Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
0ea72a2dc73f4881d98d4dfc06e69ae5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ea72a2dc73f4881d98d4dfc06e69ae5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ea72a2dc73f4881d98d4dfc06e69ae5_JaffaCakes118.html
-
Size
2KB
-
MD5
0ea72a2dc73f4881d98d4dfc06e69ae5
-
SHA1
f5fb66df2d6efa0a3a1c78587e0f9683d5efafa5
-
SHA256
792ee6bdfdb2160e10775dcc2ba26b1d9955216296e1dac4a56ada13e412a9bb
-
SHA512
209912724e051e2dd7f61604fc08759d1aaf838f9e2ee530ba3ff0083e0150c1c79c20f10a9f8042ea0271845afe712fdf2299ec269ff7c7896931a1974f9630
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a6e82d969cda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420819014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000bf3b653ab5e19907b5dde65d6a6da3610ac1e045b21c2d6d9da97a5774c844be000000000e800000000200002000000092ba31f78f2fe07bd17e619399330e3eec4262e5eee3bac2c5bc2335aa266f24200000003d310273bd162026127128a8f7948a7f8942fb7f85bbd2de74eca249c1c91b47400000000edce7928677ff780e8719f9654c57591a2faf9e1437e0e343a74452505395643567d36ef510ccc52b49b4ddcc914f16f9f5f1a2a205288ddf38211293b9c563 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{594543A1-0889-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2984 2272 iexplore.exe 28 PID 2272 wrote to memory of 2984 2272 iexplore.exe 28 PID 2272 wrote to memory of 2984 2272 iexplore.exe 28 PID 2272 wrote to memory of 2984 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ea72a2dc73f4881d98d4dfc06e69ae5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c610b8aaafd4e9213246812edc8042c
SHA194341679fc37de0593bca41f9a7992972c3f3efd
SHA2562940c08e57a31863ecd27b94b4d8b5f51e8f0bab8e386e22e55b455839928156
SHA512ba9583ac5f19717fe3e9a901f840dfb537b33006ad482fc5fa9c575dc958bdc4d55269f4e6bf61a913c2e9687d5ee7837a47bd4ebc824fbcfa543fa8393937ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2ef351eed0f8dba22df403fff3f890
SHA147aba596def29ada873ac706bd591ec2980b8306
SHA25696c46980a08a67179c1d0650d9de2c72a5a452292d49c91b95dd064e57364233
SHA512fd3152018d8610252202c62362101e7e295d6c544f2ba9843a83caf5eb118f6d4459e77fc705ae7d05a64e5f5834acc4c82f91e83c7261fa44f2b20dfded203d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500679dc074fac023c7d48f66330a8e10
SHA19188723b9f9f38b301042dd31aa9f552a2601c4e
SHA256e1ff02b39ffdd234f094ff6c2267879e4f6080f3eed71ed1851db0e977a42584
SHA51274b9a9ccefc66cf8a08e0afd1eb9c0546451e21003fddc7ce0692da8e3d56930582b2e0bbb3697522ee3f91fbe8ee3455b616146cbe3fea4d5b2dcabdafc7086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2789b7f625307d1e80ceda928522d5a
SHA1ed5255a2690979142eda2ed4b4e8b8ff9eb48462
SHA2566c26bd757c5729d1faca23d5a10f0a04319bffb82386b96022ba24c5dc65f4bc
SHA5129ca603fddb1190c747697f1fb6434a8eb151425189026522082cf82cb29271244f62f232f72e9b58a255327c023fa6896579f760793f6c63ed218ad9adbcf735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ed7de06741b3233e736452ba561cfb
SHA1da8e1ed5d39fd8450da661ecf40ceb4f6743e326
SHA256635af7bb0bec3e3cb44d2fedec6bb207b5d3275643b3bfe9c21dbc069d0ee14c
SHA5126a263a4f813c4057771b70dbe6be42fbace2d5917779fb075f1fcbca7291db6952b1b35658d9d54495fd3868c87a510ecfb1fda0ad6b4c513e29f5f7ed91ed24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd7d553684efb21deb16126f69addec
SHA107ab3460fdf89462206a5bad3a76843433538660
SHA256d300af91d6f1561e47173c6eedbd19e2a9fd65156b46b1dd85fe4c789cc95c69
SHA512cf1e86a6f8b90ef29961375546aecb3664788131eeb4a8919e07ea1f77d9546a3048d6ea1d0f61e0648cb3312bfd00e34f5bc640bba0403b2459287013f5560d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cefea20157046d2b68b01a0dff2a6643
SHA1c694297e5ed4e8f5bca50047c31959847906c545
SHA256d606ea02a01d531011cf5d0af6220d4fadf72e89bcd3bb84c3aa2277c440aef7
SHA512458ab1b4ecfca0ff896fbfa1d7e0fecc5e92fd07f1f9ba60c06bc545bd6c75940858a641bc75b4da70395254b11129dd08e36d50aebe35cb6fcfb8c6f058d451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816aecb3009d94e54fc66c69a19d54fb
