Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
1110e47d1fcd215eaa95c713f031ab16_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1110e47d1fcd215eaa95c713f031ab16_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1110e47d1fcd215eaa95c713f031ab16_JaffaCakes118.html
-
Size
68KB
-
MD5
1110e47d1fcd215eaa95c713f031ab16
-
SHA1
7e383d52567e2754faea9d759533ed536234dcba
-
SHA256
f17f78a733fed6870a685a4c9e40603ed840cff93e4e903e495eb67a0e1f7717
-
SHA512
3b6becc377d75e2fb24c6bbc79163da8a7199057ff5dc2b0aab1979ff46dc360636c322fc083af37042bf4a9e0967a39516b0372ee5266c5a180a2fd07f8d8fd
-
SSDEEP
768:JidgcMiR3sI2PDDnX0g6yU0PXQf32oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JTKkgf3HTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420919971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{664EFE61-0974-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000897e42db51da07b47c72d4a0575e293d12ca1fffb9ca12c3d2b04a0eb1aef5d000000000e80000000020000200000001412509bddb1ec2c3c4c28684dbae365af3cae4818bdb0eea4f754afa6dde88b20000000f31e9601fd3f5c481c5b5a4af9ce85e7ca5188fa22960d6b9a1a93a93c178feb4000000050c1c1bb654887307b9a30b2fbcdc85dcf29e814f6a367c0fe671e026d59c1680414f0b6af59c7e738fe2dd50637e397c120bb1634c90e0952550dcb2accff3a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007f3ae54bf2477c4440f8479ab4a6aefe15d9eb029ce5f84434c9ec5591fda4cc000000000e8000000002000020000000f359723cb37b82d801aaf264033662e5df9553c84c028312b659bbeba0e41b289000000054fb84ac8b5cbf0df61638cbbbae66fd314fd0af5f23303f829b97867931643d87c7eabf1d6bdb68abd386047cd2d4b774bb01c616910f312766cd8e9df8764669959a8cfb9272ff6f91e48fdb2414d19b3d5136e1e39223183aa9e4523c83732b4dbac9ec34dd88db6c2feea4f958a5e6903c988f57b1eb164142efeb133acd8b61543cf4a6e3c947b4dc0af52b514f400000007d8add7a5fa0896663572bbb3b75961dc9677b0d51bea719df94c80fc071553d75dc95626e4870fdbbb7f79f8924a93775bbfd4caa6fe92428eef3f3dcc16a4d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05f6c3f819dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 604 2180 iexplore.exe 28 PID 2180 wrote to memory of 604 2180 iexplore.exe 28 PID 2180 wrote to memory of 604 2180 iexplore.exe 28 PID 2180 wrote to memory of 604 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1110e47d1fcd215eaa95c713f031ab16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1059ea5cabed8cc7a477646dc28592
SHA13bb240d9986cb3eec7e845e4e5f5f3623f53ba5a
SHA25631faeab69660668ec7a2810f88e7c53583d65ea864976feef0be85e9aff591db
SHA512e0851984cd4f3706b28ba1f9a4a7326dbd3638bb34065ce37e4f7944a7ab5672bfff2eb2bec02273ac3c50d4ea7740477e10dc1a5f59c9380a4c2202865b1864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d37cb1a4d40f8d0568e89342208c65fa
SHA1d55c507ca849ba841f9a09fa6d8a910b6c5520ef
SHA25698a6b71c5216fbb402366b720619bab94d7a54bc21c6e18f68b00a15f7cba8a6
SHA5129aa7844e36dc59090e64402d94218ff0abf0115c69174483b1c544ba9329f4a2bb16f3adcd2603cfa107114122027144cf806ca4206537791b31ed60da49c28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86af94a1e6feaf0a3fac0a0f0ae161c
SHA15d8b0a0dacbb1d8e9e1af224879cd56fbe84e3fe
SHA2560080dbea7bf10c057b8af6b0e7b6795c8ee93736c9c2d4c0cce8edb63e83ac40
SHA51285966aa83bc6ae7c1a501c8d2851d3114c9dc4f164b8ff9182684a3252b0b73d70397970ef65093167c34517847d1e8f5d373d21f481c72293a1b92284196e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16acb265c45ccf7adc0df3dcf3687f7
SHA1410ed870285d4148db827c0389579f935efdd5ab
SHA256ffbb52b261080ff90dafab9791203d6d61a7eecd136bbabee0bf70103795c9f7
SHA51203430597a9686d3704fe7bf3492107241d156e8efcfe20c79c69c14305f234139a86586ee27460a9f201bc434971a6e863bd0309fdf546e4e429b9d845b9fc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc3af7d98fbcbe8e4814a24c04abf772
