Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
225919832cf2a1437936fd1825a5fef6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
225919832cf2a1437936fd1825a5fef6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
225919832cf2a1437936fd1825a5fef6_JaffaCakes118.html
-
Size
461KB
-
MD5
225919832cf2a1437936fd1825a5fef6
-
SHA1
c08a4650f8581a394b3457afe6df0446ad5ef26b
-
SHA256
7ceed4f0363ef91811d0d9446c6b458cf46c197ca0cf27da066e98ddc8384fff
-
SHA512
c6fecb92960677a2c7db92e205f6b533297ee5ab96f0069c76750aedc39cdaf65577c0f1380da97885e122fdf8b53a4ccc0df73edcb13ead4fc2ba1e545c70b3
-
SSDEEP
6144:SxsMYod+X3oI+Y8sMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3U5d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000080effdb99e6e0c61e51d3fff79f04bca42694b735b2e7b71171f0aa290ca9ffe000000000e800000000200002000000067df23f5f5a2deb92e18cbfb68589dce23179e61b09d680d88fde13873ff7c10200000001d66c80173223217741a963ad808f5becb23beddb273c473de3211e12cfc45f440000000d8a0f35abceddc292f9da938321a3da540cfa13874b44fe0684208c6f21b485b7489e19dfb59331a3d55dedd0bdb5e0dadf15e9ab490f2a3c299d0f75b361432 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602dae6adca0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{923539A1-0CCF-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421288979" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2616 2784 iexplore.exe 28 PID 2784 wrote to memory of 2616 2784 iexplore.exe 28 PID 2784 wrote to memory of 2616 2784 iexplore.exe 28 PID 2784 wrote to memory of 2616 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\225919832cf2a1437936fd1825a5fef6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c5b0f82d5715822e98870c727d63b0a
SHA1acf8616e844469d8349f45d8b234f0ba03763f31
SHA25636c1aacae609a55c26460dcb9564c7b0d522a59460643e980158b1ac20291b94
SHA51223a380ca7a425dd28b04705c8f90c35269a127131398751a592cb8e4417fe80783a04bf06989c88d3ebc54ffe9f74b520c72d29d81494176568931f5b8ef68a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59893dbb13dc2fd26511ebcfa8a9baadb
SHA1599602dfc4b558228d1302c2d5de30ad401dcf0d
SHA256b3ac8861a8cc69c29e8f90b8c146c7dd99a3137250dc4e242ca85bb7dd1beb11
SHA5128edc1caf44b801c47ed741cbc4b37d993fcb665b5c58024acb4ed10ba68e5815ec251815a87b9e179ad137f05318a8177be29198e6e7f57d48df2cd8633e73cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeafcc0d1ce21f6515a78e8c0dd85f69
SHA116117ad17352e11e3469dcebf910ba233c81f756
SHA2568ec00e0763f64a6b6b34cb96f49df89df6881c646f8f410fafb4ac2e7083cd4f
SHA5122137ca50c62d5877cd483925986466ec5b6aeab2c689bb286b47602af6eaac520cc0ed714a2c14b6df43f4cda541b8321b8a79e71250d3a1332a67b132a18aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05789cdcbf1781c5f5fbcab9ec50e3f
SHA1319b5a93b2226fdf6794ddfe5efebacd19eb9039
SHA256dd51421fe466c31828f7af672bf79ba2dfe657117507c2a5c91329710fa4bcdd
SHA5128b5d6499a50784714cb183bdcc875388bf7dfcedc5d2e5669c5a5efcb836bbe171afd7576f6e5ad0fe6321915244f7ecdd892489b30a517cdb60de445b973379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51309cfb1dbbea69bd833e10012dce3b4
SHA1aef12dc6ecfb490b578fa1dad2719364c3a71503
SHA2568219d41a78f2c2e25d2f2798b7e5827c205cea520e2830528f8e263609830434
SHA512204826c917ceccef5caa106328e97a8d79122ad1654d93bca333fffcc8edbd8d77201c5b4543fcddb11d48a4409d885573b3162bd7a448c4dc513c08dafaf613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a431dc487fcf3f8e3900021c0b205998
SHA11602e3dcd32442c627e964474a0b8dec42d3e8e6
SHA2568634cdee31fd5e284b5fc7d4012eb0a60a2f540223922eebb7ee430ea73c0ded
SHA512059e073259994a655687f2ce058e315afb5566a3f227f19ca7e7b0bcea66f1b43e549a510cdedb980d0a371c09d39566ce3206ed5e12f6d5a05e536317fa7950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc35a814b03216334a287407a0f6fd0c
SHA19a1c8f009616746863657f462439eae1c8ddfd8d
SHA2565bd8a46afdb1354c8aa830292b0067fcc8e0621c710dc2c14241b9dcc97f6b06
SHA51227a080da65977f01f5437f4b7f01508ae119c8bb5b7c41d54a17e0919edfeca96ef4ae4c19974301767ad64b29d1c4097cd99555bcd86a20e8c60aa6782089d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c327eb8ef63fce56205b7fc37817e688
