Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
86f9480cd935fa732e261ed29e4ead97_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86f9480cd935fa732e261ed29e4ead97_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
86f9480cd935fa732e261ed29e4ead97_JaffaCakes118.html
-
Size
4KB
-
MD5
86f9480cd935fa732e261ed29e4ead97
-
SHA1
92a86859f27f1bbe1facd7a2084640e4bedba61a
-
SHA256
800ed46efe9bbe58332b93e47a690a3221004db5c2d1417657497744a902e158
-
SHA512
0223525cc8e5067c0b14994ed25ad806014ed9bb529172b3c21de6e2a33eddf3f4cebda673335a0b6b1356c522daf073db18102a8faf763ff424c6eafac4d236
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRaRDXsd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2c5aed48ffc1a4592fe9118cebb53ee000000000200000000001066000000010000200000000da61778792005cd9a1d504f023b79f959ab237277d060cfcbee398158bcacbc000000000e8000000002000020000000794a0e90995ee747b42b7812886138647c5842b9d3ceb2a8d84d7bcee648b79e2000000071ba2aa914a55dc4f5caf6e9bfd6b99d08e5037035f1770521063d1433a962fe40000000ea64c7723397517fe8bcfd74f3c763112f4d5fe0ae5b3247b10e6e821935eb4be39e5acd1d0de7e73ef7bd546b61c085a1127190281d20138bed1afdc1674981 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20002ba354b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423319742" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE31A5D1-1F47-11EF-9667-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE 940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 940 2772 iexplore.exe 28 PID 2772 wrote to memory of 940 2772 iexplore.exe 28 PID 2772 wrote to memory of 940 2772 iexplore.exe 28 PID 2772 wrote to memory of 940 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86f9480cd935fa732e261ed29e4ead97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b811da29770cae403bcd94a22d7fe3e2
SHA17d3fb14a8837c25dca5024b8879b12831355d1e0
SHA25628a94e4aef8cb3f303c4483158cb94d40d34f9a837012027aa2df959282a9a80
SHA5121a4b10c9d458a43980bf13f0239a067521fd2a85b96f4a2841c5a591ed73fc8b62d247dc83b9dcaf8d10f175198ab89c8efb51a7e3ab377f444d31147f328145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b517a000b7971540c2869844eedc9478
SHA169ffa3a33a434c1258cfd0c78574ac9e9de16f38
SHA256ba52149d74478723cf418fb582728baa065abfca1e9af5f957bb61f7537ceab1
SHA5126b51301dec5d52f5861c4c821047ff42ee8507c80235f29cf3f4ac2806167b973ff7d419e1f0eafa947e1fdb0497f00a7e054d98c945b171adebad093308354c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558984e31827b68cfbd7c9edd14a1312
SHA1ed06098faefc0249a682d4a88d6ffef8f79df10e
SHA2564cd845c2ef465f4b4e56c0bbc7af4e600b017c738065f49b17041e2cff9d312e
SHA512b73be2ccb4a24b8deb85066d8b856f15abdb017dd302bd5cd319ad109985b4fad03c7711d5e5598eb120eb3a4ca4d6d4046bdf65d373ce502e1d54d339e63762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929219899fc165d076285ee2ad8413b4
SHA196741f968caad854030aa288e4584da840745a9d
SHA2564f3efc6c2872607b89fb19a136d674cdaeb3a0cdf30e9c56a1ccb238d2d4804f
SHA512be7ddcd033da57ed591583b57283bcb12301cd15391911dba592d3c886be489466e372759843d87e08524b171b046bc35df9faf64449cbb7c07a11ac84fc7787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addb0d4f03fd88ae48b44672d848b94b
SHA1a690462345829f1c8ad55d9dec8730b4fb6747ce
SHA256b214c149b8e19900e48774135fac5bfeef2def801962308805e048a7c448b3f1
SHA512f48517c03d92fa418f1441f90a29a10b43b210bb2b4896d2aaa4462ab07b72ce35f05ec429aa1c1ae1344cab3fcd17c875e022c507ef7259d00c913d01977991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a048e0e318e0a0ffddc679bec996fdf
SHA11ae610921323805722c567dfc2ea42a2f2a8bb08
SHA256eafe8e8ba5abd186ced9e0af2a661c3e5192450ae2481dcf86dffe96cb6a8cf0
SHA51293c57722ef3497262e31404a869470746a386d73c1e97dbd586edc859dba47d4767f918b283102c57a44e015800aab5747c4d8c6fbc10d1c8139dad1c2ba8466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c335198bd4e281d935e2761689a0f2
SHA16e2a035d1f859b7d285ff4a391ca90bebe8ee194
SHA25622551601f9b8927530416af14d8391c5044426216bc0999463bc3aa0fd3e690b
