Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
8e999016c02f6fc847053266e2361d36_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e999016c02f6fc847053266e2361d36_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e999016c02f6fc847053266e2361d36_JaffaCakes118.html
-
Size
277KB
-
MD5
8e999016c02f6fc847053266e2361d36
-
SHA1
5986fa927b762eca94a2fe870eb2d852f897eeb7
-
SHA256
3e48ca5ca7f0417ac33233f7675137c8aaf061fa6c79a3d487d5bcd97f11216c
-
SHA512
33eefcdf45210a42c0be436ea9fe2be872c82329cf51f57a50ea05e86d052c4aed29a2f9c7776db6598090b4ac9d57fc864e693bf7d4087df65f53df416fe524
-
SSDEEP
3072:P+l+IsteYeWM4CF+k6wHtL+nXDxCXYjs0AAHgT3LKk6AmYes/O7Xkuo:2sfeWM4+1tL+XDxCXYjymYe+H
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48E3D361-20F7-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000062262b2577fafd84b097d2cb6613f01ab2427f6e8a24b3a4261e96189e9bc409000000000e8000000002000020000000d2d1fe0b14552c28977c9462412bc40765e50cb7fa79e87b5eeaa983d4a04456200000002e002391c54ec67e7b70f1c2417841ba5a38a1b597e940bf692033cb12fe0a72400000007175557fc5360730ad655ff1d35eb6273c2f4df8ef7fe946654e8a9c3e182c5e5065f611b48cf03be08314a621983fe8e307bbdefad22511eb76f580307289c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7095051e04b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423505059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2348 1964 iexplore.exe 28 PID 1964 wrote to memory of 2348 1964 iexplore.exe 28 PID 1964 wrote to memory of 2348 1964 iexplore.exe 28 PID 1964 wrote to memory of 2348 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e999016c02f6fc847053266e2361d36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9a97647b6bf023e01f80bf5664572f
SHA11b5abc7f0c793dd6ac2c633cf9da5f487513d421
SHA256aac0dd00d20b6f5b1128d739b965f738e290b362d88210620acd50f17d68b908
SHA512a3d032d781980d9abf10d677af3343b48f2940ca1dbd7c46bde85416717dc9029cca964a7e9650e4f88c0d6b89ea45a83b59565e1c7a762ccebe0e3194abce5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ebea0424f144b6770f749eaf068cbb
SHA1e398a0c4d52d9e81bb27ece7e433897e86178e27
SHA2561f8b5829ba8ff9ee46bff5c4dc365979fcdaecf65d676cd751edac0dbf2698a1
SHA5121dad765d5d42a8d69ce591cbc6fd82265cef5d44111651eb1338ee3e81e7ee7a467c0228bda6be55f5c07f3e2df3b6c586542cd0b16e8bb82a87cc77855634ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96cae22c5cfa3f5d9b36bdddd26d9ed
SHA1e06497e179d9339555203b2d97b509a00543cbac
SHA2568dc5f3394ff2f3c0516f12a1edc349e0a44d8130900011768467a3523fc7dd3c
SHA512cd9984de57bc2a240fecc2f60a18752d7c1d5c68992d0e7a5b38bf9ef52ffb0a885e2da5b16be664cbcfb64c9952944ef5ac662d41034372fd1f905534fe016a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da006b2e770478b326cd271d6fb875b2
SHA169ece42cd0beb6aefaf79627f527c2e1eb0258a5
SHA2566445064741d4f4674b86212cafc36470eb953710dd14e3f5100dd50117b9034e
SHA512d5e0d5f8266e59c58de7b2af95d4c0cf1876a3b79dbe498d2640e546cdaca3a15c783ef658f0144896dca4a5831ec195bb285d7b5cc6e08105e343ea0cf96250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6353c61d8b02ee86697ebae16724342
SHA1c07e52b5d932d7a090953e576ff73d634bdb3565
SHA256ae4a85ee3edc95b21333369162f7aecf9053cbf562fa440b1905f55db6cdbaec
SHA512b6dbc5c77e16a4369b0f98247bc25e495bb0c2f1fb698879e13ea7a7b702b11df55f09259dece4945c2b0b17fcddac9ddf3c53d3952bfb7091efdb0bd56dfcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1168c921153fd7b89e86e4507379041
SHA1ebb35449565978f0f1e369ed9c2448a609730c3d
SHA2563334fbc6b61ac990f8e1a26e913fef74fb73fcd32f577afea784b8920064abd4
SHA51299fa6b5ea7de115a8c238d51d5070e9e5b93550b8f37c814816d96235263ccb67b870ba7beefec844fe2ef510f3d8e4666c7e0013fc01715e7bbdba37bd0ce6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50146647c51bd0f757d314867522f34f3
SHA15d80f0957d279a11f2161f067720740d9f2d8020
SHA25616e019cffc2d88d823abf507740a7f7f9a9dc4da837268cb0d40b45e1be6df89
