Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
0a71c43ff48c79fa5b57f17fd5b9e3e6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0a71c43ff48c79fa5b57f17fd5b9e3e6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0a71c43ff48c79fa5b57f17fd5b9e3e6_JaffaCakes118.html
-
Size
159KB
-
MD5
0a71c43ff48c79fa5b57f17fd5b9e3e6
-
SHA1
3c8c9e56c43045b919d705eb548737cdb69245d5
-
SHA256
4393cdb1fe3fedce5518eb58adc5735079ad17d81411604bc3f7f34fc9db9e0f
-
SHA512
cd3e9805315e3a30da7a762156430b8bca85953223b998cda51ba602324114020a41dc27644a4316a6dc7c92a1086002c6d5aa968e6fde272abcdbcaebbdf674
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcB9GHA2OKLWq8AuRicZl8kK0p:sv3pLoRiI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425419552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e19bd6dc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF9A0711-3260-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b229aa3e55161662b7db92dfc7b62df314f9bd9b786e7fab25cdc5faa64c1bdb000000000e80000000020000200000004fea1682082340ac64bcbe0ea03b284dc78177dc84d2969f1498489ea1afb431200000009fac06628c14b50590cd5f5905061191d53c5d2d028d8ecc7674909e047bf6fc400000005a51e896f4ea26e8a65538ce7da2890c2c54206b4669369b3ac0150c846a65307752714ddad6a227f2a49eee56a027851a1263750e662ce8873afbe927035a7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2348 2124 iexplore.exe 28 PID 2124 wrote to memory of 2348 2124 iexplore.exe 28 PID 2124 wrote to memory of 2348 2124 iexplore.exe 28 PID 2124 wrote to memory of 2348 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a71c43ff48c79fa5b57f17fd5b9e3e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD561b663ff50e427b706317fb06be88a0e
SHA108e25c5c8a7500ecdfc75c13dc5c150a5b5d09ea
SHA2563c9ab051d8214cd04e7285cdf0523562b3a1dfe5f7e2c165efe4e6b68fbdb582
SHA5127fda474ff48620fa76905597bbf2cff1c510f35a6fb624eb184c9931f5d8ea4cbffc74f63edccc9fc9e249a9e5e93fee9f1aa340cae90a2796593a3f46049505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fcf81a8e08a623945afd0d87667541
SHA132e965b3ba140625ddaf8c65b06940bb0683cfb9
SHA256af5f752c3e07c69b8f70b5adb2d586eb8c4c40e769fd8b7dfe8d0f6472bdfdc0
SHA51218587c8ed82cf879f089248f7165771768c1b99a94a586479b959743ca85896b7572ec019fb02acae6594ad4ee1231e5b2b1061831be17f7495fab79922deee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55961897fa433f8fb6192c03944d7a4d7
SHA1913d2fb8f43cc0295edfb21135f2598bdcaaba7f
SHA2564fcccc16a58ce6bf030ee963203e2bca61dfd5156d48d8954bc253ff67391fce
SHA512334c19ff4a0d2e94f6eebd59c980043219d90d0d2da32d56ba89ff07e283353fd46426a77fe511863766ad5e414f5cef37cd9fae61b039ffea9a01ac944aadf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfac22cf0f983726fb57b97f2371482a
SHA190ce5641267cf791c9189c0b2a6811526ff5a8c9
SHA256967277577e3044f0b7fa0ab25fc264df8ceeeaa62ec7783d6e3be22333d160da
SHA51291b67ebad3282161eb1135f898813561f1d4c05bc520f2bd003ebf2227991a987a8a8758f2547a139a80b2a772199c97489eb4eacabb1444ec4440039f4b842e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e02939ce9994ec71304b46d70d4e36
SHA182ea2c2bc124d8ef4dccbd5009a5dea7b9d601c9
SHA25665bf87447157942306068ec7b217db8c3e8e41af56934be3c268bc9742dbe9f9
SHA512cdb682501171f3dc20368610cb273b591abddd87e1a494ea11825441adb42723beadd14c23ca5919a1848416f5f8b16fd1fb9f5b98c7850605206c718d421bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50343ff141afc9626abe4f7f1890b4718
SHA12a77f1bf56ca1eee9f9836436766d5b5161f1183
SHA2569c70fac03e5c309a8f969756f78ca6412e1b9d31095f43e7a5419dc1b8af7603
SHA512d070fcfc889042ba52df53c05972a134f105f75554468741d8b0d9262e39f959b916f4a4ba87e4966115db2564f65e89e232e5f1574ec1a8b4140a125b3de6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded289fb2e740db3cdcf3db2c0e73292
