Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
8d3538af50a1e034a002e021e697854f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d3538af50a1e034a002e021e697854f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8d3538af50a1e034a002e021e697854f_JaffaCakes118.html
-
Size
69KB
-
MD5
8d3538af50a1e034a002e021e697854f
-
SHA1
dcecf22d6e26d526ffdaa3a4264a22dbe9ceb5dc
-
SHA256
823ef5c64d16dff38c7d1a1c4af63100f2e68077d55ae7b255f964e8beaed903
-
SHA512
94cb69f93e1fb6584af17ed933aa6eb2797f5398c6aa6312b2574e541dc95fbc729f75bbb9012b0427ff951d418ac66354f11d898531dd51261a8acfff510649
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6st66v5O5XloTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J330FiTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423472754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90773be6b8b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000917040edda426177db00d92d8d80d20fabf31fca40ddc0b2912af864fee32dac000000000e8000000002000020000000b2e558bce7345b62465fa7accfe56caa814393416a13657a75b6d88209e67e582000000074ec7c49306a34c4ed674eed5b53b6e4b276da6453f8e75834ca4134e94b04ad400000005db5ef8224a971e4b1a70f3254eb39f334415105f614ecd668925d8e5add4a494d4eb37f18246309210cf6ec6b999d5bda362f8ff1af5987663fa75ec0889bbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11998441-20AC-11EF-94AD-7A58A1FDD547} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d3538af50a1e034a002e021e697854f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643d69d993ab5bd7cbbcae456fccf860
SHA1f8fabde8ed40223b9fc363532a5e2dce77e497df
SHA25610ba8e266aacc1f6720cedc9deec6c0c5eeed54647b984624610f345c4bf9aec
SHA512f1a03fa9467381537dc3d638e6a1d580024a9bb5feafb5511932d6200fc2b371f08e742f62639194994e7585ff0e2eade70bcf2e68208e7e3d232b78c3477308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c5955875162eae87ef687dad4166f2
SHA146429650f1564b5b422668f7e3682fc1d294557b
SHA2568cb226ef6ab8e050c501f6ec27842ec5d7dfe2d58257b48747fe17d2dfdcd754
SHA5123ca7b81be6844e6b4417b8a7f30a164790a3cd217ba447b749d95a5f691be0dbeb7b18f920f7e078e873d2afbf8ddc2f96f262e12aa2da75752eaba519959f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b368b3e20288fa9baeaf753ddc1259
SHA1fbe66d0b2cfc1925b510907ea4eb6999c40c017e
SHA2563c346457c9eab3c5269d667bb556d6cbd1642664b4e28ffd504b87f65c493d30
SHA5123f507b1074e90231abd2499b19255ae9d6e8d013964412cdb334f58782bf69168107800c3d6f228ca7592d9fa37aab79e69e191b2db298009ddb08b89776487e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56595e7823f42da64fbd0ab486981874a
SHA17e04fcea5e7c0ed8123131e9560f1e003508addb
SHA256f1f208c9da7cc95847c3daa7d7af62635d05e205556dbbadd0ef329fb4bcdc8b
SHA5128c1d565a828a58dfdd9fccf6ae56343811a158b637f48d0a5f12a5918809fa45a12e155f7cf6fb34d06cefe813cf16d0ab0f5cebba6f1480d704d63f78c93bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca59a22a7ccf48faddf3923a603d474a
SHA107a73bd765bede5305317279c4919548aa1cfa36
SHA2562da1c883145e17aa8551e484b5f554ce77fbcda0c89b34aef5ff9471d44cec17
SHA5128ac2b6b03464077728476904ba8884506fe9ec9fcf829394c2085ace96dcf84d18484f66c834e0bad09a04309a8eaa7d0d7ffbff0848bf67fdb9c8e093678611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f9dab158f9fe9686576ab0fd482e2a
SHA14896ffd5d23bf62583da5a5246d93de184e33d57
SHA256fe44d3ec4a9dc175d10629e498de22d3187f37176b86322a19866a982a9ea794
SHA5121c211b269eae4028524b66853f98360bcc5948b0c92501b97a117c748860573fec7bb36e8fd620ed6c7cdd0a8f2d6915a024722665855b34fb33e39833d77d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ada8a6876043a7fab97c4d0495aa03
SHA15b904eebe2103a46a964c5bd84d3e7b9400b4e9c
SHA256843ca67a5717301d2c65aea2a9a14d773c8a6054148af1e255506d714822ee93
SHA512378b16d3287fa2db381384174a5108ea56516cd1b0d1772a021d482fbb58acfee4d46557daa3428b012e701aed2a8b85664a884a623d5dc403170ece23be815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b171eedd57620c090418cefd76036ef4
SHA121b3d501449bd71b7bc7eaa63d7c52300ddb1c4f
