Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:13 UTC
Static task
static1
Behavioral task
behavioral1
Sample
86f55ce6a30495fa8d46142259ec344e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
86f55ce6a30495fa8d46142259ec344e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
86f55ce6a30495fa8d46142259ec344e_JaffaCakes118.html
-
Size
460KB
-
MD5
86f55ce6a30495fa8d46142259ec344e
-
SHA1
3af3a47aa03e915fb58623eeeb80368fe389f934
-
SHA256
bd030c4da7c97d13d0fb2050fa7903a0a45c6b29f7cf36aa50e7ee42f48efd17
-
SHA512
f0c4f2eef7e7343314ccf3cf78f2eb407fe4a8e7faad9fed11bba36c19a6b723fedebc3d3589703ca18ba0d7499de2097538131dd0cee52073d6303fa081105d
-
SSDEEP
6144:SaTNsMYod+X3oI+YNT2sMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:hZ5d+X33U5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60df1e0e54b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008b1471ddd9bf0940896f4403cff678e400000000020000000000106600000001000020000000b165a11b2827e6cc0ab8c44afcf80d01adea9f3215a5da95416bb678a7297c61000000000e8000000002000020000000d5acb7e23b6da2d91d8e61ef8c32dcfbe977786413f17d0041ae91c742cd36762000000029bf78231399961d5d99d0786b111db20cd4b3c9369e423e60d5737cff214d89400000001c575d646cdbb925805d585821f97cf833882226c54176c74cf2a9a3571ab58a0ab36f7fac610c9403f4e82898ed870194956a0f1ea41bcf4341131fd872bf99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423319485" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{358A93A1-1F47-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2712 1844 iexplore.exe 28 PID 1844 wrote to memory of 2712 1844 iexplore.exe 28 PID 1844 wrote to memory of 2712 1844 iexplore.exe 28 PID 1844 wrote to memory of 2712 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86f55ce6a30495fa8d46142259ec344e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
-
747 B 7.6kB 9 12
-
747 B 7.6kB 9 12
-
779 B 7.6kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50068a33d0de602d39188d1c843f98488
SHA1e4e6bc47f87a8107c6e4f3aa9c7bdbe0d1d9a5c9
SHA2563f4f57a05074d732d8ac4e65ea5b6d724ad018cee6542be04f8dbca7e994b4f6
SHA512b30171b1c7a8f9923be6e797853494059667c10819a0a12d699666159f9f032366cab807da3b76399911dd761b8d85b1365e97e02f7e6d03e403ce405335d729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4dd296e2d54a43a311d4736a6d8372c
SHA1768570f26b2494f2d9382c11c9b5e1c52f7594fd
SHA2561aa92c5370a8e56850d8f4701ea9da6ab13a4078198c66d24d67741fc51eade5
SHA512a240e0dd2cc82d2f4ac65fff36c47e7806cb9919a8abbf16ee8e1109c1c91a7f00e15908a753bff9ab0e85e75acfa6ceab583123697d228e3033a29fa21f7086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565abb58cc968217f5bb06c62b0513efd
SHA14eb4e6ba1907f47cada238029d7bf44db4cee2eb
SHA2569783a0472a5b1553f6360712e8f2022b9a6bb8baf9e2540c9dd534f32885dec4
SHA5122f9014ba8be2d97e281dc25e567d5cdd4be02dfcd53d1bf3b89b831129c46e1b87fb2ec315d7d9ccd739a5838f3963c2ab552df176fa7cdd525036a2eeeb19be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140bc1f30f6a4a93b14b98c84a289d0d
SHA19200ec5790cafe17e3246913c1b181d5a8dc2f8e
SHA25620f3a80d1425b4568abbec22a9de6c487b3b39b741e3d4d6d9e8ecfc507a51f4
SHA5128651153bdac451f85dfe6d76d43c33a02804ef8afdedcb685f7ca20123f88e3190bddec752c191e7af3801a176cf162f83d9ba32dac98787855396475d45f9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232795bc4870101b3dbe4bc7682a14c7
SHA188ab7c263d14778f4b000dc805833406131e7d79
SHA256f783a1766c8a0036855617a5f9670c93591c91ca171054cc11684c633ba11e89
SHA512d74e864bacfe3d114d17d260a3b5bc1b7dadf0c3fb1ccf1b95e2609108c39ce5f5fffeb1b47d311b36fcfbdcb8f3646eb46fd0331103630319332d9c175c3567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c6cda0445b55cd18f9c7a6f43044fe
SHA1653cce02d4caae2eb9bfbea5ed4824e076ef845c
SHA2562c3493e9e1b41fc01f728718e0b6692d704af2d0c91043779c846e5af7770334
SHA512690887da814c0f6d6493ded959290737bb75a2d7c50a69a843f61b4a46d94f497ea0ad5a37aee92ae56a0f0cf9a7a17a6a647059bba4549d2507029b33c109ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300b491b19707c265cdb2b05a6d1a163
