Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
21befabb35ec2c4784d3236cdfb08467_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21befabb35ec2c4784d3236cdfb08467_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21befabb35ec2c4784d3236cdfb08467_JaffaCakes118.html
-
Size
10KB
-
MD5
21befabb35ec2c4784d3236cdfb08467
-
SHA1
970b30ee25a9326455820ae4d687e547b3800f83
-
SHA256
01b934a6c6f908e662816ef7fa2a7a351cf10f0b72e12d6b440adc28bf255aca
-
SHA512
17bf08abf4960ca13d1adf6df8a3b6fb240c76f502ed479e9deb06b95fb051281b0e5362b22887ccc0a03266b544d5cc780b8efe96df5656a4cb3fa35b0cb853
-
SSDEEP
192:lG0SZ8ETVHzMJ63OCKNj+6rh62sW6k1QsnqagWCpCqagWCpCqagWCp/:+8ET1zMJwL6yrapCpbapCpbapCp/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421278224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86E0BFC1-0CB6-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000000718e505352ecd6861604a21cf5bdfde33046a18c9b4c9b689a2a7f46b9c133000000000e8000000002000020000000833bf2b068642b7ef7d20ac3442e4c0a14815e51dc81d91667f14ad58816cdf420000000fe1162132ee040e39329ec52045747820cba0785f2e68c7874da226403b0c96440000000cdde71c7fb9d4b4a4707dccbd8edee61348068015357b31d0c9a9eee25a2424f1b49b1f637208993c30c68b4bd57cdf92150caaf46e9931ed766567344bd8e99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008de45cc3a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3064 1704 iexplore.exe 28 PID 1704 wrote to memory of 3064 1704 iexplore.exe 28 PID 1704 wrote to memory of 3064 1704 iexplore.exe 28 PID 1704 wrote to memory of 3064 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21befabb35ec2c4784d3236cdfb08467_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613f8887c359b10954cdb83d035061a5
SHA1df4e8b0d6cde3e78f3626ce33a23c9d68aea3215
SHA25622557717acb384c64e04dd5def16d38066c10fd46a2b7166f5e9bc3893f015ca
SHA5125f66dadf1c68415b36b7f5eaa345a03e85895ee50befc94807638f2abc867c5781c54d16c38c160d4515383d06f85418b429c7151e8e06702de7d23abb8f2ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594faf03c776e55684056caed03d3129d
SHA1fc307c985c8ee72c49947f5f025b97e6ac71f117
SHA2560342067f96e7480328fab8c752704370bc2e5de13871acc41f6c371aa8fb420a
SHA512d19eaceadabfe1c5b104e07997b2976308cce96bfde4bfc5832ea735fb6117785ab9e05b6dec41702d8556aea6837215ba6fab6cadcc37588ad42ea90d126520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a001a583453936aac24e429369ee27
SHA14f6be365c6bf67863d22c75f7347b660723e164a
SHA2564de79bccbe1462ad034165c678bc15b4e44f8cfe777745346b0b0df7a86add05
SHA512391955996db066f08f27ae70a30a5fbbecb9227fa4e620767c65c31210ebc8951ad7dc74b7280a2d95021fa90e9e75916481d402e00e6f8e3910b3ee1b213f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eda958818950d165f3201d5df3b8fe5
SHA1267d32d38c9ee237ae5a0999f6e6b3c59e2f71cf
SHA2563c4a25116945ce0512e8906de05d4e7fa7af9d54bc62863b93fbcabbead2cfed
SHA512479bed5fbfb5c25e2ee173e1b75bcd5b8e9c84c412a5f1a8e445c01045d96d37618b8a24a8612489c10db1621531026dd6fe6e5a47163db2e12509e72b1956f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577eeed47308f4641d6639cf07c12a915
SHA123863463418fbbc655d09527e6924c6dc226089b
SHA2565de526d75fba78c41f12e5abb6b76a47f5f7ade1bcd9844ae1e14a5a0f4b2ff9
SHA512841b222e309b5316f7616f1466c889a76682672b6087b9cd02f085e3f35aa31b88dbeb25ea99d9a8638138b250608a782d52afd8056092082c5ed1e0002a9396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3ef2f280eb31890af7cf5e83be4bac
SHA11c6be2c40d3231a96674e3bc1a49b6ef60b5d3b4
SHA256281c3a06695dc086de37c0fd5068802862c56b3c0ff3304c6b093d10627f7a91
SHA512fdd162e624bf9d95c16d29dfbd1eaaaab0a6e75947830998fbb5b9f62fcd1d410f116894d1baf620aa749eb7c73f693ea78279e83ea1d54b06456694e34c2b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5501b4066f9b7ec91045ea369b0a528eb
SHA143c291c5e2e4fe0cb9e0c564df1f5b6162191e16
SHA2568138137adfe914ce81128a67482f78c1fecbd058e732a83df1ab79c8c3f7a976
SHA5125fd99fe0714b45559af24076078c6b9ad3617c1d2419a083b79d6579f0b6bbab8b1e2af381e96ea4751d4edaee551b33e28519916dd7a0757c9c627207afe65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e16276b4e446f6498aaac188bc89f8d
