Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
28602949b0eb88cb9be961daa56e4bf3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28602949b0eb88cb9be961daa56e4bf3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28602949b0eb88cb9be961daa56e4bf3_JaffaCakes118.html
-
Size
9KB
-
MD5
28602949b0eb88cb9be961daa56e4bf3
-
SHA1
95a2e5846c96d9880184d00cc92d6f5d7d617cbd
-
SHA256
448611d70d3273bb29fdb9359aab3005b1a544b45b849cbbe2b96d2d4bcaa921
-
SHA512
43d5c2258266a4114c87f380afbc3374f559a903c9b62c741920e24f252f82279af24da6f972df4e5a3f1e35931d344505d87b7cd1392a306ce633c1c5715ba9
-
SSDEEP
96:uzVs+ux766aLLY1k9o84d12ef7CSTUrGT/krYPp1abkvfzllVHcEZ7ru7f:csz766aAYS/6sBwboLlPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ddaeea9bcfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426428987" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15BE1E71-3B8F-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b646cf4240e5fc4098008fcb827fcde30000000002000000000010660000000100002000000068f2413632e8ffafe58c3afd052f9575b4bf8bb6116602cfc561b7e7e3403450000000000e8000000002000020000000707089b74f38f2dbda213a53964ae8c1dfc5dd278f6dcfd1432eaa1a8ed43076200000009dbb2ad2daf608d4b4cf34d79c314a1f999bdc68b1986ee837c6db2df144bcb340000000101de339c8f60bdd254f41535852ecfc93440c553d9251eac8335c32f97faebb4ea0ce46290b07bc27103e6503f0e15e877b66d1e4e489d4decd471574d2323e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1584 iexplore.exe 1584 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28602949b0eb88cb9be961daa56e4bf3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9ac3bad4bb91197c97fb6962e4de64
SHA1d61d4cd94a161c9fd023d99d55e518f8eb73d9a2
SHA2569aaa3528214bcf476d161f8b9b7d89b2918b857a23dad5a9768e9df7b87d6066
SHA512154c03c6dec10514237f621243a5e02dc5ba762e01584db4cc8cb597ab8b4ba12b21fb598d79028a144736bb7e46fe403941a9ace82a8a40908a42c70a1e9a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56004b9a47be0b35e2180248ba49d50ee
SHA179cf077976f929247c252c7193cf920bfcb61f68
SHA256c8473c6b3688523eac0f885a151dba670431f3b8fb60d5a9dc3aa10409a193d7
SHA5128658473b137583d3ca66935a36173d4334a9bb228153fe82a26a6ff618acf5d29fdbdafaef856eb573888cd796fcc29dd0b6812c785db007ae80fc84d1460049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54505346c9889255d246c60c05e28b64f
SHA15773cc6f5562e2cdde89d40213e4715e6ecc8838
SHA25641a2c5bf6233b51d569a4367cd53110cf8317d6bd27c457c5735a64aa531a7b8
SHA5128cc5eb1e6123fe9f18ffdc65e8aed102095b35ae02c12699041132f94b4e6f513eb01cc62e5021608fb9b857ebd977b6ee91e5e11ba704017702c17729b18b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5efd13439d95dacf79e4a697c06a76
SHA147bd41493e060c940dbe0893d5faac74ac5480b4
SHA256deabcb931991096927b94a48f4245ea3fd55929eb8b3a3dc25ab60ff42cb9abd
SHA512968fcef79da0925cfbcf9ea0ae2229fb77346520ecfffba98ac02988d94c7e312b3719de464e895c09cbed9938a0be9df6779dcddacf1a98814153d1981e1e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f084c9e050be26579f43b2469b470666
SHA1afe2a5bb0e4d22dafabed4af256e9c81e9447f71
SHA256373c8f6fd8cfca9afc520cc157d3f3cffdfbc0c015cee5f87437a4dac10b3450
SHA51281f495c34e67b36683cf40765a118a9b227dd599632ce84026b0cd11e462d662768e1e5e37fa35d1b8409e6db389a584e36ff63c8a7ffbbe2aa6b9f306f52998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e0831f3d177cc5a154a46ef4cbae35
SHA19059830fba7c485f2066381be90de1394216ed4a
SHA2561944a9479f787803062b1500e104653aad15e3980c6513ee8ac7f5f8f960d16b
SHA512df18be4b97e4ed481eb08377f63ef69d3c5a6d887f22bb90cda036cacc286900423aa3df69edb6096e9224caabcef7d364c641deeebaec67bd7cb5063eac8edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b821bdea34f59b283eafe624d51478f
SHA1082a46d965432e99ade4ce52e16fb63e53061c8d
SHA256682303933c5f7ba2a08033d4a8d000b43c819993eb90eb9a151843ca880b8462
SHA512964d9f2ea772b31b189df71daeb1b3e9b261942b9840a130f29a3591b01338ae7ec9c9d33c61b067f06257d689d73f0abcff40e6529006c26d12e8773c8272df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e964297795078fc91f7a78b3525cce0e
