Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
b08c34bb8360a71d103e1ed460fd1401_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b08c34bb8360a71d103e1ed460fd1401_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b08c34bb8360a71d103e1ed460fd1401_JaffaCakes118.html
-
Size
28KB
-
MD5
b08c34bb8360a71d103e1ed460fd1401
-
SHA1
7c3dd2a5d8d8bea2ac05732c4c5c0070ee38b996
-
SHA256
db8e353cc4118b3189d477ee352d5fb2da992d1a948df3517b3f75a2be7caa5f
-
SHA512
8571cb7aa5546cf3609e3788e635859653f57b520598a927316e5d7c8109e60aef435358e1d05c7cbbc997d5f2eff3c2e5e227b52ab76994e9023f811af10fb7
-
SSDEEP
384:Cyi3E2CpfZ36qOuRvzYpYSYSjYbMxYwYSYUY0YZYMI1n:Cyi3E9fZqz+vyduI1n
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000109b60354346924395a85efd345e6d04000000000200000000001066000000010000200000002cb7864c8bc4d136521c9d0300458a2fe7631ad2248a1726ba7d56abd7a8b4b3000000000e8000000002000020000000d43a4b2fcb67608cc9314b858d6e7a9c2e6695632ccd0193cc7e00b17e09f3d420000000880e7a6b758b4b69c8cf23cd544863d37dad80ce51b0dbb54cde35fabe57c22740000000ace6a6d1ece363230095e65d3280e37dbf4f26b36c2a8d01bb7e438ef462341ef6be62440c3bc91a0a3e84080a8e848aaf199993b516988007357d7d22bcee34 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05bd39977bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4FBBA31-2B6A-11EF-9387-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424654172" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2992 3048 iexplore.exe 28 PID 3048 wrote to memory of 2992 3048 iexplore.exe 28 PID 3048 wrote to memory of 2992 3048 iexplore.exe 28 PID 3048 wrote to memory of 2992 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b08c34bb8360a71d103e1ed460fd1401_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ceb6ec22aeff1456dd960a739a58679
SHA1fafe7cbd45ac4429657df0558dcd61894915188e
SHA256bf1cd92b87a2979aa54b5c39ff32cd79aca555d4b9b418a70bf597a8cf583ae5
SHA512ee30eeadb7f40c0a217356a392cfe3e4bd5519b51d3c9d8f9e77e02f7aa1ec03aea49fbcd511417b10cf7e9cc687feb59ff3d6c6db2bac91c4e56bf9128f4384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7c55e2923351441ff9804a5025ac63
SHA18842175531da19d81c65d49da9b9703eb341803f
SHA25695ae709b60683285637e97fb583318a97dc33b0f1c78de11910c8a65e0e93351
SHA5124073f6fd3079e8e62cdd5ebe368f9366b9154c05062617a50f8f0b445f00d8eec2d29cdb4071b6dccf9aa978f58ec27f032388bacffe0c866bbeecb9a637f322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52668ddd341ebbe916c0ff01f3188582e
SHA1f7ab2fdbdf8e28975a501bafe3e12d04be957a39
SHA2569a4b66d1df9358b079667ceb41082990f9238f062c49fd2f5821ef10246d8797
SHA512d7491848c36c472bbbc25c5c794a70fe7a87f078a8ec81b1eb5334fd4374869795032f634c1a194af109d64a8e1ef5546252b3ea6b6f2913707b96ef496a4bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e3baf7b6183b8da00662479b861b00
SHA12d75f548440af3500219bf20ea002397783edc8b
SHA2564f0b3e36fb092ff5507359da325e9e2af606dc234c360d53b27c57050d16d29f
SHA512fdaa2e26ead779d96d400b62a09f3da5385fd5e6b371548d8b1c110004463a75392f93d63cdf1d3d3a9f19e44411cfd5685d871a7a3d3f298334d796e84d2065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54539235af7f15a6d32a39d66babda1ac
SHA129d52852e70a1458c4bfb0bf2cdf34f79d5d19f7
SHA256345541094bb8f25763d1a6e09f57f294fdcd29a3adcecd179703c397ff95039a
SHA51267431ae78692f800c05dacef33a61ef0e80dc2def59c3b1199b47163dfb3c7087e39594783cfcb32ac01d8bdad92548239437c837a6071fa9d08969fe0d547d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f15555e62eae07d187bf709e32292d
SHA1edd4fe0dd59fad4c9eeaa918c081277161d752aa
SHA25616f79941adc5e1f423e6c8239730ef28050aa564f12446eedcdba721f4cb825e
SHA51257ee20dc5cfaf9df1af266d992b924fa38fd9e897eda49c7e390a46459b72e6d8b1feaf474ffc44f93229de4e14c993a87748892820e7689f11eaa5db1d2dc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed97e677768c9d0b76fdae7e93d6ccc
SHA1d46a4f104d6d064c61f1995f00c59e04fc913954
SHA256012df098a5d8a2cf3e7f87d5acb337610727089e0c4cac26b445a48c15cc5dc3
SHA51207482461d6021f4adb33730accc144f421e26f04185f3a193d20ffa86937a16973c8981e77f7e1da0cafc71a4eedacfff01d8d42d80dd0d06a7f90b943f7c85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52612ef52805d5223a8977fbfcddca68e
