Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
21e26051c7b4f099d9833cf3e48e5859_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21e26051c7b4f099d9833cf3e48e5859_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21e26051c7b4f099d9833cf3e48e5859_JaffaCakes118.html
-
Size
461KB
-
MD5
21e26051c7b4f099d9833cf3e48e5859
-
SHA1
9f60eec1adbcc44020ef8146c5e4f2e114cc37ba
-
SHA256
c6993a3c458f77d9f7797319a031114e52506a8deb74a4253203e28933176a67
-
SHA512
c5dfe1d8c21b804765a00fc570f040e2bbe1cfceb894dbccbfa2c9a91b1dd16a1c63c984b3f3d666ced554bdd3fe4deb9731810e38d9e871951c3aa7a7986751
-
SSDEEP
6144:SBsMYod+X3oI+YxsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:m5d+X3n5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421280837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CA61611-0CBC-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70542a75c9a0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000008eb3a0d277db1e0fb0ad7e01206dfe1643092547df459f814b819abb68775001000000000e80000000020000200000003846ebbeba786147cf15c9812e9f2bf33a5cbcaa42389b2466c0f677911baf6920000000a47a1c15da9d30cdf99a3fd0a03ca5aec1341ec0967efeaf3945cc3b086a3e424000000078a9463398705349f739e1f0e38fdff57b16816b9821415248c7e057ed92a3df33bfb66415460f31fdb40d0b71d4569e77c2d9eafe85c53de3b5bca105e3d8fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1296 2752 iexplore.exe 28 PID 2752 wrote to memory of 1296 2752 iexplore.exe 28 PID 2752 wrote to memory of 1296 2752 iexplore.exe 28 PID 2752 wrote to memory of 1296 2752 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21e26051c7b4f099d9833cf3e48e5859_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771579071487479f0a1215034dc476f4
SHA16b4e47b6fb8cb2eedb295d009e0a66f2586d217d
SHA256504f4288e4b423e5232bfa8235863dfec9599d05372e96cc146d4c599c28db74
SHA5129a09baae106ed02e7bf5b45f1c76cc51e03beabb18343644adc3878ef5912d26d64abbd6debaa50205703717c35239bcd0535c7c3b242bdcbc43e4c031ab8341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436f0bcda38aa4ed9d47d78d67de80ce
SHA105e97abb0bc6e59c8d34c17459e482c1e24ee949
SHA25660b3cdcce141bdb411482c7f842bac7bb2ce3b1b520910039ed8c25e7f2ffa5e
SHA51212440597ce826a28fde44958cfd668e2b33fff107b9e114c17948cef277bd8ea043038297ef5414efb80266aeb965f20600e26b58a979304aa51d956df32eaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a1fbcfa888f63c25b8e6df790e56456
SHA1b76e3af277ff8746e725a43876f9ec822993a21b
SHA2562c906096d60b7ef45a3ebf95794c31ada8b93adc775e03be6af8990fba67c169
SHA5127ec850111881a1389bde4f67be2be97bbc8f1e83f0153387665317b640a712bb436a03d9a5c28a7ad68157b2abefaadd9932bc0e5750f1f2376e1cd2428976b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8d2406853e83c8b1e3883bd41de6e2
SHA1f8b6c6dd1200e8c8604d2cfdfce10c51d0a6af70
SHA256f0d7f06a744d4e99c9592fdfc9d1b4dcb353f531619b1dbef237400787830049
SHA512394c51ded35cb5e70106eff63f6170e45639ab3cf6b7a0fd96acb268145932c2626ef43d00096423ec0cfd60f7cba6b8a5cbffc563f2688234ac0f9c1a0ca4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580d8b39f76f971104792679f5d4ab6fb
SHA1d8f85cabf22f8eb57cffee415337022dd97afd51
SHA256c948ceea71958c928f2b8884830c5778f2fa11b8f7c51a587464a9886902a311
SHA512900a38f3d9816441f37e07c964a2aff0dadf7363517dd32015b042ec995996eba5e42e522b20dae4dc8a7198bb3f07d11f6eb92a638efe254ef34e632dbbffca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5765f0ba569f877ba84285ff94648b0aa
SHA15e994f5c117ec7b86bc7c92479158552c7f02d81
SHA2568f3701938771512be24351a1f5fb772ca8c1e1ec5e86b7f0d8ab912551f48bbd
SHA512789302f2f31d31aaf0efe3665cc0bf09d3013c237804fa8e325452a1b2898badd92d10a7bcf457792b2de5f7991d1b8824f2b3df66b7b1a55f59f49d1a487385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef67cf24eba170041585eb75fd540110
SHA14c66c296d9d6079f16f7fa16869a610eda2bc6bd
SHA2564c27aee13a018fec43dd5b4928b5093a7741d6998a940880a966dadf4d61d5e7
SHA512e46d24feab79462e617ed272d7126fda2a965df3c3dd7240101b7e66cf7b1a1e8c8924b3a1c3b6e01ddb3bddd2153c8040fd7a205a81ce129f79e76bccde7e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2677cf8a31edad35b85363dcd3cfea
