Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
259141fa7aab1fd992cc96266c5d2855_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
259141fa7aab1fd992cc96266c5d2855_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
259141fa7aab1fd992cc96266c5d2855_JaffaCakes118.html
-
Size
24KB
-
MD5
259141fa7aab1fd992cc96266c5d2855
-
SHA1
efff8c4cdb32b3259fc1b60f95a2b60768fb389f
-
SHA256
9c5641280123622d9dd63d191469a9c945f4883277097a308c60031993d71f38
-
SHA512
ce9c1b3a76c9184f7b5c552dd99173cf55ec76fea9db690cfd12af79245011d090e2d6390180420fdadefbd76e1b413fc03c9a92332de1880be63bf8654a9a32
-
SSDEEP
768:uF6exGPiKbnFb1uxxdCrOHbt0dW9MZFrLBKsF76n2:uFLGPiKxpuxxdCrOHh0dW9MZlLBvF762
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421345052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000afeeafed1b373939e48624ac88e68533373df99c03ae91b44b2c3de116aa5f13000000000e80000000020000200000001cbd75c692e1d7137c86be7c26d16d8a09f271d8bb7269586b469d306ee32c9820000000ee30feb89ef0c3de046bf3e75d0ba45a90cdaa0e45bce603c8067854340926f84000000009dad553e11ade284b56c52c8717d4606ebd9851624de94f7ee96cca0bec42fd3914e23301fedde77eaa114a1155fa083d074e943d412a4404495c7d2c8d1faf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0298c0f5fa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{205A0AD1-0D52-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2924 2064 iexplore.exe 28 PID 2064 wrote to memory of 2924 2064 iexplore.exe 28 PID 2064 wrote to memory of 2924 2064 iexplore.exe 28 PID 2064 wrote to memory of 2924 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\259141fa7aab1fd992cc96266c5d2855_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454a8f6b7436191c166838129968a69f
SHA1af3d316de0b9997ea2beb72d7f5fa2d4cd38262c
SHA2563d6cef7285e655e9fb65451b345bfeab967c4458bf6895624377dcef10faec28
SHA51250a090cb65e1aa2866566c558b0976bcfd23f44de46d6acbab9bdec8718cea8b90f4e158562e2c558729bed8e799f8aa1df68d214478577c7f3cad174c862683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14f22721d6f80220f50901eef26aab3
SHA1f4d50922ef77a7784499fa04ab865acb325fb31b
SHA2564807c927765b4479a36049d191c332bd1e528f8ae750e74821e3396d94387e52
SHA51246471cf885101b1a4204840de5a7b21dfa058fac7702ee9ec68e3736ec1e62937ffa41881bcdb1271034e2b9fd79a14be69e9c04f52b0500d9a95fe8ff25c74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516a84e69fea1e2fe5ee01272cf9d55df
SHA144a3de07f3470d64c24c46c30ec3cea4fd98e21a
SHA25632a9796fe48f4429be8c4212b4ee5eac01e1a1e981be375f5c676c05d9fb22df
SHA5129eb37926311f38b7bed9e26dbc7bbeecd67ac84d095269c2e9c859adeb0a51520bcb7f08008d46ee39ef14b8e25331c9cba74c0ec94c984ce1e64176d56403b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570796b3ae80236a82b95ab4e41a20d5b
SHA149fdbdc6fab4e5b4516b8008b6dad098e23f5ddb
SHA25673bd25e550b8d62256f55ae965ba0c86eab21a53aca5c4376d845e1cebf3c0a7
SHA512a832dc23401fb2071ff1c2ed58135a933ae490e6475d91993ea7e5920eb3cfc38f7cfec849a08eed4762652f91b4d00ad7f4348c833a8de98cfca303cc4308a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5656c12117f045e371e31190a1e7d81
SHA1279a68b9278905d04deb12895466456217e6f809
SHA256aa02ae68ff265b1c2efadd805fe65268fb1af84e284baa1c83c89e4ba2166ad0
SHA512767654f9ebf18c83f4f1a0335e7c69f75ccff6c243703d2cf8f0a189d21907cf654bc201f382566f301a373584e8338d8e844abe37bc3d505a69b98266d0d2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6da51a67fcd6133d7fe1df1b685995
SHA1b501ae68b7d8b35f6c1bee326f89c6151cddd23a
SHA25651c024105d6dda0ece8895296d7ab8c1da8c338bc0f8df2a07a19a18b1037c28
SHA51246ea168f2567e5bbead84a8790c7e8e3066cc4c052ea12c4de02ca817e63fbab97cc6a012ac58d83c07336f55c930ccd4fe446041abcd494a4b4d44b2386cc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57782002cdecf362c362b0f471a05316f
SHA17b44bf2e8c71a3f82f77546e6f054b094ce59a07
SHA2565eab0e5fa6a99b05ccd2703f866c54e7ff0b52e2f0391904d61bdbd3258cd6d8
SHA512a6d2f46b655b5f9b3c6e243d7c73cb2deba81422efa3aabccbc0bdc787e6d3eb043fa76fa307107513016b5a9a9c5ba11f1f6e8bb826b0045ed9b61279cb49d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52503c1bcf52f0a9c30219d3f1e68de49
