Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
f9c766edc6bf85f03f487870dbf892a0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f9c766edc6bf85f03f487870dbf892a0_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f9c766edc6bf85f03f487870dbf892a0_JaffaCakes118.html
-
Size
28KB
-
MD5
f9c766edc6bf85f03f487870dbf892a0
-
SHA1
dafc0b85a8d9957562cf56576ed9c9a3b114d698
-
SHA256
e7f1d5e9a74836de5896e9038296cb9b99ca8c6f0113f7d0c88e2d086111a6bf
-
SHA512
7650b198c1acd71c1e8e781d246c9d51d7fd06428c88c10346922f99f2ae1c3c02ec85c6421fa91be10a5da34f59ce5ddd0f9a52d9b074284abe6cf853af7938
-
SSDEEP
768:Zcd9QZBC7mOdM0VpC5I9nC4zwIwVwPhPd:gQZBCCOdh0IxCYwIwVwPhPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08b7ce62892da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{050FF7C1-FE1C-11EE-9ED8-52FE85537310} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419672546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c6d110c39f24b81952af93c6f3dd0ecb85ae41c9cb4a43acd1849a476ffdddc6000000000e8000000002000020000000eeef99e0639ede25feb29ebb54fa928e4e50dd8bf89eba51756963729b737a8e20000000c041e4e5d0f80259c761c096a25b156aece2c26afad9112d220f95919c0ef5a2400000005219f16feba41020bcc2d056a0b18bae55b0ec858f0da4fcd3fed90f814ca5d698fbb4ae04e295f781f2de04a9612b051ece5f4c68bff5c6e108e16453b22019 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9c766edc6bf85f03f487870dbf892a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a2af499e8b7afc4a216989b38baf4c4
SHA1dd05079959651263bdd731eac46032557bb6cca1
SHA256e6e33d7a2c6efd34f15700f5d086d79652c340ed7629bc78c3397867bab58a19
SHA5122d9ce89176d3aa1e325e501e23317a118d591a13afb20a5f435897ddd2f9051c500c25d243d64dc52d60a830af1e8f2b8e08f34420d548418faf2a49cdf885aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb2bc6a9d0cdd082ca5f400f7974e81
SHA1f9f61f7bb084ca024e82934c560b8ecafab6ec4d
SHA256d40d99a8b7071d99e64da38e4fa080eab79fdbfe92517978810f5b1cd0289260
SHA51223c4dd94fc732e979c2a613cb91ac6328f9b286f81eec949a17c8227407623cfa24df9353f07d27ad8e0be070dc64406607254a97c90cd16defc1a1e79611c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b884ea9ce3b5ea4b4c8aea111389c365
SHA12bef0568a390b58e30f4c8a06551ed50fdcb01e2
SHA256e4dbc0e3d037f6a17884943ad0c03fbc35670e7dd75a2c0bcad2502dad0a2377
SHA512fefaf07cdaf0e65c3a271722acbb0231cac5a94ac62565b5429ebc0bbf00c98a5d450d636d05b4a71694315757a0fb0cb16627871f585065b4643eeabe4e9a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a98a8622186e7db5b5280e8dc438506
SHA1ed0f474da88b06f73ccf564b993ba298a95a7bbf
SHA2565066f0a718487ac4db90aaa259d8a91343bf7b2af8f7029e5153399bbd2d799c
SHA512900190ae385ebda3a928e03216657db1286ec6ce7dcb43aeabb3e927ebd175ea69475c4f9717188143dd17e16583b8e38e77425d44f8ee159d115105e021fa7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6a14416da2841377d6286b676891de2
SHA169b4f8a6ca5b99247acd81ab718550a1c095c5c9
SHA256f62ad4b9c71f321feb04d36f8d3736d82c6d7228cd5541f974d76d497e0f035c
SHA51226bde814038edd3e42a52514b3499c19860dc6cca40015eb43f1e006b9ef0073ee742a65205dcd8efaecbb5a72c07991fc18594010119cf69036e1c04087f827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3370a1acffc22068bcfdfd1beb2b2f4
SHA1eea5e38aba9cf23948d552ed46046d74b191eca8
SHA25668faa26a7e084c4a84a20d6c220d1f17247a362a6e947b9a03abbcf5f3c8a9ed
SHA5124b9d699a3626824b212af2c64867b2d53b80b1459f5cad64bc331c57f761e3de2ad7a0f4bc64415a69d7633a46194abef3d5482647a2d0f6f82be4035339fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9dccc72944cd8e083526141ebbf9c16
SHA1c9a350b6eac77e529c0bb7d3702be1ef43bd82c9
SHA256fe27c67d5f9829a549243348f782c87aa0fafc27f3fe82afb0bed42a13d86e0f
SHA512b09417161823fddec2e935f3a6797b694203b9029239bb6a3ab00f363eb5c9f9e8605f3f286fa7e5aad42598a5cc2df9234e438b4030f79c8f7da94c73436e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfd75ee81ab5aa8d8687ed5d208fc779
SHA1e0e72e426a349f0782e0552a814d47d06eefe31d
SHA256aa2f94a05d20bec5c03eb7d1e1f9b827215505babae98380d4e24780edac78e6
