Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
ad389f2e64ed089d7980911d87264f48_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad389f2e64ed089d7980911d87264f48_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ad389f2e64ed089d7980911d87264f48_JaffaCakes118.html
-
Size
26KB
-
MD5
ad389f2e64ed089d7980911d87264f48
-
SHA1
36f52edf45267c0395b630c4113a82a1b5f8fb63
-
SHA256
a0b66604196f32707378fddcd4017a4139e8ba69a1e259adeebcb2dec5f6a9c5
-
SHA512
26f488b64782baa8a8b7ae1b2dd5ba38eaf44ccec526e35aab2bd32fdc9e31776401dbb769ad0d75c798e6ba252caef9362b047f30a27d53f1dbabfd06f066b1
-
SSDEEP
384:1DiOTXbehrFhyAXr47aCkdMZ97ZVWyWRhwRlLVCOag4SrW9Elt:PPKDDXr47VoPyWtOag4SrEElt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424596140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000003b8a55dfe97524495a9d9b5f4fdd5c90000000002000000000010660000000100002000000065e507a67ca6e9fea6d63605a23c50fe9054cb3e199c379b6f028bae9370abcb000000000e8000000002000020000000883ff961962be5d552156a9d2ae2be1367031c233de97841476bb55caeb4a0f2200000007c3479a217c830bdab239da8b29a2f02f8d14d15eb113bb78998476b636b08ae400000007cdb8a073b5b7bc17c81678594bc70218d7289822e7dbee59a61a594ffae5d62e9e2c6e1054a97296fb93afe23946f298e9114b0675e05f97d27fc05e8b4f048 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A73CB8A1-2AE3-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708aee7bf0beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28 PID 2044 wrote to memory of 1216 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad389f2e64ed089d7980911d87264f48_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c739b03717c59d083cb832d4c566a017
SHA19bcd2eae77f048d9e3fd4176aac99588cc3a7aab
SHA2561dc7716c8c7e79504b4b0c7044e6ea6085692fba1ce46e747d913a3c6d069b03
SHA512f0ef03aa81fa90e018d81c7f37905b917d011ba81f36a4004335b9a5e81d667128c392c069953e6cd0d78b41c1a63b91eb369b12e29c582ce565f4a66bf7ab86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80a0f7f63d8faa46cb37620576230e1
SHA1a21b35a6c148a91056a9b5fbf6aa3c716a5e2f32
SHA256cc395d12b457cbffb59805ec479248f62daa9b626004be29ea6b9bb53cf5dbd2
SHA51214d0b4232f2c6fac6a55e99f0deab67169fcaa215946a36ee68968d1c80164fa7a4d27bf6839beda701f75068ee013ef356b712a9704fdb173df9905ac24413c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02dae8c3f97dde89f0dd2c27c04e723
SHA10d3395537d4d3e2d3aac45063fe141844e76ec4b
SHA25638ec44b7383a8365c823050a6e46e14799bcd6542032a6eaf4312d35a077d5db
SHA5124482bbe7a6758a662ae2201a1d220c3893bc771f6051f313072e23fa33cdae8210d14f2bd05e1c68a8396ee198d534514ec1e83f0e03ace60ab2ca1cc885b4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb1f8513c80b9623f42393500ed231b
SHA1f8e1d72cd7e82a1c5ae502f870eadfc8b5c97729
SHA256b963bfde0f75738d2debf95727246eff8edcaf1731b52eb7aafabb5927549f87
SHA5129f711bb84c619a6696098ec201276c37de16012e5264d97433b761c3e39dcf05ea90ace6002f5d76cf36a95aa6b2b467dc04bf2b162e3a86f4570c2a50e26817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ed57a8b3cb2d9c6170ce2af2ce67b3
SHA191c60b791a6bb673417e105a4f5ae9c347960742
SHA256e328ee974dc859b82e2c6d170a96d2338201ec1c8d1fb0bcfa749bac5736a502
SHA512f27312539813adfa3b6d1536552c423b1539f18d7b2c5497c0928ceeadb51ccd70cd8d38eafd9b8c7527d61bfdfff1f367b378dcda9055999ffb28967f935557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9aeae54df35e579852082c295404f2
SHA1bc4df4804ae227820db784a6d5e36602e140b3a3
SHA256459fe5a904feb7a3e727090f0a1f3510feb462f19968f61997ac239b3a4e0089
SHA51246b544b92ec4327271093f762f58f428e903b24d482a0160e58216f5fb07676663d85f7f449c5c5f4f56c78ac908ccab99f44dd1ab93beea3846e1ef9318f075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250163a7ac3478a33d08841aa9f9fb71
SHA13413736719c0bdc9a78643a50a8572d4427f5243
SHA256739d24978a748c128a671fc5bc53d633daa096affeea36556b5cd3adeaf580f4
SHA512f43e99e2f34882024f88444e2f273037efcef683a9eb8b61bef06abe5d1beea0ce5fa2772e02954be96f770e4949a072c6aee62623f2d0b73911d2d48997dd9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560011fcd76ce418e0e7a0bed8fcc48a8
