Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
27406230b6effbbd64f286810d108850_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
27406230b6effbbd64f286810d108850_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27406230b6effbbd64f286810d108850_JaffaCakes118.html
-
Size
9KB
-
MD5
27406230b6effbbd64f286810d108850
-
SHA1
55624f5330d87fb764281398b9501219fc974b99
-
SHA256
b0b4c3fdab7c84b260500a9fd365da45eb7834a0054346c7e24e86d05e194689
-
SHA512
38787046ab2958db7d1f4d874ef964f40a5e31423b26e525c9c6c3f68d20cfaf264d9ff57adb0a23fe528ef807d834c53f56e4bdeedf54bea8d03cafc2668172
-
SSDEEP
192:SI0rIkaSOa9xBxde2X+6VqlpoAj/9zmCI:SI0Eko/O+6VqlpL1KCI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421373324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a3bec7a0a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F32FB3B1-0D93-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000083a36b9c6787e0dab0623268f6c33bad88cfd175a9f770439733488208339362000000000e8000000002000020000000daab46af31adfedba33a3bf41e90a8f946ff8acf9c8cc06cc4f6cdf1261d20ce200000005ea800df83c95a00f0f11c261a6a245e40be37f1b9591de8bcc70a55b180b2a640000000a4acc12689fa3db65332652704b40ecb21fc8f5a9c2c9abcacd235a62e177f50a27638f52e8aa41105cc0d044a145273446ec9dd7c97901b09c77e25f9c77c95 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1828 1804 iexplore.exe 28 PID 1804 wrote to memory of 1828 1804 iexplore.exe 28 PID 1804 wrote to memory of 1828 1804 iexplore.exe 28 PID 1804 wrote to memory of 1828 1804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27406230b6effbbd64f286810d108850_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ea7bfae23dfc964fa046ffea71fd02
SHA1b1d392da921d8f145639c831c6b233d423842cff
SHA2561ffacfed97ba090d96f9faeefbb8278817f013531c0bb00cbfdd0fc26f72f980
SHA512a0a8e33fcecd09fb90136c4fb95122c519a4f4d2f6b514802451d0521245f0eb5125cac7f193794c8eeffb0508c8d952bf7a009ac41ecfc7a6c3725847d42837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534f7622663e05770d3a3cbd1e87182f7
SHA1e524d545cd4f6a43810bd11efe011be6c227fb1c
SHA25640b4d9e686abea496d67868b0875328bb987e539eef10e2da0c5ad06243603d4
SHA5124fc4c2d726e010af5e5e4cbf0847fe9b8799bec37cc8430b9ede2b6ab6bdf08b450dfe3880296060395c401b561a9016266b7e83cc6cb1770bda8bc04c9288b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462daffe878dc81b46dba2ace63e4963
SHA17ccd878b2184c673cadeb096e90adce5fb1b7e15
SHA2568e203c2c179e8ed5515d7342d1dde27fe2add272cae5a876af8d10f270009f76
SHA512c652a86a841abd52daedd9e41f010ec938e7a41d68cc8792319b6b3d5aac70dc79acd93117140df6ea02a3bebafe8c5b4201c1e430c01dbbb8460ead0ebca32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43837da266562fe5bf8126f97702311
SHA1f4815b97a4abd8b9b71f1dacbe52656ada40f93b
SHA256f5d1322ef103e4b988a1a81e4ac6fe05601eeac63e3c897ca27022d0a84e441e
SHA5122cdbe11ffebca0540e555476c33527d7fab0f58481bf0970c4d0c88bdba89bf001145dc811ca355e1c1c63a32725455be5cf9250c683d7c513aba5904bffc630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30c86af6157b62c505c4e3a3c1a1d71
SHA156517471f688962fd7ceff2802e985798c9ef204
SHA25689f7269007698ab0e390e6f273cacb9405b97eeac3d0e5ed9665edca413216e7
SHA512cc9f3c55a210bb11607976630bfc1b79796c8f2c8a86719cb64a4a3ecea99a2707ef61fbe5c24779318d987445828ccba4dc1d1707368978f394a3c41c7a617a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7c7649cbebe3903e1046b4c3ea163f
SHA1dbb2be31d682bd4cc7222846a577a0888aa65e5d
SHA256b903cdcec7bd591d298b53796d670cc685c89fc70ebde45bf3f70c86ed623fbe
SHA512af2ac61cb4444b05518ac7190875d7abd3e4b906a0bce65ae42807e7bcf18853f90fba5d12b4f4459c142ff70baa6687d83bfe5acf2b7c30c9c90983e61a6689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca6bb11b70cdc780a447b4b75ad9c5a5
SHA12eca5deaae362973e5eafa4d9d8697542d6c87fb
SHA256cc21a0b4b15d3d3f5764b2fa11d2a7bb8b0dec0a0899331630694841fcc67562
SHA51207e21436cc74a80b8ba4be9b3b36edd77142eb921adf1a16e17b46d4a99934906f4c3649d142793c89a802a3bda9e19f0e980a8efbd6f2ffa8494a76c8f3804a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ccc3322a83103f8e1d493ae023447c6
