Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
b497b55eeaf321627569375339b292f4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b497b55eeaf321627569375339b292f4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b497b55eeaf321627569375339b292f4_JaffaCakes118.html
-
Size
51KB
-
MD5
b497b55eeaf321627569375339b292f4
-
SHA1
b8a86ce1c672a6b5bef12f4e939d6b4a4b4257d7
-
SHA256
12b4bab84f40e78b0721aa5cbbb2b21e2fbf86b55f393feb87dab9036e0655b8
-
SHA512
f62453ca1f68ad34349db86d1129ca608fef8672b80fba60240641fa2e6898d39e0b7357164dc0546cedeb63fa4286db782ad5c61ee681d24cef669e938d48bf
-
SSDEEP
1536:7uPW4lSGWQIaAkXmh3UgjjhCz7jmgjiqchFe9jAfaIjdhE:gW4AGW3UgjFC5AfaI/E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d3dde66326afd40aaad78b8c7330637000000000200000000001066000000010000200000006f63b81a0e0d0a9f31cff34fe7ae8537f056d3a755b326667dc84c73f751618f000000000e8000000002000020000000c41aa91ecce33aba6840b98fc7fd23075dd67653b543686b4418052e9dbe8c902000000054afb3086732bbdf487f921b2b4aa45ae6e25bf09170b140fac9e7f4966dfcaf40000000a372358d708fd78040778ca668ee2bb15d2dd0dbc69b44f553af1e885806cd84be2f5b2cf859e38eccba1a26b64380dac738677ac3d91b8f64537738c5ee226b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F932B931-2C0E-11EF-AB07-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80651ed51bc0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424724725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1836 2120 iexplore.exe 28 PID 2120 wrote to memory of 1836 2120 iexplore.exe 28 PID 2120 wrote to memory of 1836 2120 iexplore.exe 28 PID 2120 wrote to memory of 1836 2120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b497b55eeaf321627569375339b292f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51bd8abd6c113a4bd9e7f6c6b86f2f94f
SHA1ae35fe67219652e2884bad9db921adddda105fa3
SHA2565d89a9d3254cbd59025a65bc06ffe2a73f0ba5bdb9546d9bba0f3bb13a269550
SHA5127c4412643ebeda4790fb195c1c1d1547b087222729cebd235feb1c9befbf84d700f164ea706b47c3ef678b85cdcf40febaf27757086951f8448c73a303be5f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f47d58b246ccfb93f8efb8747e6303f
SHA15a7c68f571f5bac29936a7d385744ee7f73a5e5e
SHA25680a97c070b2da4ab4eabfef073dd5f72d76fce4f94ace7b82f188fe60904afc2
SHA5127ac66fbed1d326a7df17b6ee867c74791b7cf9286e8ae31d95e4de149c73430da3866e033d35395d1bf92aba14c01af67ec3d819970b26939f7fe7cabf21d0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c6bcf6bee714273f5a5b2dce6a6f85
SHA17a99bce25d237b670e427835542ce07ef273cb48
SHA256de89bf7303bde4da0b9243278ad4aa4315659e13adbabafee59c2f4040a1d7e6
SHA512450566029c0107ca23b7996e94afb9c081d30afa2929d4b5bd232ade172654e6ca783cad524a5e44864d44a9efcdc228cc9692e1180a8dc8a335654260f46ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53013e786d893309607492a5eeea64774
SHA17c98a08669eaf7bf69f92d7156eba010316b81a6
SHA256e8520bd891ca9cb50c98db84561b495ffb2fc9b5e0001185711a545f303bda35
SHA512085e345cb0d1ae58033019d63af8a9261e759dc58a975f20a77b8d52f843ac01fbaff81c2e400e0a32e3a77a1ba3f29b59ec584bcbed8d25f10057b8d2f0563f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af00044166e058b79a88161234fd0922
SHA13a6777392af50c80abf12bc876f4b18399221d40
SHA2565055a5fa4ef85f40e258c69247a0f9aa3789eea834e423b48b65ce27baa33860
SHA512f1da27c860099eae8e078685a5e93f2b856988f1b3af34960ed7fd0e704ad7fa7087e6b3585eec87beb8bad14336c299dea1062f6227b04cf58eca87056ad798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a98c7c0c7ac28146085d7c755793f74
SHA101264134f7bea694af738210199cf2ebe88ff5aa
SHA256bd1666c9f3af783afa23d5f6d3ed233d772ee30aae9be711c84b5d9197202c33
