Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
85cef4d1af637e36d103f50bd44a9f85_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
85cef4d1af637e36d103f50bd44a9f85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
85cef4d1af637e36d103f50bd44a9f85_JaffaCakes118.html
-
Size
24KB
-
MD5
85cef4d1af637e36d103f50bd44a9f85
-
SHA1
f21c5c42ac7963e74bcb78b2c59de2247337a664
-
SHA256
d903db424ab017768bf86c69a3fae469158c87d574c78b6b57cb1bc3fb13cb60
-
SHA512
f01f6e82eb9e34cfb3b80873d4a9fb9d47b492139be5ebd747241373604ee6571c84d99da95e660fc254f8109fb60d1959a1d77e62e1b20d08c540105e263bdc
-
SSDEEP
384:AitwXidpotc2Dpy7M1P4plCuWgbzmwIcyJ:kc293yplCGmbJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423286619" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFF0DCF1-1EFA-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e32c8707b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000df6011218fdccb49a46f91577cd5500e000000000200000000001066000000010000200000000e650610e9096f16a872bfc7ee7c60e3be5a3941778b096d47db2e36fe2f8ad2000000000e800000000200002000000020eca12b8338e5672512c0ed258976cef49fa148b2c0568c5d4938e9d0533ba2200000000b7b75ddc242de530947179495213617c38e1e4d3d922ce48041ebc4ca0aae5a4000000081fa02a52dcbe60421d69be08e2bbe96ec84d58f8dca1be28d6e1199657b99d04627d653a28db4a637af0175705e889e0feaaced02bf0c3f624aaa74e1ecb17c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85cef4d1af637e36d103f50bd44a9f85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d9ae6e41c63f1fdfc3fa63ce193c77
SHA1cf7aa01e24840ce2ca5dae1f1e3a50d9acd38888
SHA25673747fc89a9faa787e1f56623bf5ec7791a10d32c825224175770c2827cda766
SHA5120b2eaf592ae5fec06e301c228973f9fcae59e2309acfd5327e93d5d718d4f2bffd1ccff55ffb8f54586e38a73204469e552ed5cb9a1e0eef4e4a5951af178334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d03750c6e5364701d55b2895a2c363
SHA1e0a1d3ec9ef387edfa65d5477a61a7729794ebd1
SHA256cad92d66683c6cc59a2562c9987c23ff28ad01a06eb661ccb4ce8bbad8f5e348
SHA5120265ee35ba0ac98ec8acecf4e401688405760e685f50ea5cfda94ac1ff3382da2b31ee4710ad54d07f6ab93fc08054735c8f05096f1cea63a3a0d32a5562a05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf51597dbeec8937dbfd4bd2d7e07a81
SHA1569013c6857aee0860479eb2d0198c22757e3f10
SHA2567dae1f2734381c52df816b254ecc6d0f90766e58067b1c723d77761b45df808b
SHA5125b9b7e3e0a37a758689f573365dea6ac595723e69f77d2145bb090bdc2f9bfe17d04819e0727277780aace80f9897357f321a9c579de41b2053143d24de0e285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777642f7861b4f300367bf19b5476d58
SHA10f7de3eb66966792cc7943a710816a919dd15f79
SHA2560436f293765143e57c6823e75142992829c181d0fc01aa417fe782c1a8e95d7d
SHA512bd1dab88d497f99b7f05ded6e6938a9ae0c02008a50e1307a65c4134dc3140aa09547ea6e551867c292255648710e850f94e73f790f346acefa001c87d517a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ebeab59802b2dd51f0e6addd1b4fec
SHA1da6dcf78a48e0df2ac25fcb38f17b4785e197e14
SHA2568ec2ecb7a74ea8e9a10018c008b6379ea2889cbbfa351c1a5f47fc00d268e550
SHA5127fe4ddc4fa67549e919fcf6acd751aac17b962e7647de5cf2c153d85e81bc8ae7fa6b0e1e3fe57bece8ef483363919ab48654e89be750116e2feb3be67dfeb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581638fc0228ce047f79002f86467e8d5
SHA1224ef03a85aec746ca90f33f4bb19fb1b4d14ee5
SHA2561ac97b2bb0e65a6003ed3bc10815003a5dd4e1dfd906e486bb3661b518cea614
SHA51288243504fedc8240616a9e36661a88ee328a5196fa8257d8af752058a676a652a387563a6e47c7348b48a2c2d80fe84d24982526875dfad53c5ab4843672530f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54904210de22509f5c0c3828851a08d74
SHA1794e80814c7cb83b84f755df3a255efdc561e508
SHA2566a3872979c23a2e6d201cba78f746d0de134c33496da904d4479d65226490705
SHA5128b444203f42925bc5847f27260578cdd82953e026ea495c6ecfabc9ca2a7a0227b3f1433e24a2e5bb8a49b1b933a27fb8f920c2a317ca7f8f914b864936192c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cf4254822ba7a13ae5341af65b0fd8
SHA172fafd95946d914e863c19f5dc8683d8a48a7688
