Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
140441b4aed44edcd2f6e80a5d5c0411_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
140441b4aed44edcd2f6e80a5d5c0411_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
140441b4aed44edcd2f6e80a5d5c0411_JaffaCakes118.html
-
Size
119KB
-
MD5
140441b4aed44edcd2f6e80a5d5c0411
-
SHA1
ed1b6db69425e33794186b3d6e02ad815f15bc0f
-
SHA256
8213182d12b382c6693ae5999035f647d6ad0a6073032c4dbb3eb864372c1eeb
-
SHA512
6771f482e707287d499ed31ff809217e631eb4f24a3384b4afb0afbca94b3c87e21a1a57f1648ff11ce28b7a67ae0ac34eb1478b2643ba7b20773bfb817dfabf
-
SSDEEP
1536:t8m0myLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:tl0myfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b102ad539eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421010270" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a57347d3b4a5f5fd90efc7e2e50067ecf11774ec4abecccefa72b06d72a78c2e000000000e80000000020000200000000cfcd11103ae1229c7c33d986649df143b2fa05b7097be6c1cc2ff90419f2f8620000000eec5f86bde81d57a037f4222c31ceac5f4b966897d878ef8e925bbf4df20af33400000009fb8b0a49a25e377097dd1d0f00706c091240b402e35dd4c1b7845b080ed18bf66d0bc581cc478f51dbd5540945074c7a699c8f9f65cf6acc242f55905851231 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6236A31-0A46-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3028 2932 iexplore.exe 28 PID 2932 wrote to memory of 3028 2932 iexplore.exe 28 PID 2932 wrote to memory of 3028 2932 iexplore.exe 28 PID 2932 wrote to memory of 3028 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\140441b4aed44edcd2f6e80a5d5c0411_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eadf9c0058eecc056760e2685dfaa9a
SHA1407127e2e3b7e9758c26485a403541816ce01a28
SHA256b91c851cda59bf0f7b53d082f91c1cf0c66aba166b8b60daaea0c3f9e133553c
SHA5128392c264074f4b05594a5506f03c762eb10d068a3e41df041752e09aed56c844badda37f6d6d178e83022e4adfcc4a5276dd92b74504607d33d94351baf8ecbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5709faf335d26ef5fb3fa6b8ea502b641
SHA1fa51afd74ed43d7cea72a4af28a2bb7ddc725dc3
SHA256871457609736ddcbcbdd323a33c2dda4fa3e6f1a420e6f7d519b5c24409882a6
SHA512a9e023805835ae98ea6c8ca66f4f7b1834fa98e31b3e1df3312f2af421e4bcae291db3e475e8baac8354e59e82d649e3af24a741b1a979247a39265885c2db0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29e52e5f98773fe6029bd59890df112
SHA1bb44236169557d67f08d2892f0323c26ba3baea3
SHA256d8efcd70e173891c270a32022374613f069f88df8e89a5e25158199a46ea5d86
SHA512883605935516a9e7dd002e07712daa5409bbad1e84b8669bd21c7924d8754fd7a4e94187d83226d36441edc51ccbe16ca5223b1fa6fc5dbc0ae4fee361bea39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c433a735fc66d4dc42d348ebeb79b69
SHA13d325a11ee1420ed8cd20f39efedf1792021768b
SHA256016a0bf0c62a97c3c23fa04f2251e48f3d8f0fa6099aa5e3245cf8d706436e2d
SHA512203eb5f517e6eb00a78202d68f758be7023057d3e26a881a9b7dba54dd682993666b435b5f39f120276793f64aa6b4c70371fd44cbfa29cfaed1cb462ceaa8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1980bac7bafe1efd825eefccfe2e64
SHA14cafa0f2886ecaadb045c08a8febd3846ae7c73c
SHA25674a8aaa7943c16ad5d80be636db31269287ab712ece0223c8e1304ad3fb1c61b
SHA512635aab6ef5884bc1cb096c280e1b27ed5e0faf53b0d53ec53fe5e0e80f9257fad3cf77d00c0a093658c3c4060540c6f15dca392bf382cdd3c3ef594a600c3fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9b26bb60c1ebacff185684e10edbea
SHA1d0d77c4c7d8f3addf6b96fef121a63a55dc3f309
SHA256ce1ddd67c949e2d01cd084cbfd4a07400f363412ce344433e73dcd5544768be4
SHA512590c80103d88e98a99fe7b8dc501a2320bd39a209c9ca78d57173bcf83db3aa87ff64a655ccc89377a4e48a6c03ad916cda2b3edc64b57184c62a0f41f0b82cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5672704c4cddd04f5d285a7f0fa88a9a9
SHA15eec0ed6dcb6ded0192a74a63ba2649ef48d487c
SHA256ddbe5e31dcc297fcc5f7a0dac826a612b9d4001fdbc8f4cae6eddca9735a0dc0
