Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
9048345855f6de3d9c160596cf37862a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9048345855f6de3d9c160596cf37862a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9048345855f6de3d9c160596cf37862a_JaffaCakes118.html
-
Size
35KB
-
MD5
9048345855f6de3d9c160596cf37862a
-
SHA1
c668182d66f0ee5e2bfe62434d6f07098fbc4753
-
SHA256
066c1dc6bfa28389e72a11b20363d0a6ddb1e74d0f01e784d6a3e00b538c6091
-
SHA512
269b20f1fd8bc9cab64e7483fa76f1d0b8782704c0e67b05b9040e6552934b1734567bba3dd9f597340ab048343c2011e4f3188561eae6fa5085ba9c312930e6
-
SSDEEP
768:Q6EYfOHC45RbmoMtnfaHzZpf/eszesseesweYEtB7c:QNYfux5RbmokfaHVpXeszesseeswe5t+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2BD0C21-2152-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b43c9b5255d6d0a7bb6bcc3c6f5bc7aa44527c6d3061ae73bf992f4363d2a278000000000e8000000002000020000000a46470b4e544588e20f2a7e543e070be0495c5531a55ff307cbf3ec79cd6af7e2000000005c6f3d888dcd5484116f21d7403c8273314485e22014da0be8a16864d4c7bc040000000c5bdcc90278ab7df161a46f75cf1687c2315e8420abb9c148d9f3a6e0108221ab29580287a2d61341021818ea99f1dcf5203305526d06fa92a71627898bd5eaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d79e775fb5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423544294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2140 1732 iexplore.exe 28 PID 1732 wrote to memory of 2140 1732 iexplore.exe 28 PID 1732 wrote to memory of 2140 1732 iexplore.exe 28 PID 1732 wrote to memory of 2140 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9048345855f6de3d9c160596cf37862a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bbd2ce40679be9f61477ff5b47c9ab
SHA1ffe9ca60d2eedd20d4889c08fddf8ff1f935e6d6
SHA25612b7c8fa78b755e1c4005aa73711dbcb2730525c14d580e745bb1e423b835b98
SHA512892f236cf6bf3b29c5ea49d05f2ff8fb5dc58effffd9c745bfd3c1a90e919043a34aaca6fd9466cd8f868b23987afb352902ae61cdda51ecd332a204fa97b07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a56fc8c7a990d49a1a1c089bf3912d
SHA1f155b9737c11318561d7df2a67ca741264401e70
SHA256b308b74b8ffddf205dcc3a97168ba52349ed1abeac7bbc0591ba09016c249631
SHA5128fc9d341714cb71d5e8052e91772dfd877616e42fd6405090b961773a801142dd974d909a49a29fba9ec9b8883f0033017a9f29994b227d318bf0173abf38620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51379f1af032e2cfd23be41ef9454ccd6
SHA11a38baee5288516654e1a591825e9ee83e26d328
SHA256e949a0df0047174fd193be8237a5c4eff7e79bb4da32bc78a6df13606bf9986f
SHA51246c06ea672167e5fd3a935a2600c66ad9b80c7f5f436daa188b16716796b291d3c51910d72b0398467d3a742a907d9580dc48ea7228639393e7f98058f3fa099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c15100ba65b41819caf8139d372d204
SHA13fcd01855030590a72c57385d86fba3f81faee51
SHA2564b7d80bf431f787e0c04ce509fe8cdcf9c1e6d2e0522584f7fe76b9566811fa9
SHA5120dbfe65aa4e313c6d49c415a4160a8b8f83e320509f7948b4a0a625524a5c2ce76fcd81e64c62b57ddfeed1c247c2cd95513c529c9b6fc2fdd8e1f64e6713792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57415804f16c07bfa7fb9e97001caa0a0
SHA13eb7868f44dcd1271d095d2dd9b5724b0de0e444
SHA25661162fb60bb034ae6b676362a3a31038973d378f6277d37efe6ed6be7e96eb68
SHA512fa219168df4cd7943a0cbcfcdeed6dd6cc1577b6ed288d4ca6c8c78d8262a930f50fa762c0d284df22cf7c34d720221b8c1194ef358a9a1a6efa31a101d9b0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796edf41ae8655a7fda4962660f4204d
SHA134fd3b4492c567fec4915ceb4e7abf36346f1e13
SHA256d30ec6d1b072bf6820993c1043599ff87a158f978fa1dfddddd6ce06941f0119
SHA5124c877d3f0e3fc0fc1e80075d76f7d2666cf196719a92d6ad0d104b806f5f0dd818e1d49dccb4e6a01822d7beb6c819df572c2ff4608ccbc58aa38265ce3d897b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5562bb24fdd8bebc906659ec71b260b25
SHA1bb38556632be0d9d335a423353252c572fdeacb7
SHA256bbe3b46d8d17d0f1351a5160bc47dcff6a62f8699ad9f7238b2e1c92529cb2ee
