Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html
-
Size
99B
-
MD5
5e4768d84647fa60bd0d3c4137b98cdd
-
SHA1
4dc40729143ed76e0ec6b8a505ccc4017802dbc8
-
SHA256
f67bf47711a7f8b97c458305267d3b688bdd6c173b044e64ce84a900cd8ee24c
-
SHA512
eeb3f150ff0452ab91159d580725ac51740b95d2df08a53f8376cc61436acd75980d17a6e1ecde5d8f2c6f90957bf6a9a04f8973b00a3e7390a34c364fab1b4b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a3e1443457ee75c591f869e5b957515a82e5f4cc3f991d1d1ab5f496a11ffd0d000000000e8000000002000020000000fb6687f57be7e20602652702c6ec5ba9e5e55edc0bb72b8f134628daf4eaf6bb2000000043d1a12f5a69bf066ed5a4e1a42b71032d900b097e79a27dfc868eed28f0c250400000006fccb611d2d1a5bde35961413a696a2b6fc769fe60b0838b48d6185612a09f6bf8c3fc634f2305b3a09b70981d22b7efa3b85317edbd4bc0a51c59609ebdc755 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427596254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7166081-462C-11EF-A7CE-FE3EAF6E2A14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06277ab39dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30 PID 1992 wrote to memory of 2508 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e4768d84647fa60bd0d3c4137b98cdd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5f01220065c7b3098274fcc7689793
SHA154541bc068d886f4433ff7228085b4af1d8053c2
SHA256e7624f55306925bebc8de1ae2da6052306d1d196bd602717c69c1ec9f974664c
SHA51265cb9fa24aba78800863b59a309eba3a83cc23f54d8d8d747e4bac17655cc7377f977a2bdba10ad72f1b72f21de389d8da25c23ddf6772d7895867e8f2ac95da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aaa3454e0f0cd772677d18baf4e1820
SHA1beba09692df23d27d91e05f10307148db9f0504c
SHA2562be93bbe5a3750ea8fc0843b3aa4ac00351bb7e8a448a2035275497d54f5e1b2
SHA512216e681a8ecd40b94f24454274cae34ac9c4ca579d1d0375379a4fc780ffb79928c928bc67b6207b0f3bbf69af188c82c7d956214b64423bdb20922e343d7afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cea78e457a2c1b46b9fcf0a7902c68b
SHA1e31b12d9eedb6c411d144a56c8f10a34705fecc7
SHA256ca865397f3f2dbade552a9754ba5ada70fccc3d43cffd39d3f08699664abe204
SHA512cfb056da8e42ad1597a7358f9b32243830838b4838fe526bfb1c020e29d255bf8a2a7691572e715136b86647bb18d00344dc3b69a7ac790572d545b65e355446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f6161ffbc4b71e4ed87cbed0a3bb1a
SHA134da9ab403ad305c777f5929c929026478c849d6
SHA256604d846ab08634a56dce33b49d612bf0d74d0079799e9a769f2ffc070758d333
SHA512d375cfce68a5e05c1894369e8cc39cb4f5e68bf7ebc6d2053a884bbed660160ace279489959d5ef04d46aac87091d27dfea3706f89264ee9b4eefec739836341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda92ad98fcadf34c9ad8bb924d201e5
SHA1dd803969034a586858398db88b29519b2508a6dd
SHA2562142c21d4a0ed19c8a7d4b5fac60de4c38d7aba7b484cb726154a96a4eeeef5c
SHA512497cdd04908c341b414e0d70d4ca186cdab8c866dc492fac683351c9defe3aa6318a9ba810ea4258a22162e8da44a28b9b8df07711e2e5fae4aab25761c1d3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda617b58fb7da3281003f233c17b35d
SHA154ff8c0adb21a18091417223b5d55a66d68ea7d5
SHA2564b90c019de1b73208b6ce4919af03f05c5e939af36d9c7387510707fe9b7000f
SHA512c45c41aeb1c9f3fcead7f206a6b6331ec168bcb3c2e10471121b02f43fb1d7000d24dd8a6a9943e313d6b734dc3d8ef729ab0be64530518e1d15447960ecf814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585115ecd99ea8dafc3b650f0f7b2d915
SHA1f1fc824939f4de8f1dd478613bd442f739ba7643
SHA25672cc7be0b71d6bc0445a3036a91a37a8ca1b376dca87d788ce1d7e770ae57b74
SHA5125f2ce790281ebc87d9b1eb4413b004a78999fd3b89b5cb8846308027c0c5514aa4fbef17763b128c3ba6d74f3ae6224a55a722d63fc8a6886d9d61184d75b571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba55a50b4fe07738f81bd23da26cf2a
SHA14d7cf65cdd174713205f3344e8e21bf3d3d4208b
SHA256b9f3092357b931dd6a55a552db7df390da7325e3642c9b1eb5d1b879ebcc5133
SHA5129aac18b57ecd3dcc36680ba8ba7de252287c4dec20b6f922f63cca316faf47f574c40796b985da1f359f24fea8adda79a27fde59b14c9602ca8d4356ad94282a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cbd00fb6e787cea71c8eaf80c0fe86
