Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
0fefb465053829250b584a34f068e76f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fefb465053829250b584a34f068e76f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0fefb465053829250b584a34f068e76f_JaffaCakes118.html
-
Size
33KB
-
MD5
0fefb465053829250b584a34f068e76f
-
SHA1
fea568cb968bfc56dcc89ee4e065a62fd8716ede
-
SHA256
adf094ffc3e35a5299aee0f9c9183741afac82a98306276bf62a6977e7e3322e
-
SHA512
786c741a43d54024db1d7dab119a66201795407bee4eb7752f7e65e492dac6563625840d54db6f833150ed4080421ff3c02347e33713dd753d15afcda986ad8e
-
SSDEEP
768:18gYH8D3p36C76U7Fs7+gG7vp7tk98Gk7Ky7s8m7FO7ZCx7C30i3RglgNjIqo:10cD3p36C76U7Fs7FG7vp7tk98Gk7Kyw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009ebd2f4c67c96e6a79586e6f6466823e2437f24f929ef983069bad331d27b671000000000e800000000200002000000048ab34cd9bc59fa209e3312e77dfcf8b3427cbb80038659e5b1e1ece1fa1db7120000000d7b3934cbf9edb6158791c09fdfa372259579d992726eac34a3923f6b3b163554000000090f810d7effc855f67fdb25cd2292560018e1bac45f44a3b9787edb9dee137d9758745156d9f6c085802b16456cc679f5886e231164217fded54bca2e1c0000a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420881747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69082091-091B-11EF-9B89-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0034883d289dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2552 2880 iexplore.exe 28 PID 2880 wrote to memory of 2552 2880 iexplore.exe 28 PID 2880 wrote to memory of 2552 2880 iexplore.exe 28 PID 2880 wrote to memory of 2552 2880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fefb465053829250b584a34f068e76f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51beea4eb232cf4bcdf2babd5b6b7c00b
SHA146878d3280a86603b3becaa865caaa392d4ee4c2
SHA2566f506430b47153b5112c9fc37579610ce87c96eec44ef5767a6c04fab99bce59
SHA5124636173e05cf03e6455416420ebf2ec0f42e0c5303948839fdd7323f52646c9ccd7a4071223294f0c10017b0f16882ffe9a602bcda1df6160200cc8cc3be1dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e844a70b6c5f7b7f84d6d6214a35e2
SHA1a8bb829ebfaf79ddeac92f63b93a5a9f8f6a78c5
SHA2569ef943be7105c6620bd4707c275cdccf7e1afa65f8e653c5e48d5df084c944ac
SHA512b3a00e96168d49cf830c63bfc42c722f849a846ca306d240065117b7fe613f54a4656112dce503d4d566dd1bbc74fbf27cf8a06be66b2e95c72f2a1602ee512e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5269011861f50744fc2f5a66199961938
SHA14676b008ac9f49cb045140eea40da206388a5cf4
SHA256102ac02899f75d6b626db6086a6a1965c28f1a518975118dd63bd6c1bb7f1a1e
SHA512cc2480c8329917e63f79adc17fd836696d8408a15bbc6be56ea7aabb730a4ad2ec5587a8db212e99949bd3cc1ace5dc2934a978004a2eab6de146949127e9f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c12503378319172f67a29c46b3f8c56
SHA126591a3c3ca36fa16cdc79f9d50c55e7c20793fd
SHA256b05bc416c50fa5079637111b08394dbb24edf25660833dd644fe76157a438f4d
SHA51283e72133a06309254a073fe5eb62fe60a106bede84c2b0f429dcc8c3712f9809881300e027be2e16c5093d9db00156400ae069183f1945b9fe43dccee56193f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da83e9fb9a068e14f4eb238997205a5d
SHA1f3d91afb1f63d5531215dc1ed9d04879cc35b8d1
SHA256f35561a3fa24cb72d2867870aabf9f8cda1c4e04385e4637bc5d681937a80e62
SHA5123af5f7c30e736119d9c512f0cf68af44ee6dcc7f1024aa267188a5a527c4804675a25417f0dc0277fe75b4b4681faa42d8bba0d6239b1db46cf2e5ce5cad7af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d9f9894faaffa4b5d8f9fba5a5866f9
SHA1c422fc0d20f392658df679866044cd20b275bdc2
SHA256ddbeba1554e6bfb48371e4b365f3f4febde2b4749afb56c89670472fdb17fbb9
SHA51279d3310d672dc9f3f7364e1310ce4ef7db82cedfc976fc1c63ca1c86bbf5c73b0fc2ef8cfc841c76b30012e225ac6ddf323d3e541227e8c9900dcff13ff4e82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b35df91f04625e9bf2bedbd2c253649d
SHA19f12a51a4f563affff78f9ffe82a09da33db4f89
SHA256ee1584de33c2a022ba1885bcf689fc221c4d7b10471464344d0005b2fb6ef7aa
