Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
264f0dc80369b89ea8dd6f4ea661cb72_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
264f0dc80369b89ea8dd6f4ea661cb72_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
264f0dc80369b89ea8dd6f4ea661cb72_JaffaCakes118.html
-
Size
8KB
-
MD5
264f0dc80369b89ea8dd6f4ea661cb72
-
SHA1
a4a73b1c7f1628ab81152fcf654df6965f301173
-
SHA256
4ffccd30762df349f42f69b1cfb74f115d9bc6ef2f98af575518aff908f5bdc3
-
SHA512
e1d8500763a79aac484243a2f61f52104789a8b6364e2400e755b73167e84145b9f9b5e4d934d34cf9433a40da29c6c5f4db72e56b0cbc90f4493c93b334fc31
-
SSDEEP
192:ZcU4N9xAH2kXiJCkC0cCrZEcWhPyaAuhcWNM4w41X2R43Jl:ZqN9xAQngcWm41XVf
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000078256ab0b60a0a045954d6a8561d850d8769e4a3232a38cc16b856c978868859000000000e8000000002000020000000cb542edc65fd561dedd8f0b25bedadbc6f3ffbbbedb8f9563db428ce1ff2460220000000d0fe87b344bd919f7e752c8ede0d147b13976e0eaed72c9de514ee7744c45ec340000000e6a458f65a37d4e7073cba345079e31f97fffaf723baba80f3b37e6c805b1a7a85396c486ec63cf4c103db7345bc046424e8450eec7144a6665b6b7c200aac3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE934A21-0D6E-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f39ed37ba1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421357452" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2904 2504 iexplore.exe 28 PID 2504 wrote to memory of 2904 2504 iexplore.exe 28 PID 2504 wrote to memory of 2904 2504 iexplore.exe 28 PID 2504 wrote to memory of 2904 2504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\264f0dc80369b89ea8dd6f4ea661cb72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e835fd0fbfe8f1a1dbc76748e365129f
SHA16eac60bc7c6df2ff7f444201319d678072a2a341
SHA256c65794cb1785eb65f373cf40000d2b19aad3c79276ee383233514d82b13e171e
SHA512ef4cbc0d517c570348b9d287fb00e5647120c098a9ca090785ded3c0bb2b098210325e669f0f76eb05750f180801f2750d389324d563c1f3a87b09509d460d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba49ba9be9e8184a8624f3f9dee7419
SHA1004c22c3396ff5c5c4a31157f6eacab0a15c787c
SHA256db2515955bcecb2dee3d9a7ba72d2988b9ac43344bdd7144f590f8b8c3187a7b
SHA5127ca06ca07ef7ab25f1ed309191560e3aa450d5843e5649fc5c8b58c7ea4bdb73e07a066d51bab5a58fba71033414a2214b9824b049750ba31bb6f4218920a292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637083e03a1794566f0614392f8d5c8b
SHA1abd2d286756154e73c70038d955e0984f1a08c65
SHA2567df438de9180f85451a7d32c65ad4e41cc045fc0ae6e27b36865d6dcac58cb4f
SHA512db8036844721ee45f01dbf4a71cab7c8fdd587599b555b99493d3973447a31e7f6945259df80ae5ec4feb21fd52f737b40befe9a9f8dd46c1dcdd15c1644aa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d84f2d4bb63c929a9497454d0615b07
SHA1e4c80b9c084a2160e07b0ffdaf5275e8a98bb2eb
SHA256b738651108ebd1d317a7c424df3d401563e48eb700a4a778b7db947c6593e4f0
SHA512cb02ee31bb83df513040c8739838f22b412dd61a23ec374e7dd39b361d2d6c5f28dd2241bd685b9bf7f86ce8a2a24a820bfc4d34953e868d724e5e19fc5b93bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740437c86a0669fc34afbd80342eafa0
SHA1ac124dcee880ab111638a14a234e50e1b2e7478e
SHA2568e49b9c22500def0385cdd138deee28d931905dedcc926d98ff4d576c10b0130
SHA512ab9c58ecdfb5e5d533798e0eff24c2f45a811d83c47f0b064071b28fcec20822a8027a971f327cc9438514ead992b8eb4953b50e05e5daf19c71729287efc97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d3dcf7e026ab2714256a611b77c354f
SHA130b4cf03ed122a52f036a66f6be030d2f714da99
SHA25638f933f95e05fe26de5b1799fe7d6dbc4bdecb66cd4f7d474901e97167b836cf
SHA51235ec61cc67e72b4e4542c0f3a0d8d473b2dc7571ad0b98e035ef6a9cc38c3eecae140caf21fcdaea0681b1781533e7b7c2557ea7766aa8bbaa7426c8fb540f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae484527871e2391ba7d8c3fd56747a3
SHA111d88e0671ce74fd3647f6101c612a5a14e68a1c
SHA256895221d28d9e380bfdb852ce2e598245c7f0b12456b5da44891e8cdef151c9a9
SHA5129a054ccf92db82877dacc903dfead825f0639778ec889009d2e985a4771a3afeb2d105f13f47a49ad39536c3efe40e0837485d32c3e5e39bb5ce75af61e6c2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86e02aed9dd145c192a6c54b87b77ac
