Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
1f24e5eb292bdbcea4b5c29ef2287b7a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1f24e5eb292bdbcea4b5c29ef2287b7a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1f24e5eb292bdbcea4b5c29ef2287b7a_JaffaCakes118.html
-
Size
933B
-
MD5
1f24e5eb292bdbcea4b5c29ef2287b7a
-
SHA1
abd9b5a263b201de67ad9c23452fb413556e1e97
-
SHA256
ee13602e93da6435b2156da216fa14f3c6c7039746b0dc42cd99b46cc1e90a90
-
SHA512
2935b20b29848979c494b22c9101681331d3dfe59ff4a85f4500b2180caf7d1b1739ed36363fe9cde578cad11b77dff4f9042c907b31a11e5d27e1003a52b119
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000743bd1620dd44bfd815e403e4f53ff302118a3bf0ca0af7cfa5a25525ccd1683000000000e80000000020000200000009700ed22dda49f939d882fc33d1c7648ea8819f1536b61c72bcde582da563eca2000000042b774f728616dfa9b9dc2f4196398652960018a6d6169358d31c329edc4ddc140000000578d2a88b0bd5a5d526843d4adc95e67550c5380fa93be3f4a36e62d12300366010afadb3fce25bf02274f58d32ded679efd7238045962080c73c5b0febbc4d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB4AEAF1-0C19-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421210960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04ac0ae26a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f24e5eb292bdbcea4b5c29ef2287b7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe08dd53fad557001d2873382eacad6
SHA1546fbc699999d8c04fd5412de490c147cc8659a7
SHA2567a4eb9ef8d363b58c68f7c2aacbf4d189488346e67add37b5bf623ce2b476c47
SHA5126d8a042208e7579f89aaf7af4775c1396e380ec5bf692c208ff0bb3f44b757919eecb23c881df8dac3571d18592e0867a228ab1330626d0cca28e2592dc32f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a84942f2fb7e0a2c7826fc0edde9955b
SHA1ddbab947b3eaf3cb062b58c0e3f9d71956b98e98
SHA2565ba201e26d7cb41dc806acaf25dd052a19420b8651b12a0cc47ac03ddef40156
SHA512ee0d527ae2a323e54292a14147b1ef7a7a9be3116e8200a35a2a638c648d30890151d69ac2eb1cf0feeda1ef8ea906373b9a9e3d1bc216416d82096c472c2d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b4cdb552055bd03b9d5fc24622013f
SHA1be821ebba1af3f9970218f523ee04851f68d0d61
SHA256666b7095a63c297208285914b7e8ffea450bbd9dd83ce6fbae2271a72c4ea933
SHA51242bf3fe6de995837e8a970689f8335d81236d6d102fd63bf61aee65d64f20f2e3a92620ae1e86126c423f73050afadcb11850dd2b1f4d84792116f271129de19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb2f45f56ffb076e5f3e87ee26a506f
SHA1a7b0cf06dd566e770f2a60caea17f309d904c668
SHA256e3337cf15c277335be77a0f99c61b6d4183a72a9bdb87044ab89f94980d55a90
SHA51263e222af54b152ff1a7f933942e857f95dc671faa00bc893ba786693e233c396386bc14eccb051ae9430ec6409704a00f8dc61aff2307ed1a6148b1e12ef8cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5254a42cfe6eed8fc804bb866e62818a3
SHA17719a3a001458d853355d4a1a00648ef49bdf570
SHA256c7108acd7ccb5a6e1f17180daf08a9c61c51eccc38bd978b84086ca4afd55da7
SHA512a8aa701cc43ca2b9af0e1c54a099612c204e7984bba7ea94fbc54bb4f496245bd7bfd530f437e802ebeaf03dbf5e091e2654029862ad68068160af75a802d6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e29526c33703ac1e7e0f4738193ef9a3
SHA181bc2d516b91ebb0d8c1e50fed1335f249d53973
SHA256badd9a52d83f0d39b6f88518547e9c5ab26054139c15af813af52b650c896ae3
SHA512a3381667ccc5a20c766e61f3b97ad1f29e9fef72f1fbe8247cfe8fc6e782fa63346a71df4483b1b7f0b8ae970681e526f51f582bd94d302c53f65458984f5119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43a5745e9357c122152180cbc75b9f9
SHA11e2913804cf77022a92c62c52b4ddf21488cec36
SHA256155ea3d02df0f83fbc7b430bab764564840e9b8ae6c93d5c524c329be009f7c5
SHA512a1be88a737fdd7f70a756b9c8a3c7663a50b2deec435bd8cdf9f0f2641b9c91671699288e90c0910c32d16d781dcf09d8b5eed3db4c6e55deb17bd90df4e80b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5c06f0534863a1fa36d0213a3558ed
SHA197e7aca31c2433f0e07d8dc06d7166ddaae869fa
SHA256268ace67cc19a1030b49d74d12670e19ad99cef2500c4c2f7413e281c8b0c293