SHA1f16aa2e7ea11544f809878ea5049892c763bd754
SHA25671d2b3ef8754dbcbdda2e6be2b7003db0d88228c5c63646e830fa07c75ebca7f
SHA512985b5de0f877995623a97dbd61636d46e6ca61ab3af8474efd51ff6f28170cd7c9a4d9d25e9e697c4dd68a10912e096bb1f3971be1be3df08d4ee8e2e61cd144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aec9c809dba3d1164f23c72032c3cdf
SHA1e871a599e76c84587e56365aea25a52cbdce9f39
SHA2567adf10effa286531ab8fd4b3270ba06838fc5907aa119d8166dda502d8301680
SHA512f635bba459ce94ff42a8c293f7768b6b2319b81d71a0e99e4f4762df114d1cb8c0a08f754e5b19afbb6ab793f2f77cb29870edebcf431283f35d545f3db4a80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50340464e002b41d002267877d119e7f5
SHA11b0eeea958d4d2962884b1801425611e2c7ba1d3
SHA256bfdd99d6180e094a76328ac91d1d7d7de9e8e62cfc00d7ce986c8a8e21e67e8c
SHA51271037ce25144c56ef16df017e0504bbceb1944b71a7733bbdf20d5c36695d4ae283435fb18e8730911150ae58af6db6a764ecd8b2e032f4a1741f153a57e983b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37ca79d87a5ce7d757c8d2d7231df44
SHA1a9089bca4bd0eda74c6b519b6cf027140b56dad0
SHA2560297cd900c9a177c672390411289b509324692d11bfec625800b50f9f1e807e5
SHA512672f53b37b47ebcb47095727dd3827a8c5cce65b81331d48938898424fd7e1ed304500d87f3a48083eb6dba4df3ffc074eb8cba143895d83615a4663ebc1fb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835fab315c2dbdef69c022147bbfd303
SHA10073b455848a8bde03191d2fb68d642d3141e7bb
SHA256430f75cdc352957657006118b403de067ed5a5d59327753415312c832906962e
SHA512abaa308e2c8366870531873a60c1b3b11035444a3a2fd9fe44a73cb2d8f3f26fc571efc2bfa15be9f8c585e25eb8d32aec79fa6b49580e326c9ac0df945d8575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536822067a76b952b8c90d60e126fe3cc
SHA183481956a58722887546c1ec73f8805d7b2b17b7
SHA25601427fc2da97dc9b362656c2192f9e91d743eebf676c966cf1e855b99fe4d66e
SHA5121769e24ff8ed7039650391cd761ba3c0865cbb798b947c41a937948760ab8eb20c47fcbe26b0d5f90fd130462fdaebf437e5cd471996e86c848e83e79d5cf2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7d8c6a347717fd9ff6a620faf13002
SHA11103af67cd5414604995d85a2e03ec783a048140
SHA256a3bdbc17d7477bd14e4008706d103c00f3cf8b9f0e5e2ee0514872c67dfd3ec1
SHA512d4a7108ccde60af2146e07b2d18244f871e9713c303fed3b6b2c2bb390df807a75441c6b4708308d1c3cfcf47c419abbe39974288ee07c73dba46d246f149435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e018ac2752bc5b22630388a811db99ac
SHA1440137e12c777d79eb50a1d3afb669330dd7dcee
SHA256626b0af63cc3d30562fc07ef429e1701e8ce3bc6b3a026c26edf57dd848b236a
SHA51215795dcfbc7a5236c79b15f532d55efaae50e6aafb095fba318d382e229ecd56c5f554a97b61c19977509a30423cfefc377d5a045ff777a4aa21ca6230c5afbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986f6afe5c55129919a89cd1eab845b1
SHA19d769bc2c7b7a02226ebba0c9979c7b6d9b183e3
SHA256dfe397a943b9104f8bc175d3947a95ae57f60ff2d4fdac531b01bee60b86f4ae
SHA512369f864ee2bd0716dd29a49c0c4b8cacb6cb76c77b41e6e275f53ea44c56a18b39e091e00267cf470c7eed4244e1ecf5340eddffaa34d868b83cdf0de4cb3de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e58662e40657caeb6520be5d1bae3c0
SHA187dd8eacefe84a6a0b96feec369b88046542de3f
SHA2568340b30da0f218baec61d91ed526b74a80dded53de8c2bdfb412f1e6ca9d30b9
SHA5122454d93b39d285f71b6526d8acb806663ea5fcca692997861d644a1420eeaa49d127b10fc40504745b3cbadb760f7d4b3f1eaac7dba28325ed6ff48032d7079b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61fb0b1a977652f3cf49e86a166884b
SHA1f801de5b0ae3a10cf137e02d67668986501c2651
SHA2566e99fcf503a8ba127ef8340c496741a9924ad798d47886fb078f9a5a14f18268
SHA5128d7f67da72268f526fa82c9cb452e958c24dc58c6458b582175ba3555d0da01e18c15e7103a44244f5a7c9c31f47ca27b9ccca1a8a48935c90a8ed1196eef44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326888ecb06d4299a604f8a6abecf05d
SHA1255d61217edbb85a8291a15053b8f4abc0906fc6
SHA256805e4922e211d459d0328863474d979701c10358c2b52beb854c2590fcfdf5da
SHA512d4b82591e2563f83206226e4891d2bec9a65acd9988468155ab0e3056b0b68c24ccb0d567b88f94cdb42082815c4e8e9d14f1435e94a2d604a534862061402eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b