Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
0e4e02f325944d36b16b8253de45898b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e4e02f325944d36b16b8253de45898b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0e4e02f325944d36b16b8253de45898b_JaffaCakes118.html
-
Size
2KB
-
MD5
0e4e02f325944d36b16b8253de45898b
-
SHA1
24b25c318cdee8865fd8a8019767f3e1a557f5c4
-
SHA256
1faf596addabc87e73a132d98a55373d5a8084f48170e91f29dd652600e875b4
-
SHA512
21b37bbe8315055f60013dd90b981055e99a9f2adb4ed798d3b201690deb023ca796f8b0f69bf4bc7e0422ed42dbc8318c1cee6ea2ca1b9e5afdd6982d8b6357
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4513B11-0872-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000006872558909949d643cb8b8948a70bee0bbdfec73ac4157e56a5c65125685fc0a000000000e80000000020000200000002cf8e6bd0886691faa36f2a60430e1e9c8d9bebeeea4c3c49230eb0587ecba0b200000005adee60dc1b3793b2ecde49dc4e28f8f3b56d5b2c4916a0aaf9fe8b26e53a9044000000076b1e94e754188e451402063e8a4bcab43eb3dda775347394089d68249473a6f9e664c9b5f59a5cd5d4cd6601c1a78f3dca03745f8014d3ad009069e4314ca68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0070c1a87f9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420809342" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e4e02f325944d36b16b8253de45898b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebdc29d809a9b60487bf08b764614c9e
SHA1be9a47be5c897a2d58c2a7b935c154f36060dbf0
SHA2568a5aa05acce1a945a464f603b6a24b88476f6e8fb66c4a1f189bb32b45d501f1
SHA5126347f0581eeeca2e8577b658037e6d39e9db8a0aef303d89412fa4c37d6ca2bbf0a71e75248c06982c804efee2cd465dd94ca365ab63f3876330847ec37b653a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c7cdc804cfede42aa317b398e7d353
SHA139104daf1e95c479cb77de34f563679a08fad6f4
SHA2566a1114f9c9e83a089077b86f9fa8afe8ca6cb5c2fbb1b9e904a1005984b04162
SHA51262f5630b68ff838f91027ed176f9090bde3dc25b59a35b716ea62176ae14722b5169002e61be71f9f8f3275295f7ff572c15b62e34ca618e224ad3fbd31861da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511007e78deb9c53a0a90c6a573ed99b1
SHA1e208c4d3ca187a4019d42edc1bd5b7325a495997
SHA256119872abab09cc1087c6a192ecf2295164720d3edac92d002fc64810e13911c8
SHA51219990fee4ef24d589869ed9598bbb158f1295c98f0d07581969295f2f15d937187fd67ea059a444a57e36d5b8d2445ad5c0252e8d064706fdce30ce34471cab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2244066d5cfadf0eba311234f487a19
SHA1860a52ee6fc8aa7888dccc46ca5d67d49dfe24be
SHA25650fe36636bcd4d3e3351e6c98486358e640d057869eec7db4f2ff4dcca00d3ac
SHA51231980e15c6cdc50dcd59dc93fe9cc7de43ab09dd980ee9cc6c76d3765d429622001779cfaae3c7fcd46627050167566ceafd73bf442825ec26beac3934884936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0f914615ce0df1bc8e0b4f2276788cf
SHA1310d09c6e11beb287f9fcf4a30e44136dd4049c8
SHA256bd1f508043e3878ea4b4aff69cc71f0ff283aa63d5c6fdaf38b13959c889f235
SHA512ea157fe458d75fd44f7051e7dbce6416fdb1e0c5cca8f6bf74e12d57e9de06d1bc4a00e78b24f230fb79b617144bc580294ccf0b35597834fcec7ecf068e0ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3f0af3708b2e9094c996d2bd2518b6
SHA14c14a5edd129349a2cd893b8dccb99447355e423
SHA2562cdc6caebdba132531714e9bd8d38209b2e314c3a9d368570dc23e886fa7eb31
SHA512c09344f7ea88b48e23604fb8efd9d7a65da4d740395470b4338ad6bb4fc9d49fda652fc6b8bb2ee9b1a8077bc2e54d8e328a23838d3f1cb86e18ecbb3672ec16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c04f9b097117e88a2dcc62f2a0448b1
SHA12617f0009a3f67e69080ca351c917c66bd740617
SHA2563ec7f2c2a6b859fd21405d61a7edb12c4227ffbbf479c48c6d4344cc82bd9c0f
SHA5120cab26bf21a1e28bdc2843c009b521427dc1910e48116aa62b0e53e82492c95e0d961580c58258e5b753d2c8e49b4c1fbfb6bd82cefa5a250a1ccc69f8ca7e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f941418accc426e82625b4f4fef104
SHA1167fe4506231eb11e2ad61577f7862c9b4aa722d
SHA256c3a1d5c82f81b0dae7edec27acf1e0bbe5d97070426217b5089cb9b6be960d69