SHA512858016d2aa3d650708d97ae888ff061b642e422d16b8bb58f7189440c3ffd1a16b9cfd1e3329baec793c1b639ed27dcd381119d8cd82887ae99c9b94a0f9253f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bd69d3a8b80d5fb2cfe117869293d3
SHA1f3306707e2edbfa2c377533221213b2d4732bb89
SHA256c237761ea293a9218889b2fe6fd06c53b6f7e7d9e03378a2d69e1c22ad668584
SHA51205b4f99b8073420c06daab4ed403c395c612c0018972cbc844269f5097dcf96398aa233e6186a2def7b6c739dca23ea094a48faac147c4918d6024ac7e2fdd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568bcb9c0a6a7f8d04795af248b4c00e
SHA1cbc30ee4ac0d137966e380d9d0f6f282794254ea
SHA25645606bd7c74789ec8088d6aa63050b6e8a8b9eef096745715c6d94cd3854d594
SHA512ebe828ab37c30030d26ee82680cd279c706e03c9b92d515bbbb38544615f8a2fa020a5d6b16c7bb2daa8903fdc342c58d7e25b78d4eac9353d875330d0884621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516212d83504ca57e7862974b4720e73f
SHA1294047d8a5db1acc87b4c42c0a66a3f4b83461b3
SHA25656283f5df2c5a643c050b08e3aca63eeb8928d0393191382db789a29b2b45f14
SHA51243c6f2a62d4845c829631bbfb0b9fd7ef750357704b83af659827b7be30d293c791533fb7eaf30a6bc2879748108641f7158ab899da4173f891acd316f1e7e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354b138ee589448d367e47f49560756b
SHA1fe76dfac6be1beacae841c504e21ffda2bf34704
SHA2566da5f0bd758d50661d2e0792dd942e67727c4081cabb7ac56c7f91c60debca26
SHA5126af9c6058185c7982b0343b6e3cc0cf7a25fec9b2894fead7e18b2c51601fbfc92574dcc24791c3cc44d44aabd44ec0f01b65b057b04d3c5577404acfb91c1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742ced062bb61f6c6ca135585ebdf7c5
SHA1e96ef688ee19227fea5ebdd8dcd40410dfec2bb9
SHA2566ceca76284b2a3bfaffaa0cf8792418d5dd95d08515948386a7a8dc2583d4249
SHA512e4415abfbcc5e2b1c2f5cf72b8257941166faffe00780d8eba5b3968cfe71a6bc6ca5e49f99bd9df8c86fed3c9528a180873231a75160ddbc4877b6f550eceac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb56c0ac14a78e15b7fcb99bc22aac54
SHA182a8401b7ee773968eaf408497d4123e91295236
SHA2568b4d5e0d947b51784870511fb3f33cfb52926677d8b51ac71f1f04fc7d480dfe
SHA5124f59fb6709b5c57201d08a3df7dcb14d88a0e2ab2d5fe4cb78b28e41a452f9f1f391d2f5cce2d39dd669b2123b5bb953836933183d9e93de4154b8c2e0d99d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc595e8b55c77a35b92e25fc31cdbec
SHA1a387715811fa787b3ab1f5a088c45c02c31336f0
SHA2569ac301e21991fbba1e70bf1252640efab25b23bcbe4ea664960e75866015400e
SHA512787c2370782f3bd15bf6f63b2ab29e9069d599ab684a217fdb7fd8051b91fe4cc454ef35107685fb577d92118686030e596d580a11398b4d41e2b26ab60dc3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4b17be5b4964335a020b44950b0f6d
SHA18b65780c29613cb14bfd0331ba2b51cae1c75484
SHA256167ea4b439b16396d7dfb313ac8897d7ae21b36d3be443ba93f8cf35cd62463c
SHA5123b7eeaec5a34ea7aaea0116187ae021e60e1b72a755cc968c2dbf04ab202a82d7186aa731676d39a3603e2bff4aa21fdc689c3c4d69a84c395661137042bf814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a6de01233f0472a72fc9ae6a8ae11c
SHA17a1e5a26bc7fade5c8a88ee8b360f807e5a6abed
SHA256f90f57536d0fc12581e9169a825e5dce6b2cd696e6c9bdb7711e04efa159cd3d
SHA51259eda19a4b78225baa77bc796ffb675f5cae5f762ed01231cc9a9c8ebf5851ad0d1b4beb355b78966950f23da69c2c6e04d15bc98cd1feb0bca292b4a96d24f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd5b4b6f83dea77112d14495f3eb636
SHA11a46f80f91d1e322c0e086c34d5129720f98e468
SHA2565a6ef0483bdfcf21a1a77bdb12b86bd4588a07bf8e6a69796b1d815603c1b171
SHA5124d62ea968e8a8e81059712328ca34882408696ee752cfc7fb53e33eb03d5fa8dac5ee901c5e4c5a34b2c064d3d229fb79981f34dafd6dab698e6cda58776a60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848b482573a8b0820ae72edd3abd2fd1
SHA1d49819158bbef8e4c7db2ddcd2481271c782b3e6
SHA256c6517c9a1575f44f62f655b25d09803523422158dc695c92b7d78f68284e1170
SHA512c04a1225ccd3f0b5c9284a68329ed3d68a6a1e1685081f6a369052af9be34b30deee09f86884e45c78b819cbef66b849a8960acb306c4077fcda29f7cbc76a27
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b