SHA512702a66b2eeb60ec3f85a62d9e55d224380aed18c02eed6b418a0ef5793ae9aa6b0f50daa1fde9bd511046970e4c4431cb0b948676c5e4f3ef354f42aa23976c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2655676ee44f8425596d4449bdf3106
SHA1f312f170070ac5f91b0f36b44367d52bf76c0841
SHA2569c10a46d85ce8491b1047cf35e94d46cc48d91d04bfbf3a181c2a0810ea8a302
SHA512b15e0f04d2d4da7ebf53aa1724ec5ed4c593c6a356a85ef4dabb688c11fae225309d5313ebe960473997255fae1a915caea46e886c523935cd188e3d39978b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a733985b0209d90347dd64ec916b4364
SHA11a57f2c8afa6db99aadd98e15e393dfd288c1da8
SHA256a4ced238757962c3526c38a037d81afb3abd093850f0aa4509fbb2493a1456c5
SHA512fd4483c1f0512f07c8c754a36c8a060f2ebb02ac0db212bdb519cd25eb4a9fd25b71d396d1556e524e917afe595ffb9ae3f53433ab34ce3cc2700646b247c305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56224961d592f410374052d7acc3f61df
SHA1f28a2e622baa9664afe47e191a02a506425bffc9
SHA25691b3ec0de681605fd96651b53aea8e8bc32fd50eb6a65e8506d89339f0494caa
SHA512e5f2c156664bce14e80040887905e1c2082e962a2cb06c7327a68e31c69704ed76eefb9243d539460059933be97db2ab3b7c52267af55818a8e2bcfadef87f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525cdaabe6d6b3ee340c374f6025180e
SHA1fb5739ea1135cae1de313fc56159369b0c89f5ba
SHA256a8293fd5bdd3ace4161dad0e5d0bc4560ccc800e7f5fc7c89c0ddd8e5443ee97
SHA5127eec3f1f105513eb6ba10c2db1ea806bb1a91802a8ede35f8e62ebab328847d9fba029e541f00edee498199b07b313736d20bde649a36fb710b1abc9276a4abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae112b7b548ae9c397ea7ce830c0a52
SHA1b23f60102b63872f6abd7235e3d93ded9b3a9e48
SHA25612aaec5f6f592818c1632544221fa6223d79673c37a75cc4548d0b8e7f0402f3
SHA51227999ca10c6259c6559a0a2c1a9b518cd387318231db4e63bfdf9e64429638ec6087aef9f36fee9addef7bdcc3d1f75b70fcf2d5bb45769ac18827cd04cad376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64c2b06e36f03b0dd5cc484d08d925d
SHA18705d4b63ddc667adc9527a59eb0879a2954b2a2
SHA256dc9fc58696f2ebeed463d6a710ff1c2066eb9bae524f7f6a0e2cc5a67354e7e0
SHA512c005aebfd9ff4cbfbe7b98557b809abedecd2d51779d9ee7a219ae639e31c299f19b90741d0a7dc03b4a26f44ec831ec0d010aba83a95312ccd95433a6b3bf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae6402c76b8bfdcf91b634075370430
SHA185d1e309a70a79c788b02e32d7ca53789ac149aa
SHA256867652e85d4e9fca92f6a1ee7010fddaca1d7a143f8ad85a8bb4763711cc768b
SHA512470201dc7d51203b11c62d193e3418873f8a647e3d7086aa1cf7c64ee43dd043104fa6baaf898d2537b22b51bbe7baf79d78d4a3d372e5e371e5bcc4a317cd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5a3461ad51a11407da126c258a1af1
SHA144ecdc1e12721dea1b36296416efe50e91e172e5
SHA2561a21db5e1d8c0f3ce26961d2304ce497d47c4ab156a8d0f2158f4128f5a28d08
SHA5123de79e19803b945c31664f938ccc21487a8d215731c714d1cc109b6091e7584d943febd44d63ea4473d3fd4868cb69f34ca1fc1509189d3cad9addaeb92da0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72b2d8e51fe6054a10fa5c7e9f42b5e
SHA158e43c97d5a73efaf28a47520f3935ada133f68f
SHA2564285a9766c44a1f949c6200c3df6213baeaf0ff0963072dbd2c5a5936132b84b
SHA512cbe5961908697376e43a6ae3dc6b71141e4b43f597fc1e689df296f878afbd06c7cbd37e40c7f61b820cfdfca848e16d06dc66863f911bd1b185ef88bd987eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5af757df336ebb7e3a8d107687dbbd
SHA1d6054085b61d2d7631e5e52a87f743e64eec0bc3
SHA256bbda72cf3f0aa9674cba13ac0e531de77349407add100987644a688494535426
SHA5123692fa3aa9857b0a5c544c514adc65ba524dead44fe07e05f64ffc4cd624ad4cde11f93fdb0cd0f7c32733475cbbf04c406864dc530dac739d10e79e9516a61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9a59e3345a291c3f66e5c36af1a939
SHA14adaeea9fdd7795d65c1aeda3a0a7c5dab6f20b9
SHA256c30a0baeee68a67db740b6f569af3a85f7ec247d241825c047b815fd73bd2ca6
SHA51267dd007f6025946e28df72091246f93f1e4be15fa7aafa5e530236f9a08e357cca4c5c6f095c52d4f52466fb87591ea7db13d6ec6a08880b453f87908d37a7ba
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b