SHA1089ae51cdb05174ba6b20ed63a129f150fafec7a
SHA2561fdd6b0f10cd75a3fceff57ac74330e4e305595df72e3b2cd46399aa44186ed7
SHA5129db1a13cd8c4e1c3747014f0e1ed5d537e61203e4e92bbba0b393de9d0026d6a93352fe204700a05973c3c89e7a600f9241641779918519ef2ff3e6e20454e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393a8f41f22cc19329f3e4dc98664da5
SHA173538d0e45d7e9e526d2085dd20261cccf6d90eb
SHA256dcc001074993b99fd708ad1ce30365ed5a7c4edcb632bdbbf42bd1a6f152b4e2
SHA512f6d00f278b26e40ae5adb3b809600b9b57a8435af4096f7b232d3dee1d4c69d511d67842410ec73db4ec41426336e4b2f95a3185a3538d7443a4bd7f2d8e0ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4413018be92c366143bf3d6c334329
SHA173a93f6a269676078d535063a3abd40323612336
SHA2567da348ab7305561d807eabc74fc0eb54f113aecc33741255c213dc2b8299abae
SHA51280ef23cdcb27f64e06340915d67624461af86d688e15cf4b3b584843fb71d9f7c5c1a50f59899f6ad4f80e70fde5669c93f1b59cddf0288c6ebb8816ea6ceb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdffb6d20eb84ebe1ff69354b8cc10d
SHA176e16fdc161f060ff5575b47705ff01063794c67
SHA25664aae6d4b62f6b15f69498bb6ced02ce2a89be0ef8bcc618576687a69afeef64
SHA512992388fb7957bf7dd1e88b85ca990816a28930a11c4d7ad39b745fbac31f09dfc39546df81361bb451b6920473c6fecf0614f543c36d5b8788d389852ab77bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5947f560e87ab6334d56df2d577a0f796
SHA1a78da0ab7853b9ea7fe8d24577b8d627b4113ffe
SHA25698b9b26356672829c73eb294bdbfc781f771f3610b892c7c6d3e186bce37e578
SHA512dde87498e664f649b3ff6af4b01ce66b310a1e6066e8d93a1082593c60a07a6a06312ef1c8a5e41aeb3353f2784a981607964b445dc5239dbfb1aa24f7c40425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3dcc8a160779b8b4b5c91f88b855013
SHA1acebcd0fa37a52f0784e5a716b4748bce3a3ed60
SHA2561428e8ba4c30084ef87d8b30cc351f1149db8a1c7e30fb39629827607f710c0a
SHA512e94b3dd85153cd469bfeb4cf51a2f7c6fbfa67a5662ffb11e05605c4fb8978fbaad6714ab62e9e8144e604e0b030000e552a67101b78cea83f48b7490649c575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d80763bdd0287f22816a5b4d31678ab
SHA1717fc4116fbc7aeb60464278e6239c96be8f283b
SHA2564d9330a8cb55ee2dda98ff53402c59eab5072aba61185578180a8df56c63edd2
SHA512201d3dcd951712080a8d703507986fee9804354b07b95f4a916c6d83e7a5145c752c13f7cc279d1434e41c10d8e60abd7faef4a151aeee9ea86b7922789e9683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2793e2496d504be2e3bfbde1809538d
SHA18e4415e4787fd622f6a432f1939dc7c51c87145d
SHA256da23af3b50bfb939ad46af6239846a652ea2f6e9ea9aaab3b664e5d8bb32e926
SHA512f4b50b607bd41c5ffe422400f9621cf163b4cdb6f9979c4e54569a83a539a07d6a5bbbdda6c1ac356b50a08452d88914674a8cec53856d725a9f78b4a7785ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559712387a802ca44779e50e610c34155
SHA13f440b7f976fe04b85fbd95bed0f453710064cb2
SHA256d75cecb0a8f89cd974c74a5dc1dc8ca943540cf5ade04a93596c73a2900c6046
SHA512fe4294e382714a75fc9c43eb27e7167424daad3ace76c266f685f9c723143a8209311bc85e958430641d409c3cbbc22e169518004310df484bc251f85f7f7ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a395e02f96d415008f0592ae58f822
SHA13cb640e3650b721d3d9e4f93dd15785ea2dfe016
SHA256aaa6ff86b1bdd5ec0125e38d848c5497c183d1e6c6be1500972edd2125b72471
SHA5121f17a88baaf160016e1cbbfbc3e3a8b66b941e5dc6d8960c177937e9e761f1a0572edec0223c0fade475a766fd66281175b6b97d8b73b98d11898e7932740f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c6eadd4d4a683dc770c43f561541873
SHA1928819af9a67ff309238e62b3e31c1970d028721
SHA2567f5e9f0c4a4c4119fb643657e37cb18eaaacf6b4f79099b0d7ff19d9b1ec14de
SHA5120165ecca95e032be1176e3d5159723ad913a80a6cc31c672aeba82dcb653b8c2b57b487902719e4520e387c5333075923e3c358258990d1448ca9874ca52ac09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508839767ef77412637dd452675d2f306
SHA1ffc6dbb2a2b7174e752ad43fca0f579b6da219b3
SHA256609fa0adcf09abc6417606e9534c904ee479962e0171f01c52843b48d13dc761
SHA512498fc08caa95521fc40469fed3463ad36532d0b54b74d280c7eb89e75b704488d37dc6ead8fc294217808518055443d8404b0ac6fb7ff1000d221c4ce969669e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a