Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
0f0f80e27cdb2a1682f685277760caa4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f0f80e27cdb2a1682f685277760caa4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f0f80e27cdb2a1682f685277760caa4_JaffaCakes118.html
-
Size
349KB
-
MD5
0f0f80e27cdb2a1682f685277760caa4
-
SHA1
c58014c0409a2dbfc8dc96381d98dd982d401228
-
SHA256
30065fe9a187c97b2d6b54d25479f4b00e89b5f113f97bd8e1945611a6220c15
-
SHA512
2573c7e24ae5518231dc930d7bd31b94871aaca7f4cf6c232323e958fce6c6f221d4c1a559e0749abec4fb00df1a556046346832aa477559503a0d29fd0706fa
-
SSDEEP
6144:SisMYod+X3oI+YQesMYod+X3oI+YAsMYod+X3oI+YQ:55d+X3p5d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{152EE891-08D6-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420851972" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003846f7fd397d33796af594cb3e64d11c88da4b100217e434a044a7a7888f9c1a000000000e8000000002000020000000a3a5a7e304baa0d92a369695d833125e7f6d02758add1c3c556a7fccc980d53820000000bd66b47bbfd170fe266364c1cef87c71eca28d983b48410afbf7f15ae2c4f4ca4000000054df7209bd78fe578f0cd47ee8909f2816b3f02d3957091d73e8b69ecc9ef8c21e9ad37865c8ee7a57d7d1483d59a3aab3a50a8b7a0a7352467f5e17af22fc8e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408ad828e39cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f0f80e27cdb2a1682f685277760caa4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2923d5214d2e108d224258dd818af1d
SHA1d4941f61a94bd958c8899fa2e48e84826eef7bd4
SHA256ae21f0581fa5cde087b0cf2781424e2253decb89dce21c4075a0a69ef92d2649
SHA51276c3c4a1d02b7cb340809e74b1920f39f2deae3a5ce6ba21e9c8224f56c760bf8d46fe384417675c818c54429f10bacb3d4f5d4b984b1d9ae0fdd798e63c112d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28bba575fbf54ab93fd7cb4c84f00f1
SHA1c1a46b1d87a01ce9939e6f3bc7532cd5efcaf2df
SHA25695b4659f796da27b5bb14092c09a194b432030ae2cf9883d469c0ec3a20de2ab
SHA51249b3b5e5193eb1699b9451167191b3d53f320d7d16db59915e92a20b0e42d8a93dbfd7656849dffbe684afba34c0051822dc0502462a1c57a26737ba4ca623e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b289ad89b948449b4f462a90e3df3b45
SHA1a5f66c71afc649c181e2bebbd3a7800db5032acb
SHA256c212c79702696abd04b612f0bd50146fcd6eeaff532ef4477284d6be186a3c9e
SHA51227761f319be0b1d86b8c105011eee1ab2f87f5fb785234c94d429064c20b7dbb9de336ef81d3b95a1245c97cd8fd855e9dd47fb422a3bb50cf975675dafe33b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ea65c11ea826bbeedf9a3df2686b2c
SHA1de4b80d83656a79719b62049d0af93b0d74d88d1
SHA2567ba24ab6bfe281aa8099cc3a5d18307f701efd4638ece28337608a90758939a5
SHA51266a572022248ccd9ca8c9a6b4d6f8af71137b279d138236ad98321ba0ef8e5da1c4b1ccd6aaae6973a298211b4f527fbc0f26806dbfe11043f1e0fa30dc3e5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faec57579a7d97a338631991d605ba0f
SHA198e1144632ce9620617c6a4b77793bac2bee1b09
SHA256b43b1ce75857260ef4785e3c402eb58e4b6a751efe88c1aaf00ea6f994b5e5f0
SHA51200931db71814de3296229f6c2d8dc1da7e716f7ac6cc8dc845c82df7f7b3f8d0028af5dbfa24201b246ddafda65183e75294480eb3a8810b0ed21128ab7b2869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971fba3868700180a19c995d60f523bf
SHA17254a78162f3e5ad1d90d359b0cc23486109848f
SHA256ee05451be57bb0f476b97530c127b2e3f02c2e6cc73295a2770f2a1bb4145530
SHA5126e1608a5e4e842bfbefc072eaa284ddbd4cb22f4603ab1d46ae10198335fd2e82af2de08c28cf8def86dcac0314aa25dc2e4522251664559651803ed8c1b5ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71909b08fdd21d643adca3d099b4389
SHA1be61f6e32e9c09d7d70d7c0efa5b7d4d68b5ef10
SHA256a6fb226a5f06299934a753553be2548c00494851991dfe4b7d89a7b6a23d1115
SHA512153c5657d135ab35b0915d7cb2e3d3a2c55d105f4e9e9f80b0fc78c695475192e0a60a6b85ff7a5fc4b4dec65d04390564d8bdb879dfc030b8ccf2ba7301619c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edddeb86c793eedf809b9c64c5f7b6e4
