Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
2291e209a62d8ff7b97b9fffc67e64a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2291e209a62d8ff7b97b9fffc67e64a5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2291e209a62d8ff7b97b9fffc67e64a5_JaffaCakes118.html
-
Size
239KB
-
MD5
2291e209a62d8ff7b97b9fffc67e64a5
-
SHA1
537fcc9aab482d8417348cf1582c759bf503a414
-
SHA256
aab5d8228fa9575afa3d1d53137b32990642c154a33c020d37230f455b794ac8
-
SHA512
4110abe3a52fbb1d6725a4c99a1a472ae5b2856d623b7f80f1a6a7650d0255fd4c908d36a7f466dce1ef583c02d3faefcb83758bce922ec7aed73e8de4193abb
-
SSDEEP
6144:SP5xarMq940Vpb9lel3XEuCDPw/3PKz9VxLY7iAVLTBQJlx:uO9nLYWAVZQN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a3bd3e5a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421293027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d3c507baa147b02907194383c62b5c90072a178d9ba74897a5d1700be5e6a09f000000000e800000000200002000000013678546c0b5b450ff471c9dac3b343cd9bca9159bd4cee01b839eb8b6c64e9320000000392b2577c2305c429e11931f01b8492130dc68aac3cdd2d92c4a5cb831c3300740000000600c013d355550f061f1c074a19163b38679f78d0f2e43b643f1cf4d678fa13ee5ccc08ec9ea5085277e348a2ed29fd623205633ca40cba0afda6f2988fbf781 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE771121-0CD8-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3052 1952 iexplore.exe 28 PID 1952 wrote to memory of 3052 1952 iexplore.exe 28 PID 1952 wrote to memory of 3052 1952 iexplore.exe 28 PID 1952 wrote to memory of 3052 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2291e209a62d8ff7b97b9fffc67e64a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59695091e665987cab6c8856b88a8d738
SHA1b2b2eb89b594093e1e6a9ce23815b132081d84cb
SHA256a1e7b401816908c9c4f61f6a823e67a0f1ea607cafc05cb24208b2415102d16d
SHA512635ea15c574c13d4385d262f8156c3529dfd823656c6b1f0e9ca6190851b6a41f7be922fc14859788b3fc026f1817098e1c309906b2fa8ad7177379b1168c618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df9f58c61d6e776412db18d02634a530
SHA17e2270649c70e2f7e0547a58552fd5194d2b503a
SHA2568f36d245c67055ffd2e8afb92507af6ac11380c0efb0f4d765f324b65c7a1b83
SHA51248456463d7855049c7ed0bec55b7572c61113e34a068e24835ce97657d904fd7420be82677c9a6b44e2b60a6c1f3ce68964f93f32b3d61e8909647fed25f6caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501c2595e6450d314247c3e72dba20088
SHA1ccdd49e88025e37c06729bc19e516a70a604c2e3
SHA25618924bce7301602ab08867e7a720af118b203eb2f11366f95abf1e10fa49504b
SHA512f8ce118017b02b572f6ef210849cf4083ba0ca77fc7d1d6cfbae08a5cbc404417b06ac9fa96b1907c798f612ba6c260c2b4816111287046036f779947129393e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506efc2ecd07d1872aef099a93bef68a8
SHA1fe3972a41715f896d8be7fb2ff4ce6135829de39
SHA256937b1f8213fd01a20aa78f94cd463a3c9737430b5801e08d79d4da6da7d998a0
SHA51296c780276cbea88b1f2168d34d0d66eccaaaaa814e9fa326234d485aca2d129bd0dc76bf8f87ce2a6d794bb37af836cef0cba022702a0f75de3017b99d91ea25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9e7934c8a8919cbbeabf91edc9f3026
SHA19ead385d0ec7e288c297d397ed27e13f4e2b7fd9
SHA256325c06937cc05920dcb26ce7cee3cb5eb982ce8146092d362f6297b1c367bba7
SHA5126956012d163d5f28f7fba3214d9bb63e21f274b5eb47aebb21aefaef4f08c6e6403e10b8cdde7fcf75e374341dd6b03029bfaa4c50f15c22561fd2517b465076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a393ff5642fbf54931a8ab0880d87f82
SHA1db1708a0b5f52008ef3f41227e234096fc6805fc
SHA256b141996b6660fd3c25678c4dc90ccc6026834fb6590908ae76b97321611a56d2
SHA5120153b45e72806759853a4d5ad164fc8897ff8a83de8a67948a9d0a04d170db89a0d43915702810e703e0a8ed5f9d3e7a9b5074e95993dc4086b4e60b2248044a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc87f9c675b71ef098e3642dc0d601f1
SHA152a06ee957cc7c96737e9e9b86552168572eefef
SHA256d1768f29e54152f20af6dfb091251020ea25e786896ac11ce5b345816f60a13f
SHA51252ffa8aebfb0bab13b322ab5f82d110b8632971892906bcb75ee9742e99484ec223978279278d5e428a6424596b4049192208a053f7839a2b886da508f312a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64223efdc99278ebd8c58d03f9975f2
