Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
0e6f21b34e59f781413ec8cb44b6be26_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e6f21b34e59f781413ec8cb44b6be26_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e6f21b34e59f781413ec8cb44b6be26_JaffaCakes118.html
-
Size
51KB
-
MD5
0e6f21b34e59f781413ec8cb44b6be26
-
SHA1
d7464c97cebac5532169388f813660dae117af5f
-
SHA256
0d442e3c50c6e209524f68b28bbbacd34d51e21b03ed9bfc6d9314d2b26cc2a5
-
SHA512
3abd6f4b3b2c01aebc812aad6861078253fdda187948ea2a98682a5dcffa853958c2e50028854c8d2b41c8bc170fe880dbb42407c13c9aa2da2712f42a0c2b3a
-
SSDEEP
768:SqYR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:Sql9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420813038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F4D7EA1-087B-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000485eb24fe9e28e01a3a3d19b5fd5a684db1d753d7b1f5b2f589e2ccfe7ef0108000000000e8000000002000020000000d36e714c257a44e49b50ec58bde12d7bbd746ca03554af5a42776bbe928d6da2200000008b12f1eddb462e6ff735b281679118f1a54da0851687001e7d6f05a3af37e617400000008cc486a22db60b33e5b1cb33d028f3cf9840ea4de246235933ae285e0657906360472211104b794467fc3d3e5d61f1d1cb961379d07179ae87570f58bdf6e083 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70301d32889cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2928 2156 iexplore.exe 28 PID 2156 wrote to memory of 2928 2156 iexplore.exe 28 PID 2156 wrote to memory of 2928 2156 iexplore.exe 28 PID 2156 wrote to memory of 2928 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e6f21b34e59f781413ec8cb44b6be26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829c02a37458376171aa069a962e5ef4
SHA1b194382811afdd55b5645df4c20281f1ddb97865
SHA2560503307027119e5c6cef03eb0e54df22857322fb31823a961688eab5ef231964
SHA5120f4cc34408f6eccb72c35c180d8f71679351376b1ea814d30bd44b78fe266eb8f80c3a81e78a422d54821001ca33f69f87ae67f76e6508a892af5c100ff4125e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54afcc27a600322d1d62f811aad91c920
SHA12430a5549f9feb811156272da48c48dd0180b933
SHA2565f59af912b31ba8636f257254ec1d8f0899abd4ea66aec073dc20b6e37bb97ff
SHA5127ef098562e93454ade448b8bfd2536b070844f555e5f92bc1590b61a78aa65b78a1a32263600aaef52710751f2adef9427548f894960ac98dac7af73312be0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c3e89b247e5f63dd381366154514528
SHA168203f7a1bc8de9a7a184f42c400083b80599056
SHA256cc3c364a1c1a5ece7aa4fac7031d4b0f217a683809b303b0c791c7059dff91d1
SHA51272b337bfee2e83c513792b5053910a456a8f01e4854a016d4942010329dc05dbc0f803893f1a72abd1b6423267fa858d6207a03501e1f1b0e6f3c1b1db55c493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b98f63d0a95b9f3cc8bd5f522f61d1f
SHA114c98a7f8a12d36d91d4236581363d5ce8126beb
SHA256f596f1e4705327efb9e532a1cfd3faa78f42ccfa5142431feade585c1304b1bc
SHA512546f53389e0bfa0476883c79cf3b3830b3d07d50e5539e5d501ac49bfba71a6a57e1992c2777c9111c9954a6d505137d9254d3c3f7145bd74949feb9c3fd3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fc6a14cc5ec69f60c15dea746013a9
SHA18e0837a567d78f16ac45d4b5b71f8155619f8681
SHA2565614eef2e8646dac5cd7a4b2dc51a740b5bd38bc0745f3e1230f38cadd80bd87
SHA512b973e3c8856817140933f2fc8e105087fb2f7184234502fd1f877019cd0b2258887ca5d55c4c633ffb09651e38e2408b00c0c67447be92acb2676bc608970367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e72c74388b933d821cf8d86a5bc41d
SHA1559014ac5123366761b299a3ac2c1c0c37c980d1
SHA256b9ca6f4a41d456f6130a4aafd2004f71c6ba23fe1247540992ef62b49827e78b
SHA512fc0f0cabcf4603e4fa39c6ba5dd1d562b6be3c167f153088d3bded829df57410bd9cab23852aaad675aa329f53cd68723b5e3166ba1e580e4736883a069b71ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea584885d8da94a418035519dd462cfb
SHA110c3711feb65ec13711544b5a765c9c28f6ff94d
SHA256ceb3a9d363d707cd3200482d79f09220b546046dfe591727c032e1af5f12f5eb
SHA51262fcb4c3c95f4f967b8926b725769a205b66a9c5e1c62f97a62fcfa358dfc22beb8ce590468fae708b12d3311496827b49b2f3643281602407e7ff4d77241709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5899da76d3f42d4a88146278ee379c267
