Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
e915278a377e1899a3a5b33e866e7772_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e915278a377e1899a3a5b33e866e7772_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e915278a377e1899a3a5b33e866e7772_JaffaCakes118.html
-
Size
58KB
-
MD5
e915278a377e1899a3a5b33e866e7772
-
SHA1
ebec0b430d6307be04637984b3a1dd54d85b20c3
-
SHA256
e9139808dc875d17008907a3ab598f5318aae55205e9f034b81195f70f974ace
-
SHA512
c28cf43db97d0beea0c134c40be82f7c3289c41df2c3e803abbd1eb95305e02e14b2774536b8281e0523a1a6223b68f050ed51b582d68c4517e29f615f22e11b
-
SSDEEP
1536:gQZBCCOdQ0IxCdzvlfvfEfNIfkf8fzfTfJfZf7f5f+faf1fgfwfwfafTf2fyfHfW:gk2u0Ix038lIcErrRhThmidIooCLO6fO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4309361-F61E-11EE-B708-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418794199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000cb39644344ee631b1d458c1c8ffd26052a38e00658bfb9989c716c8aa8201c76000000000e8000000002000020000000987ad14b3c37a1d992988ef5ce199d4c58e0d7f3b802d322d3ac675f0f7466ac2000000097072634b27b2b98d9b6939f7429da670a00ad335c45c6647710048ee51a1e76400000007195da07f22088d70185645ccf8459fb98dc7eb0a1e40440b2eeb20013832477734bdc7f1cd1cca9f4df31a8ca293635ebee521cb1f04b5d25780a1a3a11492a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500f0ee22b8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2560 2840 iexplore.exe 28 PID 2840 wrote to memory of 2560 2840 iexplore.exe 28 PID 2840 wrote to memory of 2560 2840 iexplore.exe 28 PID 2840 wrote to memory of 2560 2840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e915278a377e1899a3a5b33e866e7772_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d62fe3341a7566319c4f1bbd16a288a
SHA1244d1c65fef9bd00fb85708ad774504f61e8a751
SHA25609ce83e5d702fc5928635726142c85829a1cf79e36483def4359c5acc78eaa54
SHA512b84b7ac941dd8a43ac81b118f67663b0b3757240328d8267f36d2de143d4cf8836b3d9084b4b20973458fa0c162e71dab8670478d97edb38f9cab1764456577a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582e246b88a64b9e2f51f6e8bac153c58
SHA1bfd813ae8218a6596477780106fa382e42c4c483
SHA256b48076e7a9f38d254cae282d72b13a9265b6bde5735f6ae5b71d71fe9dd60287
SHA51241f18865f9ec4b991d6802a0280a222c3af9faa93b4122add0af68b473a060cc21fa1dad97997dee6cc47365fa8b714c95526c98e0a19b466a5d8cdac3aea9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f2b73bf825950fdade4431ea94e5de
SHA1ab16dbf327030d1b66c88282615f92528f619d43
SHA256790ef345df186d49b1b0712277a1969cc29cfebf46162b174aac4388c651996b
SHA5123e357b0f6b8e35f827a18b20118fce42cd4f8b93f6259bcf311cc9b2c1520dd7d6fc0dadfc173e82abcf4260ee4b80cc86cb15b59a39660465ae69c68f03c4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd76034370c943e21dae9d1a2fce059e
SHA1647814c81e8790f694bf021faf2c42802e2ed7c8
SHA25682710a66fa8584e1590dd2307404a822bad01bdae3def69130d3f6f987bc4333
SHA512b4003d5e648cf6cc33c4c8fd51f730a03fe11cfa2a59db75263be185fe3f92ec27c341a1349bc200c1a81081985fae932dd6e9a0c6d009d89161c473953962d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8187a581bfc0a8d56dd524ef06ac410
SHA1c97cfa516bafcfd0e61518ce167bfa68276a6f90
SHA256942939add190d35f9c4c32555dc2a5d5da2bab030f38bcc871f3ccf1821bae7a
SHA5124f24fff09deb4f7eaae3e30bbde64cc4e3ec38791014a4691b52195640007b317c0f9fabbeb201862ef71e03b2edcbd800faafa962322de9fd61158e6f02ea64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f64ee9b4cafab2ccf2c59a421e4b4bf
SHA1baaf34ec92c6b3abe24f02e6590b44fb5f98427f
SHA256d6c5b5152655caf03e553c5d0034a9ff1c9e90111fa94b9aa6010f3b19152520
SHA51211d9c4fccd14148953a7a9501e73676c1d63c6abc932fb8547a7321e4149b51df98a153e6333fd97a174ff9a4380cac76fecb998256971692a52f96bb55b0376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50118dd73c3ec313c63cfd4fe575d6c67
SHA184c89d897b73c7f8decf01d29110b0d5fb960f39
SHA256b7acc7f20211480a65bd6782c026456a2773605b009a88f96895ec9e93cf6df6
SHA5127948f8ab3e80c3e2cee94a01b6f3ae64e641660f1971c74485258ea95254ec158ebbede85002f657a1af802f6bb1c55832459a1e3c2bc75c492d2fdac675b846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c65ad108c98d8c37defe2021bf61dea
