Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
1f02b890aba7f62a71f6d2018e0ae928_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1f02b890aba7f62a71f6d2018e0ae928_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f02b890aba7f62a71f6d2018e0ae928_JaffaCakes118.html
-
Size
31KB
-
MD5
1f02b890aba7f62a71f6d2018e0ae928
-
SHA1
4e70ac019a352f8f6980a39b365a9549e39868c3
-
SHA256
56e0123e161768259869538dd48250b32a5ab6240a3b3c84bb7f61ea26089f77
-
SHA512
764d9c6b09256ae0aa77afee3ebfc5edc759207153948497765d823d675d40a4c13e7b298044924bddff11b739e7854029a63871758ed52af4fd23ff9cbe6dcc
-
SSDEEP
384:KwzW9c7iuo4Oz1BGdj4vk8knZp3GsoiQT94g:bOJfz+26QTOg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5E96821-0C12-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421207865" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f02b890aba7f62a71f6d2018e0ae928_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d0f697a1c76d5afdd84254c4aa728fbe
SHA1bea17347ff34e38eec0d7ab9ad25115e50543487
SHA25691a9e01efd1572b3a6a84820f1f501b8c91172514b51b2b8d6032dab3122f63c
SHA5129c18370a38370fde7894694592bc23985def0382e8646721edb5571a89f463bca6db10e76f0e3fced34c9f84b4f156a614d9985f826f1f16977d715f1c377da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524b40add83da1ed304eebf8e8181067f
SHA14d185747f84ed79f002659d10438b64bd31372c6
SHA2567aa4c545874f5bd63377ba930592d1d061b9fa4f6d5eceef724e7cad341ebcf1
SHA5125610f0c05bf7e9a8a9e50f7607e0afee507c954eef43c4115287a03d3fb51e752d95721c2f7063baf06c8825081fc3dcdc3581e98cb6765822c037d92e3ee0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fb49870fbaecdfd2baedbcb557799dd
SHA1a429b55ded6ac77a765b2afbf0936120d8c6c31f
SHA256397e40ae1877129228f63ab4f45737ef257e453a1beacb059f177471499bbafb
SHA5127f46475bb10d2518fbba6763570ad137a809d124b91c5ac24d71c5a0d6fcaa481c0ad804a3187a98245dfd343c4920764af2ceecff610a67d4a2abae4f85ebf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294ffa02045eac6032441400916bb84e
SHA1cd414e779137eb9bd5341351be52248d66255d13
SHA2569fbf87b1e4f4de7d09d7acb0fbe77cb8007a0db8a7286b18d47e5c2f34620b69
SHA512070fe3beb6b157252d994d243afd71853ae3866c76f54512b683a951d57a3373e8ccfb356d4d6ee51b7934b849f5f20d087e148ddc11bfea957a4c7257c2bd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e5a87024757fa2eaa6c9c0276b20cd
SHA1122e88b248e9d1f44953e1b94c3359305b894b5a
SHA25675a3d8b22892540bac27e298a51cc667fb668a4ab64559aa2f1977acb221a392
SHA512b8477f2d0fc507a3d75553710e88f2078ec7998fcb39669d351cdfd86ab833ca2aad0bee1ef0434a4420e05280b1ce896c2d5749b18367357bd810f7ebd7a669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2be287fd7883612bd212c4e94753462
SHA120eac5aaf4504c7f89b5c6943b0b2ac8a1097eea
SHA2569044bc9a1fbf195a3aed312a2cba3173c4005aabc44289e5557e269fc453f56e
SHA512f6c32d8e64b2a7de988091fb57876ad72d927fb322a517fc258a7882386338956aa70d537489c3f57fe216999a7fa5c5c0744cd06a6bf2d7bc774c0190b431c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a931ae31ffcdf1c2fedb4f31fd212fa
SHA14f246727b93b89a8e793782124c91cdb73057e23
SHA2569f31c93bf5bf43bccb61e62d3d59c6926ebe17f68c320f5fe887f59c9e7257b0
SHA512fc1b391f0d399a3c4a266f43a43dd62d496b61bbefd22f248dd8cab96c6c1c59f2483e221580b610a5e942f64ca855682fce189b68648f83514ab882e15d37a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58569923be898e2108937fd5b9d8e13cb
SHA1b58e1ac8fbdd107b1afb034ec5b6c22c117459bd
SHA256a2dd4017c4ed42fe12f53712b83bad7672afade61b6cf559c839340faf6dfffc
SHA5123e54da64c928e7879d144a4d2074a838a24289a30bb38c68fd14dbfc0b3ee4b86832ac322606cc1dfc90e2ee59e7fb2500a2ea59c081cb71781d4ec6fb12e599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed7270a3cdcb78f33240183c2aeec72
SHA198a79d70d15c22434a3983a32d6cb5657adf8045
SHA2567006bbc7b0141e95c8bca210bb78f5d0b3aeefd8ff1b973ff3f5996701ff31ae
SHA512d2e44c0869304eccaf6bf6a5af0a0db88a96454b49637269a9a85e091a3509da8b6c991769ce00c91467468537150d67b677fb3e19e3132fb64f2822db3142d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ac866f4a07329668890618ae72efea
SHA13a77d860f4c942258b75b0052739799f65d43144
SHA256e589437c117ed4b02800be35cfcaaf01b0e5cfbce1368b4fa85ab3d54e1295c8
SHA5123d3da48d35deb94d1910983a68c73abf85b19ae93e509ae31e790c191f38701a8d8ea92f140e33c193e7c2f0a7224c022fd61896915df0069d3a951389dd1d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20699fa7834f1012bcd48ecc126ed87
SHA1ae921a79dc47553fcf30b73f7716b80633335ddd
SHA25684d16ff2526268187a33a6580ec398898822eb327d9e26aa2d14bff0351179b0
SHA5126ac1cd9ceb5bbec300bbbac78df28c42679ccc52e09f4ffc90c82b32af6b56d3e0776418c3f43098c2240cc96a371e6810e711f1f58e07f95861526ad395b025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD592ded5c5aa861b9408d256986f1a2478
SHA157b89eff2623cf56c3eb6c696d4daa950ff5b340
SHA256c0e986c334d5dcf39274c2ab7085ef5443cb2941ec15f52274bb34d4d7c37d70
SHA51295c65abe688a0f18d926d79e84694b659fdf6f03c21647903fa816ac2c50f2a38eb4dec00e71b55d2a901cd183314182bd80e864b87be3c58725153a9024269a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\ads[1].js
Filesize1KB
MD5ce9eed9a9bf71574b9cf93a118b69711
SHA114ce82b1c88e00e08467ab92194a09a416054a99
SHA2562e6c19708a1954656ad12fe7eec0af09c2111993549709c238ae4ebaea0990f5
SHA512c270a6b2736d713c966e9d55c79cab0e77334bd46e3bfb961497069f229e3893d67186236f54b7a76cf415c08056e7525ca090ae53636f95312cfe3886a99545
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\themolio[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a