SHA13850cf001e6d6039fd37a6dca798cfe5a33ac3d6
SHA25618608d015e80e48945852e57637f40e6ad78bcc98c47177d37c652a6dae544f8
SHA512d575eab0f73e1b9d75b58f9a88728dcc5186e3e5ffadd02edbc58e2323208caf5906c29bc4e699532af9f30e67d994179017fe1de88d2d9ba385cbcbcb25fa62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512453b95fcc8269f7be48e5738aa6ef
SHA1a25f9c36fb4aff723e1e5c95dd89b84269fc7359
SHA25696d79d649dee44b15d1565a0deeecf2b556421ed5b0ff54365a4f6f048e4092d
SHA512113455ca53213055cf9bc6972ba6bec3c94316993ed7f2df10dbbe6b238e76804f9ac47274dd083debe7010def3a11daa863f45bd35731f1f6d60c91a4af2fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566f9a4c06557a45c32c1e2e120e4b4d
SHA1652df7a9fb130a8f3d443845e113a06bc8696ba1
SHA256df2acb41cfa842ed21aa35fcdbc2de65c0ff78afef5c3b901b72eba08d954ed3
SHA51278afe1852cfaa9491a0b6fb6af0c762044d7a97f416eab93be358e8ad51d14fb54818d188b29e6f84bac78a3d919daee366276c6a384fcea5d4c7a5a0a844d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d418149da6e1dc89b8d1c4cee087caf
SHA1cabc4b94671a5b7b5e1ab038be9b4e1a1d10c0a6
SHA256b5d1eaca8e7c1e955272e693abba502dbd5d007bc41293a27dc5689ef3773b0b
SHA512730d29af9fc2e8b84cb6b1aa35a8a955d7f5bd0341db0957def076aed5eb6d45d2fe9b6a47d9532315521433c8f3173d076ce5fe65b68311a13f928e3ec9f100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7f1a32c030242722c39a1944dfba2a
SHA13d0387c2c1c4a14520978b2462114ce86e5613ca
SHA2561df34d95fc975b7cc157c72e8b339b55ffe1f5a5535002faf59f0c63a8f3d565
SHA512bba0c924314eeeb2071335f58f04c0a93a7791e93b1c98631a0c4dc34fb4b6859f9016f0720bc48a2d00acac66700bd0452b782036a95e95f0bd2a9a0c6dfc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067d1684f8a26f29526b312cfca6bc0b
SHA182da806cbc1dbda25cb6751cef4607fc3c99ba98
SHA256f68e374ec6abd4bd9f11dbf0136b6e9af2d58b2a7a73846c4a3a8ac8339696ca
SHA512046fd8bfcedfbbe69bdf85ca46fb51289d88cfc61692b2fde0b5d07b70aaf5cb957118d19ffb34b1fc9fd8c526aff9969e87cf855471901ac1d828eeda4996bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc791a4c36d4115c91389a90efbb2ba
SHA1c3544bee9f2b3d5fb6ee9a898331d26ab63545f1
SHA2566f8900fd048453fcaba33488b0ff8a68ca7c9c5ab100a8e54de3762401c2401e
SHA51275fd940e72dd0b7073d8f73f72882f8456db8cb53331612393c6d8fab6aa97b9d662e8fdef613934b844801eaf5eda8ec35fe50a35ce920d1cf44bc90f47299e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72e0d0a1a0f71cdc4d9e05a1405a005
SHA1ef73e24ffb7ae712fb7e8d4e5464596e721f6235
SHA25663a00c531f4be809fbbf022c0e545f43ffbf25ba0794506c11f17d5ed768d71a
SHA512fa6c4e755142595e6c3825ad65eec0411dd182c4f2e8021ea79ab9d38c897184680db173b64abaa8f986d8228299718ec71bc170b4cf44e8ec7086e4f7003b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a159999baedcef5dcb62a28d34c48bc
SHA1c4c590a2bb0a7c9c9747032a7e7e45448f07fcf5
SHA256dc08b7bd7e9e3e8fb659edddc8c0fbe0d0ac5190c1368c25d7904358f1037a1c
SHA51285c6f944f0c1e332d6773cd52519f377b702e325f6718ffe9e7d298625a1a10d05d405e6750a4ff5582c5f5535082aba46e9d2e973937baa0f1c2412db3bca50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c99cfca97f77d4d8901fe35be06106
SHA1715c71cc6b9e644ed947898dfc12916e284a5042
SHA256ec09ce54e10c9c65a36f1495b2c2441a6d8a4ab32a82aa5ae8f9147f62e498dc
SHA512bb44e4b516a3a5f7794c89baeb3faa4c49c04c93d06b2a2247bdaa09722afab801e9881798b4a02ec16b20feaa3b392614111acb1333673975cf9d943db1c240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e7490e4a4184c37465bceddea77e0c
SHA182c114ec51ac92e839b87ce9a3f29a46ee99e7f5
SHA25670df971f5cc2fdcdef74b512f99b8268045c86aca423658172a1cb93574aa7ff
SHA5122afd5f672faa407579bd5da3f89aae172fa904e63f2b1cdbe1632d5165b1e8e2b524d871c59abefbcd1c730c5a92ec4eb3ffb3f6e9e16a4c0db2d28181db5f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f27b99b3f2f2bf9519639f5d71f7e16
SHA1b0cbcb58c83a9aa3147e0a70ba3f956300b2a4f7
SHA2566c7e536adb990eef78482a2683b1b1ff835e857a160bc4269c86c4218c499d65
SHA5124a480ccd0b40e37f11eb4609068e10f82f732c357c45989a9a5381ebc5d5374f173b8b8884169e41e03a29b1ce877ea7c14f9381896db9cdd180c45e68c0fe41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b