Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
afeb82d0e3ee334e6f77fc4e7fdbbf8a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afeb82d0e3ee334e6f77fc4e7fdbbf8a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
afeb82d0e3ee334e6f77fc4e7fdbbf8a_JaffaCakes118.html
-
Size
14KB
-
MD5
afeb82d0e3ee334e6f77fc4e7fdbbf8a
-
SHA1
676091a5c46a64457033a1938490183b08d2ff6d
-
SHA256
d7a92446607a64dbfa68259ab5119f51b5b3d61322cf747a908360d443519be1
-
SHA512
b2823582b8086ec2baabd6e5fe353026a9a508124f2a20f17e6fbfa5122506cd4e4dd090e6b700fdc839d132c1c5015e0a391d513f9b35adfc7c378b4b763273
-
SSDEEP
384:CyiIAot/ihH9QFAi79y1wpMq2xaDI1u5Mze:CyiIZi19QFAi79I2Mt/1uKK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{836252C1-2B4A-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10220a5857bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424640321" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082cfc7b99f45ab4dbf96d851be76080800000000020000000000106600000001000020000000af9e9b5bd01fabe469c04b6f9be462521742edd8099d1bdd05ae215274a03359000000000e8000000002000020000000836c7f0f40b70aca08632b1ccc0cb77b88a4d063e11506dcbd1b31bca96083c3200000008743a7e4762f7a5c7e7aa184268586529f19729f2ed4c4b4937ede7be2841e4f40000000b157501be05f102d2a491d43f04854e880a044faac7a6ef7491e185b0dfbd18b3612d6a8d5a8a28c232818ab5a590db8320b331723afcf1dd236ef9a95de3f5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28 PID 2176 wrote to memory of 2128 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afeb82d0e3ee334e6f77fc4e7fdbbf8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91c0e0fd9e769ae3afa77b7a7c90964
SHA11846d922798b67cd74bc4e95379a9a02d804dd88
SHA256754043d4d6d416a1c2b26345ec8fed37d62594ba212890581aafca8c0dc9c857
SHA5126275b67a2a3fb099dd87ffc3fcc5268a592037e497ac596960765abaac2010f5877d58693a6ec174d036fc33f05fdb95a0e9739e192191f2f8e96b59c3c8177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81101d6621f9d7b56169d8438c575c8
SHA136d2cfc941efc8a46057edf8a23f758bccf8aadd
SHA25602105dae4b06b25a0beab4fe5e556546ed719653c91d448dc84a10693de056ff
SHA512ad5be372df9b233a45b7820bd55ac6c3e2522ad08f1db60de5aecc2135cacf3710b20bc986a925765aeb9000f8dae669030c53d6f832cb236da5c0bc75c04a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900764a912da4cbd7947930af17a15bf
SHA17d19d918fc877375d2373fce63f7026b86ace867
SHA2568c376cce35fc0888e1df93f030744535d93e9c6a744becb5831776015291442a
SHA5121662efee4c016b8660f209a029261a63dc1a2f090c8dd44fa02cfcd1d142cdd4ade83356bd8361a526254099dc2ce95512341b0d8270cbf6a342410832923c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542eb9a07e69cac38c8d67fed175fb0a9
SHA1a6953cf7bc78d1414366329db1ca4660f195f567
SHA2562e8bed2738b3ec3386184533e45de14503f6fbc06537a839d49e853bc02481a1
SHA5123acfeacc1464e2facab6aac7c9467144deadd9732f55e8cbf95340ccb796c86cd77f9271a99005ac051a13da55753f3762ea9a973f7526947b9d4ce0bb90798f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577224d866aa7e117c64c9f988e8b654f
SHA15163493154da486b3eb7775b0283544fab15061f
SHA25620d3d4771d8b6f2772a6c77aafbb362c6e1c5f7bbe92377d10ce2e4f64991837
SHA512138bfdda67a3cf56b17dc2dc5f0e3ff88b3d725cf65b4009733c5085ccebe54ca77cd4bd2c35ff36b4e518dcc545dc6b0361b5ce6b9d254f922a93cc5239bb0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cd6100349da9ad2d09c19a6b601a4c
SHA192840c4aa5564bf848fe3cffe32908b5295623d2
SHA2564e8fd866b78022ed1a9b50bd673f69babf5a6ddefbfc8b95563e7e09af48fa78
SHA51276ad02214019bc4435f9806275ef303e0ce82421688a14377e6fbdddcf9b5a3ed365826c5e10e55ca8bf7f0574b145fb21cb794b453de0c8399ebf628197f0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657b18ea6bed254e8afc01c3986797ee
SHA107ee7d1ff5b5652c787bd690fbcd1024aacdb8d8
SHA2569fbe5fe988c273dcd187ad2b1101cbb6aa40d7a1d0cbefc9677dfd90e79709f9
SHA512a460a06afc6daa2b1a85ca932c060b53aa9bd884c21f2d94a23eb0e960854fd43c483b55a904f5ffac4e37c2f51bf474b3a970f7f827c113e5129e5e2d94af71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27d50d101004234476da99d53d35985
