Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
2416cbb5b911d36174e0f6bf3d335342_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2416cbb5b911d36174e0f6bf3d335342_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2416cbb5b911d36174e0f6bf3d335342_JaffaCakes118.html
-
Size
30KB
-
MD5
2416cbb5b911d36174e0f6bf3d335342
-
SHA1
4d3a7b680565881faa415a9d44998cb965df5566
-
SHA256
781972c235d70715da0e8d019933212e26b9e37eb56561c17f6d2e625d673f1f
-
SHA512
9fab9e87168e2e7e68a6798e1088b7f3cf52450dd38d9556f04a3835a6027b97aa6c2bb6942575c1b7424725cd80aedc27fc632689a27c2332351a829ab9ebaf
-
SSDEEP
192:eOM1Nvph7zQelmGAlOK/MKhPs4yL1m4f1/sopSaJWBzkUBFMtnA6/27mF89hsinJ:kphNO9F6JcG5lh/p6lbGojDjdkLM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25986FD1-0D18-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20aa2bfe24a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421320151" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000001460d4709c6c98089bdb0cf784deeba9ff801443756ca64c6db8d6c117ee78bf000000000e80000000020000200000007119995629afc2df35a2ab99038e2bcb0e9f6757c33863afbcf9a97caeafd1a420000000fa55d3aeed47bf199060ebafc5f1d066f5cd990d11ea6a320a7a743d6ccfdc50400000001e41c62118fc65fb01391f2d3a74a557cd3b6b0fda2ca7001913c65cae23f3820e9ac38056b4f741a2103c37af239456bbe5ce13b815658b69ee58af31aa4c6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2484 2856 iexplore.exe 28 PID 2856 wrote to memory of 2484 2856 iexplore.exe 28 PID 2856 wrote to memory of 2484 2856 iexplore.exe 28 PID 2856 wrote to memory of 2484 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2416cbb5b911d36174e0f6bf3d335342_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d9b13fb44da8ad83567a64893f8b64a
SHA156d5852960ab00594127cc1881b3b11355eaddde
SHA25691a56bbfc37f5fee09d22ea6cd6120a1290a79a3a7843b65964f5134d98e30fe
SHA512b5e612c23ab622281b0dfb62adea63da7c31bbd81f4c5b943645a37858592d1e57fd701424d778f7ba93a3ed529d182610d706569e6d095e8d7473a5a58d0129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57812e152b18d60ac6e66bd68214f2632
SHA1925d78cf224b1cb6afef7bb4de47ba3901536810
SHA2564f086f41c56bb9ab1f3c63cf2ea7e357686d083ebc95593d0cd9bf9b355768a6
SHA51250872ea23b5260dc39fad908316225de6526b0924c77f386654d959a1ff28fe7b54a145c2541005d28b6fbaf742a77c277f19ea5c8f1edec3bebe24250749e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f545953a1f0ee2ea27f831b649301356
SHA1f72a1d2532ea374809862765ca960137fe0fedfe
SHA2566a973638f9c4823ee39869efa9c5133316f5618ece20c8a7ac808342a8280c59
SHA512a654967e288002a9de337d98d87b2f6b2f6486d308a0a781b9fae5d4d6e6f60ef1c47c62983951d41658a28b371c9218f98ead5d420136de8fb331305cc674d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57647f56055d8b0b9d1dfdad5ec766343
SHA1635158aa9ebe1bb799a6e2a986ca924d3e4caea7
SHA2560272379cad102b644bbb7a9f5022d9e53a0cf58f5ba993474089dcffb7fb3325
SHA512d912edd6f77b87fae247d2304221a2b029fb7e42b717fcd18c884e65bdf31570b1fa89bffcf0082bc4e0e5d7b98da8080e069fe6ecdee517bd7c5e45d519131d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f596b13060be68cd159e625a1574207
SHA16adf9a06201e85b7c1c0f21ed46faed2559ab3c7
SHA256316d18f189ca645895e5dfabc0a132dd8699ac461aae14dc057dfacd587d7a41
SHA5128ef6e47679fc27cfa8bf23ae03a003fd9da3b32d1b146c0d9749993079c5143f53c0f45fa0b47289ee881327460b2b233076fea2e226d5cf941a63e03d845595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab9d16729457f34219c4b0893fbb42c
SHA1b23745220035637357d29251bbd9ec2ed33d156e
SHA256358207406335daedef3c64e8e3097b2801cbb926978fe873df14603cc9325582
SHA512e1f0f1010d4debf7e1510ff5b87b845b004669e41d57c9b657bed439aab5641a1764e7f00ed13b05c090be7d92a758f5a24d10e9037d2a2dc9b4186fe888a4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579568bd83de8f9118ca7cc0f8a4c12da
SHA15ef8ce81428222612e57473f6dab83cf0e5bcb7a
SHA256ce09ff8291904f014e6d9787305e067ecb5b36733c57e4588fb1958d208cc306
SHA5124f1b1c53d80fbb7b1b0704d3e8c0a0df8d2bda2b5cc39f5c6e21bdc6c5a1a82fcd9586902ce3ad0121dab1c728226434d8caed098dba9fb79c53830a8940b539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8432a37e2d6d6871db3bbc03f1cd8d7
