Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
8fbeefb338535e359be277373ffff438_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8fbeefb338535e359be277373ffff438_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8fbeefb338535e359be277373ffff438_JaffaCakes118.html
-
Size
784B
-
MD5
8fbeefb338535e359be277373ffff438
-
SHA1
01b6602820bd66dae930c7182833ae526a60cb26
-
SHA256
192b493e1aa0cb98d21de8c00f550a0640b7128238231e73b3fa96d6b952267d
-
SHA512
0065f67855cc661c7419d1a8a3b51883e1d595daf8eedd9d6ade70d29cfc0415adf2a381d566ab827132efcf61ac2b50596207d615282b5d5ef849f4f514a7ef
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F85CD51-2134-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0065f34241b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423531351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001c2d159cc314ffa2aa1014dab942a077d56e247fa2da503414b2b64d7911f6c5000000000e80000000020000200000006ff825159985597a7e7d01a42527ea56e94b985cfb7aafbc3ab6d55ef76579e120000000123d629490982045a7a2ab7def1fbe1f9914c4f9b5355f56435d0a6c961a5d5d40000000c523eef13dab746e506feac4712af0c47adf84bc88509278ae6b87b63e3a22871d0a7fb393bbdcad6e6a98bc6175bc9fd5b90b75be837e8e14c2e494999aace6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2424 2104 iexplore.exe 28 PID 2104 wrote to memory of 2424 2104 iexplore.exe 28 PID 2104 wrote to memory of 2424 2104 iexplore.exe 28 PID 2104 wrote to memory of 2424 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fbeefb338535e359be277373ffff438_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15ad7f400ea8a67e688859d317a78ed
SHA17ec6d8843daea500e3dc3c2d1d275bcec149128b
SHA256ef6acbcb951eb4d29d9e440eb4baf106766bc61a4b531aecdcf28354a31c11d6
SHA5129db3eee1955c0306ce5ddfa318e19e8059b7d39db7030b07297984b6ca659d7c46646fdec4b7c684229d3b6c8980f68e478af15d761974aafc1691570c8de84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b772261ac98398de83c1bf227263dbb5
SHA11835ec9fa595041cbfbe74960ad1ad519be6fac1
SHA2561fd3f4bb5b2505811c5b6959e72307476582dbcdd4f283efa74f9cc9a8f0f652
SHA5127847306fb1931e0a2e4159837082d477f6596bbe3feec52d5bf069eaaf07c41693f900b5af27ee8f81d53f02a630c1848747a7f0f2316b57709222307e99402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6c284f1180e88714a159e5bc7ddad1
SHA1880b456aa743d2833dee027c84dd4ceb8d8045dd
SHA25674985a88078697befbd3d36ab36bf84a8f8b255765ca1f578a8407648b2c0025
SHA512fdb7a975fa4cee3937c0e7c7136ec90c3d3c51a9cce72f1e36018b9bd41465faeea653a83a0c836541628d2ff3eab99f7ae091853960b3323e72499a2a5f0237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e534bc8f524fd24b632566da9206b6e
SHA1b66266287fadff7f3951780dcd5e6c6c3377f92e
SHA256349c05af8befda3fb107d7c868a9ddbf8fb5e5c12485d8f8a310d29ceb4afaed
SHA5124b7685277ed5de4620f412338e81c6e908dd2ad70e81745717768b1f85c678cf8715ba2c226a421c6b81a735faeb97e238f9d1beb10cf41112d0966b56ac3094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de3c665ff2b827e07c06b93b5d2f61f
SHA1027172481cdb315e8d6b568239fa673ebdc96f3c
SHA25656c37a55118b3df17b2c89e7801cbe496b7d85ceed431d8732a35297bdab0708
SHA512c6149d19fc39ef2404f9d9be4f9db981d1a632afdfc86987c5d4aebfb82986499431d25787d14bb4431fc79bd4d7b50a16a57a8d4bcd668b8afd34bbadea0337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac934c0b8fe7d1485beebc1fa733dec
SHA1418975482e293202d18ecb98cdfd2d6a36d59c0e
SHA256db78573481d4c9de7e674240f4447554639d3b403132982bc01a6709404ec122
SHA51214c86eeb7e5aba8d932dab000cbc71964eedc8221ebc9140b102d59fb3c951ad17e9580b841aad892eae103abbffd0716e5618809a6e4f0c8aee5be8269f8e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa1ff4363c8169d06ef6958e6c9e36f
SHA1de5cef623a9066e47a75520f05cfba994867655c
SHA256faaa28c236d13e417679a4ad003199a52c68246d2cd2e31fa78947df4dcdbfe5
