Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
0f15f100ecbe0eeb5cb767c71d358639_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f15f100ecbe0eeb5cb767c71d358639_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0f15f100ecbe0eeb5cb767c71d358639_JaffaCakes118.html
-
Size
657B
-
MD5
0f15f100ecbe0eeb5cb767c71d358639
-
SHA1
dd400a37a6b5cbb195a2b1e79250ef5b02871ade
-
SHA256
8d765cd1f764ce6266ca6877d887879246e027b50f77b7228bc87afaf15ec6a3
-
SHA512
61e77538f20be50db3d4622321959a4c3ac9d8eec8c8253faab02cf4c1215f6fa167e73d0ac853ec24af8e95912a429af74e24708cea62b921182717aeb3f58b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E01FBD31-08D7-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420852741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000bb20719e6d8cbe5865c3778c97bac93bab4d4450ed3bd59ef460c64b791d4bb8000000000e8000000002000020000000926d0e5e5c874446eca3702e318b7b6dc98ae6af7bbd4a2223d2520d9d175e2a200000009ef1e9711b8995cb0724898c739b26e067f411b5361a76924275df9cb6a1d58640000000657f257740f0b89634cf84209dc83813aba255836a17ee7d04f5e550970d3f40353d75a4a739702f16e7e5e0b2a939fd8614cfe3a0ca583444ac823ca77f463a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3030a1b4e49cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 2748 856 iexplore.exe 28 PID 856 wrote to memory of 2748 856 iexplore.exe 28 PID 856 wrote to memory of 2748 856 iexplore.exe 28 PID 856 wrote to memory of 2748 856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f15f100ecbe0eeb5cb767c71d358639_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4aee566f33cf07256ec52c828540de3
SHA11b86b169c4cb0d141555025e0d63b0c91528cbf4
SHA2568af797b3c88615b4621baa1340223a9086f6cc2215e2554931950d340272c19a
SHA5122c12a6de3d77f6fc4347475e2ca0b9245dd19ad7ce89e3f0606a96b5364a41fe56b3b7cf4355c6a1c1ea425ca3a148afff20d8675be452ed9f9899c1152affc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5048093cd0e03cfb5f0c428e520def817
SHA15f4d01c2f308413f50fcfcc5dc3007d8bc8f87d5
SHA256f799c00e5056c082b96f7cce2feaa0fb3125d2c1483f3afade33bd275dac2973
SHA5125376d750fd86164531556e8e5e92b7851bb53480debeff275aef021302d6fcfba1bd3f8d34c89e73ca1d24b0fea6166babe3cd83c6670113c31e753450c25bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e50e095af002c8d84ee9e18aff023ed
SHA1200f23aaa246f55973178951feda00d18deff047
SHA2569add6d93d796980d6dffde8990b2bfdb589cb9a7847e972c8e8512b9690f6d67
SHA512fa0cd763cc179817d89980d8e4a519f59a4a72d2369001751ef05801b58c5f57c4c6f6768f8072d1730c9f6ee6f3b017c42d67be9ecee34371ab5247a5204342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52086a769e0f1743784a1716a00195be2
SHA1c03e4387a0d995b2a54f4a822ddfa9d9ff86efd7
SHA256cea454c37036dc9c567b3ead7934b3ee89557a087c593d30c3744fd995438f84
SHA5126c1258f7a1e440d55729dc7d1f5c27c68dab3dcc095491de47aa072620e3934e6883ba62a2296f3aabe3308de32410d5158cc630a8be8c4b5eb49a145f120ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a05a40fd57a0f257da98dfa7983159e
SHA10967dee925bffd3c6d4a760b006762558f4c9937
SHA256edfe68683cb9adbbd57fc6e039ccf31010e03fedbe186659b1597c69687304cc
SHA5126e0329cd77e4283f615bff1c4127c97281819c7225f45390e00ad57e7bc665ea591170d4e166180c90b1f327ba40384e42a455bee37a654cd24cad4a1d03b77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824a92b8bce54f5c85c7c37ba29c9107
SHA18db94ca145352fdc2b1529d4a57fc5e687e923cf
SHA256f79d6fb3a716a2707e005944325a2546c20091c9779a5cab23ad54e6bc29a20b
SHA512aa643fb8301a014940be4ba4e7a451f3ed677bb07b94679804ddd209192660d995f4b7a543b9047d80b330ef0dca6245eea0bb87cceb2465072ee2e85ed014bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57782edf42dc507985a7734a24985005b
SHA119e798be140bfbf76613b871214afe55883f94a5
SHA256f039613366de26f924a22e47738acdf78f56a556f375780880a0b9126f380e23
SHA512e582dfae3172d10c1b230c8efb6ec5d9cd8bbdb854a7529eb0c6a3aeff968b17236fedc93780c5c0af1ea78a5f2ffa8808f124f9f3dc564278f20c1661d8993d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab894ba56d8ed4eef1d8883140fdf41
SHA183da1fc980b537400e616f6109481bccbb9e9bc4