SHA512a263c4c9410f39250d82602a1772b5ee1a3f456e658b1d4d73a9b508e6b9e962dc8e7feb84daf7f718f670e97134a65666f276b3c007627f322cbb2a529ba2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce169493572f4701b4116dd42adc5d7
SHA10d0b60bd453a461648a55fbc226edf9a700eace3
SHA2562d3bf8ae59bb3a5d886bea7e9cc1944a181de732e0b60e18a4602d14f60d1428
SHA5128bd8f145a771b37badddbbd4416487771bbd92cd9e8ec72914c2fa874bc075efee6bd5f6a1c8ba826432b899617fbdea8beb45501329759cabc5f0e91f59aaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b08f771948c52d9c5b919de283ac0741
SHA17e7e7ad0d69c34476deea3ca7858e559063c7fee
SHA2561edc93fa95b8a9ba73e619a69a0e4f86906be969423e6cd113e41bd9a999d3f9
SHA512e095b145a3a7adf939505c67def4364dcb70ae078f13d396f90c36fe1e1cc8567aa1acd03745234dc54963174208e4a7f78aff93b037e292b1f92d920a774b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52804c6b5cbf72a3cd66eb17a6465677c
SHA1ebbee61c72772766b1aeaf32692aedf539c05457
SHA25634c313c1b7ef0b8b4b6255545a3bbd89c322fa5ee24a2d3645eee8ba6a632a7d
SHA512678ec2f7b3acd07a7716daef28bfe376950f0fe44e3b0eca7fe2d99d52c1a39231db8d08affea3455f6886621746c2556544d64d24b7c2e390794293ed31bbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd7da093a0549f476cff79ef942178d
SHA1d5d32622a04b94a26a53ecfaaa61d63cb91a351d
SHA256030154f1bd627a13449e10499bf66d8e07122b6baccf0118036480b1199bfcb2
SHA512e08adc04fec91591511e0b1ca768508b3115010eae73997732a41a142adfc4af153f35fc71f9f95806e517088c69e8d3bd1758c3ca0ea6713234ddb184fd2347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f772f0208f5339698cc59d9846a9a1
SHA127f3c038147bc2ef914c804608e009dd34ffedf2
SHA256e30ec8631154bc38f0ef6acf35651969f367772100959bd0af8192829c36b93b
SHA51284fd1a245296569cfa55636de2e3f4420546e90cd0c2ebb168941b0580e565e3035a82b79e20ba59646e5959e900cfded15ec561eaf849d25f3f478dac00a4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7fd5202abdcd0f08de91eee9105649
SHA17004d4ce794dd34eff84eb9f408c5769284b0c78
SHA256ace698b4b7549e59a72f8369fde622938ee7b66ac6e3821c0238a87e55c5c73c
SHA512b7dfd8d06489397b742ff7ee92b0c1fd4bc0e0e8df47eff0f3fc9fc25bbd2b22e27591d0458edbfcd5e1677d8a90dc2bdeaacace4b3d17e3a937152ef2b38723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d05db8f8be2ffcd4bbaad11d5e8a580
SHA194b2ea4906ad73ee826c7325c23cf491c99d9145
SHA2569f185ed10bf7a9a04ded9f460a311e352121617f1716cd4a37dbeb036fc4b4f3
SHA5120dd3a1d5061fa64fb5acf78cfa59ba7ce2430387cdf8b1c0adcc1386bed2a176bce0ef6a1efdf1127a17ece6506c47a883bcfb83dbf580c8b7d1314825753936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e177e255cc40933d91fbe4189d34694e
SHA19d48876f2744312c0e29d7f5d9ed70cf78064cd2
SHA256b7767afc4323d77af98b1a52c089eca00429c394e75ba6bfae900020d8e774f1
SHA5127047d81b89bbe63bd0cb5701420114d5ba4776925cd85ad34490e0a97b6d6d081c20ba5584378000912539d3d8f6447c75d4976ac7f4e4b403cac9114f7daa63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642a9779d1f576e4e94b0f2789b43648
SHA18bad0ca5dbe1d6c0e24474a7de09409656e8cf82
SHA256d29be3235012d7924712b0df6be006671f93f197455720864f1ec12ecc8537fb
SHA512525fa138858d4d345a1036caa6ab09e48ab0cc5e74f6f34e1369c385ab12e4038ae399f264c62f9e2fc93481e56ecb753f1687282fabec466fc14876f5779e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d9de7dc61553a3d0e5dc7ea47d28af
SHA12b9cd5290cede0bb38908136171288aa09edfe23
SHA2568a1925fd3023cc03a655e093ac92eb751755a2ec6676e289012d51ba9f835648
SHA512e499a3a33c803893e91067a80a6f62fb2999f128b01da6c2c11ad9ff3ab6e2f8705af2524d2beffcea3df9fbe0873f040895994a7e6bab3fab4b4d8cfe8592bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea089beac34ae9c4e7de53711b55fafc
SHA18b441ff1083dbda085525b171c0e9b8a982cf753
SHA25634255f93bf1c80835043ee552ca55bf8830f5af953e6328f49c489b8c64091c4
SHA512ad2572538f27efae38eaa1649b4091e526c7215834204d1db5c3917e2fbb237be69881f59f97a109a3dc01c63503064170782bd7ae762f36db133fc38653728f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a