Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
90f899b012750373d478d12253f4a091_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
90f899b012750373d478d12253f4a091_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
90f899b012750373d478d12253f4a091_JaffaCakes118.html
-
Size
17KB
-
MD5
90f899b012750373d478d12253f4a091
-
SHA1
387c9bd7dce98380668cd98c6c8045decb526334
-
SHA256
1cc25e8ab2596676952cb30018541525a541b01cbe84b8b574147f7fd5ec33a3
-
SHA512
1e28fb077830fb02d38b98a73a06ebb7c83d686497472a8c1650c8ef5c6ee1deb24cc8c5c8f2f4e2034596507ab89f616301ce5d2f45d5eb0cf1f8d01eaa842f
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAId4DzUnjBhVv82qDB8:SIMd0I5nvH1svV0xDB8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05a32cd88b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D66286D1-217B-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423561991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000017527a92f2f7a6428ff795e65e93370000000000020000000000106600000001000020000000b61ae9cbfe43cbf44f02b57d17119693bc9cb768f55314be39330ed12f90185a000000000e800000000200002000000098163cd45ebe1300b988fbc1294baa0adfc4d119888e6b507cfac60164f8b8d0200000002d9d54c7243495ff8821e511bb4c65d143855537224cac38596a561ecb5d4ae240000000cc06a072bb77c403372971daff5bc2295a7531103b926ccdb6f8069b58641b342b1b83be9d768618ae8e15a1ae1ae8b5a5e77eb9983dbb3ecb8c020d7cbb2191 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2948 2832 iexplore.exe 28 PID 2832 wrote to memory of 2948 2832 iexplore.exe 28 PID 2832 wrote to memory of 2948 2832 iexplore.exe 28 PID 2832 wrote to memory of 2948 2832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90f899b012750373d478d12253f4a091_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c29e510883d6fbc5f83b0ef6ead70e
SHA185ebac9f94d0fcf7e82655d2968391cbe4408080
SHA2565fad322d98e72a05c49fcd7d5b6766ec32ab8fc9cfcd509d32d86b27b90273dd
SHA512ea9088deef3c0772f5520d60a6812e1d8d84544798500a8b861e8e35d9dd61b168cd483700614114443c42664677af9bef84abae72288217f49db88c07fba9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835753f4e268f34dc3da80c58a48b6c4
SHA1a81d620774d5b997eae01db995f6fb1e51c677e9
SHA256c9168cf4b07153c7ed691494c2b5a3b2cbc22d24e03287021521ba0b7a33f7dc
SHA512c2a6140f0b8f0aaf74ad93cd777225b96af465f986580cf9e75b13c8f6070e9b8accb6660c79f2cbe0ed4d92b962ebf6749b15fc54b38a46de0239de45d7be3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507043aca96f2f359829f742645bb667a
SHA1178351de54e0ba30e8ecb6dfa8739ff2c02daed1
SHA2562abebd182f4cb62f0c0dabc438aede9e26d0d0c721cb64693055a1b50cb80926
SHA5129ad6d52cb101d7e2639170019c80cc0e4ef3bcafe3978cacd8b615fd96c7c541a7f71c9e6fed01a082ce0e25fcd0d729aa2df9906886acb4f23498af66b844a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdc86c4292e4a0f4cf62a7781901b83
SHA11f177d4223e69684f850660b7eb3227227eb59ee
SHA2562e91136c1823cea714a9de26500a2639fc897eee0a1a9be876a75f3877878d3c
SHA512c89977e73b96b964d90566849024a79baf8566e278166d6ec90cb0f82d6edca4029f7c7573e3e5f139bc980ba1396d501493261773848ede8f36437759977854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901c59010d46b4fe3fc3ef08a9899d12
SHA16f8b1b5ae2ec9b7b11ea889ac9711196547b8097
SHA256dee66fafd4efd1f74dbbda9aa3b6ae61e2bc6e5a539d55612a554b9c2e155b2b
SHA5121c510bc240190fd0d53c681983322a3eecbe2e607c5916e9e15a8c0e66fd05b46e72e72113444eb659f5bc303987498bb4c2ce4c896655a9c479c9c1b159ced7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8c95127b109a3405be5d9ab0b59bae
SHA1207ae602135dce373c13afa82c7260a0ddb4f4dc
SHA2568b9249ef520d75ddb3745eed5ae6499869a720b844efc1d5a6c7e3cd0d1f11a6
SHA5128e0c52bdbef8d6a5634b475fd4c466a2195e28d0a72b5b2a6111f8cb469e0f8d373c004d158bdbbab206a9ced82cc190207a858c289f508eea4f5e11d0025fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a1bc845bf1b71c52a80b16c5861eed
SHA19430299055081775ad4f970ef734ebd18a069e42
SHA256bed2e268c87910f05478abc22060b55c5a9adc90162bb1b664276c21ae5e963c
SHA5123840d400f994c13fa42e400d3131452793ee50c35c863f82f1b635ba88a49db2e55945236829f11dd8a797369fab4ecdf841a1c2fb8e5353ef92ca67305deb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2adab4a0844ea54cd1070eae646610
