Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
b44c3d1f4c514cb28ed0c0cfce82b2e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b44c3d1f4c514cb28ed0c0cfce82b2e1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b44c3d1f4c514cb28ed0c0cfce82b2e1_JaffaCakes118.html
-
Size
954B
-
MD5
b44c3d1f4c514cb28ed0c0cfce82b2e1
-
SHA1
2630e0933f2ea3b1a8aa51e57e9497e822fa10c3
-
SHA256
02fb475a74c34606a0e2db6e457bd3bf2125aba56fbb77ccdfe8f78da44b9e8b
-
SHA512
6f3d05be90fbf2bf73098dbea98e1d7a1ff4403de5aa31b86604dd3e95553725b16aa669bba043b2be7fc59315cbc5c855fa311c5695fcc74870d6ed1159dd42
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75B60BA1-2BF7-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008723104b66fc41479adb63b5683a0210000000000200000000001066000000010000200000001868b7289a60e8252d5da174093f3ed38fc24c864cc4d8e73f0d7666c0202271000000000e80000000020000200000001a1d39809023cb14b0e651173a70b211a89f248b1c48fb881420b08e8eb2aedd200000006511007a51a2897d81955c24152c4013194d7af273cf62bfb71d8f0d2c525acf400000009ef015f5a6aef99e80b2d28a20de08b23b8b842e3ed726c1d44543e07fdf7ecbca4c5d87357d8e4a293583af93b63bf2cd67cb190f63902905f746f6a70c2d82 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9092424a04c0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424714598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28 PID 2192 wrote to memory of 2024 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b44c3d1f4c514cb28ed0c0cfce82b2e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70ef7cd2e7c6363047624340ae8eebd
SHA16ebfe4e584657198c7b785ce80fbcb261bfcc443
SHA256dfe35153b59bca916ec464507561019effcb3130c6b94c90664ad8b089705254
SHA512a1f60c798d5e1b02972ef883a1b46071064c088f749880b10b665144f92777198bc20bd43c2ddab54a8dda0407617ed8ffba9827c434ee956aa50307a7219156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b7a4acf86e2e67b49c61ed0f37b0dc
SHA1bb129fffe0607c5a7692438b439f3bcfca309cc3
SHA2564cb63d944cb6ed634713e2ca2f4cf1cef2509af724ac210e0cc6372f23e54ceb
SHA51218f1f895df25cdf5eb0a8f17547085cef8d1d1f97acc9df653f0643ba79428b575b9233c876ccee9a8c7a3dedbe3fc849f1ae0455658f2d7bcda75636763de8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1899fb5b27dcd2b7ddde6c2810342e6
SHA13affa7e14c15b43598885530e4f737503a8fbbbf
SHA2566ea33134df50bcb4510047ca239a7def1cb8234f7126a12e4431376b311f1658
SHA512438e48b10b456c2dcea6a0225bce46625abbe08ce7887d0a906811f4a3d3b72f18ff2e22dd8e16ca64ee8d419b542d00ba036d6137bf4758b6e44545afd04d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e645399769960fa82552107cfbeddb49
SHA1e17ba50fac3a7bbd4983f90b448a0448c39bf7b5
SHA256595b3346e77130173b7774feb2dca414c2552e14c8ffbfaca193070b26463182
SHA512b538cbf7d317489ba1705f9a7d3cc35f9036bcd28b15fbdd4741d4b9f340665fb9c6f68c8fbbd63f139fe53664ed5771878c80690848ed8501c2e074dd1645d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c9ec637e524c06394659f793e76386
SHA1fe665493185173a017647dce96aba7ce49d00eff
SHA25674b967a5805b40b11dc5124fed826e448bc0ac4790b7772035b696b917dd63a4
SHA5129233f5bfeda0fa22374529e3cce0747b7ae7856c3e2e62923512ade4632fb1a318e6ca5f48f72d46196ed7f96865f36391e40da227bbdb7b0574f0148aec886c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc1cfc38b257453dd0021109b599ed0
SHA16c88b97d1020edbd17c1f1a06c289c4e159cb829
SHA256204ab6604aea695fc5866c1c4883660d51b70b4e9dfb457336206955fcd540a8
SHA512c0e59d7c5b30810a28002484c48f58083d08654ff4328f5f7a19a4173f6133a26f2794c2981ba9635ed0c30d335cfe96e80662d961834b486e4264180bb3ef93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c199e5c006487ad3f750c04f34a700ea
SHA10ea9b9dadfa92df90222e6ab210a6b5d24aaa2b0
SHA25699b7628621b4adaa9b6c8e38ead1116bff5a83964a5da966ae3f25f2334ed9d4
SHA5126bacf6e6bc84417f735d06f38287b500ea0796967570c4dfe2a2f06de3620bd884bc1fcc9c32f128336bf1bb956a8d32731e0d9e6c20c2889225cd898956d801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4808aa3e6b9cf6d59a18bae7735f65d
SHA14a82a732a70031e7b2c3723ba24cace478d107f1
