Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
211d343df80624d2f6b68762312c7c09_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
211d343df80624d2f6b68762312c7c09_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
211d343df80624d2f6b68762312c7c09_JaffaCakes118.html
-
Size
460KB
-
MD5
211d343df80624d2f6b68762312c7c09
-
SHA1
cd8bf047cf213a5b8ca90cbf443b761e5fe9a2a6
-
SHA256
678fda87334c566604ea68616e39673138ca6849a33ba6e733195cc9820ac313
-
SHA512
e929ec78f162cd57df0112d784d14500f974f97273408a59abe81614775dfc76e420fc822458dfb1f26ff99f4f2e8198d5eabafe0db3964ad997fc63b07d8bdc
-
SSDEEP
6144:S2sMYod+X3oI+Y71sMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3dh5d+X3R5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421262946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a6c55a53a00b30f9ec6281e6d26a01130df2da7f7448c4e222501082d249a1c5000000000e80000000020000200000007a954074b42b169cdee4c2f67f22d42420cbe749b5414278501199b358be38bc2000000005eb9c87ef75d7f2197b2273ae02e67f4ecd27220c16270d178a7890b1b2c82c400000007d4d71aa72e6af275c79f4df89ec7c1ea3d2c19890b891f5ddb3a7d1d7e9ee562424619f4e8958116e86fa320d89e033113c92f01d3aadd9b3ebf3a3f26ab453 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4C76EE1-0C92-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0db5ccd9fa0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\211d343df80624d2f6b68762312c7c09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cca225dcd64b449661cb4ca24ae420ec
SHA14d60be274a8edc11724d3a59654e259c435843e7
SHA256cc75dd509e29ccd38e0b2e0c9011c3810c2e414f5d894a38bea78cd1beb69f1a
SHA5127f4c25571b687f09c0e8c466d9ab3d354435f8f7d412e1982908c9cbfb1d27ddd3b39344d6cb2e8eb550f903eabdcd622524eeaf5e27a8766e583f8c5fac3c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f50cf66ee6d63c6791e228d48563d3
SHA1019973c2e55e21021a7d7f9254de1d1bd946b749
SHA256a81b8c6b7c05f71c1d249ecac40bcc431f7a57da9751ad4ecd03d635992c3fa4
SHA51246415b7bb06cb44a29a44ba384b4bbc25c66eca6d195525602cfe2b7f02bf7d2480e29f9a4039f072a23308a3d558485f196e1abce09bbc0f4352fc3a99830db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54347768eff34985512299e44822ab433
SHA12f99dfbe730364aa80d8794af1b104ba55ddbe40
SHA2564fd7514458569efcabf422320140ee537354d65dd46ae1354248a7bd915b92e8
SHA512681d7b5febb854db1867a8ad63651d7f6a99e3b4421b1242ad7281d904f5768f771a70877d02daf1ce126f294ad7a1af1dd0fc5ab0577a8d571c60f57073b0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534e18d05d9c16edb62f189a0e16c8b8b
SHA1126792f046305dcd0028fc7501920ee4fa8fad34
SHA2566ebdfeec67f200a68e17e31a0cfc32b3db353206ee1b8ff552579afb5610814e
SHA512f14f1dc4735fd29984816b101a52ea915adb25e5e7cbac5421e7423c8be8a589ece525a7148bc4d26ac35517c5002301eafd61239f8e474d5faa3360cceb267d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcb4ba25b9cc1b48444367b0562b8a95
SHA190610344c495e98a6f5d2d3b510ad96723e185e2
SHA2562d5938fd2b96b1eab84a6d11ec518b0ad2d8d2851a3cc84e96b2d2cacfa529e2
SHA512383809c54cb0f73a59e10efbababc651fb66f8f26dd35933b7338cc4f756856d72dbe82b0dd58d862304e21a45c86b28df43b8653763f8b4a7275c9da5de54b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdc96b1e96302aa9f42977562bb37e6d
SHA1a5c7feeccdefd35f92384787600cd9ba0f98ebf5
SHA256f94a2e281606e44562673810eeb3364c6dafb49674b32cc3656e2b4635b83f72
SHA5129a8bc9ccede3eb01dd9ea39d926a760cac89e8b41100d5089ea6c0e149611dd45d0d0cb352a6e544e7206130346e94b92bb6457affcc9ce167b6b7a57d06937f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2049e1a33b482ab2d6f17c5b6556d2f
SHA160bf3d0b768f46351bccdbcbc3f5a81d619c5c76
SHA256ab264ccae7b9bd6093bf5a13a4558fd6a1915778cee75afbdd9cc0d522f7e3f5
SHA5122e588a691d70de32ae30f56320d873f9f1a1f2818ffdd14b3888339da894a1f394618ea82c11e4c6221d3b776b550a15c6e1de95caf316b526069442640723e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d58ffcc39c9d214eef6dc00401bca95c
SHA18ac50300c9107342bfd61cf5c5def7bf236fa4fa
