Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
271acbe258c4ceda573a138ac8e652a3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
271acbe258c4ceda573a138ac8e652a3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
271acbe258c4ceda573a138ac8e652a3_JaffaCakes118.html
-
Size
50KB
-
MD5
271acbe258c4ceda573a138ac8e652a3
-
SHA1
0276f5f7cdaf21091ef134caedcbb92529f3e4d7
-
SHA256
af00a2a3ff2d2e1139e2066379216f9e774404a035a25dc371b8dd817c1ae222
-
SHA512
5a3e0640400d5569fc9330af0fe83fb268bdc19d85966e45c6f14c3da32a6f303f9225f054a3aef44bfe22b8a0f0ff1673902531225fa7dad8f1dff8f2def8d6
-
SSDEEP
1536:spXkT5xWM5JeIiYtFCeP78fPQ0pjQ2N3M6w2ky2:DphP78fPQ0pjQ2N3M6w2ky2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F4DCEB1-0D8E-11EF-A336-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000303fb09d63252eeae114c6bb13a800463d9b45610cdabf9e8c17337ad7bd4d57000000000e8000000002000020000000da273f6aae96312ffe05b7a6c70343f1da8f8365f9dc5e506c57a72b6b5d1b6d20000000fbdadcdcd500007412ecb5f71a7cef24ef303a059a2ea7e6797fcab285d64bd540000000b8e0308fe13ec8fd2ec5591b86470f0a2f5bf34eb01ef08687eec44e92bba8917b25eb67c61f0ccef34c2b75013683be54263fec164db2190b81d470d02e1bce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608183459ba1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2052 2248 iexplore.exe 28 PID 2248 wrote to memory of 2052 2248 iexplore.exe 28 PID 2248 wrote to memory of 2052 2248 iexplore.exe 28 PID 2248 wrote to memory of 2052 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\271acbe258c4ceda573a138ac8e652a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2cb849ce4ee6f2f8a0b56b32c52e548
SHA17e8fe568a3ec1ec861ebe13989263bae692526e0
SHA2568c6d231a707e4292f495a21c9e79fa77a0c0be1314c4f2ec2d1d08c4cee414d9
SHA512c3725b62085090fb54a0f404e901453d9e71ef22f7c784e87ee193b7e8ca545484d2b3e977b5a25c3ec6918a26a43126ff8f9977322687e555176ba42c69c729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c8183297b38b1dac1c7452e0da9fc8
SHA162bf5b0b59a49c0559807fa40b8cc3e6b7091e22
SHA2563d0c9616066fa0102e2a48ffc65e536b804ca539afeb463c81c431dc0152fb1e
SHA512f149fe726a77a8950703699b9ffa79728baf5d0e4ae49154e308d160881181f19324364a19d204995a679436d3d43bc9c08b63442f75cf012f4363f074ead999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cda7e60cf9106175fca56dfd204af74
SHA185ef2e5f977b9e2fdc80e2704560296853baa859
SHA25693fd606b9adc33755e4fa9c13d516101cf47453ecc5130c9f511a13a1550d691
SHA512b26ec3087c52ee6901ed18672dd00a0ca71aa67b4f29bd60d63802723189098f0d6f19310942f337d80fe5b3d702cf19072c3aa1cf11539e7ef170791156b597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afcfa4839189329f08cfce0b3d2fbd49
SHA1f5ce1c8b83c4ab44079273033852340ae0a4bb54
SHA256a42e13960bc6a60aab3a0b599308afa4dd99f0d08f42ec2cd47a60d8f86e0b7f
SHA5124087b7857730560b53af8d927e836012ff51e0ffc750beaf8b47470ce22167ac341d1c3a0de35db115728533ad1ec5d05ad9feddfb31ec163dbcaf8ad79e862a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a8c5f7bf159103b125d1953a5b80a0f
SHA10bb0e99a42b35be1ec98fb522b81d22df69c315c
SHA25611d61f38f12c4f7e04a306977fb6aabc0d893c573ba5ad8693ff9916085436d6
SHA512f9a4473d574bb369176f57b2a95b4cb81271cf2774a8aa38b430782a28793b0b481e3cf84847a50173787a2b8efd10eb3c4a6aaba964251041cfac46030de02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d8d586eef943a0e1f880603093d846
SHA10f364ee21b421260ec642c5a47c7287d1403a199
SHA2562e70beb765fd069cf36969ec1afa88ce78ec29be1335ce0686f004d8dcf9590a
SHA51275e8a95f7010ac49c9fd91e0892823f4cd33bd442db0135e8221059d0a26b72eea43c45ba5be9b11029184d2fb346f0b49662d3f2916a674a712b562339773cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeec20ffeafafc54df9ca7fc40704606
SHA15d2776909ff2a2fadbc42a78a7e0852f216e3c06
SHA256c964668d2c1daf445ad83ff7e2f2950ebe1610769854c514ab96815302f4b579
SHA512bd335b862f9d1a3c6355049ed7c9975083f1c696e8dd6e7107a52fdd6d3df4b62ca03549366966d3f7b28b8151fcb21e7e18b1c2b3c19b64c8ab6e85271d9461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde735fd09119a3ad9923ca52337061d
SHA189d1dcda61fe504ffbfa5be8d93aef6fba8106c3
SHA256d82a25bdee4efba8e1ccd95d18e62cdd4f6c8ae4addc0111527cb9e781b60e47
