Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
1758ff83bd92da36973fd7c0e4f16a72_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1758ff83bd92da36973fd7c0e4f16a72_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1758ff83bd92da36973fd7c0e4f16a72_JaffaCakes118.html
-
Size
461KB
-
MD5
1758ff83bd92da36973fd7c0e4f16a72
-
SHA1
fe68a33868dd0405efec7acfe84515dfaa4116ed
-
SHA256
facf98598e0dbf2f6c3b3899451dfafa2900b1637e8071e2aa0c6ad2942b199b
-
SHA512
ba85760c9d059cf735651f6e072aadaa546c99054eac70207afb565cc553b0c4fb1e753ea88369b2f26c09310ea2bc46e7ebd59b27294875b01a9e6ee1079ec9
-
SSDEEP
6144:S8sMYod+X3oI+Y6sMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:L5d+X3+5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4009acd2da9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421068392" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA1A5D61-0ACD-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a41186c705b8e8ea5ce191347f7eed31f293673413acf55e52740b637c95b2d4000000000e80000000020000200000006cc3f268e04ee86c40d3546702384293eb8f2aec539945dc09341bea3eae35e520000000e5a09ce1bf84435fb1352b071fa1bfffac89d080d7a4d829d286683d9d27597940000000d1f90fd482af96d6e579efcf6709643ca2e2dbfa5fad65ce47c93bf5973a974a373c15d74ea25f48d809d79e97233935a0a41c714e375ff43413c6f8fe0574f8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28 PID 2092 wrote to memory of 3056 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1758ff83bd92da36973fd7c0e4f16a72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4aa6510ecb27f577cd9c09414c72a88
SHA1d2c4b15288a162a08a29bac004017482fd559a47
SHA2569ebe32469e4b8ce0b48b59d4abe7aa0ea3ecfd0aa5f56c1f77b7083e54010fe9
SHA51296c97290b85ce2e7f69434a08c8265579871a70883cb0e8796eeb2014cc2e1d75680c964002c692ebb0e7cff0ed3b493e538c1ef940a2b4639d821608eeaf8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80271fda6ac5d2953ac292062b84994
SHA169d6f2fd376b071b0d691fc12002143a28215f7d
SHA2568d73110b623629d14296e4df4397a767ef3cee194b039e61c0a5026ae0341380
SHA512063bcd0e734bf95406306192aed4c78d34402550babff384478c624693bdcfe6b3aaf07a0cd982c07064e0625a07b13ab63ba0ae244ee420fc7905c3d0906d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56460e7c2998fdb2f0e514875255f5987
SHA1517f98d5eb6a9971018e91c5d7fc90f8b01eacd4
SHA2569b6883049cd6b960a94c896b1a45058172ed0e06a97e0dadb5e8be447819f15e
SHA512f1a98311fc67259cbfed03990fd494a76cfd0a1e8a214c70984bd836abc9ec144ee0a392474d192736ac0a5dc3ada321acd7704fb2cdde3aab1623ef23f6f15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1293720d307ce78691d927d0e66209
SHA193a2c78ddea119f229294d4ede046157e94b119e
SHA25621ffee4a8353cf52c682bbb54c8ec115bf2a53ad393a3b20a871720eccbc93aa
SHA5122e34331fe8ecd9cba42db07d58268d5704b1730dbc4d1339782516232dbf8e2e966263a1a24260e6e724d6efc8dcd45d3c267106e1d9bf7a100a87b72d722e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33304ff95b4f109a6288129d3f7618a
SHA106c8c9f6d8e90c7ac5dd839d791d9ea99168cc23
SHA256e1f7fd0ed40f16dedc364ff7600122436a0bd7700039af2ae0178a5496e50110
SHA51209083e80318e92d8ee71aac16d5afa67ac6f53edcb5caa28b8e0a840b455e72a3c7c8eeb061e037f697bb7025f75d45bd0914771083903aa937b9bb6adbff553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29cd4d81aa3d373958cd3938c33b88c
SHA15632e574734331cf2dcca8c1584ca1a8b50753ae
SHA2562b103355775c75192e06dcfe625175a53456d514827a5f4d4b544dd1e162e139
SHA512d1373e1ff0da659ff9474e7dd0976989504c71a8ad972d6631382ecd14aaa881a122456fb05f7054241e2ed0e751ad9b3ba43640914e820c9015f6f2e3c9dd11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5787bcaf4c33b33003e0a4bf2ed9192
SHA147446c698e5d9cbc5d5f93e9731fa47e9b3f3856
SHA2566fcfd49361c4d9fcde2c9352f56ecbcf35c6533774c252a825e6b8edb1201098
SHA5124b330394f017c7387ef29af12a999ede2b94209fc637e1c21056728864ccc3f108a206ef883cf9e82330229510f9c9a7e279acbe26f0b3514da9eeafc0217a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559c6d41d7532cba782a46d6395c4b1b0
SHA1e17baed0d5c3a95861ee61489b3961978802358c