SHA17fd589731d7ff20e50727016d492fec7b7461e58
SHA256b5f1cde45718ac21e1be3740b14b27a9746b3c1c5c899642683d485b3ae814f0
SHA51288b4b1074347b22252ca97ff41f571047a41c312fdd8bc622cec8a3c6e717c86c674922383e013875ca222b89726133ca8dab384fc52fb82bd963c08accf5d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab19c2d8b3b96d9238404c7163829b69
SHA1fe89512ef0ca1f62a607fa1a12ce28b8aeb76c5a
SHA256dc4fc9d4498e3151cd766e4d3466738a7d18120392f5c6aa3a1058fdaaa5d61b
SHA5125e9dcf9e4a5c21457f6d8376c747b6ce4f3cca295e6e74ba89d90fbe7262b157b526c26bb988ba8517d0ffbaf593717314a6d14190bc793b5a40fb9682518c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd2aac9ca1c26832c62610bdc821fc80
SHA1c6cda627d89f7dfb2e0c0bcefcdc4084bae416f0
SHA256fb573e973fbfeff2999f1748bda3bdf3b2d3282aac4a33e89e11b513030868c7
SHA512bb0d4447d9453425a523ce6353ab69248183d3cac11f87901c77a5a8269fba31931ad8bf1a53f0adb8c119070b2685ac88fcee33449660f11dbc0b6961d29fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb0ab8ed0319e1fe259b4337fd97624
SHA1536588486a55c6022a68bff4716fa40ff8beafa4
SHA2560c737e9f5e849cc839983a6d5c99788e192a3c979a5250492cdf62b381d1287e
SHA512ec8a3fd359521b66ded9bbedd92eb143d3736fe9c66bf845dfaef6ea9eb021adde14d83ca90b80570f1f10f5cebf6b7bcee7f9e3813cf861cfb7db47c035e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385f8762bb86430db5fb44060bb88126
SHA1eb27abb36c26835099a16022162ae362b84e6e7e
SHA25633b2c4ec6df295e265a13305dc76483997e01cd476353710f5414312c959ace0
SHA512a88cea7d990ad01187ae3a2e9198b2730cad4e77b9aa50e30e3c90af9a0c11852f6f0170b24798f17bbe8b02853bd7034c803c5877d2ed1d6a54796dfe58e377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd421deb02f9f64ce3d457d06b9554b
SHA14181dad05278c2ea68adcc21145c7d660adcd7e3
SHA256884bd7e2d7b9d5d492317dc9995c56f207640bc0badfb70ab7b0454cff817246
SHA512fed490be5011e23f4e809161a9acd010c9973cf75eb596c80249087cb40faa4c1185c9797f486a51cd748bc56746829730d99b99c4a67918d1cbd5211d393329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0a58a3c35a56e56f60210d8ac3145c
SHA1d7159b6161337d2c9b88b380f8095e48afd31dcd
SHA25619b005d4eaeb1efd06de4bc6a58d0d0c643d61d39c040cac60a71873afcd8c11
SHA5125e747bf07bd8d2ef5507cda1eeba3c7069ef5fff8ba8ff53388f741954da5bf9aee64b1130dbf60f0ad3169d7fa5d78ef73deb8e5836c4c030d6efd736cc5fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51159af46586c53ea120e40a647cebd27
SHA16f11f17bab1ed60cdd8a4cdcaf3326cf64fbe81c
SHA256ba9d4f0c6660a2418bebab37817693a6b432dbfd175ab3a0faf4de448a2bf656
SHA51219fa6f65dabd4a4a74daeed883edef36914359ba9e1e5f5be00085d589edce109f53c77f22b02b70056b6600b36d096a617d9c7db1dce7b009671d852479d260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5593065f01ff98508daa987e64ef945e1
SHA11fdeae4cc4cbad9e41d1998b76e84f7edb3fea99
SHA256a3250318422741ebc62cb10243a563776e81a85b639be4ecbcda3535ce4f3b20
SHA5124a154c51a7f5d04f5e5b2d34c59b0d5d1b47f9c1b1d05225e1420a6fa76a0484b5033bdc5c0281a5b14995a24be478cf73730859e38692af286e34258accc6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd251132e44cf4b1a180f2f3a86b5992
SHA1af10bb8bb1fdb7c86c3889cea31541f898320bee
SHA25618af0502898c5167d0c45a3b467e7ec24e5b4a91167b7528a5b675b9f681d3bb
SHA512f9477f7519039e75e431e45c1bb6002eb37c8974106856213dcf5bb4d5a1ad22570b3f0dc11c8504b55dfa378b7aa1dd47e8a01ea6aac0c3867c1946308eecc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5831539a4c308137970efa3be49d41bd0
SHA12fc6745643e5b6783ee57b32ee1eb46904feaf53
SHA256d12d20b2111ef2b37b360c3cb93815a2a0be5df8dd0fb42e9422c3cdebd24c40
SHA5128a7ed88d3832a19032c9b54c387cb7f86e33739173694907b9acbfe6d748a880a622ee42fdd846e12f853404092fe13e781f1a216d53b15067523a4cb3ac79a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a