Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
afbd1a0e18cc5d4b56985c0bbbe32297_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
afbd1a0e18cc5d4b56985c0bbbe32297_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
afbd1a0e18cc5d4b56985c0bbbe32297_JaffaCakes118.html
-
Size
26KB
-
MD5
afbd1a0e18cc5d4b56985c0bbbe32297
-
SHA1
b481b039b9ac6a3cd54c748880c7f49151536911
-
SHA256
1fa41675dbc48ed6fde0c65cf482d5290bdcdec6696dc2e5dc4619d5f68ca5ad
-
SHA512
3793a83f841b0b0914dd256e16601716e80133951179b54ec6e97e437631c4924c2cc74a5e2730d5c0bb1d5becc038efe0c3310e55f816c0be94ef7b04bbb51f
-
SSDEEP
384:sjR8AlpG9iTGGNR3UcNQEkB8+tIM3f1cDdZXZp4npB8MN:sjx/ThN2caB8+tDG4gY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000805bce37d42f3042b185276d83802ee50000000002000000000010660000000100002000000059ea0312a35a60a79f8e149f2b8be4a57d04f614f52376709a10a1486b7a7085000000000e80000000020000200000009913e23ac410acea00828580207ab856c9b89a36903ebd16cae80e62a4061e5420000000f285711e23172e3dc097fd12b5341e6fd0fbe2592f47b88d22b1b43e52189f0740000000914d8f83a7b805545ef62bf6d34593c56d003e0f68a3a53184f9a871dd704e4c32b984a35bc3ffa6bc130cded3327f1bb505868f04da6666203d1ce12475bd1b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424637235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6029ec2a50bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55C91761-2B43-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2256 2912 iexplore.exe 28 PID 2912 wrote to memory of 2256 2912 iexplore.exe 28 PID 2912 wrote to memory of 2256 2912 iexplore.exe 28 PID 2912 wrote to memory of 2256 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afbd1a0e18cc5d4b56985c0bbbe32297_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a8fb251862b4b57b1c27aa91c10864
SHA18acd321c5634ddcf10750f8a80955ee51e7548c4
SHA256ff5ab765642cf40a9536845efd8f8f96a8849f3daf807fc87f0fe2aacd2c3cc4
SHA512491301d86ef76858d681022ecc54fc4d892768eb7a8644b20b02c57a22571a8fce8cacd7a5e36e59f5dcb8eb5d4573fc08a1903496221d8bc04658cbe156fec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827ac5c88e8bdba2c0bd594f636e0983
SHA185a603356ca2e6d17aaab8a34eb6ead87cad4288
SHA2569fdf48510b2961c5c98ed94543313d4982553690f2e8c778fedebc69112f4a6b
SHA5129bc2b45fb4debb84936b0a4202a41f1104a8797e3811254e4c5740632832115514623b64866516feca0a62b6a60431c13dfdf6cb4ba1b328d53ccfc169f49e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b9023b9898f396e23146f7bb9ef215
SHA1e4a77a1ec2a2f8fe8614ac62d6696d1d435ceda2
SHA256c65ded6eead2ff1b89b66fd1c5c59acbe7faacd21d1236ccbcd7c63ed558e025
SHA51273c3da4a367b2864c3042271656c9d135e8f373b78f8ac9c4d5d5bcef659574593af346e7dccb6abdc6b62565f85811a65249f9bdc9814c433a8bb49b6868566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192f6c7a14519c4c6ed147efc0193ad3
SHA11a607cbfbeb2e2df3d92ab9269e1bf1a3a3fdf1c
SHA2561ccbc6375a71886ff4d9a62d811ff7cbc7a3b4fa7909a797f0f5e803214475f8
SHA51284b72f2be01cee4892b762faf56fbae1194c853de226d64a075d70261658c7a3f06d2f1daa3a8767b99faa6469a31a468028e1dfd5da23c86c3f48d67cf6d4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9004cd4ad45b9000627af516718c4ec
SHA15f4a3467599682d4ce0bbca11ad9242182388b81
SHA256dbcb4c96bc58dfcc7ed60f6bdb0b108801bf1ba4968d7aafbad2022b11413aed
SHA512d77d2bd2c593fa81529535c8b6f290b15acba2d454830b7f44a288c6529af53fcc5bcc7acc9d6d94ed01744899dd3d600974d6f92e6564061ea6c41097d04e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed58bde0f56aebffe58b28af0e266a6
SHA11ece7e6734e335633e3a716b3b6edee2cd9c49e2
SHA25635c2896510472e1e8714fb16cbf2703fd3a4b3741910bbe14e5dda146687bec3
SHA51222752f9a43c7a864b58a2fb47433409768ebc223bc48fc202fb8e59cea7ef60a7b1f3af44db0732dda2b11fcc43addf7decae397c6af7242aa6e707ef210849a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519351565a5272c88d0f02abb61b6faf2
SHA182acbc5a4601616847734bc55f3b4da384ced932
SHA2561e86b500999d82fd9363cc8b57b05c0e5418a434a78b158d4149acb595ef0bfa
SHA512a0fe97439e1028b50bf83307d2de1fdd73f74180bc3cb454d650ab5c022ecaaf8a3823de5586a7bb0749aa5fe2d76c37f41abefdc58ef62d78ea8cd992a4869e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56205362b460bc6cfc944772ea0db76f4