SHA5123ddafdc1f487046a97cd309dcc3992d71957ad1704935c37c54e3fc15c891357f498bac3b5419ab12c0911f4427acc774dae2dd3691d3e07cefe71f949e51ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0c00d45d14c593f0b50950133eb416
SHA1ec66736d41d69ec10dded9760af43b7ca8d325a7
SHA2561d7d3f5589fec8ce26d1b764c542b4a45383abad4b790d605a59a9470d230831
SHA512ccc43370a221c586d43cf156a91e7c7dfa278b3ec02d49fe1d3857c6ffd95c18ee7f94dafb2c1e71f089415ec828cfeeb15eade10165eabb53b3c3188d936a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5164110875a12afa9b1c7809b582e2999
SHA16eeedc1f4cd6ffa6569f7a8da4355210ba7a8d46
SHA256b72c7b624a2e356baca8f88d767aad3627b8edc93f7eb8049678225cadf85f61
SHA512632f5d9a894459f2b69251bac9699666eca13ff1c726f693129a1fa035c6e6cf1cc25679e302197c63a723d63e61ac25f75565f818340cceb4d8e27111a090fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6bd26b5783c05873176a7ff6ee22bc
SHA14af9c7a5555a99b8e29b912c4178d68268cd3aa1
SHA2564f0cd103e4920363f19a429e18c19b82457f2f9b64f277ce3b64a49129ea8f27
SHA512fb9ce942bfff482e676bc66d83e54499b0f46a25324c436193b3dd4753fd56b327eeb97c9739a60e7c97febbfef088425a0c9a3969285f7967315b5dadca5a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a134870fcf73fd0b217496e7b4f01b6
SHA1f59697686770091a90de43223a14e1e1d94c8dc4
SHA2563d91e01e60ccf3691e219dbb9d96fbb4a5f5a8900021b39e14b18537f8af49e0
SHA512142528f08bdc2acae3c90c108b8b37639af806b8077d816d5faeb27157f6f17d63e50f09fa6b0b9457dc80f1a15572b1ff999c8a0f00e4533e536a5c0444f7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6a326860369acd648075a4f5604447
SHA10661633022bd1557029b3551c0ce4af6d82433fd
SHA2564d0a4099fda900bfa6002dd0c44acb7644b570385d92ca575b835d010d706a69
SHA512b9fb7277da062a5bc36b8b0fffdd7d28443c632fcd6bc47e92b9f96a820a769af36356a28e424883460e7f475c97b8e4be7bd3266c6c6facaf79bf4d7d9e5dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c42565cc5a79f3f7cd65515f490c82d
SHA1b172a1b2f46a7bbf6adb6d03f4e12d7f11f3d247
SHA2567f87107a40ce497d0f2f5f5e70abcbda35d1239de0cf75d287851fc4ad9014a7
SHA5129d9d22e0349e20ff09f5b036fbb6795e5bb69af0cde472b5e3c52e9ab58e54ef9a3729811c428fc5849712ab735872707c6a47c76c8b84efd0989f72428da5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f68a48c9a21dda92fe65c077bb3050b7
SHA1432688f1c4c34a24ebe7a45ec58e4597eb98da36
SHA2563b23fab81f80b99d07c7dc7e215abe86b7d9bcfc5e0413f15efd61b66607c8a6
SHA512f55a417d5a641fd0c67969e85b37079541fa18fa888691e24220464b6767c7a27e75abdd4108e843c12ffeef41f1d35501c39f4d7555fbcdc9fb4713d4dc4e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3bb8089457f5b908e772369ab43095c
SHA18f79b90b8d2c6de7cc7cd7fc16f534a68ce4d715
SHA2567b8e4a2e0a55bc08bd8f03c5d80c7d1f69812f969f1fe14114c4da868b1915b4
SHA512e78dd722fc94879131f66bf521c08ff307e264cbc2ad897332baca8e98d33add3efc12192f10a9fd407f793cf1b54a252f9fb84c7eeb5038caf6be5500db0ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a944dcd071d93c647cdfa71ba74b18a
SHA17990e2571066ffa7e2849d897be231507b244dc8
SHA2561b32862bb21d1ae3ecd66ddb5e32ebf4ad9faf045444427f7b25797f16a080ef
SHA5125a5cfd0c8333dc2924743d22efc5d011a9e3162613f8f16f73a2403432ba65aa55c22d934e513919356a27029ed757d1b34adf61e7684fbabef5ce4ae2a03e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211b935413f7a8cf0f38cf12bc7df032
SHA1f5079620f9520dd28e5b1ed799332295ccccd7af
SHA25682323d830f14ad7f7a79d06578153e1a71dd474f3fcc97ca95512b1534e98c13
SHA512867128e712291830e2d9087a2f0180ed291277a13636a543e508b3bfec66d158befee1d46f3579363c7fe9b80d1d24cd5af1fb9ce5e86aa730050f0505aef090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b287f451e8d75bbc481e3d7acfaaf6d7
SHA18e49327af0f08adb12fdfe26263cfa24ab92db53
SHA256ac6d0d69d73b287a8de925fdd245e4a0325731baa1eb44a8ae253470d41e509e
SHA512c72be74999711ea306f80e0a659acffdd40ab046d8cfa958177b1fd106c5d69d507544209c13fd21b3f99ab8b44541eb92404ffe45118256621faa0ac6f0e31a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\ie-fix[1].htm
Filesize795B
MD55d8d79c3cb9af023240b1be6f5057aaa
SHA1df22980677b134e83d878893f7c7984e0d78a240
SHA256e8b101a7c7f64aad528cc734513cbeb02243c0af37930dc0f3239749cff184b6
SHA51266f432b622cee0bcc06cbc0f833de1471ea36c295b4cd93eb848d97e69c2252acd2fc8972db51ea35475a424f4d6cb5001325525fb04f71b8704eb24de1c4008
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a