SHA1b244b7c2ab8c94b86ef2d1b9c040758df55f9636
SHA256b6283013d89e9ed13be89065b11f8d9bd7c4041e2a3e7c23fd9c83206e2e190a
SHA5124f7fb8a9663c698fdf47080c2b1f61c67083302078fa1834f90b9fd0c915e7b29f5ba3d983d3ac2e91fe545d32722a5edbb90bb59774617bd3b9158b31d40d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f651c560822b9bb62210a0b8e8085c44
SHA150c9977e84fae98f7c2ad64af1bfac600cd03cd5
SHA2566f7f09544859c260739d0fdf0ea9fdfd7ac9c44f475b6c78454046a942504fd5
SHA5125335d8bdaab9a7c504bcaad41ff08f2aae60649cba58ed18fdb6953ceea54ac3e087d125385442b3b6cfce24665d497b1036144bb92a4941a08ed0815ec79f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c21a5711907cdb66d22242d85f8ea546
SHA1afe107c6f6d38efd7a430751b0add3ffafa6b7ca
SHA2561c83ea91f6f9dde1250baeb313b27ec7f7183601d25a947b92e0ee466726fe9b
SHA5121a1844378283b7fed73eb2db3786919f84c91892d9eab3d9474a695741a2a478a5862005aca72ef4042ed70479b8222a7387633de17c59091a7126646b8988d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2cba32b8f6390b193bf202c32b37ff4
SHA171b860204a560bf5075eb2d54d097973f7c9678b
SHA256b5283a1b5042609deb3420a43940e05c755d8b651b87fa5ef330045c8ee09b35
SHA512ce8cf45734d8e231ea744baa8bc60cc97745a5561753c09e07d4068f6b291d714f74a3b026c0e96ec2625bc349e927baccc6428eea32eb444a27ab8eef8d41aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c3c9be854714eb57c326c0e26ef9138
SHA18e398559ebb9a34e11027426a88e4a5a524f4ed6
SHA256643297aeb8142aaa849e3af171778b4712ae81025a5b4e3bd0d62a0cd66807f7
SHA512f84568b6aba759a1a61d33d498bac0f0eae64f0b1df012205e2ab717bf315609ceab40db30c50f6eae01c5d4fd698d9da8108bc0427dc306c8f0e62773be157a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb7ce841be4008e7cd108985273f769
SHA1df065161eddf5650d667d2e44a07f3c312789a6d
SHA25672e813a27e498b31676b9581728b4968badd2cc0094ce5e20e43fdc33f3722f3
SHA512e11ba164b59b3b6838b73579feaf9acb5adf2ad33723bb8a165d9755c8b4a9cf3638feac52646bf953e8cc4eefe9e4e13ddb44cfb0d1986a3d9c19536155122b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152a0a731513513503e0897f784561b8
SHA14e60b36b6bff54a444db816c837dac7af3521efb
SHA25640e05e8fa82def024d3ab9cfc0d059e9894e3e7a4e30b638296e6585120f6554
SHA512e25964cfacd1b96e464e9c7e1d2608578f0917a7d725cc0035e13cc1bea0e1f27a1e06ee3231f10a846cc458c0e092694a29cf36e4d3dc974e655e89aac8d447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08c95f95343556afe96fa7bbe1608ba
SHA1ae25389d839537347e7e9619cdaa70955513ab83
SHA2562ab0de97f15b43c26aacad013789d9c817706e102157242f3427a612dc8d49ac
SHA512ef7b522294d95fff59bc917b3cb2dddb7139b27be68843936c1a01a307a2f057a84a39639ed4c14121a06a5a94391146887e256a34606ca82d984784b141de0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597efc6be13fb43b8ee1e0b9dadca08f8
SHA10f158ef795222857b77aec2cc0310a293ae06dd2
SHA256d64e67566811ce149072a81daf7cc61fd9b30b107eaadcc8a760485b21ee0e53
SHA512167e50e0a005b65b8367116a5bd359ae93449df6c1f61fb24480739e03d9c3df6bf9aab53befc6e44fa9f995d76caf0d420bb789bbc19ee54a9ae189c4b21494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83a53d677154ad2fe4e0b3e0e960bb3
SHA1be58c3a6a88a5cef46baeab3e38b5db4459eaf37
SHA256e65e2b87c2a26bef15b05d4f48690dc67466fa7d61c2d885f495b484f315052c
SHA5125f145846c7f4be96026bc6b45e35ad8fcf962973a9fd79681be72f3ce0249689773df4b39bbc93139ae658f4a89a6cf2e7407876752f288bcc9bf9fde9238b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f402fe4b78020958bef0c6f92121df
SHA1e1ed00bbf364c56a70e07a0a12f31d0dd5d8afb0
SHA25684f2177251aadcdc1a5ee6c4a7c0d5926372922d955cda0869e053babf6fbc28
SHA5123a423e190ecae1e89451f0f465e0aa6f8af9557349af889d8c97e790db59b92b569b615ec9f5fb8058f4a008bc44cf6706658ba33489d01ec2e47258a134b05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c360dd8efbeaeac3ca6c79d2cdb6af2
SHA1b85379e394d1a1890e9bc7ce34db42b9dd95c921
SHA2566db5cd1c27a3238718326e7281943cb7ac12ab88eed37558638a46addf6ae0fd
SHA51256ba50b6188feba0068fcac7d772e16c620f09010926875855106500e616b1cdde088af6db6867e30b626e6a322f928d1cd144b3d98c793b3dbbb0076bf1c4be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a