SHA182991c8a1c11f74254e78a406c56f6d61c08dd8a
SHA256f5444d0a0e817c0248ff6c2e2f5da51fa80d39ce771d45e6998f6c0c342e4238
SHA512185b8cca6292885050580f6a833433a539cc4605a68ba3916f2d56fad25e33faa12997c5ee72851f53168203fdd063be90f190f298fcae5c1b1755bef570e042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5422aa75a21569e5e6d7e8608e97684
SHA1d76946dca19ee66c68b638f40d286c66cd61d514
SHA256f39923bc99fc975f009e70160d308db71ae6c1e0bfa4b8e642fbfb94f7c3178b
SHA512e7dcfc7c765478f2a01c959b0f1d640187757105813c74311d898e570b7240cff47082462ebb8615414e8e605a80a3762a9a7989fc9b0021457ccd553fd2a08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4662f7a69b1b4456fba0dabb5d0755
SHA17920b0f2f6b60c590ea14325242982064e58c153
SHA256a52646cef715b088d3342e1fad2edaf44ddaa49be91c6677bb360e898f67f40e
SHA512ade882e458eb6893ad5c9aeef753b49911e8b3eee77a0888d23bec9493f70506f9f4205e0221c205407d7168a54d00fdde69c47efb25da2ff78548428c7d7cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf724e2751e89fc363d1610cf52792c
SHA19e0b625dbf177a404455fb4d941c642687e9f7cb
SHA25664d35eb2d69e5da32946fecb3a2e3ae01791dce160a47ae93a8e4f05c5696b27
SHA51225a310b1e6c93bc2a52319b35f1c977db8ee85a250642e56d13e66af5ab9a665ce033e2dbc5664da685c0253494ba023ef0e0360457b571e51b9262e59cfbaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55cf195244874fc1d155137c875edc5
SHA187ca406d0fb2337d7a887db0c25bbb1794e58d4d
SHA256b35dbf088027d0cb820aad4c9efbe98f7268a11afe1a5d8df4eaa1da239f8aa6
SHA512e636c5f8706c8fff1442fc6168665fcff7c981dd70ad907da8e87dadec4c7e5a8dd178e7fccde12fc25addda67d24ada813ed1e751dda4e884b841051270c8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1f8f4b30bda0802e2fe0bb89c91fc5
SHA15bf81f16e2eaab3ad7fcf4125c54d081d40960a4
SHA2567b5f01b4f9ccf34fadb8180281f92b13e8dba2afb0024cab49cd6ac3a8353a47
SHA512234d3e9ea16dcb12e2e9786721c59a3238dca4385b82ddd9533e0ce9eaad1d9955e5454bea9d6244e22c72e877dc5ecc39e1c6a6697040ae4c0e90588b606c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafc865baa33e6dbf3b10ef492adf6ac
SHA17634e555bc55d42934dd1af82c888368dfd5f3f0
SHA2563397e6ce85fd0ced5f52ee7cddb515d77ee6abcf7bd10b3c107a83d9933935a6
SHA512b3a6dfc97cdfc72d3e08d212318d2e4b7f6268ee44498557448fb044bac7b1d55830557d3eb321119aab47ed84785afdc8969c94518bd1d5e1ef83b375819f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0f45905b22adbc53ae91178dca0dea
SHA102dac97290547f08dff3240fa849a7e47ab61292
SHA2560028cb46ca8f748bc93eb9a3d788dd7ed20bd804f7edb60b42f836777a87c0d4
SHA5120f15e510dc158141eeba949ec0013d3f003ace1b97bd662d5abeefc60976bfd9fec6dca98658b44ac582c9dab7583a24140f14efda813676ae3f96b26f6ee394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0648fe93b2cfadd2131b2beb6456c6
SHA1029843286b3bface8b5ec8230b84f07e9211e7e5
SHA2561d2611d52e78ba236e1a4e98774985ba2a5378ba357e37f2eaff8c7fc2b6fc7c
SHA5125d5057340422c45f6cf1976d541d0ba103220e9d3667a7277f053a0821f59b0fc31b21101e3ae4876df67ca8f4e353bd56ff8b20e8aa93b8338b6f8d4a1e35f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305fa13cb425bc37413fc5b9eb77eff8
SHA141c05200057e0ddae7f54b72330c0ba05445092a
SHA2569d6edd0403ac71f7edf8f3b6f1ac0369f90d6b254046d68ea8e3cdf5622399c7
SHA512b9b6e50f49a9ed3534bc398af31e288f7ad332aaa26668c8e6b330a97f451a8be064499aec272240e2b840bdd4322fbac4cfb6939f043d906a53c777735411f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dcc116f4a65ea8489a1ef8846a244315
SHA14e8df07f5e58d176f4658020306a9360fba59a0e
SHA2562a60d3d53571a978ae63a09a8c024bbbf37eb70ae7c28fc2eb906e2027070862
SHA5128353458a3703df0eafba403a89b68441431ac01bc105a16985160b2f074339dff6a50580ad1cf26eeef30a21639946053c5ac7dcd588a388dcf19754bed03134
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b