SHA1a705a4d11083c2c204ecb42d3ec8d7974916dce1
SHA256c2ed14fd16eb2b423384a405850ed1e77420b11f8cb2cc5bd0372a09b4fa85be
SHA512129a08ebf52e37c2a0204d922c1336ad280d245c06acbeb6f7f755e85aa010b7d462b0a62a95a659cc28ede00201553574ea6e31e242f7935a62222f6b02f71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704f47e998f6c34ca714b1df4c2b2e86
SHA17552ae76fa12e2bacf0485f945d11ad90ae308da
SHA256c19a83f1e84316b6295248a24a20776f54f96706544b3064211cff4eaba7cf05
SHA512b423a16f5379367abb7a2a29559d8097f04f3831bb2ab75c00f4aca0b5fcb3ef02448176205869c792f6d3041e9ed104e272611e3d31164f8063ed239db3c46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cffdad1de53e0f468f45bee13d680e74
SHA1cce6c3bd57cb024dcf6e929e46ee48711a364127
SHA25699f667926097463b9b2acfd16ec3baa28f5628457fac377e40ae09d1a0e83299
SHA512db5ede53ba63dc0db3e2df50c9a663fdb68bf7f9f64b181fdc2393cc7f51bbc63ec3305d99884fcce03f1636ef2bd3251f38ae1c68a961bef4426c7ac63abbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242c188c1d737ce1ae0f23ea3667937e
SHA1da44136f5248690c2a5cf10c494371b3e470d9c6
SHA256c6608b84fb25826ca7e0ab70711ab5ed217360030f25ae7ec2f682828a43445e
SHA51256892bdb775feef52d2fcaa8906bbc3cc8ef790eebfa89399834e17cefbf858cf16263c2c5d4b0b81de9c5b20dc8d1512e2308bc9ca77564bc1278d199c1bb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53152caf9537dface0c6792a0f13b8221
SHA13afe3c0939ae63766b8db95ca4e8d41602046ed5
SHA25694732929055b95b0c5d5dc1e6cbbaf2fbd1d62ca4d910dc6cfd92e384cbf62ae
SHA512ceeb245a76d1549d7f2450849653281687ee1dbc41cd28d886df3f80297c51385ad333dc1a6dd8580011e80dcbe2a1d1b49692a1148bfe025e3f26e2600915aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0063b7f2ada85a3f9bae64fa3b4bf1
SHA1b99c6ea288a6ce01275d4a89515fd4e36343714e
SHA256ae877d4881e2fc822bb96c4b533253f29c3d957637644ffef218137ad7025958
SHA512084f135e29ce7a9c1e1268f8aabcd645a97de9eaf13de73909a736f5099be138ab1780b3de5454306b00a5e2cf9267e15c4d37d7e451a12d1beb3d8d9c3ab970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450afaa31c83ce5687737142fcaa257f
SHA1be4e98fe9a830a89db02c74424a3a91350b7efca
SHA256cf01f6aa0af92213e82150d819ff1d9dacb57f33b3c9be6ac7069367f44757c3
SHA512c5c51febacdd7f67ce619d64fb60eaeeb2b22dbb2ba20284b0aeae4d3c6bab276874e68e744ab373a81038f0f103ec683269aac066fa87518d879f042d2360f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c8afef7fdc5fa217d1f4b7ac6d35d8
SHA179f8c9330ddc9feb8a45ddc2cc0dba487b1da8f3
SHA256514fa9df6ab4debdbb26d1fa3197070d505df2610e4cd4be858a8d9ec81c0a11
SHA51233734b7ab8947cc45053dc13b7a73c73cfe3cef2bdd4c4019a8e3577b10cfd719bb1b8d70fbbeccafbe358034b0bb182a5143b2ab65304974e7f79d9898795ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793956c273685fadd1e1323470a78c03
SHA162bc558fcc1382030890874dc6739ea101b68e59
SHA2569e5794fc568cb7d1f80d854c68b80be9c5e94eb791b26884d972b74a48e76cde
SHA5126d6fc773373a128720dcf140449be762bda45907c4faa572eef66faba217fe6d02d14df29a66dd6b1731f374068c38c4602e6f4ec9fe897a4a482c913e0344ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3ed029579c1394970728cfc4e32268
SHA1dba4c48e3dd6696eb4a0d0d5ac0cf9affedded8d
SHA256b0c4abc9c629cf05f68286a5235f932ee7167dd4521984dbfa838bb586f05336
SHA51222a1091faf2c7cebedb4a5f23bdaae4ec41c9f703277146b70f43ead0287c3a0d35e831383fba6b95bcb23dfa178f069c30a0cb0dc9f89d289bf751ac07a5c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59873a3aca5edc0bb5478cb686f176e0d
SHA16b1620e3b85026fa093b31769eb701b25fccbc4d
SHA256dea9d487e6077079226be33902c7f26d66568fe51a67d59b818401337b3ea360
SHA512f5d7253c0f8c24fa5fbb5caf975ca9b1717c70b316862b3791ed5fc11761c59caca9142f68a5dd12eaf7a3dc0b72680b5436bb4942c3ddf06c8e015e5d03d2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6c6c4d18a35ee5e3636143ded23a35
SHA1b34ef4bc6d343be33021b08835b0054a311b4ebe
SHA256673492c59e573a729fbc79733fec9bdef6cdf02a44502f2beeb1bfa6d8d79160
SHA512276a2867ac83c2aa4a35909f97f7de087941ac43d8b2d0079369d5b6f7602bd587a5f635e009a1f35e2d8e0a9ec9f1d4265df357ca2630c7b316612b0be7154c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b