SHA256b45bca9e8a0f358af9f2c4f656ccdb00650a18908c39c942847500f00c9a2743
SHA512d8b22f7abd662a98de6977d47fb2a27802a415db9bbdf41845539018b15b3d0c6d3eaa54d0118a8a0267fb5c2eeb99b5b84bbd1796358215503001dadfba52d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51415fef9ded4e9d36043cfcb56567190
SHA150da7cc1132c6a5ca2b60ef4681c7505c0391a6a
SHA256bdada693991a9c4aa8cf532df70701bb56c9ec401cea34913486c2d12ee42ad0
SHA512517fdd2c415d851cfbf43f4851c4691637b074a389148121ed4499f22cd0105862f590d043d4910cc909920a793ef790870429f0e7d125b48c54584cb19c05bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5cf11997d6b10a1a3323b32ad52185
SHA1938ffdd155e117726eb0ce8fce36b526553fbcb5
SHA256b053773e82a5f30298af32f6bd47ebda5c7988833000e9360b4f61bd3a9e2540
SHA512c3c08137c460071490306cb99c9518b7d4404e3766f655ec1707ecb0be8517a7540bf2913cad9bbe73e434ab455e3297ddf8c7f5e5658c076a783da712182954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462eefc7a156725149e5e65819a60626
SHA19b40c6b233570e9d55330b50913d39198a6d8b59
SHA2565772e94114d69a918c106807b73d6033ff8405d529d34fa38dc5784200dc9dad
SHA51277a333dab60d712db8f524b11a59152433d240972e29291916f06342ff7ad8379875d518dff5166b38cc3242750d619dc7bb15cc840a767df78153292e7e58c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212151fb2db849e7066ec90037569780
SHA11ba9177b32c0224738bd20400e9d4a348d3fdd35
SHA256ea80e87756143f495553fac7752d281bbdabd5aa753d27d323c9c55a260b187d
SHA51263caf56cc75ea0065bdc05963594d10109ebdca254ca491ed1860741cc9eece8e3f4353f28645bbfbad252667a32898945e2a85e3d49e5737aec1fc0532b9990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff9d63c8a4c692fc8e0cfcd4cc2e9826
SHA1b64d68d9d86cb249d784c8069d7fac176ba757db
SHA25648a1b6a73b6a23431fd694f54ef7afded35add31def01ab9c88d25d74e5e3a8c
SHA512b99e03452a5003825cf5b9d0d21ea3af59f4280cbd32e751c33ddd0af52f2c5a7317ddf84522fe0443e3aa6225f77c618c2a34c19ae18414a33300da37a1ab5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda292af7c37b66a209fa3a01dc74de2
SHA1dc652aa3c4fa13db6dbe8e8b5019a06a9cbea727
SHA25633739649c6933bbe0e07666dccc6390e5f71fdd24720bd2a7555d8c28e63baca
SHA51284dd1841275e8edb4d945aeed7a9b331692347a349df4f933e3a5ee1f73a2797f4bef5f9e5878aafc5d7e4ad512f635f0864754fdf0e3810b0dd3c5f30027942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6aae43de17fe5160635c84471b5ca9
SHA165af5e4c355ac02cdfb68fffee2e3204b7af8145
SHA25678a86875e38a540fd3e65dc0df9f94842d9abc13422190a8b40d7f0c9f19c607
SHA512f771651e1178bd13073b28a9848507e6422f9e53af813cd6418972d6703320b73621d0c9eeac34b4b96ffde1fa0cef676e63342ff081b2e3f497f865e96844dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e8e0b88164c2659b83c2bf7050cc03
SHA1760bd0fdd82307e885cc64cd04fcab24dd4c183c
SHA256835d81c49eb1a058d90250faccdd614b3b562fb8907763e84cd5e958eb6a407b
SHA51209f80fec36bd98c3df1b4d72e991487f5a1e27e29b64833e31d422e16abb13be732ced0e9f4ebb518d886e95418156d6dd2f99a73e248c5094449d05d46eb85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dbfbd8e6ddf463b60cd4cea81bcb1c9
SHA1124d8358cf14200aed78e3de8f9f6f557d5b7e81
SHA256d84727211dd3d046921ddc7df2c0513c6360386f8f2ba2cb490f51731d72c95b
SHA51225e2bcd4a3d41c3cac30bbf103003c83852ed4b74b0acaea840067d98d42a1035b888e1ee33252730f80897a4e9b2e72278c38ab4912635b2ec3b3a469e43398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571bdf6de44508fcbb4b721df77603da3
SHA1a39b9243424501ef71a30c6671a705850884f89f
SHA2565062f26394165c4c5834f6f1198905433fe43f84243fd5a0a341b1b9c36c40cf
SHA512499f0fd4249162af80695d078be0123fa1eca344521be0a39f217230942a76bf98d4ab3c5d06dc106a171cfc9ccca82282b31a459b4557dc1f231bc1080b4c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55794b84dddba8b381988d96faaa71ea8
SHA13c9820c2cc5df6a1b30a05bb99b23ab11e1afeb9
SHA2562f4f01df2bf6aa37f5fc866c6ae404de8cfeb129e93d1cc82ac0bb3eaad62ede
SHA51280df2dcc33cd0727400417dd3da3b50d1339b17e0c18ceea53b8f0cc2cdd1124a408fb363763c0a76bce0eee7d61995b83c2f9c80af7f1e5f34bbb1f3e039f58
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a