SHA1ff35db6681dd3adf7f07209769292c84d5f748a5
SHA25623e464894e118b0716a6f9193c2b03d73e067661870d6041531b1f6233904630
SHA512622ebcfec92c3552ff1ec3e20a2dc08a26e21506f380e7f5e20f75f7b6265fb57432252fd9a6e212a9e835a5f6a097ebbfd9f19c77ee54377364d049cab3b5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b619e5330d647243d86f5404629e94a0
SHA13857bc4651be5eeb4eb8d8e02e22e4730d7e0ce5
SHA2563decbb737f4dcbb58ee9d791ca2f62fcb7f0a4879d3e189cabdffb89d4c8d186
SHA5125f812b06f7c876f57585783d9a7eec50940390ed3de16c6ad7857c26be84d62b50c2ae90e992e81c55fbfbd3f9d87e54824415d4a21d1db652a0c3176b507398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bf8b4b36b1bf202abc598e882b7377
SHA1a63b7883b595ddd89f409505f69ee11a507c3520
SHA256e0777b387f21a1b4d79f5e2798f5589b75da4eec25d4bc16af96ea77f07b163f
SHA5125f42e9b47b75b03cd3e41ef93e8489950a8c79000e27d9c71e02c6b15d677822c8cb908fd80d912fdcc3924b9c809b5a1f534b42c0257c9bbab003dd52aed008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309997072b5633fede970b6c7ade36d7
SHA18627949f675691c6675d64093671736f1b7f9af8
SHA256a758bee39ea0f1d9e5c1906e21e1901671f8fb0f29eda9b7c484cb1b72f2ca3d
SHA512e5266ff1ed64b937fc6118b06eeee0c8f535482cb00869d08e529486b49658860c74833edc2759104198ae9b34c644ca1ee5ffc01118e611ff4b971da5dd76aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e6320c1ca699f71982ac7f2882a2eb
SHA12b918d0b19271c8b5d43ccef0e649df2c7858be8
SHA2567e4f94460e06604f1787f96baa2a0ed8e5c976b06744357bbf6d844f796125e5
SHA5126dd76e8d042f4658b30061fb072cd74fdc674f14e57783085a67bbbf85cbb7a01e4f8334b389d5a306c894e9480caa6379fa02dc37d3d312083eb74f75e1734e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad1d143194adb166eb47b666e700439
SHA121424a33ee38d5860ea7af8ca5aea9f3b371e75c
SHA2566156e73d3ad1bcdd7e58510800664cfbd6e264d96fc9b70bc76e390e530fa12b
SHA512690e3452ff1cbca230892ebce353673b1ce25886f7b4e17ccea198b12c07b0c79ddaa2dc139ad947e6f9b380ea90158d192bd5f522a4c66dd2f0a90ccfc920db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53539b3e08a5c21a464156b20b8c9f371
SHA1d502b15096be256e46db0b0e6f3901ae3dbed704
SHA256fe388b6e1875fc172999a24e6bf2ead1f710cfd9c47f63df8ffcbd20c3b9d28a
SHA51244be38f4380cdfcebca983de00d53a53e3b76a7c6d834925fd09c28884c718f6845207501dd89b502d60247f11d0b823f48fcd314068242db3f1ce47bd7a9c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ad3a240a17b91a9644b72052c12141
SHA1f35178d0ac02b21575c9dc8d3dbad6802950dd7f
SHA256cafb4a1447b6bce34e6d2ca2223f8257dcf4ec2cde216db530a0c5c4252c5ab5
SHA5125a268e612feb2465869bd8bcbf499d292b3f26f7d22af6d400540c9a821ce3e9e0b4d4a46e32739193d8c2f8386f329cffaa2ef1b56271b5431a6e1392c45373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abe754460b9a0db80a46b8a72b2e016
SHA1a4219571f4411a22f3bc8807b32914d3d8b3750e
SHA2564475fc38c1650aa2e6a340787d0e99ae08bc2463903152d11fa0ee8e00311738
SHA5129206ae95c262b6bf87043f3053dde4d4fc8f75d847d56e88aa43e8eb23b176d3a8d245bb560e7116134c1734f22a50d5d9274759bd4e4449c50e74d28fea8b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903f2848bc5cac20948764a575866c11
SHA1fba72c245784155f9529d34c03a228e62c302eda
SHA256c1e3e80737b791ef2fb13625d1a54b7cede9662330bf82c916120c310c17843f
SHA512f295631199f5d073b4bd2dcac82f9dbeb94d612274b28cbebbd5e39e78f1b2a958d02a4602b43721169cfe63d505e2d95e5f0705af0c4a29e52b14ef46d0c093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57978a61217c3226dd9e436cf636d0244
SHA124b315060f51adf021d91ac4725b1d622c0ff030
SHA256d6236e66f853eac8e13d8a4f3737ac021279438f2112a291c9b341bfe3eb48db
SHA5128f3bea112386b470fedbbc603455f13b34d310e9e20fb287a7b748316ed2557dd0b433ad1b6d7643394ab970c781a78003412a5d726ab30ef508ffee02650216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aad928e1bd8fa7c5e9a151254e89707
SHA13467f560a5429fa56f652ad68fc85845b3a25a36
SHA25684028d8b0f01e660dc22365b1768c8dccb8d732d093239963c1be7450255dc34
SHA512b19c834125b0a65ed82e11e6d7f6e1ddabc999a042de7a59c60d24e96c54221633aa29f817aeee559aab108271500bef73456a06d2747886017b0f932834f439
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b