Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
98866d0d4257a86b4d5b68a90b07d0e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98866d0d4257a86b4d5b68a90b07d0e1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98866d0d4257a86b4d5b68a90b07d0e1_JaffaCakes118.html
-
Size
16KB
-
MD5
98866d0d4257a86b4d5b68a90b07d0e1
-
SHA1
5ccf8a726c7bf25f51b0abb3405be0fbe54fb959
-
SHA256
b26c11f63d9d6ba42d7bdfca6bf12854b19bba0c664c19400552c2df34902d01
-
SHA512
57c5dfb4ed737f2202e9c92a042b1f87c8c6d7fb0d7c5cb1ef4c77941440721de6ccb30cc500262dcf71625012cc2148a02f15d5ec70629761e1678672648dfd
-
SSDEEP
384:SFt5cx4whDTsNbOs/EleB65vttEt/QVQ1h:SFt5cxbZA65vnEtUQT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79B9B4B1-2353-11EF-B826-EA483E0BCDAF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407a415160b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423764557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000de8832e4faca574d98e7de2207fde41900000000020000000000106600000001000020000000ecb16d32e83340ab78400461f9030483ce5b423dda539de22111d096fc3051e8000000000e8000000002000020000000adefd87e1446dbbd33d53cd3c0d03cf31da25c4cc629f65ab21a9b00d6e5931320000000e7c7f771d7076eae21d27db1c9612dd86ecf800c8d4612c763a9380adfadd06a40000000142419ff339e3bb935a8de664698f21e12fcca09d83dbd15fc408cbb492a290bf3f4df2bd3ceb31fb76970687dcbc70d39e4b9f23a712fbdd29c12d1c1aa9580 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2132 2872 iexplore.exe 28 PID 2872 wrote to memory of 2132 2872 iexplore.exe 28 PID 2872 wrote to memory of 2132 2872 iexplore.exe 28 PID 2872 wrote to memory of 2132 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98866d0d4257a86b4d5b68a90b07d0e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acf2813836846aac4a71f773df7610f
SHA1d75ea6b2b11807f8e95617adc1fb0b73717d2484
SHA256437b8f712a0b221f4e7c8377932e6a26c2604ee402c20c7b6de1e1f91f0f06ec
SHA512ad38fefad423d073ad41f6a702a8f3998b6fb64ec83c191874701227143ffae68213786d4252ccf9c5227a2376935c33f38129a1149b3dc8d095928dafa7ecfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b39cff64b2a28d71ec66f85899492ec
SHA1f6218593b9d4a8e12527999bf6708a194e461bae
SHA256d472541ca24c71c70c674a719e0f134e2ad9366cf65f4d9181d8c9100a34ed18
SHA5120bb5dd9e2c294c766c2af8b50bf926de7c8e590e0e364c722034164c6e7b0f2116655b7eea9462dda6e11d21743bce83c9cda553d444b98fdbc74ed1f823e776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a8df29f26326ec00830f4da2310e52
SHA1f358e497895a5b8275eb205f6ec3717c16281bcc
SHA2562ee00fddbcc09c3af337f5684c9d4ef127683c2bd321ff94c4d60c42bc64ed37
SHA512878a9fef0b279995a74b1c5fc15963bb5acabaa19d1c9eb2d14c79520ff2b30c7c7917a4e30357a426c8e6549d586d4ea41172a60eb461c8cb7d28b6138bca0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b9324a9a77515111c8e20852d37938
SHA1526d6df208f51c909344ba8d623fd001ff61f75c
SHA256df010bebba3425371959c2bf61836319691188981d840611c9ce627b4d5f19f8
SHA5124cb1911256cdcef719121e1f8f0a5d0ec665699d4ff9541b9224114f7de11428a34333deb5bd087fb1cbad176dee03750b24233d1e207b6877a4e874d1806890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd478d25d1d9399ecc11b5bf22c2283
SHA1250ab8dab4dc1f3ca7859c03342f57fb30b4083b
SHA25676ec216e65e60302ab158f4d2febd4581f57d34fddd51a72cc25f0e99bdab74d
SHA5121264bc25543d224ba3cda9f45b28796dc1a199741fbea68d9c72c50811bd15c8dae32a5b97485b2010424dc4f5b3f0e31e043979a6e2b43097d4337a0b8faf26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c8dc5974898d99be94cf9ad4698c1e
SHA16e7c7798784d86b28a88271f3871efa47588259f
SHA256a5d6486fa2bd043e5a3be39a59a3c5384952940f187115bf4bb9f0e95891578c
SHA512af49b0445f223af571126fce2a561c8189ad55bd376442ec9131fb827b974f22f525c2d214959058b2c1eb138024d07c1bb6de490ae0a761d322e2cb1bfc7559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e897cda1f88e179c61bb8cf1c86a58
SHA1f30c3d583120f21258a7973ca22400a790434245
SHA256f1786033ce5c00aeb06d4a215428144b68bb36bf9e466596f17ba8eeb3444abb
SHA5124a591f203823da9886f896c7bd01cf3d7d04acf6a299b80d7a41afeb387eee8a985d104962dadb844e86ea44811d7c7aba476009742b40ad76ff6914bfd79a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d984ee74473f7bed73c2d51ac257bb