SHA17a7c9fc5b85dc1c605c4a92c34c039404244063e
SHA256c8c4ed3d4c3497e7ef020347a906fab405fa1ee740c041a60764dcceb651655a
SHA512bc9c0ed11eea3f984cdede9d25dcc647517c4495e712c35c2bde653ff67af7fde986c50e53a7fa6c7eb03ec8fecc901964a8bd56f2c02c992e8fe49ca5ffb395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbbc9d7cb0fb97aa0972a4f421d7691
SHA1625772cef0c6a4774e0ec3b84956d339cbaff5b7
SHA256d83622c36badc4d4e1dd3ccabc8fc749991b92cd3f600af2632751ce6ac4ec5d
SHA512bf45fadda0daecab6c3387d76781fc42b498b7e78080c8ec5a15223013e016fc7ea03d3646896f803bf8b4d8d581efbe085890553887836f704ca5d580df1013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76f0dff0eb0a565e5900298314bd9d5
SHA1e45649fdaa7012af62e24a24f239c68cc812e729
SHA2565a4af8eb708aa8a768add6b242e9392227cd9671406de2d50b290fc86c3b40dc
SHA5123c91e74de89a4968db81273fc68e4e7e45d1470211a2f9c8d7840808a9a14909f200e7dfd70598f0489aebfcdc4ef752df477811d2f4727dc8a8c8e4a5fef749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9dec3fce51ef576aeba3992a910f96
SHA18cd1b883f5a815d3f8118b14cd575191ca9732f5
SHA2566cedb8d62c68fd46489b6e698f068734df49fa023ac2ffabb7a7df0d4b239037
SHA512c573b7915f0234932f4f7e738ce0d2edb580d80ea01db9aff4410f316a4b1d866ae98e4328592fbef8575c99a35886fc16dc6f06761c5ec8ed5d5f42c9b08cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778cd688475556bd2484a8b73669c033
SHA1d1d8a4c01a06482085dca8697cc17a83ba538abe
SHA256bb245e9463453c30ba7a8eafb37cd7877afc5ee7d1d6021ae702fdc654ef9881
SHA512a14ecad0fe36100cc9ded28216d1b27ed68178784463aaee74657923067a5e489496ef8cf49496b0a885b0c16752e8f2036e25c280140d6fc375820630797673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987bc932c469b5a492ab6a53b0be437f
SHA1f1fd1171decfc55773b0b9b1342fa9415e58c67f
SHA256646c8ce3ecb1e200734af82535f7a639c7251e93610f7d263f7820099c43d882
SHA5124cfa87240aa2ebdc3630cd6cf15e4fa93bb40976d4155f10cd3825aa8a0891be38d6ea6f0e286773f7007757f95f67dd5683a9ae12c609341ea0b9ca844e84a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62c033557bf0e3fb2d05f61fb486025
SHA1fb480e45a993bf0a6c2dd012d2b8385582aed9f2
SHA256d683415ca6ed55f584f96bd6981e7839b7d4258ead5a569730d3062a062772ae
SHA512f76c226b0a19b9852d796f5981162a318ae7d75b8943365ee71a77a5024e8171ad775b824a5ed66702c74947fb6ce381f857e8fc9e6a266ef673585cbcf14159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f777cc1b579fe27de7f091f84d8e881
SHA1b2a8003d348d001567a69b06be8020b26691ee3b
SHA256ac2619102af9dd23a2b9eadbea10b624d8196dbeffdbd492945e10e15ef1067e
SHA5120824a64c8bdbbe452b2a41d1ae6fce623fd953148ff66e555ec8edb38bf8d9e65b3d2e68731e5c75be006db2287990b1e6f361350e9daeb4fca8c745c271ad4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d189a88bd3bbdc6fa5e154a6fb956d7
SHA15ccf339aa57e4b985f7a9b26d4858d564c73725e
SHA256a6c7ae7744366b0cbed6d0cb6dc9ccc880200520d7b9c853c09580a2a5d365b1
SHA512996bf6eb56d1c6ec82385577ee518565b892e4634db29d32ad3c47a37f72c2250f323f158bf43d316ec7c737fe965496f3aa0ca3772b235290640313ff866171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d388dcc1d4a73019babef58d5c070b
SHA1506658f8f9b65e249a03cd710f47291a76ff56c4
SHA256b70f376068386e3bf645657528ed22f1d1e551b1a75c82d00f42ceb5ef46a602
SHA512acaf79964d35f7e63df7232736cea6173e331c3fc79ea1cae19da21cb076db659813d2a8d07b3f99277ae84191847ae70c9aaa1932ac04b4f08b4ea45bcd2b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1844937a893b70e3996d556f461c367
SHA1400e4cf5eb2fb7f6f339d6696265dda88531e7e7
SHA2565c5022eb198a96381f9f6c251578e4a47ee7a53d215379dc81ad98e2bb3b264e
SHA512a626d91db67419085b61d5b5dc58abb87ba26288e4e087994addcb4725d8a36511d816cc2a68d560b207557a94cf5ce9ee5694c63026f0f1ae26dc3083ff4ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530bc25e2c82c1c08a64b69000b93c3f1
SHA1c3c5da7d900d2315c9faefb3b2ca6176110970ff
SHA2560f28237361dbfa0b147fa3c7501fd6c8eb9636a7edeba1ef6cfd49d2c21095de
SHA512403339f45cd35b0146607829226dd4c0fafce9c710bb4344ca23ec36b3c0c882603d22d644393d203cd0ba8b5c6424428922632a3e44cad5e27a3e83c7aa5cac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b