Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
247e53a09368685ad56ffb3edc00b874_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
247e53a09368685ad56ffb3edc00b874_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
247e53a09368685ad56ffb3edc00b874_JaffaCakes118.html
-
Size
51KB
-
MD5
247e53a09368685ad56ffb3edc00b874
-
SHA1
29983edd7c4f1d2ddf0010d54bd77c73e5fd4301
-
SHA256
fb5bf86a6d9aa9a62012f3d2a243210eeb2e3bccf47a419c632801d99c59d5ed
-
SHA512
9e120a563021d68129d3fa9f70c76277ae3e3df8acc451778f16ad2e97d3cd295be9ff6f90c5aae672a3edbd3db7ea2687d3940875b5c3f2b8c3b5af83d70729
-
SSDEEP
1536:GILYWmRAXa6ILnIHkVLU/BflCitv1OP1GB:GILYyXa6OgOP1GB
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000bbc9995dc0072e82130c6fc8b7063b8cfd80653c053a8ef44b6e632a24a03544000000000e8000000002000020000000101ec750e48e0b8c57d2414e46f77092730bcbd81f0c07ee5929de969f6b17d0200000007284e692f481ce7baed5454d68aff69390ad1c2f593077fe1f0922b93a0b0f3740000000ca4a703b809fe46562674d335daab48e7da52bd5fd6b1823de0f7e4052b5ad7adae3162e3f39ec33bb1c5546d6d2f746c5e30d215cfc3dec89787a249d01efcb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ed5a3935a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64D42B71-0D28-11EF-AB95-422D877631E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421327128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28 PID 2072 wrote to memory of 3020 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\247e53a09368685ad56ffb3edc00b874_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5896b3bfdb26728cafa93ee508c4185ec
SHA1f7a543904793e27fe839bbf165309256497a4f42
SHA2564cb721c1eb65795f1428beae34ec1fc784043b3d11eac1c60fb9c345b6bb9d58
SHA51283cc289dcbe71ba02dc8c7d02c501e512f07809e8dca85ca1bdf67db85121c45e4fe37ad349b2bb0c6085de6ed713c12203f2edd19824832988a257e0d39fbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571256fb5a097383bc97bba263a9bae13
SHA1967f5010a521254fdb9859e4ca4d60caa4fb149a
SHA2564407ee1a8c6adcf2ef613c31a94fe6faf1b9c9fc4511e192f25dbe20a0230a44
SHA5128275b6af63427733e081db3eb1b287f522654bee71c4caeedef947b3ac2fe0acc5ffa8b8baeb4970c5bd938f6d669be6e3fbdcafc65cf4af9f9a22bf5b032252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596aeffedbd27e40af16c2ee2e1907484
SHA163eeed935ad92c75f3d392006ba5718548e9420b
SHA2568fa8e777ba29a1aa46e1fcd2babd71aedb257cb3cca60263796310364c3ce280
SHA51211bdc44cd257b7fde7ef6301122a67eb71058a480526e2fd06f5efe579fd55b9aa537594bba62bab84fae5ceca12b62134db7c3c285096f61495cd31bd9ff70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975a8f43ad846577c89ee4464c7b06d1
SHA1dc67608066b82f3a7601c8ff37d756f3e2367944
SHA2566ea698214a9b81a03b5756542834d16b7282fea992edcd14a8eb14e54d1057c1
SHA512ea26efaaa7b45c411c545ba0876d8af291c912882c0879ca9edf2a6cadbefb1f4697ad45c2012fc37def24a5374af0bc9dce51d29e5fa196253765c5238c21ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba6c4972b7cd3dc931d0f34310bf028
SHA1b6470c5070b4aed6d240f50d509fb1236ed18035
SHA25666bb0309cb6c0eedea54edb4c2662bd3eea77852059fc6f158847a8cb8a17ef4
SHA5123e7d1a8b8b674ca0a0a46e8095ed9a03070b5cdd777eee1a4f48e4ffdd2a33f9ca3a750eadb40d5a471e3f92d29ad5168af911af32e57c6c2cee2ca6585d3614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563be12115486edda104ffc75ee860c61
SHA13017a0f619d3df2f23c6facd68f2cec788c09023
SHA25685abb4c87027ce9d4382f48470e599f416a3ffbc06833a9fbabd791c49233edc
SHA5122ba70c25cc664ef680240f966ba9dd80e313bb5d8a9cf72a54f1a2fb9afd93482bef3f735e1f2841c0a2d7cc4a7758721e839a712200e382be0e4d8393ba285d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40ffb02a3fccf45fc62ae082dd7b07e
SHA130a12b51bb175455b7c9a8c13d745e680d63278d
SHA25637561a4293e94bc887eb4c2fcaffdf357b8d719467218dd666a046f616b27be1
SHA5122ffff2e298546296163d33b2333cbe19618b3d5a5953fd8e4941fb63172c7409b4f46b04a83dc736e2de9a05b2207678a874a6e745575e06d553d8bc656f16c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952789c0ab7af15c07d6d59158636db0
SHA17fb9187e4a70aa006d9c643c42765a91e0330161
