Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
242c49614ab34976f5ca45b0977d3b2f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
242c49614ab34976f5ca45b0977d3b2f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
242c49614ab34976f5ca45b0977d3b2f_JaffaCakes118.html
-
Size
917KB
-
MD5
242c49614ab34976f5ca45b0977d3b2f
-
SHA1
16c3438763f41c5c0476478106f428e575b9bacd
-
SHA256
26768f92e5f380727ed87cc1ca96bc02366bcfaab5ca2d9335e1d71758379fc2
-
SHA512
0e981e74faa6d95c928802b4f9b481866d215a175cfd7f06ba498dffae05ab9b2a493ceef121d3d878b8e8ee4774bbfe5e8c363e95dac9ed41280105cdcb4a83
-
SSDEEP
6144:flGMAJLF+psMutdY1YQMNsMutdY1YQMpK:8MujYKjWMujYKjo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0B2B881-0D1B-11EF-92F7-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d1462ad8bcb89321e66d8a7647e3e6fa39804cd511730d75167ceff69778861f000000000e80000000020000200000000559a8e2163121d3ac3d1e079d891e7eb6b4fa3bf32db4c401da98ab07e163ba20000000a183ae419f8860d3a49b8f5920fd19877f89defe3ab9aad9bad899af4e42f56c40000000cf76ea4bbc08be94778301f93189b27e8a8c96b7ed91916ab484b25625f60d3033e24b3ca23d76559ff7e7718223b61f683019dcc33a6673fae69c8decb268af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421321647" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e7707828a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2380 2856 iexplore.exe 28 PID 2856 wrote to memory of 2380 2856 iexplore.exe 28 PID 2856 wrote to memory of 2380 2856 iexplore.exe 28 PID 2856 wrote to memory of 2380 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\242c49614ab34976f5ca45b0977d3b2f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e1a0cdbfabc1ae8835c03e42350b2aab
SHA12a7c5322ba99053bb6f003c0d2647ed42b1d860a
SHA2565ae929d4a2db14201ef3f48aebfddd070c10bd8623d800d44a1ba561b1c077b9
SHA51244a9c10de925c6aafc1d584dafe11b837261460e1004906732d6ca3861096494f9afbf203150ad92336598c8b65e1bafefaf12a40f2567c8a74a0f2a3b44bc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5accf5f18f0dbc5153a225fb9bca17368
SHA1a3a66f78ebca8fef9d6a992b2410032dbd6a9209
SHA25689139dd18e73c82e3476115bd8e9d2537b314188200d3406f2b35c359a4b2f41
SHA5125b231cb1a3b4d0d2faf112f35ba091c2f49670740ae99f0ee0fbcfdf9f3e2d1d0649f11590565451a4d7c7e2b16d40d641d67966af1ccb217ca7f9a5701524be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54460aebf519430967df34a88ba18ad90
SHA16dc2b8fe1919686961c97a09cfca3715f01f9365
SHA256c552841f0be30150adcade90970bf471df5216c91242a4f6c4a4488043f8d950
SHA5126a73cebac048224ea052d0df9df72fc57b670f1aab72e7087fd4ec1423fbe33c1bcadef5520b82657433f2292882cc8bf77afa6bd60ca6d9fe539e95ef7a6e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7b71323f962d0fa808968969e8ea61
SHA1e38d4f2a7c6f8e65c6a8140bbb4d47c3bbb73c5c
SHA256a73adc9809fcfa2f4bd5d79803c08f607a43608b5c93c9c51c126d5d3675452d
SHA512f52c26784c6153943cb15fbc9325a9e05c4dafc35dbd10bfdc6066265f59c69d444dcde87bd761157c9fb8dfdcddc842fec21d6a36234ed3ad71b5f1f6c1e9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f9f2280a99bb7522c9729c1b85f490
SHA118ce89a8c50fffcddb9e107192cca754f6627054
SHA2561c12a95e3f9270777f503ee70b7ee060e099af5923fa3b7b5c934ee7fc8f51df
SHA5126605207dccfa6de06b804193cd8145f8d559fc32e740bd3f884faa6d2fd5bf171ba1577ea1968338fa87a337a071aa511b00d94080e70122d2033d643983a919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adc8f7a1ee9666b077b253e452e47e14
SHA10e6c16c62ab155d8183fa971e8721f0d4c133b32
SHA2566d08f65e9efe00314f2402efa3b946cf07eb3da08c0a94c3782d40440ea5015c