SHA1afcb2b4aae589db5f19e4017589c37bc4041f837
SHA256679e6797fbed5b6c8eafcc8768e142be71e5fd96342babc11165a6eba2a521d0
SHA512a0596a0bf147e6fd48c4a79e18b47664e8b7c41aa653cc5b3effbe8be74b5fe3fb99331cd0dcd1b7f16e907883ac7127b90947aef765f24ec15b385c0664d1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9afa7a625720137eb15f815b4f5dd5b
SHA1c8723671d4a278593cb39ae78d463da3449de866
SHA256a829c46f4fee4d8bcfdff62250e8ce3a1d57a2323481600c539d3db9dc08b78a
SHA51267ddff46f1f3df83655886f0706795a652a3e6bf6187891299d3bea5ea6a426c57df1b17804b4dfee0f21bae64cb7336b2e9f622ce5850eda88873e041e50104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d91d9d030ef01cf4a841e5bb180793
SHA136a0bfcb8bc93e6969974c2118ebd4ebc6bc3cc6
SHA2565ca8973dccf88a6d2e51eccdacd660880ddc246932e1afda44694b4e384f6888
SHA512710c9574cf74f87ebf834d7c269fe230459bc28982b5c56cca891ac1f500a4c6379415a85735a1376fb716003985c8b26f8cd7aae4bdd57624d97cca42b8fcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59953f5b9df9bd0a47a1e47126dbaf8bf
SHA17a24a1b7b7bfb5a02e31fa003d6abd3e1c6d93d2
SHA25653e3d1064110df3181328205b4797ff89971c32d74e19d1772c023d7a5172f47
SHA512b0371e0307d336aad3ffed79cb7e49af26437954aacd8577df9e25f8c5db7f68c0fe7d142e5535ee8296e12da7222e12427e497f324a0b92a0ca7db87d2ec5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87e7909ab9b243ad5d0e235ebb44fd9
SHA101b9fd94e98a688250add45503ffd06291044b16
SHA256c04033cec106a57e4c607c8380384e5ed541c7cb949b34c1c7e0d52d80ef5e9b
SHA512351c2210ff67c74fcd0ff5c8f3fc1bbda9441e18287b946628d548be0b3531dc544d258fb4c95e0374538b1e291b7a88f05a465e125e07dd45b8298a562d4188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54396c51719036c1dea3444328eb1fa0d
SHA1c1fcb592c96a38d7d2b0abab3f8377df8f89796e
SHA2566a931f7e80f301f48915ecb0a7387a78b628bc13404f1c619825431726d9d32e
SHA51253f791cf81b20c751050c7fd420781afe96050c233c1c4f5a2ba60f81e6178c8f249ffc8d03b777509ce947453ee0618c0680dad2e2e8749f4c7069076899c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f08984eb938a381b985bdf008c575c09
SHA1c4a4a75071194aab66c74562f2a5a649207c4450
SHA2562fea0857789d291e55f16d254940df05318d950458a959cad35634687794ba79
SHA51214d6ec01a05fa18d9614df74fe87792ee84faebc426093afd0148ea5666803edd735e30c9ec753f5663589f9235f4ed01877ecfb071fffb8fbb450cf7878f497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff692ed0f42a59cab3c2b4d84f63d91c
SHA110704b3d9fbea8d7416e8e08d0cf983ab48376b1
SHA2561a9fc08e9ecdb5c8f9c6e7164b21d42e5548f8325bfdcdb29b09e96b9cafa1fc
SHA51217105142fb0c86610e122bc4e057927ea829834222ced3292a594a0540f1ce717c0a1f4263dfa799fdb1e6c6d85cf09b8d1ed10de4809f83a5c0359d6173880f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50164a6240d55191356cf80a9cbfcefa6
SHA1ea857e02643f442ad98a43359f2fefa4046c4b45
SHA25675be78a69eba45ade5ef9ac1e22457e25919e9e7213c5f71d798f0c9ba78451b
SHA51226701baf462d2860741385cbeabc412704cc83064ce24f83e6dce9b41918bc65b69fb4901200e8c7ce6ca2d9bb04c6df07109d8da77ade04344960a6f0401f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb45d69982df827974bddec88912fe70
SHA1cdd70a6f764afbb927a25da8a5173a7bc11e1d79
SHA256b33e1ae2a38e8a2022a35f524dbfcd3aed66ffe33e0721e5b057b43f4afc25e6
SHA512fa4de9630dadb66793fccd45cc5a44f882c5dcac84c8f5bbc4361ddd8a516b41f9509f25b1acb5b149c77587a09f3675137df0ddc0e6ef8fde329683dda238c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc90166e18a369ac74bf23c9247b50f
SHA1a198d2e3d8ce42eb66828e47071d621300051824
SHA2560714d5ba1c0f592fc2b1c6ded0d6de2b24cbba54c7995ce6f7dc660cfd4e03ac
SHA51235aefde221672dc29f5478477c70ed6b085b8ebbfd2c76eaaef721bcca9192668772c53d36c69b86f8320c39b92b060eae709749b38ec5fe58d3cdc681f361da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58edffbd669d06208e9fcf2569bd5e96e
SHA1e466ba8aaf161a70dbd0a480b749df7e34cc2192
SHA25656890f116d0dc4e87d95ca70aeae27c743ca3e673ee8b1dbc7dad2d364b3959a
SHA512709ba7134b07de46051491317dbf214a6cabaf5397282e2401d05c19f0357e64c36c87810e18ebcfe40e05a8ff3bca660aa32c3584d942b140ad8409a228bbae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a