Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
2bf0f0ea99a13695d1375189b65ed9d3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bf0f0ea99a13695d1375189b65ed9d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bf0f0ea99a13695d1375189b65ed9d3_JaffaCakes118.html
-
Size
195KB
-
MD5
2bf0f0ea99a13695d1375189b65ed9d3
-
SHA1
bf0800ab016e53158f187829304cf14effacf60b
-
SHA256
58dff1f1e1d592b3369c4567d31438697ff313a93a0d799863931615144e3d7f
-
SHA512
773302f1f0e307b48076cff9c006e150e2cec1e7f0c9130a317f208c1e4262998539f423db562376282799fbc8b4ea41bae3b4adbe3f2f708b2c82521be048cd
-
SSDEEP
3072:dyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:osMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1036066e5da2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AAD0DF1-0E50-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421454242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b82d7c311bfc0c2936bf3c6f13ad96b3b9df00e8a74575cd1f67b889a571f661000000000e800000000200002000000081586d605c4085d1904ca1bcc7a1c8629b4dd3c55187ba781475cb3e106131032000000053343b6faeeace5097af457d988dd0ed229de26d842531630eef1ea7124966af400000002156ffd5189f220ca29fcbdc19c6e4bd8518a976844bea7da85f24fb1196f731888130ad7c387187932c3190f78025a51acc0d0fdcb2be2dffba3d81e2c45e90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bf0f0ea99a13695d1375189b65ed9d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58153c06977c523c202d56495cdf1ca08
SHA18c92516fbde628b836bb25186be0479c96b075b1
SHA256662ec0b3b40d36273ee71e553e0d483aa03ae697b8d11247598c702860a282c0
SHA512dc13e82651efb7ba9574b6ab7ddf987cef0adc9901aa2579999c0fcecac4f07da2d253bf581daf61331f7fe86a13ece4bd07cd98f960b43028a49ade76346384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1646ce7aacbde97cc935fd27ee3b5e
SHA1c32c6695dacabf9ba2843dc8de155db01b515b9a
SHA25672a9c99cadd364a30de1677bd2982e0f2af0acb1eb707ac029048384c808d0a1
SHA5125d9178b20c1fa6530f10df76d13df72b4513218bf5831da623ffb1d87fce69a971f1ca1f30665586d5ae4f140e4c3e40403757bb51724db2c1bc18f9ff541cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53540bd5242d47afea2b152a834cce98e
SHA15a10d63d4e3d7393119e303eac3b04c2f370691d
SHA2563c786075d4685bce0cc27750622a3e80a8d81d19192e4c4239b5e2ac3d73b1a4
SHA512d57c7f847e1ecf44e1d653c7a39cdb5232b9e930e000cf2c309f615e0c1816f64d026ab9f28577ce94398a24f4dc0ee5b96ebe50fc25613cc361aa86133c8a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec828fbf5ed5ad94d438ad6677336aee
SHA1985723984e873582d20cd0a4537574f6051a45ea
SHA256b33d5de755d5529a33e342e73e519c33f6da33bfa3c3bc884517df70532bd837
SHA5121c133341bd51ed40dd85b402ff76fdef2f7388c1005f6e14ddf2339859d58589079f14248a61da647b0c168d1ee92aa76293f3d2d53d2dd8c8d33d53cbd0ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a31490316e18254e40916bf250794db
SHA180880722120da022e72a3623f94fcb9443742f0c
SHA256480907fb21325b012c8f0b9193a78d1a81383fc17aabeda900dac87f37834b3d
SHA5129644b0ae65c28d9ce9634213c767e8762e71e96b813735a2c4cb851135ebc2b116ac7e4dd60c04e75fcb0ace2c9b8c64b55d97c6c76f6c139b9ff751d9163a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d53c49fa7a9e92b38ad68cb78830fc05
SHA1270eba64d1f9fe6551835d5884ea23aa191683d0
SHA256681c4190fdfc8496840764a9ecf5d480e1087584111dd16e968b40ea5884a5b0