SHA1b04ad0184b8c5e70597545c416177d8a74c25147
SHA25616baaf53d32d2b6b4324b38238e6d66eab3f34cd737d2088075b35d8f53d0b4d
SHA512530f778078abbfe8f7515d15ea4b3ac16efef4ca4414e6b13255ff35d0ba7b3dffe62102cfd039d21301c42e141814668d587a06791773d2103e2643a630a15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075f7369ee1d646218038592d30e1adc
SHA109eb0b4f428ad960a31ec58718e21474f525dd44
SHA256b6aa31227f4d5f0b4f4b2e422e7ea070870dff9b2dbaf2f95b2e39368e615194
SHA5120ed8e69d7034f844f7bb18de60a389b520ff5a9f9455340cf0725ea1162d97d0c3bb52f374fbad62de372d54648144258222d35050161775065a89773b754d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a144b92b450835a6ff7dcaed5c8e388
SHA1f4fdcaf740639170f4ae27cfe422d88f41c326ce
SHA25628add26ec1a7638851c630bf7c79cb105ddafc4614d01acf98f895a8d7e602a3
SHA51218a961b9c2fd8664160a3a6e85e6aea0ce13f0f5eb178f59543d54ec4e71831643071e24716f4d1354c180c5981fef20d3e3d4eb454f7b7aae32607dde2a8db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8ab7f39f2203cb163251c8f08f65a6
SHA1bae6ebd86357453d2d1d402553847622202a5965
SHA2563a2feb6a610833d92f3dcde468742e5ece21bab4bbfb4bf5efed8992d216147c
SHA512b5ce0af3e3332bb0eebb74ad8904a45ea61dc12e89d5b3346f69c4346d133b364160c4878cb5304c693a39fca50a1b5d83f51fc354868578b5ba1663674af2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596783c7a8bb8b7837971329d863c5289
SHA1406697e55b284ddaea4e36a053f77d1b151a8abc
SHA25690669bd3b198e8a29b56a1bb07dd22950517bee39881fe618d49d1a384ae8e76
SHA51235fd05f917adeaaef4512f95b7d9cc04d2959dc00f5487fdda6bd7fca4b28f923adc72cc3fa96071a86ad8e5a0278f7d10157aeab2226b3acb8d6be5f4fdbdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf57a7cd1ae5aa059c723936c9c3ddf3
SHA1e226963f900148f2a23430f797cb0ce71f218c37
SHA25651322f46d76ae0385af96f036ae72116f4d2bb1a23b515f252d6fcf13c4412ad
SHA512f7574e98c3dab90850712c98348a5d3aa3913bc2053b33e4f8b1199aee2715733dcd8972cb242a7edddc5af554c80317c7f6b6111e93e4d95e6560bd6ad512fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a6e9a95acb786ac7a36b352567a3491
SHA18da86a8e6048a66dd6c4ec890cde5bdcc2ced611
SHA25674a7d4e8a04adc8558577c03f9e41016f9e9bdc277626e81019b9582052d6294
SHA5123ce0f1c9c8f6b8b0ce5c404a24ae385c399ba908a46139880d76ba689601b32f3f3ab7ac681c81599a890bd14d62254372900b4002494e85db92ccd10d90c5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579408f168aa55dc58f5bb520a5de2deb
SHA137f872514ca089fe40ae935b85409a6558429b0f
SHA256ecf0be23c4f188c0244b7676b07efc266b191657907b047a56466853720295b3
SHA5126279688d3fc9ab2b8f4157e94dc2bbefb5e26526b7a11f42f035cb6cafdd23cf48b638b22bf3dd095219d8aa9896ee39c3efbc6b14c40f46cb9e17905d6cea7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da2c4e7b4ef64babd6bfac7306292f7
SHA1b09512eacfda806cc7fe0084ecc92d0c9f7123c9
SHA256763a58414f6b626a7d48d51f27b7457260c9d1eddf8a32b784bb9078ee323b4d
SHA51237931543c425caa252a75681399199b7b6d1a3aa5fce7ed0dcc8f186684cb1dcac6f19f516f0ef6b30c75e6d145861fa83e0c4aad9ef2181bfa89924f7be2352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ddd4bdf026361165e95412509933a2
SHA1ee41ac1abfb92e1d84b2b6948ccfe8c7310188cd
SHA2564f0507c5489d734bc6e7bc00b2ba2fa5ed90acb1e2876fee63233fc1e6551145
SHA512299fe31857ceb14aa5990a6f570a6c1223b24464c85b369bb63575d65009158ef0c8a6378bbdc9873bd393a64d37c9c86be921010ece1a2a1bb6a3eef98384ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9e0840270c35ae7b0b4f77aa36748a7
SHA12bd2496dbed3b2235c662eaf2b87660864975f76
SHA256b20ad1135022be2154cef12bf017fcd6de0d6366734cd8cf9b952720e74c484e
SHA512a03154694ead602882dec665c252d3cb629e90943a90c0cf3b19438f96bcd067f4e3544406bd8b57f345ccce705dfaee8815d49ae5fac454f0111d190172bc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e67a27ef8dd83a38ff29d43d4859658c
SHA1d3ffb9a85b7340b197f3d46791034002c24c800c
SHA25643ce56f842fcf22a90897e28b03cf6877b7ad8089d8d5d4d7e5f6511f1f7b8b5
SHA512b0e4fb2915d7befbd385a7f36cb0ca14be2d196a6b1d73c17fd8eef107d39b79d2957442efc9f1f1f678ad465bb35615964ab4943f3879b491d55e4a0449d129
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a