SHA5128ee5575d6af4290ae8b6ca36628eda4d6e5aa711ccd8674a348ce6f3d51569478759f2c62dc365e78c6497c463c96370bc71ae5789bbb1268fff9ebba0c3870c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57411ecf7b9aea8072225a349721b3241
SHA10557f0a75eca76369ede254574efa946acdeb3b3
SHA256b94f7f3f1f35082ae980f97c4458cb45e8b4e39736a51417e0a1feccaf4d55ab
SHA51252c3d3070f1da5a41a11b0b3dfd99b158d8ed4b2f92ae38168576b9d80fd458a8fb1b1640972e5bcf3fcbaeaeca0a4e0ef140246a99777c782ece2b98493dc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e227290035b2b9e7e4c58f590833e0
SHA14512eb55cb991c30b68aa304c9e4460d8840dbc4
SHA256f39365a1329dea6967674de8850b1beb53a70497088a95b293b3f6f997589951
SHA512884243f87785e072ecfada58d467671443bb78fa752196551ce811bbcc452fdaec27f1756e16cb6cbc3bbd583c87b2779b50c5f1b05fc8b00069cc702e0df07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07eedf12238adc90cdfdae034ef7b6a
SHA1eb5d8112923d8d71640d4d60821468a6d151e2e8
SHA256c116d9770e018cbb2e5413a4eeee28d259f5362ddea659f4d974c31369f4cd58
SHA512e635dc382a10236b1b8452405686f40327575482584f67f8f18a29de81b202f3d8b58d10b51fd25e864508c6ef0ca0b380bae93f13411b719b3f4a2657ba118c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe5af575eda24e88c708fc215cad279
SHA160358ab32afe82ba070cede0698151ff7e899611
SHA256635cd12916b14ef027bb4d2074e39eb2d207b13ab6fc2e65ad85548cbc56ea58
SHA512ad713aa56873b367d88edd40c0f4a6ae2cb590c43b8dcfd0b0235f7f46fcad47a31ca3ba647b573c1bc2fea29c722308fc846d597c1f572be2f65ab6e199a08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67832e9a7af81835f23229df9416d90
SHA1255840a70cad075843f83d3cd8c335ac64ca44cd
SHA25645b021a400bd8153b23209ae77e806eec87929eb420b643d4977564431e97407
SHA5124ea5a532b012d26263cd893a5ffe5fe1f2449acd6f668247008f44567a461bdf356418f661d7054879292ce6af878e0575f6cc8ea0b7aa0836f471891a156f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9d097dcb7a59805ffcd6aace833f85
SHA194360586dcd934b69a05b9f6111c37e437dd2ae1
SHA2563f66c3edd2b30b2b3fd3526d3c174f147f71c106678903619db8878d36ddc617
SHA512b4ffc44dbf44e65d58e17778a85ce2326f097377fa93b735dbce9b404d70dafc554653a66e92e1714c96d1c0b895694ae2dc86796e0cfdaca489e0b6ecf546f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2119b0911e09b73b08703d2a837cffa
SHA1b7440c5e8e71e12b080744c6ab52052604d87b50
SHA256d875145469037aa7d7c0b6f321f2f32d5bb3c3296960987648bb7cef9c038c3d
SHA512af21ac2381e8ef1d60968a90b6a42155e293d4778f18776208cbc79bdaa86eac7f2b50bb7d78dfa94986ed427f99205e5b161c857b15b79420a683d1f99dfe53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fba888e7c68f244b117dfe89d27e9b
SHA1d3defd9f474dbbb50dd5c1b5ee901c5878c855ca
SHA2569248dfcc73183a7ffbdb9573b85a6d1c6127256fab3218baa68df4a594a6ecff
SHA5120e40da083d9744d73f03d470eff3255a3edafe0b230c50b9855e965df87c22de9791760e9532e3b2b1fec401d91590424f554d015e1aaa2fbbbbe96987143d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f1c39b1bf7e5246de737c3b3d6b9b515
SHA1829413f00684eeb815b956f2fe9cc28e2d4f2f27
SHA2566f2908a3b9a1522870dee152d7e34d3318125294bc58e1f7e5612fd6f8e05e21
SHA512ad612b43b49aa8732d615b610c7455231b494f28fb31340f7d114444780fa2d9c30bcb129b29b63840a62c143cfae41a115006bcbbc1306fbcad5abac19cc48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57dcc93a180e6d4b75788307ceb06e946
SHA173913c0fb5cf1e3b4bda7216c9b8859296358582
SHA25636762ad03d111fb0139b89f2c19f6e3cd5caca477d418c0081c5cb11daea557d
SHA512c72286130a09f1d50336bc9609a7071dc344555a1b8e93d70f2ba91a3d3bbcbccff93167f2f2c8aa73102cec2d51002ab9f434365d35fa12797c9f7f65673bd2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b