Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
-
Size
16KB
-
MD5
e2be974af9adf766dd530585a62f8a63
-
SHA1
03c6a051463cc047bebcefab6beea5de864e1c34
-
SHA256
e045400f1deffbca923e3075b0d2d3cfaf1cc09d0c1ef09b4d1d76937139e1cc
-
SHA512
013986c517e230e23de5205286fba5514672b3b85a2c2628805f9fe8dbbfbd0e657d8b277be94774add2c6b5f5417667ace59aca9a531c7f84a57487d32eb6be
-
SSDEEP
192:A0VQKmxtWM05LJGbCTfdoPOePWgYLPsO2lQ1yhQw6d6+g5xA6k82ja:DbJGwQOrg53lB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f90dff2e88da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{054F0C21-F422-11EE-9782-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af60000000002000000000010660000000100002000000054bcbdf4843ad6a63ceb3ea3813a83b4033fd865f4dd41650a41d485b2c4af9e000000000e8000000002000020000000fd85d1cd3e8eabecb2992a29736e20dd2ded52fb9c19291d6697c5ae08abdc9e2000000077cbb830d86687c08f633fb47e88667741b0cfc090386f599f694e15d8ae5ef9400000003c6a846e4db4d2234b796b5049a17897cde1994f8140ce40acaef93ae557130e32219732e187bd4ade3163570918d30fb5ffa975682f1c137df72f5cac619e4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418575614" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1316 2948 iexplore.exe 28 PID 2948 wrote to memory of 1316 2948 iexplore.exe 28 PID 2948 wrote to memory of 1316 2948 iexplore.exe 28 PID 2948 wrote to memory of 1316 2948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4fa8456992b98c15baa5649af21244
SHA118c48bf799e4d2fdb6798b461e4556a00d090f6b
SHA25691b2d0a2f0ee5bb8331901e13510b4df012753ba496d35d34057ccb9b635a223
SHA51259262ef000f99db50e4640c852f3be8ef21feb95c81b2665f74ae5cafb022f7619da0877a90680abd7d7c2e197b5689ab9a3cacff03324d339e8c21d6e2780c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e00c1c2508f935bec60a09741a4c75
SHA1c0ddc0d247959e94da1453365df14a26037d3462
SHA256187032c5ae8c97a46b78eb4dadbd03a58a8632aa764d731908bdaf5e71dd2188
SHA51251bf7e7bfc6fa81d2e2925978d792fcf61b18b6235cdba9ee2b677b63ffeaa72bfefaf4b0374544c7a016a2c32a6dcfa2234848306461f997eb3d613ca6b9327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffc60a65a7b49b608aa3c6bfdf8c7f3
SHA19073640c50482f5a20917d35b98c9436027d9184
SHA2568286588a1806560f6687ab0735ddef73ce437658f2c9ac89c1a9ad628303f154
SHA51240711e00201853f2a520cc2cdf4777d7909852d42df9ec7ed723cd11c608419c1866ce568ab3455d5dde911c3a0eee50a0eaa12534a298b9011ad41996772fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a1879b29044ab854194414a17d1a16
SHA12af730dfae85605067e4060c3bd2e2477776d86c
SHA256e8d7f48f256f61778787a85b1bd86ffd2657e978e224bf05832b0203af9ba118
SHA5128404486f89b543b04f1ad410c1d1aabd011bbcb200f78159e22e4646b2ba12a4833a692c9b81a92294aa118c8a601e839cc29377886f3167da177a531cb23231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bdace0a0244b615472539879df743e1
SHA13adada4bfbee2bb41d9e92a202974a19c97e8917
SHA2564eeef458d714d8368c6bca0d10056e3576e936f0028d687173b56b153b35bcea
SHA51264aa1525395dad922f64d0778e1e4ecba43f67bedc631492865f57b4fe87d5caf9b344dda10f37d5ccc41f4f29b8e5fc119aed975ca33525eefd3cd7559fc42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3ca79bd8986d67e81d45946b9101517
SHA1a21976a53cc6062e1c3f97bbe6f03355eb646d16
SHA256e53dd860277dcd20b555425c053761e4098f5a6d41dea170416d37010fb71d43
SHA5127a2563edb9bf71c8a41a4a4a5ddf9134a30d2353be36df31df91a193e30daefbcc682210fb9b4c40e65447617f1d9b302feccc11ff8e667b5384c6280861c1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90eff1c661fa220514c956398f6a520
SHA1e05ba772206c5c78fae595abf5b35c932c33bb64
SHA256cd95daa353f1ed813d4cd65781ec19cb324011700d85254663e6579592d08683
SHA5120b16bbee5ec60e7bf43fdbb54bc83a069a4fa9d416c2878887057ad1b178f3b89176162c59fa73ff87806e30b25102d2641197cd9a73eedb16b4fcc4f69d4d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfaabf591e6ad781f54095e0445bd66e
SHA17ecb371a1872f3eaf57af254e0854db91d717f6e
SHA256d828a3eba24ba040b6d873140a2f3b2ee7cc7d58a8073374b59c2a52c2cfe8ac