SHA14638c466067112f5f3c9183d6851e72fec6b5a4c
SHA256c466159db0205103be45e69f51a75889c3d6bac28dbb77503cb3eff33491e396
SHA5122b5cafa45fbdb178e52fbf6b8ece76d21561eb2c2a96ee55f5af1939976e7ed9354eed7adc10b5c24c73e04726aacc7dafd2614f043b0be39f54c24e02e83db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb9ee7eff7b1237e39819516a869edc
SHA149d5e57b137c56ad588180dd1216af4aa1771e29
SHA256d9080eb65f150d039993f411c0a1c43f9ec88e657820500f1f15ba784019fc39
SHA512eb2e8cd9eba14b22838947236f966a37478fadb12795cc3dfd3cf0fd1549d2c6d00c137e1280ca98ea8ca5d08f1d11a0b9dcf58ed966567a06c0a62f86a3ba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa2a6b590b94a82018da13cd8618a12
SHA18c17776e3d1285a181f0df43ff6722317d5e9b3b
SHA2565c6e29884cd453e9e38584b02880a5c9fe3025fbd49788d1b441c6771227d358
SHA51297b919930e14757996233ca06ff5c216cef94c3c44f038fc4b49093d5e81c128f721f03e4852ac51e236bb7f45ebbb53cb4a54a731b4e56427e2d76778e46149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578238d91b176495cbc6bfd72424686c0
SHA19fd7df4db9d644c2ae92d9615b5e857e5fe1f4cf
SHA25622988b11f6e16155108e0a75a11d068000a215d8722843a2be59215cb551e89c
SHA5120c7e3c8afb34219b78d512c688afa39255841c782c4c0d4978630d9ce89a670fe976c8553221b54c1d5eec645e862354b47b1b5a05cd862e801d8055884a0875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc05dc640f127ff8777124daebaf46a
SHA15c225ecdc562b25d894defcd82ff3de5b224286a
SHA2560b5bed3ba486baf9afa471d3d05a82959550e3f2303523256ba86d0e8c4a8fbf
SHA512c0affeab12264a04e27681297562be8675829bfdb53005022aa52ae0fd9d351224a985f0de5f326ee66fbd7745d61486ae76302f155a4cf0774555146d4c6de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4a0627aabe97acb92d47983b7fcad2c
SHA13fe8bca2fae3eb19fc824817583fc3bcc88815e7
SHA2567f936622e1885a2e82dee019f4e45f490c517146d19c19e5238cdd20b974b141
SHA5127a4c172b3de7dd62a45192c0a94db0d47a331d7746ce561ff15074025f9d254d2a6bd7bb0faf9aff0e06c7a4b0afe43c3585d0c08c3cbaf16bc940452f07c5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56294b71f62d7066d2eca1f6e856de560
SHA1a7833ea852dc7f4cc473e5ce7b777bb1ed644d5b
SHA2567cdb7dbd2d2eab0ed589f8bdeed7943f79ab6e76b47de87668fbef0e4c8de971
SHA5125cba66eeaa4e0356782984339d6045c91a074217fb7fe98a5061d6c8b6531860bd920ea7013696e9f366b83596da3ac670806b26840a4863ecae26f1be282452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513531e1f0d21fa6265d585379d87f01a
SHA12376f49a52a6875b59191b30d9e23a8b51e41040
SHA256fd3bdf4ded5860abc620908b9be892d30105932c643fd7313d71da890882c8a4
SHA512e29b5480edca4f7fc686de9d6929cd553fa5bc9549fa6f3c9b99b803da3375a8b87035b8fef7162ac6eae6ae31fab59d9758407b4cab47ba05a2d87fe7f37c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52012593266651cc7451e0c432ff02105
SHA1f80cbb0150048ecb2561a6bdaf12eda487aa6acc
SHA256ba4662dda1d1191de7ff2d4c8c619d27b0bf16ca22b50e00eeb48c1c917e8b6c
SHA512285d870c0566347c03f7747e98766685d15e756ba4c9fe6f94a47cb307e8d4c4674da51eb34d3a6b3282d9d77b1672e77791d78a66cf5ca20ad1513a269ca236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535fe2d606670d51b9aedfcf9e6d8fdaf
SHA199b2b4eba99f40e484396f72b49f5933b611f94f
SHA2560b9ef3df9739031a12ec699589f63dc689a6cba5df94061641923b5f4275e692
SHA5122e1e82f997772b888fe473eb93a38255856c0e1ff61ae9c7da5e6d41b9b619c230f2feb552ce957fcfa146502e9fae3467aed47719bd769660d60ffe258c177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f57e22bdd07b9caa49748c6edb6218d
SHA1917fd137c457aa136d7cbf973991551802bb0b6c
SHA25660fa17b1a1ea329ec209168cf1cdcec52b3ddc2b15b0e12b4b0dab670acfdad2
SHA5125ca573e284efbdc0e5765774f038c0ded7bf32a604da12e509d14b8b430a9ade9368ccc77af727d8fa7932452fe9c57db46a07f05af00378bd23ee26136eb5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def1e6d14ae400087c3648fec57f1285
SHA18af6591243f91aba48ac56123c4e30e2aff6ce23
SHA2560d441f7130cee1fde704570b87eb4c13a4e5b329caa2e39ba0d8c641f2446d8f
SHA51284ea0a9c04fb3b3ebc638787df2714c022c26e222bb3d445f633277601e2a743af56232f1f2743cfe99e9551267a7443829e760a8b82b58dd15f18490b7a0578
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a