SHA256d7372b8813562ed3275e7d5cead9f76b253f762a98c220b072df0816fc0a0e6a
SHA512e0d6245b248090180f7b83136ac325a66940a7d6f19324cceede22bd37184d912ca6e133c486b392a9c43dfac056e9f14eda14d00151d6937a040904e8e4abeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59960746011833aac85786265958676b6
SHA1e6039189fcf388bb5e2fef6a0807d533552345eb
SHA256c034fa9165eb7e4841540034130dbaca2cb4c238c5ff6885813abf522443ff50
SHA512227b0f3e82647204fe065027aff659b4cb7d94aefeafb028e292be38d019b1784bc99cfea40f4f0b9cd827c7d1232de7648f3b046f0d9d726bdf9ffda2657151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff08af59ede7b7cbd81fd67059f8ca1
SHA1f1fb1eca919c1c4e07d302da592ce389f43d8a66
SHA256d9e695a5763d150cce1f0f5190f5522357f7d03c2ae6b23b6dc1b2de88d4df5c
SHA512c29300fd6f0c9c7046b56359b5cd93b845f3083913c8a7d1ade9e99fdc864e7134f08dc40ac01647111dc43580752d25698229cd849c57195529a43b94716247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59442affd198ed434a1bc48662082f6f3
SHA1718d804c9cbdbd335961e3a26c4908fef93ec41e
SHA2568362feb1be269bda5e822836937c052ae303e65b480f444eed20430498ba3be5
SHA51276f4bb57166a44bd1f9f7182def410ffd3fc2056304a836d1eac04405afe154b25f197ad18f0bcdcb7412a04f9a532701da366f18865341216bee1e3709f1bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5dc2effc36b5daa308b0e7d8ed5e4a
SHA105ec53aea43ab2f961353f34af6d7008a476d403
SHA256295f806ee4cb39d87148b32c750493a6871ae71a6c2c9145c12a58000a0154db
SHA51252ae5cc4495888ada0ca7faeb6d3b6baf1793b2af251ade976ec7dbabc1c21c01d1db3ece85d0d099ad7a53308b3adaeda70f07de13c5b5d88c256c60737e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049fb574f953631f9dd4fda5fe0086b7
SHA1dafe6cc6556696d3adee3a915872d19c6453ebb7
SHA2569622afd2d704108190580c6b4c017240a853dcdc5aa3eb3c41d2219398bea180
SHA512568f635e05d9212d3f89a319f6b1da8ad02f089e1176b8484f064c84002c31fdec32aa92d5b346330f1faf915b159e413e6e457a3ecf9be953cfef9a794ea09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53420b88f10a19909688fc815218d3c5a
SHA16c8485ecdcf7bd8978e19881aec73333521f3f73
SHA256d73c57ac83b6ed618439b6a4bc710e710f981795a3d0e567c3caffab326faa44
SHA5122b34a661811e57a1bb67dd6b6545710d8a186434896a79780a61ec92df6c21096b63a7e00071d521f6684e536ee91e642c6c2b1b70a72a84aabe18e48ab98a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a5fa8b9adf1b4ec3b9763274ef6e9e
SHA15e75b67f6f02edab4a05fb2840c932c526737011
SHA256a304af9bb6f599ec18f045f899d401186ead3269f078f24f2e94b7852f64ef24
SHA5129fee9a058cc97603e2727d2f25ff6cfef4429f797f7522b1b671aa529e56d4cc57e62bd8132ab82157c3b416a866b8966bb06ea34603ba8c8b0b91485ce6e4b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58257aa79ffe0eddec6a119fb06028c78
SHA11508a5ac62ba2d9c8fa05d44b1eeeb674f5fe949
SHA256c6ddd1717eddaa01a596910db455f04e431989558d4860f55f48a60c16abe812
SHA5123ca6c960422f86aa71f0522836403ddfec3660d64f0a37a24dc2d1f4bcdca9a34f42ef677f4898963f2b1eda4a3bd35d29a54deb7700e84322a535b55176226f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ab2096fedb109744296f6fc8a19dd6
SHA1c0e6e89bfb52ac0fc2ec1cda7ec87f27e8d3c485
SHA25630e687249d83766404832b134c100075afaa280a0400cf40ea21e1095dee2e28
SHA51238b7ec3957e852edeac8fd460eb4827469b00a596bde697d9d2e29ce228d4c4ebbd26d30c3d5d11d9c95cd4ba2f56e068b1b7383a731968f7dc5a813d159d56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6458a6d287025dd91df4d781053dbd6
SHA1f244cf0d5c1c39fc84cda4dcbd93ef946c3c6d7e
SHA256c80e3c07a143f6f36e525c214c2a74d7b3e953dd62530b70ac1b8ca1893aec96
SHA51228d5e9c45b5968689e0e21dab64d7ca6f191842e474a7098415b86dc2ca26aea2831908490f67f788efed6eb42e8bf857c132ec4825250887a18a0980bf0f67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b1c4f14fdb586f5db622e157f19bf0
SHA10854233551a150765c56eaac94a6ef10c4efedb6
SHA256f63dbd03b166e56ebb45d206c104bd1094b08c3ccc65a282b201d1359bc4f6d2
SHA512f462c7f383fd1328040ee812777f8ead38e76c3e83d72e73af535dd02e4661cd5351f15467f1770dfeccd498dcbd2cb928e7858abae3435573d372d21785ee5a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b