SHA102ddd675f644506d6dad719e420df35b8d3b0e97
SHA256bfdb2ea521aa8ec90ed98ff4d592ab1c6a393814a636d6688a76cacb3b4e3fc5
SHA512847039af9916e2db891bfd7839477403f05aaa21abc9f4b43fc7338e09fb7015f1a9908b952fc1cd4ce7cd6b05ebefa6b6defea9f5e8a430e2ed09e2d9feaf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f1556b6a7dbe261cd3e927e050b9fa
SHA157a54e45580c2852797c8ad015b4a9ff23869e40
SHA256e084073e5b01f52754ffa284e587e58702059a4ab3c3fcb603dafdd4b9bd5f11
SHA512d5eec420a03120db61413704bf97ab1768b57cf4fabe0d6e3301f1f17f21fa4a95f2dfd204302e3d782df45396f3ec479984a0107c173a7df16d8d2ca28ac92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fefde34310fb0f3020707b1bc54132
SHA126907da9fa7aa159b6cad54cab3ed9ee3d3cf8e4
SHA25603e118fa009a8d441b414797a108b98cbf3cda8f0f959c4df88c247598032e3e
SHA5125645e8272736972b5a263b5d331cf8915f38595af2049c49532931949f800120cc2426dd1807b642425c6860e0315eaae1add23b601f237299d16d54119b55a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c204054e577247376a8c35877e8f6b
SHA10d758cf6c221fb12f0968ce2a785eebcb2f490e0
SHA25609b8c0cb6f645696bce18dd66cc4ac601424b264a3fc4bb20305a61980555788
SHA5121f421aebbb8ccdf615f5a51d0b5c5bdf7b7d0218d2148ea1e3f417f4d1243b721f6626ad010d8e256d673fb9ab089dcd589f2f8ecca7635ba7fd97073d6afacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556904043b43872db15f3d6d76c4cf3db
SHA18d3337c6435c104f705486694f4d407377178991
SHA256e5dbf58d5ced4bbbb6bf521dd8cfd6dd12a6156f3923107337e21dc419d7c97b
SHA5123caddb6fb841c467c04dc438c358278d232a6ace4301157d4d7f22a429ab620729c3e918971b29fa9274ce8fb020f2afbfe685412e743aee30fab5f4d9c4c6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5803921b44b16fcac7d6bb3bf2a6da7b6
SHA1e9619394ce48d95cb8258dcb2b1b21c29f8ed41e
SHA256017a22444b1a7a5366a5e104ec75ff07ca4ecfa04088cd70abdf79f4e1bdaf4b
SHA512f44417320e36e1c2dee10b22fdede674e7f1a58825b6b81f693ceb8d38af42384f753a7c8c37772367a34172f22c1e65a34a445b27565a9e52135cfeab014a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4caf9bbd282623b27a6c62a7ebed94
SHA1df8d43a9e489a58dd9eaa873b30f53a3655e4c0a
SHA256191d91cae51ac568f07a6842d3d3f886a790daad6106950918b193af67e71c2e
SHA512f8ebd7e9680fa6ca61f19dc08128163fbd0ef8677d02c0df9e6f9c0506d034ef57cdee4b6b6b081e97f01d6a92536635d7a7a0e9700b29f2d31572ccf78f7e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acf59236dceaac2fca756c741eb90fa
SHA164d20be9cb047eb7f09c1f0068c1456a387fdd6f
SHA25621a8891ff603191f1428f5eb2fc87ee02bfa2578984b1ad0e3b962ef8fe6ffb8
SHA5124e512f6cb45a9900f5ecc7ce118d2e6a4b336a99e91e14647b3445079381f31bba658ef29ad2ba1487702ace6a52d6b5aed8ff778f6c7eaec1cd97e7500bc816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa06ae0fbbb6f116b702abd594327a1e
SHA101fdfee567f37bda966383a5bd71e75201759949
SHA2565d5e51774db7b2a89af46b0d12b52a9d09dd2d9925496576e2554c520f3e1401
SHA5126ac331dcce96b0ff9c81c2bec1b0988103fd0b2f50c0437dca58904ea42089b8248ad7aa94de2d6abdc8f324615c0c5357683c25c70761cf9767f39fe72b2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e834e4513c1eb657a5a3197aba1e1ef5
SHA158d5ba3eb0bf72dd2adfcace5f8fe9acf4d84198
SHA25690c678841c9cbe019f4e944583c1d6c899b85f3770a1b1440db6bae837e35dd5
SHA5121da27c8cb5c20aa379d5a53026d820099737e8ad5a0df58b14a4377e33a566ab04453554a7de6eaf78b30885071e2cae288acc1ba5b7470180480b8ddce12459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e290ba36317d3f679beedf47cc66f68
SHA1ecaae1524a82d9af70cd5618e997fdcb164ff174
SHA25661f6dc965dd2bf7a54d1b76f27e0706c91b54caf79a4694bf00b5b0177dc7f21
SHA5127c68bbe8f5d710d677f246e60d1667cd357b0902d75120d9a216c795e129327ba7a2832f62d42c0542e94c058dd2b7c3971081f199ab23673e3373049f98501f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2d8c1b1b5d559eeba88bf9b460f1f8
SHA18ab79a9454c05cc77886a0d0effc85ef32f95f67
SHA256f7c99550e05d8f5969de81bcf77044f34a15a8315f6068172b5479b2789673a3
SHA51261f8913ddca96e35b9dd7805c746a6f7aa96e534f40f5a242322e7c8e56778b06d5a26d8d0f9f2e87e3d7adfb2e75184760008457c8021c1a22784a7324d2b47
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b