SHA512042b95bc1a7fba8a0ecac2ed6e7bb0f3d408c55c28ec1c076e1ec1696e0e3742e667ffb5e69273ed376046012d17003447b33a65e598fc7da57de9e0968ac259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d038f6590905a3bfc48dbff97cea2ee
SHA109164cf027c342f1760b0debaa4485a22706119f
SHA25658f7d4482bc9ee1212104748082292cc79acbb3c76be28a68c0a535928d1b7db
SHA51243000420103c4317f673bcf052f3f02f55420ace7a0b6a3e69fd2fbfeabac060b2003a9d8a3b41381b05c5aa99676fec62f0699609b6d33cfe3b03a370339873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc3ba606874ef581a6585e3a7473ad9
SHA1508e3bdd3802b4bebb719811fa0121b189ab4e81
SHA25698f0e25572a436475d3bc3c4afa6409acc7969f853ce458a17b269167a4bddb3
SHA5126aa44fb3c681d57e6df8a178c8f8d8afe51cfdc9b327e369e9fb1d1e465ace44058023923f7d472efbc7953ba700f4f1766696ee54e10cfb34263be0d6d0e002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dbc0baa2e1bdc7b0af3acebfc04be6c
SHA17215a31b3fb506ae5520a4bff6385f14ab7911c6
SHA256e7461dcba2a8250678788358eacd34787da816823f0564994147a7e7a495acf5
SHA5125d681de28c30ce79196490e6edc5a407649368005be9b577de515a7f0818a64d3f55a37a20dfd3edb3f56ff8c9f8d6d644effe204127f38ca9711068638acbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d244420a8fa36197e8da9bade0b281
SHA1e8caae0a2ab9dff06cf69584f36691e78af16145
SHA2560d6880ffcac4e6fd961c8e8764c1c8a066988f1c0b1691d21d35ebf6bb036fa8
SHA512975cd92d31ac0fcda890dcb8aedd562a2022bdff614d72d1a81b0761f0d60d988f6b12477f08236c8fc04a130af27f3a3a6e05dbbd8590002fd8426be08270f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87dcc738cff528aa8e4d9b6b2da9b7d
SHA19844f2c59b391e696afa70ed3e072cc8b2acea64
SHA256f7a64e280fbe1751d375620b916423aeecd6f384be2f650525ba30cb41327446
SHA512b2d1de1f546d598c58e60e67fa3c87ec5ef083d6d00b8cc91b88cf089666f2d64eea9765415fbf3131308f2ecf3bbcc58065f97cf9274bf0bd6144bb6606b1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560278f049f85a48e2597ad8b1635c7f3
SHA18af642fc06f287a22f24c9c0b81af13f6f101950
SHA2567ef5ae80671a87c1ad5263223ad1849bb351df76e9ff15bfa9effaad1704690c
SHA5121cca8b77487db64df75db32c7fbe4b27c63a0d84e7ebff4fee3a3a746c66a72ee814e4f7cd2070d05ebf5c2128860d8d0fd1e50bff8005c300db0be6a83ff0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b3971dc9eb1524e11370f0fbd2ae7f
SHA14b4f83db32380fb10aa63bf624a6250c6bfdf4c0
SHA25608c806392fb721a7a13891160d7b91e5f178e06496cadd0514284c6ab2ede8cc
SHA512fdca46bc610b339649680eac35dca829cd466b3bbf8800ab5b1279987f2d9abd9f382bd4cb3dab6878c65331ca3dc3dc5eb849647f7253f2e82986c8a91e9796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539882c0fdd0ce2ac04c9889247d70207
SHA1e2819ec49d9df83d7355ce50d25bf920ba6740e8
SHA256d4f25b4a08ff3ee0b81aec34d34af0b03da9d27dc6b7a67391f07e696905b95b
SHA5129dcf95a32ae62bf13ab0c516d4d3a749217e966dad6aa42e26e23d000d921a6f5e61e19eccf8265ec4ddfc37b3f53f517b627db9fd6349537685328c586ea343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e564397b6eeffbf082398b1e371175
SHA184ee5bf574e92368b1c5247e27f5188fa48e11b9
SHA256ca8b8b540dbe2bc0f368b3cefce4182366e272c3fc660cee774d320e5b64f8e8
SHA512790912f138f7cfbeeebbe5dcdbdaf24b2d2b62086acca8e8382a711885b228e318ce40aa218d32492e37da174c99a1390febde6fdf0b4a6a78769c9837257d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5217a8d273e826284c1ad0e4f13ad8
SHA1c4bbcee0c281ae0f05f2b763117d61e8898c532f
SHA256dfe0a141deafe487f972caf5cda078e5ec139666074ab7e258052537d4a97dff
SHA512c759c9d5eeb1c63973a8248f48b8ae0b18b167382be6f0cc06e1eac21dc4ab626193c72918698c33872193b050bbe491e0aa81ea32f43609a7d36dd87f01c522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd209978456c18ba13418039fcd6e82
SHA1e184b88288ce72b77f0821de5ba84b791dbb0e90
SHA2565327c639fb532fc122e3863cd6485ce5f50450bd5c5ec1d319cc1fc6b53832bd
SHA512b1a201f29a267e427642a084bbd92f566b1912d8c185d5ee8d88d7dd47031bdb19d848775abac6da8d88faa9293a42e4bda92385b956cf3d8870e08d92c7080f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a