SHA131e0f9400e09b9953d379c0c48fd03cf4a73fdb4
SHA256b6147c7c2c7cf0325e143f1583930800a36ba1f74c68b0cd66c946bac4dccba8
SHA512ba6ce716bf63e07790e911ee8231eaca8c0798d3a426631b18a8b947f8220abe2cb8ab4aea8e4247d5eb6bcae8017af9a8e205debe8910d4014363f1a5a39fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a640ebe8254c11a384f646aae2f342
SHA1cc5e597d038d29be56e48f3a853a4c42ffe56aa8
SHA25609fb7597c9d65cc010741cfaa9346bdf347190a6d02b6f7610a1c062ceece4b2
SHA51279d15b9a76f6e807e63eda44e1220ec3e3422cd983df98a6d1c660ea14e8f2f46bd5b7843244cdf6b7e8dc4df63fb6990e1f3cc5a0993d4ea1049c1e6f2ab9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7926f77be038a819c78d7913d06471
SHA190a7a95f10cde6e2b853050bd61e27187668a011
SHA2565b0d8cd0248aaea0bff8f4621ef139aff99d5161391b7db943efa30c45440484
SHA512b5cd3602db171a151081c3fc38e900ae20bee33dc08943445ec03de4cb07db2a7462199016ebb6626bde601a5e721509ea4163e357cfb703d2bb833f885c4252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e5dba009873b5f2cf5c1862de90b66
SHA19560256fd714d4f86c51031aad341057a4791be9
SHA25618b6b9d34c4d96e8fb3d15899852dcc8b36e28382c63de2f6648a5afe4db7585
SHA512f0b0c6509308cffa12fa6d0563d37ee1b4a1e1fc7e2004a58af507c23ef629888698340d845153fccf59042f6cb4d8a2ca02f5f43fa2256780311a3fbe5d94c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322b77fde0a0e4370e60fef80bd2bfc6
SHA16797d56be03a3e105dde9a269a4e00dcfda59ec3
SHA256d34502e2cc17e8161e94e63ab224bdff6d04701b9699ac079011620620318d01
SHA512131ea817d88b978a54177c13dfe7388c04c8c9ca3d8d0d23b4347d5885de22eadaab0af50b0a504eefd9162755bf85eb9ef915fedb06243c0d8406f460e0d9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ec664f470c1ad8c97ce5c2ea32d11e
SHA1ec5cb92ecb2af5c1812f48b7adecde6c8a978f5a
SHA2562acc675bf794f129681fa773825583002fd553b9df54c11cf03ee932d5742052
SHA512cbbc0e11a4fd387c523f0f2f88ff2b1eb4ffcdc8a9146cd6afc510ec4d5d1ff27cdcda9a963ac3a645d3616a91f3c1391ae4cdff76df228ea4b111c63075331e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a6381aa35505c4d60eed0e47559373
SHA10fc714d7b0b3d41641a0a58aa844c02873cdce5c
SHA2563ee450f029e577488204cbf4e4f3f6f233398d7757b9141fb633ae7a8ae0e418
SHA51212323d271a0a273db08852ce0d907075fd1cfc88a6c8c6123bb00a89b353b4f693b0d26976234899ac5af6f5fcd420dfaa68314dc3b28b00d2c426c02441ed40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f915bfbad61d5aed82d039b2547b71d5
SHA18e80aab8b0749c7c62f27e240ada89ea98cc70c1
SHA25665fe1a11e5c2f07534525480d8cb5bad401eb8e9e549e7dbec21e46d856867a5
SHA51293e3a7a197b475405528dcb21b9c464f87f81f2219d0d4c6feede0e39fb7378af812210ef4a13d626cde1c4bc944b4c5220566ba5413c36f04988ff68c396cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf83aaedee6203d533a2e5f2fc992a44
SHA1403463da41c0dc41bc40602828b47836b0ce9887
SHA256d697ea7739748a60a0bae14408ad20c0c559345802b838a9258a1f383039e0af
SHA512b7709571185e8207a5b1e1bf9e4e078ee4f8990aea28642be374866a35efa1245fe3058505ac31ef8f690ff59f5ac397f03b9dc15f5ea4b1ca11b5d6e9165aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079f5d9944104d659975b7ec873ecd3c
SHA1682aaaca1f8e922faf37acf869744d00405a43d2
SHA256274f64f98c1fbfb3da3a5ca6ec104b3b5915189b006a079796ac88d739eacffe
SHA51207a23f0d408b2373fda4c549520db69735ebbdd575a5dcf4a2f2fbf7753cace431ec26e09282c06c57ea6dbd5d09f4cadbb46ad7cad09ec6398914440c884c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5789c1808d328a8cfb78ab0f3c52e79
SHA1ee798223d0d3677d685feffb9c9c4f4616bcbc29
SHA256d6b28e0c1ee10cbb1c4f35c771ab846d886207ca9870d121b8865758710eebfe
SHA5122be8db242fcf87aad00916445b8316fd3dca8854b310d0f659e85d45f95e7336ecb2f721fe6254fa2b2064819b8c38c4794d2d323a2d6d3f60b8c4a9d48c0522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65171d1bc5eba6413ee1c443d7b7d5a
SHA136527a7564f9aa1550b7e3fa285cf23a968024a9
SHA256712ba3bf7672276d1eab4c9168c984e79e8988a601e76094f7f4b3030fbcb6ca
SHA512754fd32502e78d5bf62aabb41e5d084e6f364a2427b4c05952804ce21682a69ba5690d7f1e5d95555833bad5da993feb69f9e41d0764e071998b5af46fd50b80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b