SHA1c2ca5948d0ba599b424d6cbb76bafe12a8276259
SHA256e1e29905998a56a1741bb68aa64b0910fbf8be8f3293c6a904e482c300df7018
SHA51272d7f7370535903a4d4777f0e2d7c0c24ddb2e8029c6a4236134738becc94a62e3eace8cdf826914fcf72e99378b139203f3b1da5b6391e661f359388cf945b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a8d67bcaaaa82d728093d31dca4948
SHA1b15541b5c56318e39197eec85ce164114a01d84d
SHA256c73aa5380f41bcd441572f8fae3f4f28b102c11bab6718f87939fd164fcd3f57
SHA512a894c9390311d13c105f68ec934db22fb0742482506533025a276b46555ad472f5594cda6a53aa786360d682151866172527abfa3dc19ccf47029c6825e74c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574476ffc51aaadd8316703aefb96a1b2
SHA1e0509071b7c13c918fb73755e36a847a179ff1da
SHA256d707523933b9974fd8529f809cc1f497411af32b3c3b700b843c989bbe361152
SHA5126912669e2bb91ee33c3826d3121bfa360b4761deb87b800f00ef96fd5cacb1615334bef985697fca3a372d542bae1560b2d4e1fc95d9473bc22c9125d6f919fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bde81c294fa84f58589d51263a5ba10
SHA1b92b99ab440a21b64f4ad276f074605f94770d4a
SHA256eb5c60835b504cff597d55af46b5813a5f9cde72eb68f95c3eff9f51e99e157b
SHA512da05fb6d7fbce5c3cb43193e83f5c6f618d7d0a7b80dd85a3ff309952442752ab36db9d11cf70b9ee1322bb97469800e0644aba320464b9cd76f3938c725049f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6c8e8354f452a09e28356dac8843ed
SHA189a79464b64f256df3892d0701cc777090dd3005
SHA256165dab87db3d1aff9c6b4bb4e39ec1745279ef6f400f67964469ffe60f103ab1
SHA512b7ee6148d9012e7d63d3dedcc3a0f56256baaab3b6873e58500c6fa4367c06fd7ad816978074ab9b851a710e7b2b1a2ae393e32596be12df6767c6888fa31637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572077fc85001ddf5f60e78a857ee423a
SHA1dbc4affc9b4f7eb5d7e260c3cc9daf289a86192a
SHA2566be128d29ff57e2cd32ed365f0e616b2489866c14a3883eeaa07b7640012dd09
SHA51232a020cb452f3bb8b02cccf4a56bfc189507fffd21834da3d4868d1881fb232692685e4650fcb3ab07a1ababf1657867ce2e5ddb7d3db852a08e4337c534c592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3eb909b301fa116400f213d1e34ff8
SHA17ddbafd10077328bb75b62b7afc86eb81bb5e155
SHA2561e4cf99d50cfd9919fc7398edaa3cd8fd826d9eabbeb4a2f8ce0c1e180306de9
SHA512a736eb8498707c447b3a04bf17b74cf5911a2c2e44f06ac6a87790112b519015fcd4e6a5eea3a77df27d0dd1a513148b3d60c3af443ceeb889e3a049bc8f1c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917bd1f93945c9f5c63f5ecac20b033d
SHA18c82f4affdf51b459000e5da02bb9ffcf2705add
SHA256668bcadf11fdff8302a032e30d3f0adbb777e74d463adc07b66862a430359014
SHA512d64f7db4841d0e55822e5c455a4ec631225a6d9ec1e0170661a0207366da1ced6114ce37bb590e5c17450489b5c6018e50c32bbd8e4ae932aeface7eb60266fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18a79e288fff18499ea15b5ec042807
SHA1ca0c8ad89089f8afc024844e5d06d06dcc14ad30
SHA256176f9872bab0371e19d53bef796faba699f7a7f228bd4a903b4505db4ef3dc48
SHA5129a74fe50f444542b95bd97440cd331da598a8e66628b0037bb5c1858ee9ef2f90f5bd0228e778c48a8a0a5e66cc0088cd6f74031bad2333098dfac6028eaba6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58480690804bac07a12b3f9e6b6758d54
SHA1a9754c96be64bec5250c2c7673377e91bfe54a35
SHA2569566468b1fa0355a0fad6dac0e636f4ee6685a24d747adb9414fe2b61519ece3
SHA5120f955d8d3ab4bfd2f734163cae78056753e624b3653bd63d431a9098d0bf8fbc2de8176bab0c1a355d810fc52a5ddc4913f3f24002e7ec997b1b182a39d95425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3ffd02398c82ab275bf021b0ad2a60
SHA15ea52656c52fffa598a3be3f571ecaf499efd926
SHA256ae8474635b795ac080cbb12822555305001f5002f75153689936e9396c41758e
SHA512afbeefff15389028afd9920ae58d41689dda10d712072a043b2a76ecac2c2ef53164b6c859bc9fe6d670c63472e644d29c0643dd6705ea92b04327a603ad2ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3c745f5008cdfbb10937137092068e
SHA1f5a032647c095253352ffa355dbd949bafb5f6a0
SHA256524a8b2ba3aec772e6aa89684c435d3bc4cbc9681dbbeb828fa84bfdab2d0cf4
SHA51272b414525374939e0fe2dbedee6815bf4d57d6b4ae1e0392258e1b1ff330cc6fd974c08beaf4841117f9cd2b659509b994da6ccc9c494cf277d927f4502f0c85
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b