SHA512d39b4f3ad6135689814c580801aefbafe38e5d661486debb0e500bb4857dcf57e6d9ce7573f6d3ce772ed7191dad2f1b07e639edc358d697b01933434ae68964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a422cfad3eddb06834699ce0f657b20a
SHA1a76bd3386ddb1b269c029c7db1efc32f8b9f1993
SHA256794d8da2e8f4a1a0d7d156dd7789c62633583dbe6e0e862b85302b9113ae63f2
SHA512680c16fa95205f38d1d786cd6b106f04ef4681370cd80120528e98766e4ee92d3cb9f0c1803428f82cac76497b45a8e025b2e5fc3705aa62dbf026ed0da03831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed96e46428a5c5f07c339b3c5515860
SHA1940d6f9589b539a0eda7db3e2ce41dc7aa11c359
SHA2566b755a6b1e0ef5a57ef3401a42771a06ec86337f9f1e46db0ddc3a59c7eb8cb2
SHA512a313d6e7f373742fa01fe0f5c8cd99965d70a38d09d1eed8a595a4bc8aea5ef1be3eb37b4f50f8f6d8141dfec456c930823089b66dc5f4441dcac8c6ce18b016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53589e2a47ff34e16766e72e0b3f6f940
SHA117bddc92e83bf330d2e0af6b028046395d86c3b0
SHA256c57c490c039a7110b657d2df8de79e3cfe897b34609f68868c2619e66f79a0c4
SHA51240df52da867372d41069a835a13afa7e734ecc70d1b4db33814252fe3dc7e382552a552b1c8bd8fae223ede82bed53b61475ce4f3c64ea10afadad8a2727425a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a7312ac835a06ac7690379b7f9b73e
SHA1e02bf9feb55b6143676e2d250eb4f43e44f4d0f0
SHA256cae2585db62233f5a97a95f1ad319448500893ffc9a8d52c3735e1140f5787d8
SHA512bdc71c76fb133a643bd08a778a9fec60b848fad3f331b6340fa8b8d66e7cbe51aa402f93d24be5dc1c42ba2328bfe6899ec644dab9ea2e07776dadd268bb4a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d6ba7b661c8a840bfd4958813cf1d4
SHA1fc4f90ace30c36200850773ca51b299c25f89702
SHA256b5babfea248ab26539dcadd254940b01cbfbeb45c0954db92e1fdef78956c0ac
SHA5127b65017c29559737de595e664a9848210106dd8fe87d7c507bbef93374035253d40a381e6598f9f02896dc8493f94726a2a8454185bbc50898e6aa99d4b81b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2994a4b4b4b8eb3596ea6492d8cfc2
SHA1123b975a9ab29fc7930a9b8d2aa7dfb6279405bd
SHA256ab0f572e65e671d67832f6238b494f5dd45cbc28516f6f935a6d1fb0c4fa3167
SHA512ae6a7ccbdadc60e2275e076f460c4175a21eaf4583da3c4868075d32e7cf18cf17968a5377b864cc78e8649995e34d28be7750c8e979182256a69c8532e75292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e60dd7787d48d61dd77e8ca8dcc3c8f
SHA156613f1f8fa53d49d5cda670338942612b22a7fd
SHA256f94a177a2248d9778165e03a2eef1bbdccfe7b35ba28aa09fad00eb45c544c66
SHA5120deeed9a6f34c8c27dff3224b90b669c54a145de736d1fae67568f62941974fefaf0981084220466cd89cdead23a22c36b535fb8724c5f1aae1c0bbe6db3de03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8bdf51a6065f909ed85d5bc1ed14e0
SHA16cf7e7f2f4a20591ed2f9cd25951e36f4fd88d04
SHA256cd4895e36696323e38dfa73ba1fec6b267ac12b7c70f92d3ba86aa00d9bcfdd5
SHA512190afa80e769dc6c1a2e06a5bf65d604e0ebfc8791d5254829c9a01bce875332c9cf27fdec3fd9bcc828e8ce97e538507dabd7856bff2051a6def59fd72c914e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569a19a319b011676b5166d5cfb8574a
SHA18b99a8244e92a723257202dd087db19196c381ee
SHA256aba3948b76a325dff2ce010662db20310e5f1de392ffbb77fc79b8dca27e5d8c
SHA5129c261beefac7ac941321946730b9aa95fb7d2cf7ad4b2d5b13ea39f330c67921ac2e2df34c26563c0f689a867f7948b87a8e3ec1c6ab9717edbd2579097e9ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730b48f4b6ad3d98f276309778578165
SHA1ff8d10f730cec59411a855c99c70d6ea718a2606
SHA256c881c91165ad4183937d70e4d7d6c0e5876f89e2585b55d15cdcb5a02f528f00
SHA51228d312cb7bf3350aa123ca774c5d2a7272b4e5a0d00b8d975cf5529733847b5bd1da380d88895ba8183aed958418d9b6f17caae915944f501fb529caeb01f021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56757fe615be2fd34cb0535a8d3c00724
SHA1c8290bc045e8fbe0b3698967b0158c92679dfa06
SHA256fc83d383a42e30bfa9813edaabf0f5cca262b2c49123c2587f6e95b433a113b7
SHA512c952673b98deff32b08af73b98934067d3d2b66f845e6c1d60373ca51b963cb811acf740c382c8675e56bb187e12dd36c9fef183161a9832222dedf6b2b0eeb3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b