SHA1106f81ec6bc640f2f6db9da70707643f1657f7b0
SHA256f5738c8d165142d7a887055f37f93ac9f2056e1df4f675983827238fef0761ed
SHA512f501a97586f4220ba7ef803fccd418afe3fdcc044684596f0f88ec92b22a844ff3dbe9e9c2fc650c41a8df54d60929a49b4c1f2cd5b312765d59053dd7b7b3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb88b27ac3f48aaddc00bbf3457db46
SHA12e31c10c810e09d42d21ad48eb808daf2c4e9378
SHA256c72d287a6b688b47f08cea5a5f362d7f535411be281990cf9c80745e9508d544
SHA512f1bba73ab4bfb2f4613a5609c4b577b5ce7d51188fcbbea24fc7c651731768a85d1679feae8dd0ce6df5111a986a3a9943adbf8b0f17f7eeca9a6c7771a3f182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ccd5a474423a130989bd61a4cc0d11
SHA1fc244240f6349f265ca8a399ff50de2170c6d7d0
SHA25649bc13021d61234014bd2ff4a40ad3a5a8841b93d5de5fb6250fbe27c6447cc9
SHA512ddb41148db7406c2d39e9dde99aeecc09d1b233f607059f5d005b72dadcc7797d882ad6d87012e04ede826adeb40b11a44c238c4f2e4fb3c1d9eb2570adf5aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbf8c376361c2d04c680db88c3a5a72
SHA1da7dcb6024c850dd50fcd75c922bac07fa3c425a
SHA256d975ecc1ac3aaa071c786b72c22a9c08bec5aa2f27c6b43d2a4907bcaa426400
SHA512aea251efeb10c1379fe8e212e1aeaf4e33bd3a817205e5de723e3416900ba8198e28892768413204eb10b6d7ca17853675526766c6a0e4344605a4631b182645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a628da8e84c3f1598d65b39eb49d2b87
SHA1eb602a443554071249301971566a31570ba15730
SHA256c08a51bbae664db83b759f64d68bf3f81ea9670501c469d513bd060ea522a8bd
SHA5120bcaae84d18c527d01fac9dcfb7bc09d9b5f683b552e3540d64091e6f9728497498b682894cea64514ab378668e2da99630d4a5a6da3374a6c51905d5a351427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc3a44977e9f87514c7f26ae367084d
SHA123e89592c8314080586ff4ffbd8d84d7e5fe7e15
SHA2561e2b9408cd5c847a1b6f053f2f46b93cd8614a63448830290c918bc24d601a61
SHA512d636b6f6b9052c80c89df3e4ea05a46d6d90cadf907c6441190008d8788795342d541b6572463ad61e2dc9807a23bf4ccf091fe4d69fe0cc37ca4ea86215547e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c5b19847906bfbfa47b274a25d3186
SHA1fbf3a5652ffc24bf7d972325a6404acf1234bff6
SHA256b26e91ebdc9d061f492a079d2c447f4002eafd1d6c2ab445ba9b224898a4fba5
SHA512f1230ba00c62d439ef3e7e48941cde50bccee7918456df89db56d6b0920d3aa726107f58f56eefe4cdbb5a1375a49d649168199501aac60eb62e0e2d6d482008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54083a1c0a2de3234f908a7b8da84323b
SHA1354f8dbc9845fe40ce61697d69b921b509db6e10
SHA25651207499bf52eae0f808be7fafae3be2667ad4f4cfbd059280d120a32ac12c1e
SHA5129a13236b8be56cead11f94407e7c389583e23437d8eb2e78df93e9c23e9057a253fe5ccc5165c7b4266eace4c2078b07fbe93dc0ba05c47530c6336988f752cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7ba8a1a84dbca1f0310453d9b43b97b
SHA10981257aaa6c6165b9537e96bd9e88b95f811cc5
SHA25639b4c865b5259cf110795e9317f99edb68cb2fba9f8453738d89d8ef6d7e1507
SHA5123f5559ff7479668f4f3f9b16dcb2ec50480c58bf56f464120521f32febf3db97f0c8635c53db5bef2a308619492b76f62567653c67c981167c0bb28e7b653abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d039bb6677cbe2f16d07d74b7a40688
SHA104750e93d20b3a13cd8fcfe6e98c078633ab3142
SHA2561cb2fc8f00501cf73438accec9547c9bff0fe69a49d4398101dfe891824c0340
SHA51282508a8fb312c51709a9c39224ef8b380d24d829b5b0684af4edfecb0ef744d5d0b3bae610d51f23c7b8e09b57ab5cbad5f38974ae33bf3ad8eb7ff28f680511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512bb23e44eb599e3554e0f0b7ff82b64
SHA1bbf07ae62f6a03e1be4c51e8c71b73b981812bf0
SHA2565fc6dfbd246174ff62f5688802059e800500e2e3dd915686cff1a72a98346529
SHA5121f4eda5c979859c3eb7010c70abbca112c4b91125b255974949dfb76ce2378b23d69dc84ef27a614bc4393a41abbc94a216e27be09ac3e8467bdccdac0c55d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e13110e9553ca85736501ea7dce6d60
SHA1fd8c4eb2003626514e7556bc7c32cb6487bd41bb
SHA256d11592b5b739a90e818da52b59f77744225be8a1a914be4ba310bd8a0789e829
SHA5126102d43880f28a25a660c048eddf655d93b5be354c8e05a1fc4ec9285b8bf25add5b1d8a273cd45d2336175a7c60b2fce33a508f67eea759459ce599e99d5c5f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a