SHA15cc2d88c9222c3b5ab8064d4d339fefdf1041cba
SHA2560961060fcb16b176301c3bfb80ed9019dcaccfa71972df9a383eb0f04506c66e
SHA512d4f8f3482ce26ba9316904c573d199c459b1a459991ddb3cfa33850e8af34f4336c62bf3f391fbf032de4179da8998c3c801f541d2726019385a683116a67d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b035f922171200706580dd4b20f13026
SHA1283cab6f5322deadac3677be274591fdc3553315
SHA256c6a215488e5b51a43170c76ffc6f3897bf0e84cf178dae01e4f272c1f8bc1efc
SHA512a497c6df278abe5c713982b24d521170544253470ab58d2aa0c51522f7e1758ba9df9c2b8d71ed61fecd3c7d7694256f2461c2af88f1271ae21662877ff99ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675df1f6181b2af1d8547b6de0fd3ae3
SHA1a13f6fbf703068888109c1236fb9141ee4e0ce43
SHA2563610f620c87ec55fc536cdea7faef451ddbecb33c23297cfe9d7acc3b078b636
SHA5125591fb2d8567e6ebc012d18b659c58656ea54c7508a4851b2f698cf11a1ea971e426fc44f0548ff3658d0ec4e842380d41706a6178b1cc98c8d1ca377a374b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf7c412f7b88df663b307a3f5a99bfd
SHA1f879a7470bd7e563dd0df56d864ea0c9a5ac0ec2
SHA256a16298a3791b01e2d4bce0819fbff27e666355fa9a6755490714dba2796b5979
SHA5124c7e8f9d00a331bc49ae07432e3e02e3ddb40bcd00ee5a28d8d35a92f3cea4471a66997161d8a0eac7f4f496c93a8d7ee4729c240725c85dfc59b2135da61aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e15577f9d66baba39b66f62f059384d
SHA15ee013e53b8c5efdc876a5c944c618465620dcec
SHA2562a4f91455007abbb9f44cdfef05cbb6e7ef65f5374332ed68b4ed6fa53270e5f
SHA512c41e39516e4b5fc71952704b93c5d43ef74d746bfe81c507e3b45bea508ae3bc943c0a26906980a78e2b646c3ceb4a66bfddbdf14d5bd3eb9bc809b6a5686f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf70f6196d403e12740230ab611d7d9
SHA1eb7e807dbed7535854f228f18ab2f3019c2e49b4
SHA2567e56b4c243f0cae0fecc96f6d3c7c792c014812bb4a03a1cb2b3600399a7f4c5
SHA512c04500e9ded9f933c1b35522d20527ee0b1e34677159ac3362a00f12349a666de4fc094e65bab178d6dea1034851bd9883ba0e849e5309af39839ba6b243ef3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578776244f83de01813d57f7dc6e43d2e
SHA19cf1803faee896805efcb9496d32b5710ec1ac52
SHA256c8cc805f009667f3b089b7d3660b04fc362076c6a6a7426f9d7362a0b4c243d2
SHA5126448e8030edc8fc4f76789a6c6b97c479c467aa2ee059fd385752b089e526afb2cc4f5c8c892a6d225a02ca8a5b178cb1f06ad790d488b12c7f8f05a7ce3b0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ff4874349665e3188bcdaa7f5586e9
SHA16aea2c1a646246c4e075fd4099d78c99a945def8
SHA256c07a0df74704ef790b830de84a72f338b7c6fa4eb54bdd8e6ad56df58f62840a
SHA512344acecfde8c8edc9e34dea0764850a90c5c2174b95edb90c389ac546c7269823eea154d5404c6d18aa47ae92def45b6f57ea78a544b3ffa857dc26218b11c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771f63c59499f550c9a9ecf78d8b35d1
SHA1bbcbe78ae75bd87df7f9b9c0c012b82be7d610b8
SHA2565812409b426cfa6a5b5a212adf0b8f07a2510cee0e7dc995f04b56c2ffa6c960
SHA51282943c7e2c778a002647742003211ce71ad7d0c5f2a422139634ff20ccbe1ff092fd9dee95f068cf8d6c0f5adfed78f0ea73ffc1d0d6e34d85a9bb6cfda91a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54faf490f51c077643623d50a9f0159fe
SHA1feb86d4e87c6c598ff9c4e51ac6c77dabda4e89f
SHA2567742bb4a98a80565decdaf8b819284f5fae5a20e919aa5094794f723231b3adc
SHA5128f12144e52f418c126724ac79766fe8a735bcc3369077202e42398393d51a660e2169d8b424a7b66d074da7eaf3550c4eb2eb45e3aad8dd91b732dec4d80ae94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7ee33f12365d7a11942cb6dd02cc4c
SHA1be27a437f2d9400fe3928b294c927efd9cd46426
SHA256568bf4d678f4bc3a670233d40fb35983f7783e484a8251af6bb97939b3a50f21
SHA512fa9fe318b75f1af626bc7c56a0c186509d66a0a4d98fe652ffe7b36194836b46377b6228a83e8ac08ac7282acc28b2e8f836ebc3afff769ef3246dda5b6e20cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b129081c55b3f7113ab255c5a900e8e
SHA13f1a13b418c96d41b332ed220a7e22f6a4312101
SHA256ebe198239cb8530c20b69906e8e0e52be6deb84aa3a3f6f96e62940d8481bc5f
SHA51228af0598a907f1349e736449c36247dc6a7af5b57a225ab7f02f05b818aa4fa56960a19dde723163d5e188edfaf93f86aa082a578d772dd923b0fa74dbf0eb10
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a