Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
98841e578973211048d75f2a649b4eeb_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
98841e578973211048d75f2a649b4eeb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98841e578973211048d75f2a649b4eeb_JaffaCakes118.html
-
Size
94KB
-
MD5
98841e578973211048d75f2a649b4eeb
-
SHA1
94acf6c6706581de8cfa0842f39d9ad4edd340d8
-
SHA256
3b683e1fbff026a1b633639457acc7df678e466f29ae626568ca22725a3dd63d
-
SHA512
f43d5106c9806a844b44e041a2bac3ab6a7c88d04e2392efd38c1712c027f85f23d8d66a04d6f55a7242c9bce85e0b3e1c3301e0763ac15e8264b6f299bb2b42
-
SSDEEP
1536:WMLiNnrv7LJGrFLKtfC65idcMJ+PfXb+Z5ayUcZBdkrY8mgHC+qpEyW:WAipkZBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A0255C1-2353-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3065d00f60b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423764450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f08b1ee3329885f765d835f85eb6c0fb234b21006c87c42b3e24db3b3a57aeee000000000e80000000020000200000000b4c37f03b36b3a3b2a26747db700e01648595aed0e8e0391437f8bc46cdfec82000000072ea45c2d16f5a40d6f2d4fc1e2248646879f697c565d4bdcbda20a253c5e1ad400000005ad97edc05729a58887b2dee8571155198ea798e1b91a3ada4b7088a9b8890a406239a804c4aac4746d15fb12344728cf6f070c659fccedfafab4e111eab1f78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2164 2080 iexplore.exe 28 PID 2080 wrote to memory of 2164 2080 iexplore.exe 28 PID 2080 wrote to memory of 2164 2080 iexplore.exe 28 PID 2080 wrote to memory of 2164 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98841e578973211048d75f2a649b4eeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccf64ab14e49f338ec355497b641aca
SHA103f8e1c226311ba97524f6b9d04a93a64747e06d
SHA25657fd482215f858e4886082f536b30aba5932b0bc8ef6e08c17e1b1a760faf59b
SHA512482ea0fb3ce489e0dd38a17bc09d7cf2b9378112a2e9daf0d3d43686225c2318c36d3fa80eb066e1c1c718f18656d803c357139c6dedf89cb3426eb4d51ead4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5cad908a53c425ca319cb6f0f077c9
SHA1e348b5812dbe4233fdebfc5066be731c10bc3549
SHA256e24a6b26b0357b338e5ba398dce6f0f2450cf74048c0875beb343699a15b3fa1
SHA51284e9c4d926c064fc6f00a00fc68f2b78a964436cf79e29193203099718fffe9f7b1b22e80acbe4f90173a237897cd7632136726bb714e311f380847856b6ba1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50307d40cb14c507dbd886e59067b8fc8
SHA11d1d0e8b1bb4131c14fcd173f10bfc3e03e57d71
SHA256930973fad8014527537f8bda09c6ca48b55ae6948ae58933b6dc6bbaffe807d7
SHA512040043f58cdf718e80233bbeaf22021007db1db7640891898b6048e73f9a6141fdd9e18952fb00157b764d29a4c2d063421a5b8dc7ce52f18d3a3019ab7baced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8130001ddfaeb21aab385d6c25d7a3
SHA11e92b2a346b9505d78cf0e0981ad18137e1d21f4
SHA2567a6eab0b171170e8c3322de60d3befa37fce7f4d71f696c00746ef24f8a0c683
SHA512f2ce98ffa27b60b9297ecf8bfb7ac349dc1b9501407c9ffb3d4125bc80bcdc0e8bb10b7bf14a3aaa53d6bc98100a3e4521c5e3e465f7182c7707426e69df072c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b02f69a076c388f87e76c56d7d27ba
SHA143f38cdea2148f45e8f601f464597079da325138
SHA25657a5249f9a827dc9407fafa57f946e6c30ea89fad7a18737bfa0e27174d38372
SHA512349a023068ffca699a9291419bcbc79319df74c444292442107a786e015990bea833605eaefcfc8685aec745e65b4dd68beed8b67d5a53e1ccd112782e83fd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facfa6df585415cb92002449ed87994b
SHA12de02c68c453517e411f36e8368ff97cc8bd831f
SHA256e60ef52fcecf7c44129ebc10016318b0bb34f3d43572b93152033ea8235f4da0
SHA5120fad5aad530dd36285c3fabcfbd5e757f47267d14742c4d21936db456488858e2adc1f9f104a15f290071c62f9cd30b9c4c35f7fecb90805408794bf422b2f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563440c33246813807d12de30ef58839e
SHA13cc92ec6181e182c7d124cbdbeb0e2f95e22f37f
SHA256044d256a2bebc5d22c8301d8c1575422a2de1ee297592bc6a8d87ed2f0353649