SHA51238ca7c9237f0881cabbd55f0d90937e9740c94bffe1d785fcabe7aeae0e3334b07ea025aeefa28933b25263dfa5a0c5a2aafc36051f1e8d867a4326196750308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea179c6ba836a9a116b575ca4deef034
SHA1749fad424d5d733c596212ec9b2da8f70e0f5c2b
SHA256b62ee34e2245e24d81097a121aa7225bf8391258fbe9cacb07dd9c83b42fe2fe
SHA512e9ff6feb99e40343d9cbe775872a60f44d3e48868299b5364958d2616a6388d6c2b51e327b118ae21916da41bd04280514a56c5e2488cf7a46d9d2d6c763af79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86a3a31b214d9d69668aa8f6e5c1058
SHA10d68f086f3277b0e729fb6eb2f2cf6bd6ade987b
SHA25632a8c7dd13df218a8a0d8550ed4b43d13a8e7fe5ba2105379a15eaa5b9d844ff
SHA512731d0cd5789ec8ff6b8d31fcd1e5894b5a32a19bf261247ef5869c44acc4d8093510cfa12afc83e27b628788a9faeb3050f01eea32a49a8c3deacb9fa9223077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efd000e489d536be528aaa321f70cfba
SHA1aa71448f2d6dcf36e7fa3fb482bf178ba2954fae
SHA256b8121cb1c1463b174ff80f36147806233a9f21224a1c59cdc3a48e972d1ded55
SHA512b08342ec9748da759363fa519152495556ca84f1127e1a076925ef5cc7c0f0d85d01c691e3f612879f61b5a38c5a56025e06cff276999f8da87ad46f9090610f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e026ac5a3d979fea82964ecec6a19f
SHA1b95897825a1d1cb8455697607662cf2456cd1484
SHA256bfdef0a665278245ae7aafce730439336f48df55bcf4110dc815485ce410eda0
SHA512513298ca31021f7442a737435a7888ab180d0594a00dec53288f8711cb2d4b8bac65eadf767a24e15c5aaa777c717600263b4162e1dd40ea18dcec3e3a9a8fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81172acc74eca96283273d194dfc46f
SHA197ae398b820bd22aed4fddbf47a8589ef81f4c25
SHA256c5f5ec58aedd88b9f337ab0c734e42ac27937724eaaedd8d35eb703a3484e994
SHA5123b2ffb4714eaced7973cbc197cc35baf3c0135d360017d73863065cd427935e0feff0c8f2209ef55d9ff6a26cc1f60241c55a4b48b2dd919572aed006ae7cd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6578abd395a6fd0c7a48a468ef9cb5
SHA1c376105271f78efaeaa0d521abf60595cf087968
SHA2565813f02ad085678aa629055e3b0f12961e0df6c0d61cb3d4c21e66832af8a7a3
SHA5124db15391dddcabc4657ac3e686e609235469997ad2134f3d1e89b03440678ecddae115bd9bc29aedcf8ef52b9fc3669f1b1ef1390a30963d09b093f2ed88e800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186d895ccd7f469e3a33aa69b67e9a5b
SHA1b24a0768f3390e458ea3bfaf5232ca5c5810fa58
SHA256bd9ce2f0a5519192891dc93e019b6ba5650cc17dc27c63125be256338f0d9136
SHA51235e4c6236e57fc91673b17416d9cc07a76e778d200f09e417b1f839130e2ab8d00feb9f25c6f0226e8580cd1d67fc6fb7530ee188275464d821727ff802555f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d288f150a0a1b4cdb12cdaf857ee134
SHA1db8d0534b48be96194547f70bdc5281e2286d575
SHA256bd4cf76eb1ebe26d9adf199cced8074bf52c4232275b9852df402811093e0697
SHA512740b898a8ec94011c52c20e16269e9579de5773e02f73c4893f76375d9806f0beba91ff7a624200d6cb5a6ed37c417387b1fd33aa3bdd279842ba6a9bffe188b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d38072ffe9321912ff6c289da177d4f5
SHA1bfbe3303f5cfc1100ef71ed751fe1f30c8e91e8a
SHA256e4a475a8e67ea10bb74ea4701bc645dc24aa17374f9ecefd1385592741b90d49
SHA51203d7dc20d12c58316259ec64c0330a3efb6c7a277c74495af33fba58006cf2edf55ac05b06ebce62c42a6b4a0ac8250f7de3f5f97e0182f4c3ef9e8fdd33ce54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54020692901ad941e0a0c990d92fb670b
SHA134775eae619c6af383100943f35bd46bf4b58924
SHA25648d8b11e2edf73982df15b439e17fdd88dc03f0df81429bfb5f659cb996987df
SHA512a38e9fd2c0aab261fadc56308e359dd8c19f48b171e72ea62fcfd94ffeef090bb14e9a71d8835306d11ac8a04b2659ee07e9d51b15cb8a6eaa38de39362a2a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c1b64181c5af84cd282ac4befdd24b
SHA106bf86b1adbb39b3a6afe16f599a3e87736c9d98
SHA256cadb7afecbce3a9b5c654fdeb4ab078f4d23e6c7faf303c0dfc2d566d1ddc152
SHA512e71632fe2022d9948ee7521984fbd45befe78cf22f61247104eb9e6fac49fa6a6c15333177fcca301a7fc948191e384cbe9d64312c20347fa95a526a90b97dc2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a