SHA51217b93cac7a092e61faaf9a71ab6ad53a8f548d592f599d6b48158fcb1d13fd488d743db0bc8ea3752ac2c3705de80387318a4a49be57275b6d5e3048e1e7dc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54174783f5f00b6e26f6f33aecebcff46
SHA150adcc1cf836198ebb487132d0108829c4d47aba
SHA256fa534f11002cde807c0d5af10f7e8b9399edc277f798becf80421c50c5d0e26f
SHA512662f6b059555836db812ea8f02883852c5b44cf9995dad6d2344362d67e2fef7b8e777a9480c3547e29a6e6adf5b52fa0287ce63aeee1cc94f6c512ac3e94875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b0b355a71c6456eaa022f905a67217
SHA145932e6185135c8004e896fd0f404d8ec5ead6cc
SHA256ae9c1e3f2ee10447faca36053a5ea4a8d57e8eb017115b70ad27921f7a61cbad
SHA5120654a7c0b9094af51a7a6e7f5c87b0f4c7942467d28dcec596629253f902af7660c7bf633ee496e1c3d1ab6fc4bcd21b797986cb4b460a5574f709a3e4830b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed23384171754b1e75c0fbad9f1b1675
SHA113ffef2387e63394781c067173c078b35b0916f8
SHA2567bcfa1b9fa8d43283c644fe151c7716d34925bfed8ff916f31011775d2ddc394
SHA512eb907e2b1a51070049fb61036dfcd75c3070103ae5a1e2641b171c47897f1fbd7eeeafc33cc10713552f8f384cbc3ece73548d6837137865611b8132b161168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d669a49c414fe2e4a2b205b318b40a3
SHA155c4576aa3c9806392637adc0ef63f52365549e7
SHA256abf8257287f5bf396103b584515558eec14a2d9a154326e1935fade883992a50
SHA512e478c420b10f5b3327274064527d05a92fa1451f36c1468246e587baeb2e47e97bd6d4e9a35deae772c796217c3eb16a5f10e4b5b2f1e5a292ed003b7173f1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535ce3715194c2fb79671e761b8b04a95
SHA172adafceb0eabcaffa38774a02521795dccd5b9c
SHA256c443df53851fd29918d9bda089bdecd7a8b26a3c6c6cf7309aa7ed3566505a6f
SHA5124fae80463267385ca47a4b4c1a8d625b170f346a0c3171b1bff1c77f81713f3aecd584a2cae228349211b0bf450f73189776c7fedca0abf90bc5f51c43c3390c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a4a494f813202076e2bb20cec31332f
SHA183c1087f75e20ab7bae9eac6e77199ae9ceb3b35
SHA2565e68efd75d8219f7342ec9605c7fdd5c90141cd93d13fefcdac9f755ae1b082a
SHA5126f9d670780ccd08ec95a1b1600eb5f8430e6c823906be3e9acddf5d9e356dedff7f01fb0bf9d8985a3f6720cdd341a9c9650de2c1640d9c145097eeb2004e9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5053347579aed02e936339a8ac58e51bf
SHA1e57c29b8ea605a04d2cc33bde19a4fb3d50a1af1
SHA25657854f727af8abe3d112509ddb0fec6e2ff1d5e46a1ca661641e137ecc3e0d27
SHA51216c2d2313f11821de7ca4e04e34627bd7e418b2588b9baed1797eae040a5578344fba15ae6e4a6714260e493e977ff19dce48dd9f66cc3b9f201b2e55826c2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee394ed24283ffb11dd1b01ed70f79e8
SHA1f333f886f972c145fa47c4bdd617004009886cc0
SHA256bc1ea96056869b7b96811d751e93f35bff3187ae5251f7db362a177f6506adc5
SHA51244c9a4b9ac1463a3c2f3790927da9bd44236a72f5869ae78c603e3b52f76a6ea97d800018990e2d272591b5f517dcc1915985702f67e586f210aafbdf8b1018f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb38840f5137d84417e07fbc971a75a8
SHA194eda33868bfcafb575adbca5417a0caa6fc9162
SHA256bb3cce0a27eb1f16be4fd9c3221ac9118ba7a9fbb8fd9372a0f507c4da10afa4
SHA512f6defbb6d8f059af2f252d4b02dee5397d6d58a78e109c0550983ede4c5110377630671e3079663f99aad44c9008759bdbbc6e1ac68bfd4a2260bff882a543ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca6d03bfa2f79f1a0f5b7d0a3cb433a1
SHA146410717aec771cce22cb26eb9ec34c0f5f2cdfb
SHA25688bc7f53384614ddb8c6315acc0cce04e791cd2162310629ceb272180557b086
SHA51201064980fdc317e44a11e322fffafe3155e45f67b9e25e5bd7a98a1890fde7eec7944c68657377292499fcc3af423c5e13dbc4f9e3736d6eee24f4a3feba24fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51045fe2bb688eb700d3bc6b379f4994c
SHA17668aba3db65e58c937ffdf9ee098b75e399e81b
SHA25621f6e7323904cb76f4174d62ac7c3e3ed4e8819599d58aa21940467974137c10
SHA512a98982ddaf857e3443a2204417cb3cb560751389081f804543de7a4600aa6c04d78f97102a26638072b348abe7c2c7e1e41ba61c6ed1aaf0e2a2e99b1886b846
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a