Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
99e0a86286f1f8ba537fe38d936998f9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99e0a86286f1f8ba537fe38d936998f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
99e0a86286f1f8ba537fe38d936998f9_JaffaCakes118.html
-
Size
460KB
-
MD5
99e0a86286f1f8ba537fe38d936998f9
-
SHA1
81dc8f5c616dd64b239d7feb37e986dee5bc11c4
-
SHA256
33d0a750e22fd5f61a51f207c48dd0d8faadf9bc7d865d17240eb73c1479443e
-
SHA512
10a4923273bf92cdca9e4859e893d20554a9e5baff8671d254d85ce4c36528361eb6c8b311d07ac14f60d190086e3f36e1cfb8ed52b4c41c77f1a49d75418e27
-
SSDEEP
6144:S6sMYod+X3oI+YVFsMYod+X3oI+Y3sMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X37x5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423806329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f1aecdcde40c5d40b4094c328066fa9300000000020000000000106600000001000020000000283f1471f210080026e670a0e1dd5cbf8022e450ecbeec4c2917d25270b15445000000000e800000000200002000000052779c44ef3fb1addf9aa19d4e18fe2aa5f7f4be69479dfedf3b975ba8861ed7200000007789ae3eeffea8da100b3952aa7707577a1527971b5986a06a43ed2aec11e36240000000334242e127c9bc0fa34e0d781803e5bb1388a1245677c9d6491ac455c92320dde497e18223cbae21951dc8a4c903d639d8fbfda5e19bc2bd0bff28406dfc6147 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6092ba93c1b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB320E41-23B4-11EF-AB07-4AE872E97954} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2292 2004 iexplore.exe 28 PID 2004 wrote to memory of 2292 2004 iexplore.exe 28 PID 2004 wrote to memory of 2292 2004 iexplore.exe 28 PID 2004 wrote to memory of 2292 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99e0a86286f1f8ba537fe38d936998f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576add6708548f6826ea048cbb3af416a
SHA1847ac146e3a28c37a9e61ac401894d5d7beaab46
SHA25648dac8f8877159b4ec0592ef43cd9ff7ea269fde073ba8359156865fecc82d99
SHA5126c3c053f516fe417ded5292047a5b3eaa32faba188a9c933275e6632d9ea500c736af295c73340e859fb61e8eac3cfdd0414c3b75448edf63d200f6ef6d3b611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207f50295260568e7c2a138438d161d8
SHA13f0daf161e90d01d842ee6a17a5fc3346ad7c441
SHA256075d08d8334e2cb8597cec7ebf6885954ad9519d872bbe31e7a76233702f3da5
SHA51217130d152fe886f0c9733d6008f9d32c79e08af1bbf35113f0aa62eb11bdb38335747ee3254ee6a7075471d16852c49697c5db2a14bc42f82e4eeac95d013b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657dbe324dde7bc97002d552e8422cb7
SHA1528e20934fc77645e9a7f589102a25a49539e06b
SHA2561e68fa6dad35390ff4cef9d65c002bd44155a9b2e03394871fd1a81b26910565
SHA512d3a44a08650bfb8bc13351f88362c9dfe2d8f652bdecacc2e836a6a4b4a51d0a4dec34c9f2967b04baeaaafb5744e6fd7f5926d389a773dc0df4944c017b1fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8224138fd2f06b102bd7c78b7a138ea
SHA1ca2caade60edf575e1f2eb9edf5e4f2b729a219f
SHA25629e491fbbbb746eecaf1bc76a43ab185db345ed1a7b804c7e222b82e7448299a
SHA512a4b605685ad22496e1cc5c29ea0109d62ecf773c07bf372f2dbacf926174ba77d8d3a2273b880c4e525b3a9293d94130cf77d18d636e6710134599702c4f443a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f548848a7a1ad674b45db8ddee3e04
SHA19bffe2f9d78900d8d50e96a5c7e671b1f5ef5ef9
SHA25694507f7c40305cce38297cb6fad17756ed22777cd9f7a38c4ccf88abe963602d
SHA51266503401fd2ba58fe77deda749faef915fe5481a774479f34cb777328dcff49dc8735170f1c3913a3ed39f28358a6f3b711fdd8c59dea97e577971beccbdecef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c161282bf33fc9c63b30fcef7631542
SHA1572b7f5a966d73c74bc22f273ff4c37b77899c83
SHA256bea25f17c4c61b1cf0bb1429d8249d3c51cdb8033297bf246e0b3dbe04d279f2
SHA5121e5ca1eae00b6c8f371b1eef668f6eb2e05f3f343f2b8dd8ef7aad766b2c5c4a20666702da9cfc6ce3810477e236a3bf27a0ef1d355095499da26fdae61347ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ca745c4e6e8d86acf58f9aad4eb49f
SHA10f52326477dd8caf5ac6a0cb63708397cc4120b9
SHA256268d06292de6409b8ac7c3b12eaeb259007bc6e685097025cb949344a2771b30
SHA5120318a410f7c55d18785e9b8d86e2171d5e9f53b77e57c29c400d42f19e236e2a3a6b0245d01d401f5c5c1adbb4b9201220f1c5c9a8b6d9660cf9558078db6e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c6c900c63eb671825d58559ac06b57