SHA5125b14822ae402569c7dc9451b20e9dc7304221490f6391dfc5dd634d4a927c873a999c053b2c7d902282e675cc4dc81df8199674f4bfb744dc5bb9a02cf2d1a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e05dd65e4998ff7562f88e52e69ef9
SHA1784c7c3ab9295b5fcfa6debcf0761471c91ddc92
SHA256e401fb1185c61af6a52e93c22b8eed92fe2f8d7fdb8d0ef6fbceae01a64b0528
SHA512e6dbfd0f0a85e28d13ea5e371377945def73465a8b7af5ae09bff0aed6a29e2eae6e3a33a0c7811f14811c31c2e5909a28c1596e1d71204b3bdfa17b36d2a69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319c0c9338c24f20bb74537aca614b74
SHA1fb409eae340432db7863bcfd68616254776d5854
SHA25674af0e65c7243e23a5bf3832f62bdb2931f65d0b40afbaaaeac3bb04582cfc2b
SHA5122f606741126534065df5399cedc790ae3cec329e274e0daebda0381ab41dd9f68ff477318df793d2395f87649a2e8413d8eec3c616edeeeb1f67dcdbe755722a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9f9150535120f1c92882a8111d605f
SHA1da22331b17bad1d8cc7e2b644bc34b3045a66442
SHA256deb36d8ac3506d92894d197ff2ba6d1e1fabd2ee19d6e4778b21bbb7c2ee984c
SHA512f36d0c4dde5c683bc2e9fdfc00823b6b8ecf11889cc475bd87ec2ea4dc0a8edb0358319d19758fb9d7824c2a91d4ebee85526c4bc5239da0cf9546969fb14f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512ce049baeb2549ed329e1439072a73e
SHA113f565b4a4f339ba4791fa5e77078c000b55a369
SHA256e9b74704663454bce448283b907984e8503b365ec8bca0af34ab63537dd7ed50
SHA5122a341ff322efefb057d19c2800654476a6f2adc80c7cf1b80b1b7cdc466f2dfe0203f569a631b747e2792ff163088488d75391b1e5fd6b438af62d01b400c096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c59b28eb09d976f3641abd1f57fea39
SHA1f8272cf1e2a06cc4c5d7b5a74b1a6b36024fee05
SHA256c7ee088353fa2ce51c281b374d369972db4faf00ae04dfaa5484d107848c304d
SHA51292c52021663fa4d48d8f21184f9703e8d05f71ca41e6c56b7b7caebe5ee904b6a78cd0b94ab7e80ba5a5f34d985b062bd78b0ea798e477acba4814006fdfdc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b25e305957c5f5d0f484f49511abdc3
SHA1738d66192dc7183236505c3786ea8e4720dc52b4
SHA2567e49b9c4bb004964712b6b8c04615230bea12b510b0fc0f1ad9f4f87b9f77fc6
SHA512457e1b899ee44e6d12ce79133600dfa2952bf392b7ee8b9da0d25d433b880aa8d219ec068ea43ebd2d07e0587acf1c30b214439b971ad3ba22076513c2a45216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ecc18128896dadbc2d61ba5dc88c0f
SHA13c1f101fb1eb728be68b1361a8ee18f9e77aa1b7
SHA256a905a5c08f5d832b2d729abfd04cbd43d4014c7657d1dbdcf069096d0fa5119f
SHA51279203c172e617cea073eb2d4c23dc5af1b2de685a5418cac03e0597c63d0b9906c9c73a7e97b22602ae9605ca108cd12a4822909fce209d52b8e4ef48d0c8575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5082ad7b3a9e11beeb7c65deb6f61d3bc
SHA17d6fb9814599178e2669b7bee53471b6ceccf317
SHA2561e8ad2fb3a1feb983174eae825cf59ae41836b7fced395926037235f48fc232c
SHA512a6b65c0ac60fde241d3b94f5a2ff391fa9a5b593b697c4dff8688ec2b1e0dea74b48b30c915270b632e8eef3d58e987f10c2c72e72508214471f064370ccf208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56833d33546f2e294b8e5bc630b185e02
SHA16e54a3394cc82b38ed33612a4cd1a061bbaca1d0
SHA25697a3b666c1bfb2f8444b201529614d78f8d8c813cf15e8f73c5acaa0f060bc5d
SHA51269c20be9c5c1e54edca1a5368550899ef52acc377fbd6ca539e0c24e03404ce40707efe020fc2734cca8eb4e39b634c51b4773d7d58b98be3170748415d87690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56bef726c07e107add229bb7bf230da91
SHA15c845e5e0d39a89a21529f59e9de7a3cefc4fafe
SHA25667cdb18ff1ffb5bc6dcf28380e140801275caffe56f59e768603caf6d1216d1c
SHA5121e17947c4555813b83c90c4a124c3d065d61fab7b69b7d55e7b66f7ffb0220125892c2a0849a3aa5d9f635c7b1aafd161a11ffaa08c5d7386ad1833d93a7bfbd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a