Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
22e57a395a979a0fc38e82999d91e30b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
22e57a395a979a0fc38e82999d91e30b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
22e57a395a979a0fc38e82999d91e30b_JaffaCakes118.html
-
Size
53KB
-
MD5
22e57a395a979a0fc38e82999d91e30b
-
SHA1
66c1e4832dd17d7b96b82bc9808616038910a9da
-
SHA256
48f9a15721b9b81db64edfa18c8eeb20640dace33e62770a1b071a5e2118d505
-
SHA512
4e39d3112066bf67ac51d1a633884e0a4680854693bba59d55ed725a1f772a964dbda8af84f208c6d2e091ae234c19c72f8b4611374eb191b08d24f69e827580
-
SSDEEP
1536:CkgUiIakTqGivi+PyUvrunlYl63Nj+q5Vy0R0w2AzTICbbJoe/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyUvrunlYl63Nj+qB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426183226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000095d77fc80eaa0a4b9cfd4616b4efe15f000000000200000000001066000000010000200000002b9d3b4b1ee750c745f6cd743ae9cef99461bf67f6ebc438d365f30dd46ad106000000000e8000000002000020000000d01b79e713950aa189dd2310df9e83a8231d120cc5bf0856efe251a2ebb0c3f8200000001925084cacbed0d8b55fe73004aff81b358f86b3fc00821137aa6c2de8dae5a940000000521bbd413fb9967535b01cf8103edd55383515f9ec0d23611d33d492244ba2d9e345e6430168b0ffecf7461ccbb9a636a2f248e97d2d306c299eaae8930b6f74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402607b65fcdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E02A9011-3952-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22e57a395a979a0fc38e82999d91e30b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cdba363546b82a9c1be80171d898d3
SHA139fc03410440b5c8ca39c666ab619812008d7b75
SHA2562258188f9657b1da3fd3855aeca4a36c72f75235c5f6640abfb917988f387a4b
SHA51201d455c0be636d420d4459a118f7be56539932e93157ff93637f75bd0ac3697dd7b286ade1c0fcfa41be6006e15ab8f162a198b5f64e3f860dd5cf2952e8e287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586efecf8c88c82e8031273db1993c569
SHA199efcda469161cf949682edae03f25c2129941cc
SHA256e8d1b8f3b04c5d88cb52ad7063165938d9dd155bac1c35a435ce3c57a09a78e3
SHA512bec6425df59120a24f79f3ad42ef9895027fd1f7aff2b7b24b3d41856b7c888f4ad80423a86c2a5acec98313c40bd7eddc3db0e32f9c67df4fac0a7cc686d809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56493be1d5b3cce4d3576c8d8d915ac59
SHA158d9a38bb4c5a82424d4e2efa1a29fd5ed64b2fe
SHA25647ec85a1c67ad4c673f8b5f395d2102d51ef5b63c786957beb573d494e2dfa3b
SHA5124ebc866b694ae2225beb12601341d549708a556dec9f03f9284d0616ce32575fb322c51d0c56e00ba9f0ef6a8d0b52c6e80f99b1a4e028c1b6d9c4b614edae44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e121679766f103fd1c496b34d0da1ba
SHA1526026a40611b9b3526eac4585f89a918819bbf5
SHA256986616927309da209d9e11d71f7937f6e70ef68fd5469a612cbf5409bb001fda
SHA51238ebc77f079877af2ffe73edeb074b8263692c24701474fe734b5ebff5cd4fa83528d9760f17822cb1b38a5d8562f1a6f45c22b6f48dd8a48b651cffd55b6791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d388090eed61ddfe99e9b71d8a83bd71
SHA14dbdc1c1ada6d8df1258bb119f23b6b5e5dbfec1
SHA256c2a758e964219b359da839ebf113c21bd5c53a57b71cef28666cb801a6c0c174
SHA51262447584765b1a6a5209c2c615d42aa809061752e57174d6160b1a0345a7adc202979168064d4c4e6c97d05e1fa8d6fd51140cc2be6eaa7c8e403f01c0b3e529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c24157316fb8f39b7cd40d5133a3796
SHA1026d5e7cad8e0f3ee445db13891a6c45a0b5b5c3
SHA256d073ba4abc60f6e571a544c6e80149675c4280f151a7cd9236236118c78eba52
SHA512f45804bae6241f0433340396528c800bbb45977710b3d123e103d1c97e5325e9dbaf65046e3f90673d8d0cc3cf614679a1bf0c990f794c242ff5752fdabd704b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2bcc51d54d5dfef0cf0d7a68394245
SHA14c64532ae4bdcc05b0a630de133fd369ba739641
SHA256d8a5cb84fca0b6bd3e1bccc901ddfb8512ab8b11c521ac6d60016dc3bd9d6b61