SHA1297c0b92f85fc583edb428558ad0c71de51a52bc
SHA256dcaca405f76e2e3e3dde9a1a7865b7cba7c7302c303c3c9fab679ed056d2f783
SHA5123cfccd22ede17cd9bf1282864af9ae1aecf640b5ce5cd180157838b26ec8cdaecb6948950743d772541c3675d08e9fddf9b6b0c1813673584a68c4cee83b5f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0964b1d01f402d3b137227ee3a7ba8
SHA1cb549730a8ec3049f05803af585de357537ac3a5
SHA2565ad7f6704f136a1a9dac265eee63acbbd0f9dd515ea57342d9908bbdb1bb8921
SHA51226a93f8d9d4a52b9bf76aaa023b4fc9f06253a9c0325a8dbd6b459ae50d399258371e9331746938c025cfa5b5255f2dbe2c10fb1ef96b3111de85c72ccf3a061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2bab6f969ceff8f0764135daf5e047
SHA132041577eaa83541533d997ba1155a197bd4f2c7
SHA256a3b079a3d815219749e5c1c0f20516e8ee20b88810c77100d3323e4f385e01af
SHA512ff59b6909acc037084aba17ee4ae5351727678397ef22d81670722cb23587339ad1356096d00aa79efcf19f0742c51dd5d48e9cc10c5dfe75b78cc8e4e8c4ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d478a84b5b72635e6bdca0450d71305
SHA19f7b6ed7b5560f3e6177095fc323170bff2cf59c
SHA25672725bd0452c8cbf3c079380c2efd8400ac904df6fe291637df3f0d41ccc191e
SHA512578615a7527475aff14dde10765d42d8475ca9e9f5361b4e8db28c05a10cd6b4fa7ecfe227e13403d1f4aaddd16d9f8f41f79f61652626283310eeb15a01d9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a90794b0e1c9e1706e7fbff1383d12
SHA10aec4bf553fe5e98f2bc8bdd972185614523138d
SHA25661fee6f0a2db2900d7edc8b49db225f537f411b6880461c13c2f19ae6804ea85
SHA5122fb7580c5135be05d8b4ff7789e2b4cfe54ad5e4fe0b9612ff9c3558f18ea18b4152989a8937abca5ae0cc45d9e963de6a4078482cd1c0d3ff96986e73d0ef38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e74125deafc3d9c0fc45e16fcb2df7
SHA11503960d820a24bb56e3d9fa6b28906fbd669ded
SHA2563bf3c913c3eaff102fbbbebce099db73b455b7f4c1de48e4b82d3c0058a66b41
SHA512fdec685b2a6e708b96b82ea590a0cadbf08b6fc08aca368aee1a49c4506a55f5c275d8d8bc8d676987e8efa02c5e66aa1ea28cecdd8c898e0157cbf76de71848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de5157ce658dd10f7e0c30a4898fab1
SHA11624a5173d83e58ad6c2922341fe9a731df91068
SHA256ea3787c8f48f4e5fab7853e48b3e0f3ae5414ed4193ccc5898bf644925814a70
SHA512476b3ac4e600c947065b8153def61677f7bd156bd7f54c4e1e496758b28fa075adc788eaa077ed450574a49c194d25affb3a6634cfb31bae9cb8934f786bd1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52229cb869832265b40cd8df44b0c77a1
SHA16701798de741ebeeceda73167f6717bddd0ccf3f
SHA25601f2001f3f7aabc522e4cdddca0ab453a027e06d753b5f65cbf1e4c4304bcb9a
SHA512e2e4f15fe7605ce137f2e80a8190cad8af5ebd2fa879db0dab27a4532af006ac2a27707e44168a8bbe4b2842fdb86c90f85b1a0a93a6e497790c467aceae32ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c92bba3e08c23605b1f0af0009814f0
SHA1868c69eec50da1745a13171c53b072fca11bbede
SHA2569942b016588d5fe2e579cfcaa90e22d939b8dc5ec23bcbc0929336a266a0e1b5
SHA5125a2e844b3144c0cfc19fefa5853747fda37be6b9a776244ff533602eb9767a731ad0352140b985db29e0a0877f84a803234a45af09bca34e399b60c355f82181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a1e6e96562784b5d587bc0c38111cd9
SHA1d4d3642905011ae311b9101a4845fb9a520b2943
SHA2565870d7d974dc0c06effb8fcdcb65437f3dac48d9f12429b75e882427485c531d
SHA512ad177c896679b37e08555b303f0e15948c91cb00a324c39b7c5859f635ec12c3deea59700cbd370b911c715b2d9e28ae98db3347fbbd3795b5bcd0ecd324c287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59918b2eeb74866df5767946c15949ab4
SHA1d1bc557559da8b0c1887353ccee6f0a89dd82745
SHA256d088f77818192ebbd09c5db78f631c1e94f9f5a63a0491f80ee838d5f00f7c5c
SHA512c957776d7218534cacc8d8530996547f80113cbcfb42d8ac8661ff9833704b1d54435cdc78bd7cbfe9c47977fa2fb26fe285a3c8e24386c8f51b3a2f6b5ed92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c738f390e6c26ced521b697a9f6dfefa
SHA185b5f462a3798748eb6492ad49de1ac4ec5a5f99
SHA2567b8dfe872bde4df1b5b8c919ad9be1b14b72b751eda49d0286b1fe895190210f
SHA5124856e1ec8620c6e5cef3167876e4ae437320f854ca92b71670a7cad1488f786eda2a34c1d2aceab9c036bc6e11c75eaa7becc1c1f473d46963cea5d20930c89f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a