SHA1656d2787d2e69dd14292cb67c6125355e12d1450
SHA25650fd519f35769519ce1337fc8b2ce230e0f55c2ce6dea8b3510b7940c84b9f09
SHA512cbe1ebf87a7a3c92bb0912564b8307b3e37018126abe69c5a8a4ee6c0e820565f58d540fb7d716eade386f95a359cee85de481a8f37d7ff37b9b331d9d00f802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a226b8ac525fd06be9050f081950a860
SHA126ad81ba88582471f8ccf9247fe59062ac9af1b3
SHA256ff82219379c2d4ec068ead350f4011675b26e6d6f7a55f8c800e32ffa7be9094
SHA512517572d0faa6526d296562657a4095dddf8ba137558a12937155f6a7f75f6ffb061766c7d1e03f9c914461a55db82a47f0367759794981fdfe431df06df5e7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521468f21785d2e1772b7fea2fc06a4cc
SHA19ce8517b517ab64ee70610ad337e9b41464253ab
SHA2567b5aa6d50b62b9ed878b5daa8cf76d4a5ac6a98941e7b1074c13e5cf87fc0acf
SHA512f3b9ab19e44c06b0683007a9e9f1998c9c15c0cb2c3b161ca1cd3819da283da815ca7af9722821d05596f11291dcb463dad09f8516424e18df5424102d71b658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536175ead00c8dca031b9732a581a2017
SHA1dd272780e45152b93f345ed7e41e604ba28fbaaf
SHA256ee8f9d65a53ab3ee4acb6242420d37f14e35af5445d23fdd2ff3468bf4ed50dd
SHA512318b7f63d9b64cacd5b6b52ac88d812252acba4b143531f5aff402fca08584f131cf60097cb7decd09f11e92356b330ad1ea0a956369eaa46819b3bb9f39e3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807702ff0bef8cd5bd0ad96bb697575c
SHA1f7953e30c6239c34af3d7c7bdbf28b395a8729f4
SHA256a476f715d8e3d9c598d118d31a5a5272b4a504c25be9cdda1e280d60155f247b
SHA512916411338eeaf0711d7758264f89a65ce515372de5c59776de94ebeed30c7d5b4cfd1fe35c091a0611e1a8d6a0be4e4b219f2035edfad0b0574a1dae952567c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35eb1545ddf3f9a3147ffcde14a3721
SHA1fa323a004a0131d89c1cc5bb9f64ace53df5c9aa
SHA25661e1e28fb532282eb8d3dec570c69da9c6c4f5adc0c1efb6c7cbd6049b6bf8bf
SHA5124c99af66c906be7cf80d0b39d8abc8a729614ec957f27441a26d7d0d7b367b6aa1b221c42db6947913599a55c2ac5d54f4c205ce4ed50c7fc78a56d3eaf91d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12c52516a910012fcf2496b3b10a305
SHA1931b490c02158d696018dcf9df6b1188f8c466f2
SHA256042ee64628313609027121a92e8014e666716881daa3564cf98dff16d1fd0200
SHA512632e83af5c3438990f8fd9d937de3acd346673cdb8100bae49e8dd152395815bfe184f438ad87a9f139b0bb13bb185af9bff650cd0b25eee40f16c2a36a0ea68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775326f06a1e5de57dbf89582825d83e
SHA1de3c95a93ec6bee0b7becd44ce70a9887296903e
SHA256589fe295bfe59755fcc6495fb713aa9b1a046d7c2b9b71a538167b1aec7e5521
SHA512def53d63c14c46334ff8b77df3502b8f01327ca33bb98caba35f890545afc288bd812b4271f59af92416fc23698b99a5676bf7178fbdd3235e72ae88d2726bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a412674e44965876b6c488f1f77fd399
SHA14e793db16dabd06be503d3f1b2679ec91fa29121
SHA256ab9b72dedadcc38c9a5b26cc21a3539f538790409a7e8ccd63fba295dccddd55
SHA512abde57a75746bd4933930679b6a3100ede55b6a870463c8d43dd85d36c59278a966eca5c32d1fc1b7135d9c09f1828b0a1ded9036589f8b5e854fe55be38bb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884330141571f08fa6ed13d345fd3125
SHA17104ce0a7b1a645be964cab12ab2dc8085129bad
SHA256b78ee19863b81298db7b17fa99c6b8e4c5b52f92d12c0045ffb41b1f67c240e8
SHA5127ee851acea4dd6f9e3a711d791adb3f9c4ddf43957542dd1588f162058bbd87b261c6cec9658f9db9f0bd0c11833545e7d086ce8a4a7e517bead26acf2d20532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69fdb8f7de04bd94d32e900b2c58561
SHA1681e6a8ce1937182eaef7e61c1cf7c81ca2e7c9e
SHA256e7a03b9c6b4eeab38e153ce4e3b4bb65fef5dcd0a1e29ba2fa758ee9f540f196
SHA512146aed73abc6986d19ac6e0857a1b3914fb96e3eba4103f78aed355b314edba366a602dadc79e293d124f323768b7c22836c1b1596cefab2b28574550fe181bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554414e0534ad72c30c8f1007de20d06c
SHA117113fb7b34c74e2b6cf28879bd4ef2209b062e7
SHA25662a849c37a871f3f5734bbd33c7766067d8d2b88e9b8fae4aa70d5dd50a13034
SHA5120bdb505570f462af7d4fcdb6bfd5da4bc04f37e0a6bb9ae9e589f3630b189085b64175f01464b2f8427e838158a959e0adbbf981eea43afa09b5285efaa1d5ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b