SHA1274983ea2180ed8e03321b72789c225e29034887
SHA2561fd0d002e0d39e003971d85da79bb639cd78ab4a03da4235551a8158a6095b39
SHA5124628abf4d638b24e529c151f5721f4d6873d8a3127db0affeb9bbfe9e9cbf965278808934e32fa4da55998b73226e11641c963d5dc9b66a61987a7f56eb72f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5524c7eba6152c45363d46cdb01651c54
SHA11f9e00e0f0b59a548b900b422cd5e3528fcbf53d
SHA25687eab886a39b9ea27dfb5552a08a8bf829590888a50a03db0f9756ed14d47dde
SHA512d4d3dc7d4b1be3555dc85f6fe5691f78fb7488749b496479b25f8d21244e3a8c8bb108548d64fbfe31a68d7ed32b8054b14726ea02ccccc8c97b1cf56104b099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b0f7cefe6cab80289c3e46b28060d9
SHA18284fa68efac7473ca04e7c13ee85d05589b4efe
SHA256cf50ac479e964a52aa05e72a2442e2abbe2e02b258e1493432fd630cde344b10
SHA512a42a16cbfc6431cc009985d91292d88c5490a47c39e5177d824b0b04727239b785acbe0c31bef98742a7d0a7dcba9f0be33eea3c0937d9915c77da8c129d04e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a783e78d226c161f9d41af7effd6cee
SHA1e217fe3af86504b1e155a7121b62478a2c9676b2
SHA256d57265531a5e9f16d1bb75fde2e035928b4eb49a43288b42cc27dd728d50600f
SHA512fb3a1d7b2e1264f772abead2f5dabdee413c5d4a20eca4451d35f0b12636b4173169094a4416d9e13d4ce09eb9067513ccc3c7a5d255a8b26f37b306cfdf0f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56231e0461a4ebe1b078345b8ae8b849f
SHA134f59e672eab81d94c67cd167f1ea1a8ab5d1633
SHA256d6f5aa5b928618811994c4674d6a410656f2eb112ea8969645b10101ca256662
SHA512d7bee4255bf33722a7d95bf4a968ee364fb35d50b813e3ad1d28ba51b8bf540907af6cc401776435185bb306d7ad22587f20277e1e7dd5c0a70397a789e65b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db31154b6d2455894e3c06940365a432
SHA11beaa51333accbac79f08d21aa5205f5d74b1a0b
SHA256dabf573962e3632eb19ccd6850a52bb4e27d11f5dbe26c3a900843c3d2a9d2fc
SHA51261c1fabbcbde0d8e170f1e7b73ffe581753c4cf00e9e003df7ddb61c8800a9d8191abd9712370316a75d1a3cc17b502b56f3514ea33da17d353db0a58494dc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a653624a9d52a030c42cca512ad27ec3
SHA1187efc041c9e94105b1248c9e9669fe8f827ec3e
SHA256698941bf8694bfc8c8f45488284d493484ac9debc17391f6807d7942c5c3a792
SHA512829d026115d769210ab7686fcf9c4b764e38823ceec6aa601d26b46638e892704b122261c501294901a0239ee244642be1dbf8b6393f2b4210df560ba7c46f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f9b685e0cb6e9e1d514dcf9cdbe627
SHA1c18a72a3e2c4bf0b8720ca61932be1373f60e858
SHA256434bb91294fbb5beadeb80f266759e9941094d7e34dab15481eee6b40a2b64cd
SHA512d2d4cf75c12babd3b8cc5557c500e6cd85033708ce259df5fd02271749b74c477f142e7a1b036c32800b7c773d7eaeae91cc0ac5cc31ddfd8382383293508c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b97f8fbecbf6794b1f4786c8c075aae
SHA1699723784bc8ce87de3ba6f9ba1b7ee3a68e8c8a
SHA256667bcd2847fa36ca965fdeed975c691f52ca985aee479da681390f2c250cb183
SHA512fdcfe607fbf9070414f69d73db2e4e2488cb26597fd900878d8e8a35b3a92f776169a204fb1f97b53e33c45e349dec2c3596a69b7a9ebaad6f3e76d6aa83109e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce5144bbf6988a64868bfe25345e145
SHA17357324a547a2dfb50c965e7ca673e88d5f2dd22
SHA2563da057fe6f3022fa397b3b88fd0248273e5be302975f27261684ac2ae54971eb
SHA51278b454b47e132b862503d28e68d32691d76a0ee3a75f645efe1e50b0f11ceb30933fbba2fc781a736b1985caba0daac116fa6dd0a9a0abf5fc15bb45f04458fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15db679a6a6440116341f5dc424de4b
SHA10dc24f9fabd096f8115f1272257dc9ce200f4036
SHA256f2481e92910f155abd0e562959e45bfce4488c00189f64c12e6da784217588be
SHA512357dc5560b73752e218de971c2ac0f8fda242c6d2e82f02126d9b71fbaa847e3fca0ab1efa688b268c9879fb4ef199c50df0bc5a8ad288eb42c0bbc0afee4d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887178d24d60fa7d359c4262830df3b0
SHA13cf733cbf3a3ec1117d359e5fc50d46ce8d8be66
SHA2569662ff5f33799dae0250da9f2d2679860623dcffb38af754ada3454f345883cf
SHA5129063152d19c42d98ffc4233b7f205fd2ee9dd5042c61436f8ad09e50b8d3155c7713cf753f19aac1b5953f2603c06ae471f0ddf705f034a723372a5c31413e7b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\bPZsaxGnx[1].js
Filesize32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a