SHA256aad8df01effac58143d07bc39457712957dffef7fc5db455dbe4242149e96bd6
SHA512f9e6e200407feab329b99156160bcde328c8c8c23d8d9c8372b00c4ffc02284459a3383ac34fbf80ca178c71635c6679d66ecb7b0c6c6a16d80c5852126b36fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480db209c583c7ecb8c60382aa83573d
SHA190f591d7bc6b313535ac80d0e3ab529614af7ce8
SHA256bdbd619d0f8918af3a52eecd09cbe93b89cd8581bc5a4cb0f34fde0dbb6b26c9
SHA5128f208e5a63acd05433df4bb85138cae902cc069362eab49be9714669d48fba9073dd5b17cefaab7eeb0738c6c7794a7a34b513dd33ac6182ff1f613dbdc70cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591353fd7a543fc15924ec71e55068bec
SHA1b21dbc2b4754029b4d3c20f5f4d05c73c3fbe84e
SHA25638857725a7fa1c990acca58b73537b9263ad845809f5c91b58118d6a28aa5cd7
SHA5121b6549eb7389c4112b7a1aaae6e7073f433bec9f927269e5568871b742650de4349847b44be1cdc462dd8e8923cbe9f92cdc6cfb4a2aaee46feafcfd2d64573c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547c5a281849165ca87e61a6b5d1799f
SHA17aa4eca94a2eb57c357c8fd0ac9bda773c0afe1a
SHA256d4498b5fd57f706ac19bd40c46bc96d6ee1816a4477b91d2e814ca0051ac74ab
SHA5127523695106f280104db556fae7a71a7f60fb68baff5beb957808a8560154cb2ec4b61362f15d7438c315c9d853c6219a9070c5aaff480c0e4733f30c2013c2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e625c933547475beab88833c5a86c0
SHA1b4345a2e0735f67b5f617cbac6534d2e1df06e3e
SHA25634ef654762e356f16aebf726c29cfec695a6168daa5d2f980e7be0bb26199139
SHA5121387e8eef436fe6f31bde6800a383acc7c0735f6f618a7c1387aa6794b4619809060efffc821339088361f5484b92c6bf9b7afa5e803b902a7b9c27febd42eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72d93a28b630b0b07caa73d65e0acb3
SHA152bfe1e9d2d35ca155d444d08eaf9f6493f1dd1e
SHA25671eab1cc6f86d3bfcdf9878993e1814efe243501e00ed8dce54927d859f87f0f
SHA512b7d6cf60ad9385feba347c3e529a7502edec72297d0730483161316746602fa896445a7c54d2261268dcee520efe5613068d95bf9086a69490023bcdc312a73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd91b1e02d7a7635457625791e086d77
SHA18974b27920fea3b6d3fb6b18e624e11cecb11680
SHA2569a5dc76472dd006cd6029d8898b89cf6dc3eba760e0b3437cc79439ebc4450f2
SHA51239525c1583160441d9dea15b31b2a9468de66bd0509887ea869928bdde4cccfc49a4e330c9d84be63dd77ad43d8bbfd8d52ca810225b58ed475f373dc7c63cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1b01d8ff481781eb3510a456506bbb
SHA1120a0a9b9d5ad2a496a881d36f875bb359c5bf3d
SHA2566774e6a27cd9a49e8669e85cd75da5f7b1cf2118dde40cf89f048179599bca9e
SHA5128a8543a510422c8aa5d88010900537b9b6ee9c0cd6e5b6e76cd48bf147cf1bccc30f0f77edc229b6778c0037a27f33539e26d39c1c9dec4426c000cc569455d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545fd14a996c54de120f44d6363b2dc42
SHA1870c04da7bd0361f080ed4bb693f6ca55829e11b
SHA25603b76fac65987a7fbf6838d704d86fbe2df77aa74d6b4c0b29588f0c892dbf9b
SHA512cd86038ec677d22e889cd8ed4bcd058656640c5125de289eeacf3cfeacd7b008bbf77f70284d42221ca200ffc5004f37cd583e37a946fb3ed48c06aff5621c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec50a8b287dc353d27cab8598e454238
SHA1602ecf8dfb0c2ce9b53d5133d97ac51029ad5e6d
SHA256bfd263e8f6b8e071c4e41b1af6ab103b35ee84be1d43f9ab9caec7f8eb7fdee7
SHA512bff959f3418d3cfa6c8f03920fefd5e479cc71f40694b4927a200dffd77dd4dab32ffc0c1131f3cdab16f264d6b11da1de5f81f21ce7384ec1294afc0a838aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a887e5a7b41953887a3c02b2831897e2
SHA11430e24306e50a7eacf3da3bc6f6975b2165ce8d
SHA25645007a6d887c42742664a161a3e108693aa7be61dc9cc045b4d9b3489986e456
SHA512288cb71ddcb26767eecc9ee28a5bcfd1262dace1551e698f8c01c132f0d04634490d8474c6daa585a01ee078e6df557a7db782e1d834a7cb33085705db5ac5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d342851051408acf07c2408e9b8aaf22
SHA1c4a1b95b231f43540c13e42ffce4280b28595790
SHA2563c1c16f4b96c65f77878da348a357dc2b3486c8eebbbe8a19c4d5f8597c824d1
SHA512867c2b69f71ca4b635a509df90417b13b0af8f5418254e72e76eba45364d7a6d7babcf5df9b7de4b72f621fcd8ff2a7ce66fbff345df929a9fcb544894276f94
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b