SHA2569444aceda1f4503bc307211a47f5673dac62360c8fa0f4ac9b48a96e57152ab1
SHA51270100b5c88832a7b7811e83e5a0f9b4b8075539671272331bb1200be2632ed5275340cca3da82250c3181ebc6512e1f7db47482de14fd950c95d805897548e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e32ca79815b4588882e60f586ad4113
SHA10459269eeb06b25c9812570342177a23ad782781
SHA256610e56948fc7fdc1d8718f0725f774936806cc5a7ac8b68fcba5fa7b1a72ced8
SHA512e34d7a2c04c6cc2a8138bd0aabbfdb885a711a954d83a19bcf669f199d0ca4188a80fcc8822f5a290a59e6146ae937697e58fde2d6eea06ebecf6455d1846e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446ebdbbe5233075466b5a7f4f50a196
SHA135ac182cda35471b6491d01d10a5874aad0c21c9
SHA256a10de8e38ecfbd3afe438aa0c890cc93f19e181e0fb98d988c331c08ca9b97e1
SHA5128ca7e0a84c507aa27f4000fbd10bae1c7c852123d6259c1a0b7efb6284b7b006158982dee44c839f4632a5dca0a3aadb88a5ed1f2c942928556a1cc4fec2eb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06c931ebf7a76da85b283cc8e4fd1b9
SHA1ef8c09fb0e34885cfbd6e9803687a8a73ab8ee94
SHA25675f0202f61873e8df7fda07459e14e5cf542f6820476bc523662bc2639be3728
SHA5124f04e8fcab1e2d4ca8a51f4bc39a21827c1ec11e73ab8feda936478bfa730bacbdf37e91edf8e048dfa38eb70e5c82de260fee976d1ccb280e574045a71b7fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50093cb47dee71bbfe9ff94ceeb904b48
SHA16c86f0b16f7d6dfd10018608fcc611158d747076
SHA25665b05200068339322072d7cf6007604193643ec2a08a98802207578f6b31ac3f
SHA512fa6dbfd86a3cbaa5a62ca25cad51029c70879586efc9dc7a57de1395a46aa8e7bfd3373ecaac70c72194810a79ba113c0e3b6cd4d0dd7c608aa7bad2c8b89fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d3c97d3f8816b62cbdc36d56928e9b
SHA19dab2b6fd44f9370d8f825a687f1f456953c1abd
SHA2565455e15d6643c2c68c65f0388a178b90c8dc8d9201f37618dd29ebee59242d50
SHA512e9ab0662f3ba9921226caf4ff4e744e23d39cfd82810f4390f80fa612994ec241dcab02bab2660a33101593218c8bcf4e64efb3269076d23349db8f0d0fb888c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcc01d3290a88601c6a83cef7fd916d
SHA1613050b1dfc43984404fe5579ee8772daf636e12
SHA2562eace099443da1b3ded766af0dabad898877e080df923f1b08fa7deb2e5bec6b
SHA512ed18dbccf013a676ac3d5081667c662c1c574f3b1a1d7f2547eb6b8846a7817f1f43c9b25325f64166a1b72d3d1802b9e1326df178ef82fe1912416245a30294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50461e68ac99c2535ecd1dfbe35432689
SHA13544f3e3eda6f2b9fb6db59d30f94d6eeb2c8d25
SHA25638e16b9e4c8cbeec8ed3e804cfa7c9de05805b2d28fe251468940c659f8fb1f6
SHA5128cab8868f3b6556328f50fde37d5e772a6e7537af6a2536ad7d3d25e42f2e5d4ea881554116c6e7526521b1aaa535d07be683828e7566c3954cbcde4b939f335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6c04a8a75dcb6619a98fb36b1e70db
SHA1d3662ae39d87c8380867f498a17768105c009811
SHA2563fb564d38effa12c98ddf0d01612d4158101a99e1c6761b1bd0840488f40fdcb
SHA512f5e510a797c6e952ab7adf381b535aedfa515f53c6508f3ca580332f92f77a0ddb5ff92fa22c148307c00c7830a8886dbf3f6ca2f6517339d6094b0b7b2e6894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0c0f36a82282da981b9f5c2c5705ff
SHA1f1a105ae99f67282641d2212ca9b3372a8fb937a
SHA25625b3030a5f9de0e22051a53adeba5a839a40a1311ed1e349838f9f5ae4a9d948
SHA5124326a5e19602dd1c7f435e8a36c5f84c4ee8854d2b334075921c3ebe38992008f9f23fa0644eb92224859acc45fccc56d49c27877834eeaa64b045952634f71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae8112e439b841337b8f761b315edf8
SHA1d94d192be4e0130f633b484aaad2415c65c68090
SHA256523ea78ded438480004af055a0f50e38d546863e873b2a6193ce930b834c08f7
SHA5122de401137af6cf55c86c44ca409f71a8af92f511209a730d6271368309d08951dc032e9b6167623037367e2ce9670faa45513774335d67dc7be55a1b01c78b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565558cb6f2b276193de10ce3d78e3f3
SHA19af1d60590885313c816e18143adaff66897941e
SHA256a05952ebe457955c1ae392d0dca8acd7b43fe229a6f32ebabe95e64a0b381949
SHA512437efa086ff3a907f694cf46ca085102b7d07e99246a8ee53770d4f42f0931d6b7eb11f656ec21821437cce8fe532e4f05c6a07f4d57930018b5eee62de9f697
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b