SHA1937e2912a8ca128a0ec790011fe67f075ee6ead1
SHA256afa7b1930ea02e1228e5989e31397aa369baac8732ba80440aef4aae9e6b38bc
SHA5128e29e2b4f80cf4f6ded52f30c15b198ba2af03cfcd302186fa8b37c2267fe9e1b7c4b3b49b1cf29772e5fc1a0480317539e6e88f71336d6a10df7f3970ea9906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5272e5358cddce24dff6fe46d9c06d5ff
SHA1991759dd9baa67754453a3635e1d90ed074dc640
SHA256bb8502ba40b0b29f834831c766c47026808679b9342a65c472c1547c73866e7e
SHA512fecad71d1fd442568904c91dbd1e4dfc02906880eab90d4e43ae705d83525259623f0c4b75319a183df7e95a9561b0e231067ccf360d9a3c4beb2ec069035aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c70123ce65cab18964916dae6d6cef9
SHA10f72554b0a31396022eb06e5e5f84fbfe16c871e
SHA256dc71e62502896f0171c3f9e2672365111e61092fede7aadfb0e7cdc540adb6e6
SHA51257ccbe8a2c7747fa303cd9b5ab415cc9d8120bee899b9abb774c3d83e4635c6bcbaf784b25b1d594ffe946745d811f0bd0e0202ea4ecaba646e6a0015fb88cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515afa05c4883c2085c3e8b62d08e9a3e
SHA1d4a230930765c02405b0336c8077326b5f87bfb5
SHA256f987e6c5fe5cef277140f9848a6e6191ecf33d4217776d874ad73fcf3567576f
SHA512beb95fe9672dfefc2c2081c1e0c18155db09ae5d7545e44f56373184467842e9b8d5d2a2143c72a157984b3786ae29169cb7e5ac52a00865e9f0edf672be60c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feee5e743a18870cf2bc85fd366be3ad
SHA179a5abca8667fe9d2b087bd55c1ae34642c87ac0
SHA256942bd4fd1c7a061a8a48c039b3979fd1cc01fe7b0e9cc7a38ab3624bed9ff2f9
SHA512e4daf3cf0e5a81372a776bd2e926304033b7fa36ac64caefeec7983ae348215fab601d794e335d2b4d8f035bfb9046bba291209b6ca5d1e639e1fb348d6d78d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f883dd92f03534aa88d6a08c0c7d6f
SHA17481f4b17d4354e01d599112e19d949cd23be6bd
SHA2566bb51379a7f31c9823fa53b44c19e180240fb0c79e22a4f1e07b876d06b69e7c
SHA512c0fafa66b09dada5a05795b4c4c64dba2a8c33df21297be50460fdff1c925bddc35b17ac355f64b762c110c3be535586661b8ec63b17112ff3c09978c697d889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f138148484db46e28bb91024d1f3c52
SHA12eb5e34b87f379ba299155f2ec96946f0777fc3d
SHA256847839adc0d93244fcde2fa4582fca6cd46f3de7a7510c8aa0ca609fe383422f
SHA5127d1210929f916879b4ca48a24de159206740520de863939841278884580733a8e0699106c2c7e2c0456f258a5b92582f3e2af39b97c12d554d0b6091b88368fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f88b17410f2f36fb63d3bbda45f7e1
SHA143aecd803cb1eac4a0d23ac3468ff769598a8d97
SHA2569d177ca79c07493bc3128955ead7ebe8fb5694ae32c28ec51819f57378af8140
SHA5124d291e8bf21569c3d734714cf9904dba75e9969c9d2962bca28400c0f1d80f86b17182d11a00778e427d98cab6ea9eb153664738341e8b3216e3196f10b8b392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a8698dc4e3479639fefaf0bba32f7c
SHA168401d0923848f8024eb68b3e9076ddd112571db
SHA256a1148f0d56716b1995c278d7bc8a0f859362d9ccd049d7935627f710704b1ee3
SHA512536e940fd90d308060505a3676439bdacbc3862f137e473db2e0bf23a36072526ae9d9a94b86bb1a1a3a7eddf57b0ae7affab861e643dba778d15169914c7b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bfdbff91d909427b51e3a9a2660bdac
SHA1acf99f287e12b786752247feff073976b91797c9
SHA256772793d7560bdc4126dd382f251888021b44ed2695d2dfc19b27b810e247145c
SHA512ce936e9cafb7d11af85e1d0e3bac4be6887ef28344a3e9c53f5c1099129ff54ebc91e18be784f9fafd4921126af91e3db44b3ddbf43db127b296c666ebe60b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1977c7a303d3a59143893f1a6198784
SHA144dae31b2946e4f5d17e0c7f0aa00407b3e17a6b
SHA2567e7cc6334ba949c486074062e98e3374ed7a6b7c0947bc1bf2f9ce736d9787e8
SHA512424a2324708229d0696f1bc3ec8359a630a9d5e4df063dd30e7a981f27cecb9129cf8a966aaf1f3127934122b2658a25710486f2b614c3e68560b24bf5ed1da2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a