SHA18d3dd2e47e0d0203dbe97197c71490b4543f2378
SHA256404e4f2971d28db174e13459fcb5fb385a022261727f409c65042a44db497f57
SHA5129dc270d8fde9c3fa47160d03a9704a09f9f4082822c1d80037d110504d26bd95cf9f12cd78cc6737387bbc80807fe22de83e6783bde9e73f0debb4c985a1198a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71963ca770281a9cf4f9a416c81cd93
SHA1a79ece20ca53939601bab313259378435d3bdb26
SHA256b31ee0b1f899aa908019964da1fb1d867851e77e50c88dcda90b13421399bfe2
SHA51296c99f9e3b7909b98a5286e1480caa2a31dd6a3dc7c9dba21e9915f36b4e17abc1d0e28e79e58c94699e126ee53d95ea17c54aca48fe5075babcaff625fb46e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e7cff9b5ff4faf0e0ded0a81f85130
SHA15216935defdf812e32ddedee4f1287b8d1278218
SHA256126fd60580a6610ce0687ed7af25cc8d5fca509c1fdf98c24e02c429762a8b04
SHA512f288938ffdd0c81339768761255ce252daefbf096a094dbae8101bfc0971f2b289af2128d0f152712294b22ad44628eb4dab0ba4a820436f25cb0d696d178344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920875ff6ee4b1ac4e8948bd664f38a4
SHA1989462094697c448d63da0746df34020e83e17fe
SHA256b85113e578571ff6ec473f4e6cd3bd2edde28d29c97f5e1b89c7f4e2af6e9852
SHA5123dc7cbe1565b9f9dcde16257bb2f742af02e2319a828bf186610cbb6ed1236b99f42f701a1c3faa111ae4210ed24301bdc906303cdd387346b27a655c99cfba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08f43449cc9801cc12d0f989bb77b22
SHA139bea8e876022d9cd93600d57e62049e2c919bf4
SHA256e74f63115091ec3f89742f4c7ee2bac63dae4c404fcaef6b6c48615b688cf6d5
SHA51200d5a56c7a85a574fddc3682777ecf1be24f96c49d648962e9d34d531d2e0562771ed21db57b2feecf6b89a3f6b417deaeba6742ce5877aa511f67a60049fcc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a914dcee6f78f80b3f682f711f35a7
SHA1625a280a021779e08b01f8a71c34e966306f2cdc
SHA256da0334918099404819df0915312a7589982f6f2f346e60da923821b89f7f7c16
SHA512eba5207c0d92fbc7286913c38f1223043f911abcb914c52f65cee4f7f611aeed8871ee20db31c60ccd5edccec4131d53fda73f57ec169554558bf7d6a9431e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfb93b2d1b0db033c9c10569529fdcb
SHA14e148da67486deb5ef83dc313ccfce1687ba4af1
SHA256722b978df82ffbf6dfc2b8b31094c5d3081cac69fc6edc778283fb8d6979987e
SHA512151faf67e622dbb357eca0aa47051c5bfd35a973c3223f1e8611d5d9fa4de35d1c34c3acd779c443b0da7a3b2fc013b502d141ccd201cd5693d5d444b29ac2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b1b3450f8ea691d060c5cc6e14ffeb
SHA1db6a4f1a9ff9eb624ece0a8b59e50969191f3efd
SHA256169db3429843e826889470a154d8e3fedc8917c6e971ad3be795ab82c06adc22
SHA5128d0a87958a897a2a7e344bc71ef2dc4119f5d1e2ae11ec58ba8f5e7b3fc5faf17f290bff9cbd2c7746696e8c1edaedcf9ddb178eceebfde7fc6acaeb30df612a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550abae084702985c10ad710c1d18cabc
SHA108476f0c6281dc7b2873265c00458f885500b1f7
SHA256dff1896d26997f831f138396f094fc7cd322b9cd5b464369cc582054477aa1fd
SHA5124b3746e494aae0245949bd5f515b0265909d6da4a127bf3d0a6932046ed28e06d71e85e28aca3e1a960c2490f1ccbba8e9413f9a54c7f7ec8e75622b44a91388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798d353fb5d27319aed01d208d063c13
SHA1d3f856f856cf8be5d1903c91fe2bcd34dbc1a1ac
SHA256d2ed4f3f5e5f3b2262ad780ad329f8f8a3e90060b855d497c223177fb23dfab6
SHA5120b1024ce1f10f20b95a8fe4d4db33a4f31695065b905c035b7ef334ba0dae7cfdaf6ce8cfc7c4c17c1eeac210955b815dbf3233574b04e050265f8b39b485bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fa69022c9d9f78782cb7630c635b82
SHA10ff4e3fd6517f15a8a318a9d97afcef0ea4cd513
SHA256958a02d17077e7871ff9f7b37d505bb58d63ae06d857ef3d8766167c54c1b622
SHA51278cac0a32ebb5af2c29f1ab802abe713746663633250e39c99c0df5703a37b1fa1f1f09facd4e3c2aecd4c650c3f75ff0a07bf5edba0a922380afdfa923b1817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5d58110971b9f7909a84caa33f239b
SHA1311a43ce990f98a08250d8d471ee062220391a55
SHA25607c3a6f3f3266db97ff9253e8a24202c00bc778354c8fba03d2ee518101d35ba
SHA512fc8abc1e76caaf5d2199a1ba2d5e56ad33f5f85e3090324bc29b7e0884002acc8ff5a8020d5514ab40903f9224efd94f13802e3056dd3c5edeade8d9db84fa96
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b