SHA25687e76862c80e4a5e81cf0e23bef3065751f02b4e2d38b0beb363a35bcda84564
SHA512fbaa2ef4372f90bd13d1638961746904cc3a920e2155b4e163d7dd5f8bd0642e7c36da5f07c53dd440f17c9b57ad63925c5733817f8322b95a55098ec25e678e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aadf2c607392d109f2f514e4ccc4f1ae
SHA1f6fcf2012cc637ac8c43cd50cef525b59c74935d
SHA256204f6509614acc3ab0839c6a6a6484ab1380f89b4479061f4efa318ebd0c1a51
SHA512015d05decafc31138e0e2ce2a3b4ea78f7202d271397b62a6ff330051d961a83d37d78e9f57eb5cfcb369b07b46c8f6bbb200373e59ab62380cec93bfdb28d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d2a94b4f9d29d05b6f0f784462ee7a
SHA1bc6f8ced3b3c089df645c59ef3d31ec31a303fe7
SHA25622916742cb7206b9889e7e5c379ff023b235ecddfd75a6a1dc4d7d0f9a3efddf
SHA512a70c9a31b49febc0ce521e9c7c1899547a61785a0f1759d0b2fe9abf7c9f2b25ed064c6215fb3060ccb6000767e6012eca722c7222e4942be3c4659daabdbc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71112945aace3c5f824086945f9ef4a
SHA1f6ff53377c9c1562e64b902534218df3a35e1f71
SHA256bc0ec85f700861c1810d489579fcf4a6066bec7da2681714b00ab3e7a1c78655
SHA512d7e855ce83f6c5bf167a9f38b948cfbe0657b8d7bd9d296899cf181d13ab2833606a47db1f2c53e9a18d5c2825b1ef87b88f6bcd44e74a8ab0d6dd38d169f119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd47d8c3e3a648b700df26a1d32b752c
SHA13c84d0d234bb7aa564af337253bad94871b5e18e
SHA2560cdfbd0d250ee982b3bfce8da88cc6c2402784e4e47284764efd95587abf7c77
SHA5122dc799aece8f2ff8419af6b67e1e19204d6e4486dfe779c156edf92b68016e6da9f9ba07b369587754fbfb8d543be45e549d5de55b46434659dd0152cbb76a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf86a47876bb49d640547b628863aad
SHA1f764ca1122ce3fcbebf1b6862d70e5266a8e2aef
SHA256f9aabc6e867d524ce6c7b16c38b973eba112fa13525258fdf8f7538907863087
SHA512b4880bd8e478fd10280713f514308b0d96fc07f4b13c302fe967616235e75226e37193fd3aac93fa63e365cf1127ee8052c89e850f7cbfb59a4274f138a0b65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5483c8caf88e01102ea9e81ac7477ea0b
SHA19a77268885dd1033269e602779a0614e1f022563
SHA2565b544ad59af882b5f30d2751616845ac660c4b7857170eaed0e59f8b2b79227b
SHA512650645f48db480ae832e6fbc9d62dbdb616f4ac1e28637e930a3146b9e3c08d3fa37d281bb5bfcbbe0f1a910d3e9cf834acefd450e6fa327f1331749077f4e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4087c5f898b911f0376a136b2de273
SHA1e96d965a0b9d68ee9bff21ac810fc431d8cf0acb
SHA256d612ae194131080b8bc8d813de5182b24874824091a2d7edc56d80009d6fcbc9
SHA512e198b48b1ecda0e4d87ae95a9e8a657ec908409b7777f8fcc74beb9be5e27a7540e5cb161ac398d9a52b345ef91fd0cfd2aac27b566235f87448f293cdc96deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a5edd84239c141ca035d390a0ccc58
SHA1edcceb46cc3fd936df78a5516a19fcb11438b9a0
SHA256ea4eeb6460dd910d0977ad78a276551e7ac57eccdd495a34d3319894872c5872
SHA51206843b4faed94fe30bfb37ed4bc92603fa5592b45d8d47b25170f4cd55093f8b902d55a3eaf0dcd144822a37bd89b7be71973d8305756abb1a329c43f19f4c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5015d7361cb3fea6ab607c7768c250e
SHA1cf4a5a814d78e8fec5f23e25f7fa2e8b2cd93485
SHA2566e7f6e0101c55d650b0fd8a6dc08c2a36519e069324431b5d8c09df9bc4be8c3
SHA512a64382057f341cf81ade6b3203b92366208a69cb57916886c528ea61b725da749fe2ca627bcd6c6bf0ffe259a8d28408631f41258f1d8ce5be6236dbf2d07e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52816b00f54034020522ac7c3c9edd77c
SHA1982f0b1061395cc37f09c5d23094980899637dcf
SHA2567ceebd202dce0c126e43e904f515b10b95ea6fef620d886a1ad5924daee5c4bc
SHA512c533edeb59093a84d2af360f621c8d68d6b8f488a547925aa7758ba01fb91e70224a5619a786c027941f9f3eff9819c7664375f5605b51a40a86efd9cb334519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf2c3bce83d3093b1e82a954f0a7018
SHA1039212e113dd09172c498b86645725df23e5bc72
SHA256e92660e18e9d6c88b3d1b84a607ff11cbfddf1689a7fa8c7c5508a7778d21cb4
SHA51243a6835fe55a10bb2bc23dd083d002083af2264a8219001312087c5661eb11599f230e53bc7a1aa170f07dd87ad6a8c7042a888d06ca451fcddec2c5e9963e81
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a