SHA512402c9b2ce9c98acf4a0c3640f042fb988cb919b965ecaa8897bc58132f851d38087cf5ec3067ee5239d2bd819b32aaab133bda3aca46f537ff6844c61aa800db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550eb1876d244d452f0542bbca378b613
SHA1b0b2adb51bee66951b5a5d4c381a320cf4ba5265
SHA2566cfafc9a55d244d4c6c411542c55f308d13e09c1a01c9b0e6807d2a5444e746f
SHA5126ccb26a267733c07fd57c85aa7990faad8f7712e8dbfd4bb1fe45850a181bd348c12bbfa12fafccf26849c5862c0ed0e571525136e10323ba9b8bd614a6cf330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d36054829265416851b83eb4a8c98a
SHA10e01916a0f15cb98cf70508d24e18ac5348f4a53
SHA256b5f3dcd3e7b7d63d9fa4766ada111dcd130671651a6ce97261096f1f65aabc87
SHA512f8c0525362688e6d97800e75caee527e21408e16bad835b4536cba6fb193ac73bba0af6d9d904a6b910d63eaf3984269e53c68eeb19a10fdb7f008e999180eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3afa79a0f439bdf28409d47f825b3c
SHA118aa5bfc775aa5ee1ebf2bc31d0da33e6485bf99
SHA256ef2062eb79b4740e1d66b6fa5cf22eb13cc5cd03d509d918b1bc0eb3b1f53967
SHA512a0ad4d02894893a78e1102f1359249d4b3714c091264831e778fe7873553670ef7beb9d4f56fbb5302d499d5c64cf95a4449a3603c4708203f006e19c2a19996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5fb8d5a90a3635d4c0b20bbd36ba66
SHA18c9b84f7c7fc5bf12fb602aee1dcce607bc73018
SHA25625cbf5ca34a1e2567ba6c0fa7dfb4320313ca4e10ea753f6cd337a32ca87c021
SHA5122f98ce2cdab66cc9200dfa7d470a80ea31825f16dc2804e87acd3b8917bcea325f724ccb42cbc9e6d0b65d641664914ee83b582dfc87b0efa4ce9a5deb15fa0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ec4bb9975f6254a0e4cfb8230cd27e
SHA13c7b8c572e13d1f515c95fbda56c0e083ad8821f
SHA2569c4885dc0c17e61273a3d1dfcdd81dee02a760240613389252cfd77a5c79dcf4
SHA5120fff633b83c5a16f5233cf8c75b5bc46faf6a0eeb3fb7834fbf2103d38524bb4e2e2ea3fd581fc74381c9d59a38ffb43f77f7107ece9d54e0a370edfd2882d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12163eb5664d8eb72f12ab16b4a53f5
SHA1ea6a1423510a35ef4ea692c46f07b18302eacbcf
SHA256d583456892c6488edaabe41b793ed0cf874f578628e10867c4ebb1bd4c86b6ec
SHA512e7de2441efa8fe36bc248af0df7be680c9a8fcb2ed3007733d63139f087f8f49864ef7f623291606845af7fbfe1f609d12f93a17fc873fb9575b59cb97a8baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3361b6c0d92c41342fbbda59200bf60
SHA14f17b76c98d68b09c4df8239a7d4bc1fb679e8dd
SHA2565e472acd89391989d5573e343e742d165b7cd5c4f40d1cb94fcdb704c00ebc7d
SHA5129f42b75ffe6f846e8c2238ccd433aa6e4fa2207953755a437d1b34e1c54a8162abe9aba406647ffa08b44ae8c94fd920e0b8418e0deda0d63bbcfe85aa98f97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58300e49e1c6ee8c561ec69d691aea3ff
SHA149e2c5451e939bb341e2bff2627edaa053f06619
SHA256786cc4c74960118b68979504d88073af94f81b779d236a4b2f748a8f670690ae
SHA512a17a822abf65b4f343640853e65c21b549af22abe985e1a41130d3e395d25d5664a6c392683c40d397f0cd31f0e9d52cbf23c8f3de7b55dffc685b7b43775dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325f486aaf6be6ca8585e91e538e158d
SHA1d6605539c59e8f4e83331bdefe75815c05eb1b91
SHA2564ad1f68ed405922e537ba091bc8ba0278b85488f3d42246c699ce074ee42866b
SHA51279a2cd60fb56a210a600df3670384f6c67f71cd7923a05b7bd41bd38a2bc86a749e19cb216eefad660b98aa11556f5cb42423c89f504942c556d16eb340e5e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f5e91c4ae901c16f7eec49b02a8520
SHA15e79562b508582951231b5ffc2ef87bdd6258825
SHA2568c335db525fc40e13bf110044ef669a61fda3d1d49269c0175600e4130328df2
SHA512ae5fecd3981e29d2f43bd7477470be87f6011fe0163aad47f01864a82a83ff6dca8019c5917e75f9bdad1622e89878c90bd63f2795225f4022dde6b2fa5b6bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b45b32d6ab1944c709b1e2c5f963436
SHA166b0bbe2a03a6b5feb1e60329975bb7cbc974c67
SHA256543440e80388b9615c8007b2818f12555b042758297972811304b560588aaee4
SHA512932ed80a4b8c06ae54e72f5d0094f681bf19d5e5b8cf44a234ef305cbb02fc95d58af56f5267bbb961212b8caeda77f6dcd4ef3f83e42a214752109a78a2e3f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\jquery[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b