SHA25691bb6999077c0bc3bd01da5c962a7b71940b96bd5088ccc4958e07a5cfba99c5
SHA512e7144664a01b33a20ec0d65afd97d05dbe04857b3640140eedffd2e8022d2c4c94d80075c1c94bfa8e3b237480b6ec4266ee525993cc3f7becf8c8183baefe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fcef7b13791cde0870f133bf7cfe88
SHA1b13324a2fc8fc8f2514c4bb027bb0137c23ae202
SHA256ff4b7b0c9edd5a74e433c232642d324c1e97f2290fcf965747b8d020979aa086
SHA512fea0e9e0a07284ed389a8bd9e285c0b503fabd3a5a83bd9bf218125f5f46b2a9f91612ddb7262c8a7b601f3a286db1eab753ce77f7e6cedefdd4be58518f5866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541217fcf4b733609d77ed1e87a7703fe
SHA12aecdfc5377cb83dcabcf00a74b90e5970be4557
SHA256fc28f784ed36d12cda6c3f24c9aacc97cf21bdee5a66d41b2347dbf801dc61c3
SHA51295643230e6e4418c7cae5cdea0900e8f912848204a7c0ffe0ef9726f0d8043f95134590d4a140ca5441573e4b46bdc34762acc93abfa9d469be6e3ad4c3a36ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea5b83ba5d841d7c438c74c25a06d56
SHA1fc49e577f7a74e990e176cb8f1a709aad41a54af
SHA256125ad9c7c42c20c8b36246c5a8115000f30cbbdf568b78e4e265f2c6ee244448
SHA512a16e149ae14ad9cc0313edf3463455e1f906f7e7cbf04497a95fbc336a45ed1d51efe983d68bdc7e728ebbdabb0a3b0fa6d9da02f643388a5a8571bf2ed050d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1c751d238f8126e56a39ccfed98a124
SHA119528b6b73cfbdc88c2c45e51ffd5e1a043c1df1
SHA2561a162f5be114c4dade80cd89cdf852e8d5a4b93bdcf5e3cb7834e985feb37cbc
SHA512236a08f878bf35b4def61dc93d74986568a6800b0ad081e58eeac5b2b59344a44263dcd2c4d9e3593404d5058e333442100100c73a6217cc594f91f3bfe49d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef17c73b1fcd0f6e2fa33edcf162d1f
SHA1e700f74f3e3e24767d58a79e355c309069d06200
SHA2562b909d924cdc962e96652bfacae2bf51713c6c3b27f7e704d80285641d31e073
SHA51213fc86eea069718da3e15d236990251b5e63f32c72dbe9791e67f0defc6cd8706612abc32b95606df782358927ac65b68ebd05d7acbc966c3b35503ad9eeeae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c033d0341432197da480dc15998849
SHA155fa0732387e28b42995d17f3526ede86aac92bc
SHA2560c528e0709148990c87fb5177f34c6229b34490f442430c88b985755bf4ea7fa
SHA5129f9b0854bfa4ee97162652197d72de11fdb26b17f8e98190be2650981df38528fff46a7f7c8137c581c1ea870215d4b981c98857e358625187286a2144e364c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cee992ebf2cfbce09de882294828c235
SHA169439745fbbf8e314f143df6686384f84e2e9f03
SHA2560efde2b25ed9f16dce9f3b45252623487d7650a5b41becc99af31488e74c0c5a
SHA512086984346e83e0716a725dd1afc2e94418be8e231f3f18c3320451540adab4c665a4f97976365bf8ed96c5adac407a049de350f7261f93509f28cd5c38957a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5136c0fff1c31b99ab99d9cbe9cf4c1
SHA119b722b7e89398f722315aa8fd99e57b3f0e68f2
SHA256a9a43d136799bf71e6353f4da12af09ecba1c8182f8d93beba1607f4b9d13da0
SHA5121f4efeadbda8d79fcc1bfc7434cd1e12790a2a44b604cc4d5009529a68a5d12649b86b50c0d0b9f7cf591373f6d254ccde80695fbf3282e0fddaadba70cf8e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3db5833c6e7695be3df0297ee38820
SHA181f9a209901c187daf7aa77536b7bea9c0f4321d
SHA256afb42ce39b37aa42cdced99ccbdc14ac0c9173c991c90acba6c26f28c97f3451
SHA512975db495d6a3f129270c2604dd306bd660f7d8e3cc5a1e6af04565d7ab5e87a0c8df5a89d9478c74e4e3a8736a3e85c4566295b37789e5d838892ff42cf91f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3a89a082c3d2dd5e5f67e8dbf4ca89
SHA1c1b21885f497a8fcac7b42429d6955bfc8f97714
SHA25616a1d555e0ee98fdb577f4064509801078c9bebb5fd96b140daab8112845c7d8
SHA512dfc6e517109d9aa6b7efd0e5b9787a44653d53ee2ecbeae669800e0b32a749fe7caf73a35fc64a4a6aab90ed549d48d6b489ef4d7caccded9675da5f6d4da080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d6d10fa508c66c0847616b72fdbc57
SHA1300633f4cbc395b251c42600f72a5cd535a7ad03
SHA256c5ab26b88973509d7cff096fe620e8f9bb0fd75ccecb98038d28fe42accdd283
SHA5126608cc028b0f04f8a6d4d920e0ff9ee94afb7e95c5483df29f96d5d7ca5e75358e548656ae95595933baf4ec89cf37b21c058dbb1cb8469495ac73f86c2fbf7d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a