Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
264690c8950d82da7d81cc8fd2392933_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
264690c8950d82da7d81cc8fd2392933_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
264690c8950d82da7d81cc8fd2392933_JaffaCakes118.html
-
Size
70KB
-
MD5
264690c8950d82da7d81cc8fd2392933
-
SHA1
1a2842e213858cf740c1995ada284ac5f45d6833
-
SHA256
3c03da39fff6410a2e6df215b06f9472e1ce870e3638f4e81c0d0746faa5d336
-
SHA512
46664ec175b611f650aa5ae16c3c40472749dce7c81e0a0120d503aa92f52591e7f165bfb4cd1dfc8433fa6f35d9e6352c490f318079e93ea7f2d08c1b1185cd
-
SSDEEP
768:JiigcMWR3sI2PDDnd0g66FUv7oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8F:JoUsTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bcff747aa1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A048B2D1-0D6D-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421356864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000020a4f3127540fee9d38054021d0793b2487b50980a59cbd9bd3c9d580a1cb3c6000000000e800000000200002000000009d64281e074d91c1ac4b1b21365fcba9ede7150b1213b2f03c77f887308db5e200000004f44f58fbb98496e6047c09588718e510274ecc9713c5f99f8557f17ceeb60c940000000af5a607b39e99bfd7f3838ecc8f22bd1823c5c6655edd2151d8f57ae853235da6078209fd45424cfa9643ce6210f43fb0ab4a5c7744d42e99b580c2c6b3aef71 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2800 2276 iexplore.exe 28 PID 2276 wrote to memory of 2800 2276 iexplore.exe 28 PID 2276 wrote to memory of 2800 2276 iexplore.exe 28 PID 2276 wrote to memory of 2800 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\264690c8950d82da7d81cc8fd2392933_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c138e4959657dcef1be8cd96ea0f0b60
SHA16b8a13d41f637b36ab7e03b07d4ac1447657661b
SHA256939380982caf43a203d5ae89405c4d3e6cd8b26626cd6d0af66b2c31cc7ae870
SHA512fb90053277a4276bf7d5833264fac91259d222cc9026c9cef74f8e2255719e9c349ec77f31fb49c6853306c9f10395841f1387b4962b6b3da37a003af74915e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8fd8ab97566df1c59066afffc2a502
SHA1addc0ed5289910b9394b15e5030f6ba844e97ba3
SHA25637afdfc81b194b8848de9c3656b2196cf4d109c4e3fc4c4c2498fb34bcf1fdea
SHA512fd157e3013ccd3b2b0d415a083b2ee38fdc3aa6be565138c3204af822050a6d3364c76fbd3c8a70bfceb511057796af0150ff36d37402e297a08bd9f5cbecfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e6573c0e62b77188ed9a546ad6c835
SHA11ad1ed3b5ef97eae6df090ba3c1ac4d626dffc42
SHA2561b7cc5c50680c55d65b442e812048889ca8c585efa485981af1c75f61cdf0ec7
SHA512e46e2fc40039fa91f630dc02a31012e16cc26f99bc1f7983611e9f3ae6f8722be0a5d91f3b54a1bfcffa1df899e27c2f2d642a6e4d229638112c4ef1f0b6b0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570fec6415130918c461df234bc0a217c
SHA16c1a3c5aa0935d7e7b7a343d2077a49caebb7d51
SHA256e6e7679b3cf033b43cc51146830c38fee941129b95db10c6d263cd0730578c9d
SHA5125030bb79c04feff296790ab4dad349726268358dcf30fe3727bf956d55e3b7ed5c065f42892ffb57e954181c0d1a066e6649596374e7311c4ec6b293308f1c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16ab4ea1e9988b1f32ffa380361ae0a
SHA1932d01bf544990ea08889f9dc297f6aa01d5e15a
SHA256d22d84b49b477701267f486a837cf0882b7cace5296faf03e909a368b8be5741
SHA512c15f9898beabb2e051f065cb66e4a64c13a98571336ba54d38891d8f939d73af17029b2aebbc3ff236e2089a495d8bf65c54b2745a89da8aadbc12c9f3e8d414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814b6c8b97e3b588da1a10397701da49
SHA150c59b581afc9fb2b962e469b15e6849dac0be46
SHA256798cb837db0f81211ce657acc8e1553bb5ef853655d7ba1e7253db3a1c1187ba
SHA512d0ac40372e7e958dcffe7a8997754e9e9fcca0a79722cbfa01ff12588351a1ad893eb62768e7df1f6beae407cdd935624324a815338d7e98af94ab4379e1c119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0064942e48c31d1ba27ea27173ea1c0
SHA19969f5df23c29aa254df67c5ea7600ab145c98f0
SHA25618ad9c401685162fd846131b22697efac61dfa21e569445af05fa8d5255f25f2
SHA51253fbfc2c3a6d4c248b71d2b48d4a3ef84017967a05fbfdcbb623cd0a8a5a90d3306926f1c00a3d7c09b8c467d579c5155a65c33dd86b344ca755049dd84cbe6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4f7512d2299a9a39ab316c65261ac2