SHA2565a4059198d1557d61ff0eec981a408a35b0e1082caae05f1d6bf848971b5c076
SHA512ed34b40081e174a78c48a70f834d9a031bfef69bfaf51c624e7cf5fa38718317c6ec3f3d6a70879ffe87d38b9d97e18926a132801cd276f1ab9b5ee9e6a2edec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51accc7c05a5e4f9adb6d283da3706a1a
SHA175c6bf7fca562b35a2cb7d27107bb14f8328c0ab
SHA2566eb02422d3d79613208357bcc97b6b62b4f6aa4334deb3e4458a2bc974acf49a
SHA512a92a50b67bdd6ec59207d011cdb7caa3dd5eecf89d66e8953e2c85f32ea97f237bce6b45fbb1b8a7c685c58fe5b40952dae98fee90c6ccfcc40ca46a360fc991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b765cd12b195ef5df70f9b7e3c01793
SHA1601b06528b5d53ba2d3410f2294c598e431052b8
SHA256875cc2c24c7c0c7c3216e01c22441fb41803b4fac584d08e34dc54ed0c60dac7
SHA512c90687b2d2367af0002099e6fb2e773badc0ee81f051760c63fd91bac1f363b7127b2cc1ba3045df7be2400a96b8227f2e1e64b1fc51d9c6bf205f4eeafcb84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e37bff8577d5b1fad0878182681a6f
SHA1e086586cc651ea5c34d6ba14033559a057bf945e
SHA25614d8d7afc1c361a711292ce1f8ef69e1b349991755ddf45cae55f0181a5f61c1
SHA5123fdc56ae9a0cbed79c2fb5aee805e5ed81bf5450704fab41750c8e8a7aaa51f1fdcef678c3ccf7113134005a007557930068b1598d229ad96c13e876be756b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23ee3be275aa8f47c7be603cf0f125e
SHA186469f6c08a87a60f82ebd16631afefdf2ef1e24
SHA256a50080939cc1dea83fd8b7450e84dee5e9f5c6432bc9e71d82b16a44c1ff6bae
SHA512a1d4ea900e7fae731b9f5a1aac6ecf71575ffc728da768d2b9633582d4721e37c60470f5d1aba05e24806c99ad6c23f0ab577abc1ac1809c9192fcc0435d67e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6893317ee7ed59c0c949071605dd196
SHA171c3da5386b9e552e4ddf70cb804adf2d6304433
SHA256436bd8972ae9e17a70e079e64ef64d8d90975582c85de3f4794c44d0dac44101
SHA5125ef3df15286ebe74525eed2d26785d02c4a4cd683fe724df95414557fa2d57fc88bd3f0dcce76b31bc4133fdf1f9737cf84932258e458b9d9f698eefe6b0e286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ff08662bd33f17c52ae23c0d887b18
SHA161c2e2359b44e0a70b59df9a81b9a51895ade162
SHA256c301a367b2283fa86b545c74f8d6f19755e5be96f2d33c68c6dd5e8ba8b5bcdb
SHA51286d6221f800b844bb3db07369b53754bcd2c8687b372f86773b6e53a6f5e2aa31feb8c9b6199c69181b52d4009742be066cc2100d7ef2f8d1cb190cb9092e2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed500ad47db53c10d517b60b14494b1c
SHA16395eb0900f43e36dc255ee58a93077916e92761
SHA2560626e3be40ceee500e6d7d3fa3b9e56c590f5e7b53ed5a0ea558a1876910a694
SHA5126bcaf89dfcf23443fd03893c95bc9a109ca42f3d49d1b177351875c2dcd6baa98ad560bb0d746a8d81536ea096d06ca2d9e5b3ed81fa5a4ce5da7dd624875395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45e0b8f333f80e34d5fcc8dfefb0901
SHA179bc008dd84ea8afbe07b249613694ca4a787667
SHA2565e1fb2e8043dd7aad5721705b17b85b6e032ca6f6809aa6bb8560a6f5c4ebab6
SHA512aae8d36f63c5b3702b8f152ddbfe947ed611b941cf28bd2f97c96df73307e78c19a90e4e7b69a3ab2c5430fe7a6f3ec3387a6f0307c19427e45d3c5ef203f203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d21b15d7620a09bbb1a5bd93e033353
SHA1202d29550862241d80bc9ffbfdf5f86972a04a08
SHA256345d8016ad87c30a14e6cdb20c2a8a02d30c7cd57a4ac50893a2dbd6f3db4f9d
SHA512814e8f7320aaf7c1ee8428ac0b996e68b81ae47441b1c5c058886d187d6dafcb4b65c39f3470438bbd2c3d1946068aa1943b21e5a955a87ca16e05e4757a74f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5539d990c7e7385c4bd5b1d9cecdcf7fa
SHA13e595cafbcf6f566c8eb139dede501bd63865b29
SHA256005317ca75b28c164c4e5aabdb4b3b9428e2745488395790e6d2e8cb6848dbfb
SHA51270fe1cdfa48c2cdbadbb7924a7cab9a77e56837adb5bf06e4fd26d1f51d7b187b6f8a7e9b989b4ee498e02d1c1a0a635f191464ed4fabc34e5853d118a962084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542253b62440b7c3504b0a5a743f7b7b3
SHA1da2415cafc3940e1482d7d82b4b5a8e87689e60f
SHA256ed039e8da2c96a2795403c0ead8b690c00e68abe4a9a90cb58230436231e0c71
SHA512275bea180a53d2e18d27b9983947cea7085fdd9162215efbc75b4e6d22663af594eaedb41a988d1c7966effaa3f8ddce15fe092cef28b82087d7b2e94643be12
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a