SHA512095d94b6c129a506ce8352b3a5c5b53cd18461923959ba30422b3afba56dbe3d68e3151f10c527a866f8202e403c57a1c473e6b5ba28d68abe04b2d16752da5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b45e8b5cf10bcc27f99ca56201ac8fb
SHA11cff152af5453210f8006ad141474d8b56577b7e
SHA2564fb14dfa793a2ca7c23d029e31cf9b9903936165b56a4fabca6db8dbbc5e84c0
SHA51254f4b17d428afee2029a8f9b660269abd135ce7ccae052f397d0b959f4adfba386a4ec944905fe212e1863551f8c8b2c8c440145c3b8867f028f51ffdc28f1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747e7b6ff7aa04ac57d1c44536407364
SHA1af3306b0ddf27d3b5b0c52588eca2ae92575d100
SHA2560148d668cb54778803d0270aae32e9c47e4ff693727ce2734ea81eb1d1e5be90
SHA512f8f3e7a7dd3beb929d95a7aa7128b555e680ed2bad68ee6e710661028b337a290327685d996303fd3e34a079b46ae0562687d21ea56dec201627b01c5daf0fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f948e9f4f9d1436854705046c005572
SHA13bc7accdec153ad3e3a95e8ab3738674e6f5d6bc
SHA2566d903cdb69720d641179c8f133cf801dd50fba5122502764e856809f57d7a7d4
SHA512e754f8bd0d51dea43962ceaf202a46a5748c3f2fb852484d75b4ffc6a9cc6f524e38b151ed3748ae41c104184bbd2f12fc4e35caa5f8506e38d8a216dafaa317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5c46ed21f4f4ebb97a8d8fe0c80dc9
SHA1b035008af9349faeff497a05c0be0f23fa8d1f92
SHA25603e96eabc70ea24195225d1cb9ba4da7324fb54638cb67695f08b86901937bf1
SHA5124253b7a46b8845e20e4c2572750655da5c3abfc60fbc749e178c6527f1a9596d8aeefbcdb965ec377ab1a83528436b8affdc173c7fb293b09f27cdaf6490c2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7870710b4558710e20f58b6986e6bc
SHA11af2b002e5e56f418cbfdd80d4dba3fdaad83e79
SHA256e39536f302a68e47fed1eba4a8f0ffe2ec963c5eaf7015421e18be45de439a49
SHA51260fb1e8f92b79dcf090b5df7b20ac4da7889c23d48b0258e10d2efd925a9f8a832a7cefe95fd167bf71cb37fe3a611d0bafb0343928f9117476b7fbff3013988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ba17e06878f1a1c8d927e6d999dd11
SHA13988588ee4aed0ddd47ee0a3553747d1a3d07f43
SHA256831561ce1a95f784a517b6a6dd83b6c75edf1fc7fdfe9be1c14322d1ddaff686
SHA5123c00ccff510fde570b7e9e3267b3842d89708d23db25837eaba438a8c839fbb62ae2ba5d202b5d33a9745c5dc52dc7f502bb61f2458e757534973c57cf7ae6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd4106831dc2a3aee2a6859c6bce7852
SHA10c3dbd2832263f58bc75d87a857a18068313ca61
SHA256e3550c2c56db24ccbae29011081d968217f2efd086987e7be9428ee56ea5fdc7
SHA512e0e6ecd2476b5bb433f0df68174c79d8e473710fac7b6cde7fd2eb8ead03b1c2f9f9b6bd787943b1602c78d103e8c7c8d0ba6c1c43c749247121ad2c869b4fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b36b9ec6559eed6c34b7f99ba85058
SHA14a5404d2986cdb8a335aa429ba178daf92e7534d
SHA256f69ee225417672ea72fb4200e9e0383f617fa413043505e5a0a29d70e076ea53
SHA5125528e1cb853a337e909b3f2b60402b59a729d13b8dc57ab57404ddd35912f1ca2c6c67e89c3e99e8b29471349049e5c4b5ff7ce337d3f10413431bd519a0b158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596f4d955bf373e82bb0b7b04b533994
SHA1b074ce7f68d029c6f8f5263ee2804355eaa7a859
SHA2565804f2472f5ae05454aa6196315b7d55f95891011516b39c6101d571c9c38b7d
SHA5121dc7f3d6061006eab6db20cf041be69c978b9bedc7150841e9bf0a9e1bd77121a09bb4e3c9a6e4a914f1982be502b2407f5ca34b457b521d62bf534291a730ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e45b28a0214e1a2c4a6597c5f40e7d
SHA1ca29e6272bbc740af349f8282a5a30d5cc3e6278
SHA2565bed2bf80b0019fc1fff2f1fe35ac19f3b954e7f3cf0740de8f8fdeb13801d76
SHA512433089de9a8fc18d736a9f604c04ebc7943926a284d64018a91650c43e1030455b3517b09786f941bd760129a993dc7759540f74c3b41812f43a946d850fca4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34446399a671eb5f2d1d1f9a95c001f
SHA1facd26645400cf7d7a73fa23a53e1d3e6b20fa79
SHA2565805d863f424cf7de8638c8fd9b6ff95d37baef7f866dfc491ec40d110432e11
SHA5127b8b7f6373643382daa1fdc9e9427cfa428ff0ae5fa7441693077ae04bc2554ad71b3d13c233473eece78aec411125306809fb42b9467d00b2c637159a128e9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b