SHA512e2407da73b8506ab2e8148a8c1bc5f9acbe9498f4d0d469ed4753223d9551626ef76c0ecf155d9b516561951d78ab0f3f1f477d5f30af4edd955f5888654fed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba30a37c90789ba4c03854c4ee2d4d73
SHA1d1a3c4f7c3061fd075b1496d1e8725282662f8cb
SHA256d20703ade98a4af64a3e6c288fc0291b71f71e5b0c52500c0550c63eaa7e29d8
SHA512b7829fbb4b6669c5c72ad3b8cd1cc8f56e5d7a03151d32cd1c365629c393d08de7a01cee9fbeb03362ba964c366d0667ed473672421f1582940f97096e907727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ad33bcb7fbef5366a079b0e393a8f8
SHA1ba61d04dce6d7e411d8fbb84d3ca9bdd9bcbba15
SHA25658fcb5be0547f3c4a5dd7f4a29b119521cd6967d4f602d0b68ec603e9eb59619
SHA5122b91ed011c7b0c7ace5b29a2e2db5a58614bc43ada9261aae7c791c009704cff10b8fc0e473fe1e8f82119f315cfe6aff2c80a0ef085e621fc7e6a1eaa95ec0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b141a040b7c3e8a86d76deeabd8236f
SHA12d8f7505f09305ad96a701290172fbec94a2a849
SHA256525e33bbc7a32ccc98ad6aca170b09fbb4d5b65e6d4ec19f9a063d4c432b930a
SHA5120055eee9faff8de013d595fbabff68297365a65153336602d093cacc7377b17c1448370f98b7ee92923074b977ef905176ff6cd1dec098325c693b6185ce1f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae4644964b0dbca466a467eccae6639
SHA1ab2cbb650a9d374c18d77098efc22ec64a005970
SHA2560e4da453269c7cb6fc1ab5008c29e7aadb1142c9ef29fa543a7790b652f16a9f
SHA512b4e6cf7cc8e3f492e93a628d7566d762e1e514550735f070eaec65f7aa10e0406029a987b49d71669b8bb3af6b662249144308496b3ef38ab99c4bfc672f55b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548288b412560ba928735e2937e8ad5d3
SHA1b6cc2497760132363baf34d3fe92a94a95abbef2
SHA256295c407be8bd6d829e0ea51523ed8716f59aed8072b0b456c441f6f00339af77
SHA5124bac66e4d2a3ec71c5b90245ee28163a049afa5173d1fc339f8bfb192b7e78cf16d274c17ef9e04cbc8c0c9fdef906e0e893f4dbab94fd4f746d210162d02a03
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b