SHA14de0cbb40d85817c00336f495a20d663df8d1588
SHA2569d9f628c00ca6b9b5d77ce5524e5185c3b7acf789641cf82bda9029b6fe34188
SHA51295fab42163149ffa150a3a5a88bfebf2348efd9a05bf7545ffdeb21b09d25b466850a27e5f17c9d4dede0183f14b495f1193a99340a142872213726b512dc875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ca9c994e970e25aa08741509e4b08f
SHA1522c7ffd0ebac5a5a89fa97014d1b48af689e3d5
SHA2569ad68ac66e3e16626cbdec620f3a63bb4801c596d5c6ab896288c0e612f5cacb
SHA51214d3d800ca301eea167f07d2454468bc5c83e6c144f4ae12acb182c4b9628884fcb9db1b7a52b05f9479aff2b8b84c002b68ea0e44a46b44cbeec71fc0a5299b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511e2051135b2b592b6980beabfbcc307
SHA106ce77a726adbebff499ac8b66c26ebe98f75648
SHA2564bed6e7725efa106d3cbab1719cb6ed832fc155df8261dbb139d81f46cf8b00f
SHA51225003301f2751fb145925293e7f378f0d0570951ce898aaed93147c527daa5a907af3a3e703be09e2327286ec19347e5bc629ea424a554af8f65278b153335ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de5820cf72b1603f30b8ae48c532164
SHA11b0e44fe86615865fa60231368bd7e9fc207efaa
SHA256f4d981f0809d445abe8685a0e7427e522d324b654ea03e45399b71b7267788ec
SHA512c69a1cee160ce3e4f25733d6aad37d1cf3a569e161db4057c1b350724db040e94d49f5c4c7ddb774dcc05c58dd02eb88084c3e80a974f374f4111e813f21fe88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5514432c6af312ffe8578df0f9b1cb2ab
SHA1802572b5f9108c4b81d91a4d0fc67b272bf20ea1
SHA25688ccce9c95a3066fdec5c1372f72593c0d0771394639258c8230d470ff64b131
SHA512a95a47fa9a61da7227634ba8e45e45c8297122c35bb71fbfef4dba636c5e651daf9f80d4387deb977d8a311d7bb32207c0db44cd03fa70c4346fe40ed1c8b7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591364e82c7102c33625dec4c2032e8a5
SHA11e37bf5d849ebe76f4bd516a4d7248584959f9a6
SHA25655be908234e1c38f500e13772b3554b2c5e3e34fef5ad024d9d1cd68d3651697
SHA51212790e7687094ad838c5ebd1bba4640ff7483d6b643a10dd87ced9598ac3b01c1c4213e834271aaf6695e1f9ed1acdc929abd8991e4aa4828d2db9e465956de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd806dc71c25e23e1a551c1e79918b0
SHA1f3a176d42d68481cb20e8df8af15002b8a1bb275
SHA25667ec41653d71d3cd71d7298e574cbe7f0d048858706e5318bb7032e221c193b5
SHA5129402e2eef01e1ef0a1ec949a1980472545d505d7c17bd6455ba56340f7f4247fd87e9c73c3c851e6d964d3bae2f04516a3dbd13580ad9d30ec0ad67b851fbdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55807a66bdbf9fca18afd3641e1f307d3
SHA1d0f4fb8ed8f36205a133d377a968c27667635e70
SHA256a4455118af856ce909dcc027ed862f0d005fb266ec74f4671c2bb53dd266fb8e
SHA512e8e17e2099bb8704c56a5aae5839672577df935ba878d76304d70c6e97c9a4aeca8fffc28604990dfbbb2746c39ce112d2ac0bc0e266588ce547870fb944d297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac563cf46374f3bd6d7a86b18536188
SHA1ff7036fb36a462e05cb4fed20726d32be6ec63a2
SHA2568fa70cf1a0d295832969b987ac94323d5d38908a63f1c12907258598bd27dcf4
SHA5127975464ca366f38d90e4a9b35b458bbf9e010fc42f2e51bc0470b50b9b0c7b7388b47e8bd0eaa660975f549a714eae33ad3a53a86a38bd25a951624cfa4a77c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523c1315e2e72e51aad8c2b2dc221d884
SHA1ff34a4f48146c7ab245c37456423c4c1830fe74f
SHA256a8ab95d8c99af907e1a880d9b1f6e74880dd9dbe837e85c72a02c4d1376b9928
SHA5127cf0c781963eb3d52881d0fee60e4e07ab48b32af7cff4770a1a65536a11c65c154366acebad1e9b67c933012502b9e1af72bf3c7abc388bba0cbb66c2b58b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175b9809e768dfad6d7a3be3d5e0b705
SHA128c8167fa1800a170765addfb33c5705117cf6a6
SHA25668e9b4c7e6a8aa47a6dd8b585c04bed0672c4111df3da846273367ccfc78fcbb
SHA5129950956f061e3138008eeb84a76db783a26d29d4fb3a80135759a5b921fd48cdaea142997288d41e299eed93924d7acb76966562e959830a2002cf9ac2b5c70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3be06925078c78715054efbe56d6d5f
SHA1a5818cc80757aa77c407b49be7d6f5e0d6906124
SHA256840e2a0c8ce5396af718eb282dc876769b997a1472680cbdfb156b72d447acfb
SHA512367ef95cfc876a630693822c772f01606844b0a51deb4c7efbe0b369f5b4931b8158643822ce6386fecea900bfe9226358fc48de71aad8b5a853e22d6229d374
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a