SHA512854e2c2b837f84b4ebc68b89a4929319f6f99657690784203fa235c23ecd02a18d88eb2f115c90366f47d74ebf04f998485a9aed57acda97c944a8cec5715f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7ea8cffae59d6bd7508d3d5df623f5
SHA1d3d6085903a8239dffa23f956486c77b6d06970d
SHA256146acc4f733b42470b570031a25610915e4afc770175858640371e39fea6d18e
SHA512d9542c726bc384b07928df8ddab042d9accbb0b5906e6ce36106003f08d471e136df72324d6aba366ec243cae39b39c9f1a3d92e145be3fcdcdc2648ed95312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917422b46d41679995d09f99f2fdf223
SHA106718d472b638b50ccf5753fe3eeb18e8f2efaf3
SHA256d09fc0befec39c1f5e70e2796943392aab6eed1a1505757012580e24c2cf385a
SHA512b33a9a9f22f3fbf302d29cf82cb2b6be0b03a94eb4ad2d60813067659f939287108ed21d6ea989f5ab143a8f671890401dc84684c01dc1e6435eb817e159e871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c4fdbe48241de691d217537295b5b5
SHA11eac607cbd432ee18eb2087d563608cb44fbf7fb
SHA25648888a0662f5d47b5bfa12ebaa34e4789f78f81381509e281b8e276401d4413a
SHA51277f16afb2a6e0b16fb947b748f5d75960d5f53bf7f56e2ad2e659ffd64adbe9bfc66a03fd3f0e3cc4e123d4af7091906ce034e41188a9c378e5873d0d2d666a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e491d25ef2848fa786b4cfd5a5c56ef3
SHA1ce01d6f10fc5ce8304599d01f9798da2e3a3f7c8
SHA256e5d5bac599ca70e48d52af62d198c616cbaf6ab09e18dcca2945db7ce4093075
SHA51248af01b761e13b3d82971c4088739fb009328a98f47b3da1d4adc7f2a0d77c41be889ac8bbde70fd949758ab59bee90689626a9768781acb13f5d94eab4e6692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc879ab43b39a3c2e0c663ac4622c73b
SHA19b332c83aacdba512d5b68bf875c94e74e28f756
SHA256a81999c954c970155a7e645a941fd18a899797adf3e1248e9f620a9fd7b4aa9b
SHA51247877906dab1f2249e910db860798e9c8898210042065aca5c69a549b5fce0dfefca908ae142cbef323732627163aa52461b6fd8ed274e6766656c7f207a5f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd14d98904489782ba1e95ebd46d5cc
SHA16cdfd0e81ed93d3dc0dbd64e8d23ce27d8b70878
SHA2562c809993658b9ffbb5681c858edb51f82e6fcc5c82b051fda5606efe6718232c
SHA512a937b4484e4f2e3381f219f2022c0e742ae628040ba2a5f1f980b8eebc485e9334c787e38d37d0b2681c76fba63978271cae057e06fb862587ee2f20e4467a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e001222843519e2854559dfa764a79
SHA17b089df4dfad01713f2a8bd123eaf2fa219dfe44
SHA256582747d4b06e513ee48efa3a6a587e8671f9f88d53d29365d96d32f455a0efea
SHA51207e8464734c7cc9f938a0d344ea5adf083df8b510c107d4fe45ebbab123769d1af47e5df3131c9c2da5c1f1ea1b8d5c92f006038297e15161d7b41e75b185092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1063507504a933d9b141e5d8798f38
SHA1dd095d0fbc007d3c54bcd495fd721e241bdc40a5
SHA2565288e6d5cc1b6c0eb9bae520094cf4abb5301a06c5f2a1bd8c4cf42bf4c1ca62
SHA51295a7d5c01c52959df4747a8c609e3c971ab769b85c7a2ad1b74003ddeb2e8b8199d306460ac4995cf33409793a179f82165cbdc2b9f9e09108a7cca8c207d70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34f1cf878e8aa9595fafe8f1d59e210
SHA14ff50d75fcca819c556bcff2003c5751328a9308
SHA2562d2972b6c2c66e8b6bfc8d925de3f3b1c008fc45ea909b5e8a643b353892fb39
SHA5121b87595513ca409f2ff06b3a9a5aa42e905a640b688d561e198d34142bf095634b25fbca485911f7f8fdbbdc66d5676c0b6cd57a7172861fc11b54cd8d63e63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551680f20c46df6c59401efbdbf924b84
SHA1acbc331f64d137cb0c419e3aabeb021a350ac119
SHA256f0e1e3f50cec403329c176a30953b2899ee9e17bda55b7ab9d240dc4cf868048
SHA51204f65d0c5be5eb2e5a27ca86982282e7ce002008f51a9edf5249e3683b1127c05d17a009a466bd38308df43e64b8f38fe1148bab67a8fcd62ff07011e549b04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396ef2ea174c40ad708e2274b79cc6bc
SHA15002b6e0d9426d33ab2e5d7b51c5ca74a5e4ed06
SHA2563c6b8b4fb35cb9ec625ea6f781707b073ff6df3c12abcb8d328712cfc3678205
SHA512292d8881f880503c9a7535d3975a53a3e9564ea711c7a03897c82e6f423ceb0a5f318f553f6cf318f08ced921472bf38217bb56c8835cbc98848c6aeb4adea97
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b