SHA512bdea050cbdeb026052b82b54b21912c73ecdba372b0d1811663a5882da98b90cb55789d7ce3d2aa4eea7b38576996cd683b9003408ed7124172aedf27bb02f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be068421f186ac6961bc67f064aabaa2
SHA1bbb3244b240979b939f4b45e27beedac0642cca9
SHA2561891f5595e4c99d04b0799147192475877e5afabe74246fc32badda4a00a7f99
SHA51249e703cd426fcdf1ed607e07b0e948a6e92d48b64100d6743d1722d43f83dd3b92498d2e5eedb573a3adfe581814d149824ade7517fd1062e02738b4658bd3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398ca1ae285db77e538c696efcbb2f02
SHA15f365d5d6d5cf428880e99d57292a492b1cd23d2
SHA2562f7c568bc50220a3de8a7dd0207f9d452644c86808ed97b911969c9c26173648
SHA51283ca9f13c990ad3efbdd78df371c55a9d7924e498922a515b51e5531ebc961af541a1be60e80e9eb56192b7276306826aa12b330f5626e7a767e1dfdbaa9ff9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d6d4a07f60d476c017ba43743f25015
SHA1d65f896179172226bdee8dea50c0a0818f771131
SHA256c9f6f085124948a956c9fdcd1f88855153dfc091f5aca18669e021d299b0f336
SHA5127dd78cedeaf3adec32dda5b946e1cf666fde726c528e22c932351137e31696eb9baf601a2f083c5e6eb069d7183815e23f8f802406d8c7df09831d2f0d2844cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb2b16c2ec1c7dcaf892b6abeb6791e
SHA16d5e8b42d89a3216e4e28008fca65a7fa74574ae
SHA2565bbecff957db5c3e229dbc3dfd64b1f4ef2214064a0d99ad2e0a3c0ac604560a
SHA5126f23a57f9593c0a6d0ec2e843926a561108b1e131d0d58581a6eeb9277debe4e4a12da19aea33e9482170542c04eebb8c157f5a58667096b982206adb03746e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4d3eaaaa4c076c5c4462e9e72c3fe5
SHA177653a267e620f7bbf84a0bed1817cbb69a0cbe3
SHA256383ab10b7b434a620df2b263239fb71167f2ccb5cad5342b8cb36f1aa428c316
SHA512673a6cab311d0c82da123c7d01c0bc8dcb777f74a57c973ffcc7c033ed6af9aa33b988ebe9552fb8c3dceee6b99211cc525cfc8e815d9baaaa7be831409cd221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b2742ac91755ca6931b8215d56c297
SHA10ba00404ccb5121436739a8cb3981d6d03da1b18
SHA2569921da6723afd497be655621d30d44e0871a4184eec0be7b4458d37c96bacb5b
SHA5120751f02e4f1e54c97f1ecb99da93793fc3be78fc3384bb04f3635339415596f394e6888ec969bd2c13731afe296e312ee56d340681c9b3d873447f740102a5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535c8b51ffb4b44e92973fb193ca2b75b
SHA16acdd49e0efe1e86eb2060d9f45322c09d3ed24e
SHA2569b3e52a5c9a4322227f3bc809feb5ab44df30402988aa9d7afc87cc698000367
SHA512cdf62df3b45aee699ee404d70a41f6f75366636311fc4dd9ce8f60a0908de857dfd4856cf1127dc87474263ac9e8235a37da1fe2fa7518ca07b3d68b49f046c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509128ff6a6d264e6e18e03149dce8203
SHA139530bb9851d514dc5481de548cfaf16854154b2
SHA256bc5d53793e3681aa84821a4d457d4d2e41a0fb5f7fd647403bdcd28efb1d2a24
SHA51272a83105731e6782d8c3fccb1ec0e3503892a1b0ad312e3c4a879d4f1bacc4708d7b79b819328dd432640ebf6eca9beb4fa4ce142dd2b8241abdb30edfe0f254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad5b0412e96b46e1c9fd5eda59a5a9e
SHA17a4c5bb9164c6e584d17addb47486c15033591ae
SHA256cdc2db6b906829bb1489e85fc7545e88f6c3fe9e5c52f160936c77268ceb3e8f
SHA5123b84e49d33cdc1d0a7ace3ccd0b4ef310f14a73f9f7bd4f4c1cdf9c021981bbe02c6909023f3cab8f055a903b2e748465cc5d41a52db8768cc047600fbe43901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30c54d2b9c7007cbf9fd4e5c14745d2
SHA1e13aeb47292f5272ebc56a72ad6ed5dd76f86071
SHA2561744f0c80da869d85af29f9bd4735b905220f6f8756793ea017b24e393a74d39
SHA51262709e4039de4029fbe0cde3ac405b55e3f2e8d226d649539b076caef9544d8b92f3267c899cf4a276cb1157fd21e3e1840a3ba973a2289ad3213a1532368d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d81536c759e81371e231c65035e791c
SHA1c11abd8ffc6b23597f80c6e8982eb8504eacd6eb
SHA2566a0398231f1c5d03784bf9b556d0935abfc9df138b4c36786be1100f20520bac
SHA512cb453f083c1bde883db5285b1611cad4b2c4aeeddabe0c93bffcf01981aa40e3df3b5ea87a3a5a1f3538f563d0878d1270f0eb34e61f0ca48878156326e99d98
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a