SHA13bdda8a024f0fb330cf7b6e517db413990b96ecb
SHA256ecb7678037a35761f44864b1cc02bb4a4e2254c11ac1ef64f20279d1f884ad3b
SHA512d14637c3f62ef98457e5119fe74384d68e27d9b62ea5ae1484b9753e1034a8518735923f9c5e20d1e3fbc0e3d1632acf09d3adcaa84cec13414d0a141c0d37d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559ddf720cf8a06bf4fcba1835a5d3591
SHA1198e75e26accfa2409cdc7bd105c02f58b2b14f0
SHA256131792730fc9011c579d82722a364b3819ebd331f6e778f0d160b24a30de2af2
SHA51219487c199d64748313dac00b7a421cb3f09493aeac46e4f838152a95df99e67b741a2b4f77be8f0e93337978e8eafc51a33fafd1ab2b461b11f145572e03e9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b63fea3d0bf07e38e940259183f12e
SHA14f6000fea6b0f393da71fe0b06c5b176d1d0edd9
SHA25662104e97b40f805f909efc7869420a1f23a7dfbc38f8f8e68956dbd6b9eaaa12
SHA51231f83840f25faf3e50b0dd6e1661464dd821fd8d3ae016ff9e2f9e30a68c6e5dceaac574626209bb9a36b49a60f917b884ff04e47a6b325718dc07b303d3d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a322291f67e01c49f74b17b1b2a9f1
SHA1833c895ccc5d43bda4b2509e23a4a13d3b9d1695
SHA256797656f06456e239747172939c8f5e7ae34d893f48f9c0fd491393f50c9d49a5
SHA5121c7aa5c6b5317a44cdcd37532a03439634e03d38aa659367328e9e5449703af3055e5724e0208e050c3dfffc8d975a20a94b7f80e520571753247521dc902271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59adacba145abeec045700304aec7bbab
SHA12f107641d42bbb176da2f7eb2fed73b04eb802f7
SHA256ecd350298c95a9f7a5845c7dc7e216469a48bbd41a6632fe7092e46c8b47358d
SHA512637096916c9da876f3bbc13e26646d1167291116042d29ae00fe337e5626d3695638ebd8f2185042786df1d035d517850ac9dc85ce421853e4a2074fe745278d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161ee192d531da79f2af049e950ab034
SHA1474a84d8f69048e41cfafde2a9e5b9988d473181
SHA256e0ec5ec362e032f57358de35bf074a693a32a95b48079881e69cff376be90e59
SHA5121c6bf647f08e3fe5f3a54e144616968710e2c4d3d1f0a367285b66588c659880e454d6fe6434665c646014ed0b4c7cd9017270c03ff5f5dbd65f5cb156fd4e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8c28c953ace0d26e60532e36dcd708
SHA15437c405d0480b0b79f1b2497bc061615058b532
SHA256c377d88e7c59da8bbb55013533fac62c4fbef164a8d5ceed7972cb13b517b2b5
SHA512526f2a7fa28b1d1b178016ec44d2c6fb0ce9621cb9de7ad9b17c97751a910da15b3ca2b24686194a7b1d0952c39c96ad111646cf33c458b4c912291bc78225b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ee2169cae0044828b8360a869a23da
SHA1ec50784bd27b2568dfbece15d9e9d2b69b554539
SHA2568418cf5029f07de3e3d34c8cf7b149a4cf136f18e5809a9ea5aa4e84b7e29e37
SHA5128706cd296f5440b6d5c44392794f39b9eb624437c18b2614882e2fc1acfb0d947f40afbb6956a4498c66c1c92f07066b0fb9ee02145e64b5ac66d4f2926d1ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501b1c0b13316706f549835069d97516d
SHA12ba62b5995e1fad7718689389b8ae4e009387f3a
SHA2563f75fa19e44c347f61946ff0ef9a33c68a7373af69c47e4f146066a94f486f40
SHA512cde8b12eccf9f4ac84ee46a245d4dedee690d13fa3c29c460b3563d6a42be69699483849891179cb868489cbbcde385b62ee7794a195202153407caa3a5b9249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115e35ff6015100a6b99e38ba87a1fc0
SHA123ecce2946940e3a5c12242d335ea563090d4c7a
SHA25633fcc6cc85ca1f4c2193d01695cc9cf981fc390f7f40d5f67ec2dc11e18438c3
SHA512e4b42412a68ac15c8c3a53410d1c374411efe5ba469df9668e3b72dd76349f71b142c65f3c04b4cd7d4678e33d25ad69bfa3963d01b8deb0049006ba472efb28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaba50a2711b96942744cbf3472ef59d
SHA14299043d49008f89de6553d5ddcfc87c59079b1b
SHA2561658f4aecd6bbc96d42a2f10798ed405b004df9185ec3e68e4916e5c41da3cde
SHA512016cbd1eefc50752846977e789256c33eb8d27ce9e2e8fa0e10da2b14a6870f04698ceda671ac17309ea261a28cc9687fbe98c629392a403bfd645147423fd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e538f7ab8b22899f866d1c2e0582c1f7
SHA1409c625cacfe6de716ab37ab9d2cb63c36cbe9b2
SHA25678590af1107c81be3ae62960a2bf2419cb50b081bc322c423b1e56bbed052280
SHA512127f8575448bb48873c2b3e1f1d7f6289212e29765527491aaf138ae9d6a2e3a1bc9975a71d194a20a7f591804f659abe71886e542e2673068ae736cc02c6bf9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a