SHA5123a1b5bac39520c1e903ed6a3c6bebd2a97b370e3b4bc067f1edf4356f85a63a84a868ccfec273658c808cdce2289119a1ceb678bb49b06d03507404cca23592d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc864af054654acbef50fcd65b40ff2
SHA1fda93306813833d435b5aed6e28976e2ed7fc866
SHA256fc69481847ae210ff3b9176ace12639ae843660848b2660ac28d82140bda0dd5
SHA5123776007284d25751a4dbe8c66d1fddff1f42cdf7c8eae1cefc56afbe11549ed28c47a8dafdfc0d6597b4e8d27fb45c2e4931dca38812592f01cb796ca954875a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cbe71bbc1cf13450ed59a73d5b0868
SHA1c9061508fe7334359f2ec0f6cf30a6f81f7f2c60
SHA256991eb71fab4b0034dd74bd00a0491346aa7039a74b7d505af9dedbc416ef38f1
SHA512135ed9e80d3823cfaa26b78544903e1b8101fef1cb92331e387547d3c14e5766ba8e226a3f429e3ac3c8d9c010bbe8a03ae49fb4ba1b9d8f3de19925cd0d20de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5eb8dc136151a417176d6ef879a55c1
SHA1d8f7ac572c5d5f238d6134c4fb5169a0262125a4
SHA2567971a73f0cd32229f22af05165c2279090db2543c163b15a29d56374224b0ae4
SHA51251898ab5ff09447850249c4469baf449d3089bf1737362f6ed4884e270273d720130cf8ed632ed9a0f205376992cec27a3d3c5f1d448625a58c7a52e10784ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55f4c232285aee3b81462caaa5b0fa8
SHA18b01b4a4dfc3385aa9fbf725f3565faf5cf09b03
SHA256baef8e5e4c9a6fe351b98313ffa7790abbb3989645cb4a85d39754d49db4815f
SHA51278b7ef26f3cc87831396ad88c38c95bc1b1567b5358e84eb4491223143d606a340993708a692b3850768cc96507fb8d5b0ea7c238b405a9fb4a114516c7f9398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843c1d181c78034639cdd84267c6d2a9
SHA113b9d3b2083b51685296d186a23f4be1cf1bab3d
SHA256d1456997eb83d0e6753018a4f152f9dbc14ac968eefed2e94c941c8fee147394
SHA512bfa52ef358ae9fe79396469921abc5a4a06092da5a6e0f64d87e16b22a97f553dce5c5d02eb660b1f4836036561e30c7894be6bb1de1a3d2c59ae436f2d90cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10b45eb6526660e097833924c865a5b
SHA105145d6d0ac0844ece0c31fae40cb26b29128252
SHA25677f4ef7304cb4f5f8615b4d8b6537c1ea568a1ed40b4e013a47f28a919e47eed
SHA51219fb2116590a602059aed092270d32ae52432029dc3bdaafe173003c7f7c3a9dc7ce7af752be3fbb6a36cf5ca8c67491a54c97e8781106e5dd581109b7e3d85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e88871bf25648e1b0e321169d47dc4e
SHA1c74dce84edbd7a1a42b25d6fb1d963ea362c70e8
SHA256786cf4d76490a6c354514eacd8f365c2bd7795b4edf194571326997bb13f765c
SHA512e3b17fc2cee161f31cc83dce2e22a9949fec20a44d9d358a974db7995dd08c9b26943aa367015c580e17344eda6c61377cdf5b809304dc1752150037e8b3528e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c27e185f67f8155bd67ed146f8db5a
SHA17c661b5d33040f2825c59a8881fd7a8e780481d8
SHA2564b08486b0d711d07cf8f1bab850207b565727db33223c4ffb44fc87bd5d01975
SHA5128299e2b596b5de0d7dd3833b034a9460186a939ee13ee48a8e797215326a6ac41bcc8291593cc2aa6e4ae591ec72e55baf76752923d78d34b85d8dd3b154bc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58850a557b93014598fd386120e775509
SHA1cc7978ce4c75dd59f247ef2211f14fee4e9f909b
SHA256f9d84d5dc449cdfc0f61e4537bc8316fa6f87ec4e60ebadad1ad6b3f335235c5
SHA5122797dbe80b7622cb273649f70e09382e905752e08c3fc0984b6144b9300a12284616d48f71d2742567de2b5eba03e33d52491a66d7376640e654e6849bf0facf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b25317e6faa6faa6dd90978c5937e4bd
SHA16a927c92718bbc1ae4cda199f5cb753b654145e2
SHA256be621aff3527ac9948f57a13394214d103c5afbceee8a2a608a6bdd20a15531a
SHA512b01c5ac9f3f5637ebde1c6da4fcde0d10722375d030d4b2038c602ebdb8a5c258636d58ebbfe3d02fffa4844e145232ba232459059b7c1575dc0c4b52c727504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32cdf6b468e8ffe58256ff16546d09d
SHA175945ff9adde077419554c04dbc66239407595fa
SHA256d92d677aa8a6b5f1fadedb559d72a063b923e727dce861137e8c209793ac9e60
SHA512dc5d6c6ade3738415c105c8baea9bbba2fcc63cfb260c269dbfd6ace29e199a02cf6450fbde005dfab8fa24cd411661971382875f232286f98561f0212974e5f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a