SHA1962afff28b5e6bd19f060b811da49d69b805f1e0
SHA256f3d68d92f14575396326e0bb682e28ab0c93f961fee1991d24d56ed4556075e0
SHA512227aeece6048188563369a961909f88d9d4e08704e1876fc6f19e2c23426e1c797623e67ac4a15f2c6e4c68de7371c7fedda6c09953bbc01c200d26573fd5955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f23c997cc29bf282a8218116081b6e4
SHA1ed1c70822c7dd82f9aafbe725ae9fe79030b2a76
SHA2563c40717ace726df8726431d6351726c311661f1ba6670cfd1143760d365bc9d8
SHA512bf9c27b35857f7514285a44f4ff35ac14b102b35cdfa37abed529a15bcc8de7f69faa529e5ab24c50971dc567a0126f42c05bb898759ddf40643ffd4bd5f3846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0ee45abb66351aab043f49169c98e9a
SHA1f29db4dfca05dc069e868030d54ca1bc7da2673f
SHA256028bba0d27e3b90eb9433d126798eb56d2e65e1590d80ca9e43f537959a476d6
SHA5127ade419ae75d7d16b2a3254da5c18bc6ae1b42ad6abc999e40eb4ffb837f4d94d4e24be16d85abd4ba4dc6bfeb5596f53baeddc5dcaacad0fcc631a9c328b44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902011135b963d04a90ccec711295e6f
SHA17d23ca3182a88bdf90f653af3de2fed97956c15d
SHA2569c8f14228847f12e754e46cd3fbfc6e1689d3d21d1d36c8af47e3968d93c5f83
SHA512ad2ceeb8a653bb04ffbbe4d4d54ea1c5a77467ef2ce8bd0efe1267540e624de235658141d1e11f9448a73923958b342585f78ca01ad126f65ac2bb507e92f0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb2b9e6617f29e77591656d44f2db19
SHA1bf1f5b8fe6d08a793aa6a8eb55b35585f039d90d
SHA25678097a6f9e91d22458ed64d5dce413da70708a4325bf0d3cdecb30e33be4c834
SHA512acbaefd4183635ea38f9768fa00d9cd81d955bc37314d8eff2f0ffda7d57108b7b3c91f6b2ec6f4705f40752b1803f228d2945e753a17c4f6d174552d12df9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c2194fd0f38d7b7d7dd51f45ff7157
SHA10f70ed32a037a3ee39d929ef7f585d52c093cddb
SHA256b5c5a8d530f30a42eeb1ee7eea76d367b9fd269db621bbf425bc09071ca96d74
SHA512e540ba7298f525b7293ebefb9372b3d259a6b3153336431ec3b3a529cc5cf0b497100aee0a00a02fae82ccd2cdb77ef8ae21cfde0f61e48dd452eb333cfc86a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37cc0118f6db0a3300d7b3cf22262e5
SHA1f17a0a01fa8994cc60578540eeb6cb49dda24d87
SHA2564e8222686758b9f9a2f735ebb7e77c8acd9c57168f91da62fb068d5ccf0eab7a
SHA51276467074a1c2a6aeeab18e08b49631f1dba293cb4e605303929f609bc37b5d8ca1e76a8063d9b48fb7f3f67cd78494b2c7e7f7a05ef2192c99cdd30fb84402e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f3714439ddb8885f0fb4e8b68eae07
SHA179f7542c49767ae6a340fda9c76dd6ab0ab031bf
SHA256bba05774312472cf97dff9798752f489101ddbc6bd23af09b2b7dc6efd013817
SHA51253b081114f97492570aec877c292d83eb8411f9aa14c1cc12700bd46f0797d9f77998ef86f18191cd7fc10b490ecffbc5ad8dcdf6314380f0ce5d29e1bf84978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56536b23cd3d2927a749a3352648b9bd2
SHA17028e8c0eb4b6e63d72d0d14653990c77e9c4145
SHA2566e891446093a57c1fb5df96b44f61d18cc7a32d4ec9cbfa9106ec1bb10fa9683
SHA512615993e46ff838e1c471b1682231b10f4443c76fe3ccf80acfdd84d55136eab9a8a2077f8227cec18a7f9e47d2dcb43dc85de8e67bf796605ebf1aa625a326bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597dc96f64df65a5756837e1ffa9d215c
SHA17b6457453fd2b9b9a0b44773eff4f3dfdc1d4e38
SHA256daf4dc3337de75a080f72560a1134d457aa60a1eea9c32752d9335e0c5390ba2
SHA512953e5a11bdd6a43e5e05c131ddc365742f2369c369ad1f4d2fb6ef1c51c64d4f48863b559cf771f1463ac29e7c084a7677dbd8b9c727beddc3c94e942fa0114e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e20ce61791604ea9a4ef60a98294b7
SHA1727f3ee1946bcc100eb1841479cd14e6ae7cee54
SHA256312115ed89554c1853aba1c1ddd2ee931ee7e18bf0d1e7ebf98d3f887e71480b
SHA51213bca1f55955c7b717f2d96562072afdb6526659f8dc65ce412e0ce782a8905c16a6a06398ecffe69f06c00049c185262dee9a5e22793b691e9e3780128587a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5da09fc040d466cb9944a72a029e61
SHA13d15ea076b7b38eba1136062980784ab0c3c5ea2
SHA256011de9822492e96239a0dd45844589fbdd0541736b226fcf082cbf59f44bb36d
SHA5123731fd0c90fd0081869fdf5ae8eb07f1e1b3d607fbf53dfe7fa4d3cabee503f0d6f3376efe8fb0753f7d4a5e925d29ed16c3e5e5a4947d0b5e9c9e91dc068be0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a