SHA512d550515077607989947d5c5f02c1f27c8d7cf72a381b38553acfb6c9ba76e657cf09471e37db0165ef80b11c3c18023c810be595481b57b7c949e7a4425dd1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c306b2aa51726361b02a40bb8baed7bf
SHA1be3b609c86fee53673a0ba388e7789bcfdbdeaa3
SHA256831509620c873666d6b8d2ceb9644d8305d829c09375a76b18628f03113f3373
SHA5120c4ca4dadde9fcf11f9e6d813893860741e0757dcb4f2e3203228c9a03b71df6b548c07bcc465e0c33239a2a466b24fda5333a49cf10e3ef9726be1302f3b988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e43947642d838b102a42386f2018b40
SHA1828eedbb03959d8e3d1b28c4f89debb57c4d2a7c
SHA256fa686fa3e1d638b508aca183e8e7597a548600960ef9bf16885737d5f1525747
SHA51298935233e5e384cd25c2db43fe8f2b479d09d3ff731c92a5f0210fc762502f402c3e8dc7be3753dab08f158348429ebad3ca51681de06c69ad824dd1243e09f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d0bf46a5492f8ca67d7cd22687af6f5
SHA1330ea74f9abc112d81dbd105285044ed39bdc0d5
SHA2562cd6bbbc8c2a84b050bace30b8ae6c1e2f8556210cebdf301a1505c96f720a8b
SHA512bd5d8c5f3015e6c81634cfb9b3a621297ad40e876eff82f23497a0e1866af99300e7323a5e87c3e14dd81ec69fb20b793a676ff5a9a9b696bf20a4bcf77ebdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d6a50ede42aae43265acd7bd6c24568
SHA1a2cb468da672d429fc89a1df3fb1a4bbfc4bbe09
SHA256674b93fa3cb99c005612c78303e4d4e8088664e5b5dc39f04fd6bc4a15ab6ded
SHA512d8c9198b5def532d559a2204d592cc4515e77f1401d91adedbb0f139b499fdb3ed5843b139fd0371d19e7049c4f9962414f7b419af47360cc2af0336b7658831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f05226d1b685d8dcdf0d68607b22755
SHA146cc951d9ca38de274b135224d2be92826469be2
SHA2567a6b2d1c79bf70a09ecb025d23231b6b2d4171ecbeddace5a8987e937fa5d801
SHA5123aaf258cd27537fdc090b4d31fc77ca5380c4ac2a83e78482f167bf63adbea39373906395107e30f1869905a2ec1f941bb81378bf83037a19628880db37bdf81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ef66a0d76c272ed9aced54587c12a3
SHA17bb1e4170d5cd22664f7e754cc07735a3f7322c9
SHA2560f5ba139f796f313a9ecfcd74fb725a7a43d51d897e3f108cf713910b107de9f
SHA512812721660b095fe74fdd9eaa31284ddf7eb262da39091b7e009919cb9cecf8c7c8b4a14a4ff54fe447f6a10d79068e3d7d4a12dd720fdb529e990b0f683103c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eb98b7f7cfc4f27336444af2b845d7a
SHA1f0974e2045d14a9dba27fc806912a061d4e8dbeb
SHA25670e355e473f4bf3f227dc25a82ca6b0776e0b121034af70a27ee6b3f3c6e161e
SHA512619fb128add15922dbb3b7f6353c49c3ae028a7ecb58bfb99aa11848afd218cff8935c0ea9b869f6bfd83e290933579b2c399b36551f2347fab2849405610627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760e030a620f637e86033d63682eefa6
SHA1448bd83b4f5f57b8078d97ebea5e0a0780f4bcbf
SHA256bd2de5ece1f4aad52caacb35bd9eecb71491614870d32f2b4dcaf50480f4590f
SHA51248529186c9c7c578951addf217cb969dd80b5751ca3242337f49df7a323b59655dcfc2c44b0f37e3d51a71813e2933c283607c9b771b76b52a56c6142c6766bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061b883f0b26258870b900832f7cd8db
SHA13429e802215e846ebfb49218f5e5d98692b47170
SHA25605f7e34a4af4bcf618503872610122e258588818105d68fd902c5f959f10d3c1
SHA512ebf6891d0bb0ef6be651aacf37cc268b34c4d4263e3bdc9b6c9bd1baf59ea052842d88ff4e57f9b670305b493fdf9a12370c3f57bf25a57302142ead96364f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d0fe6c900f29bd91156263db9f50a0
SHA185d25fafcabc3444ffecd1ab367b9378503c7b1d
SHA256f0d3edcd5da4f7776acc53d93e39ba7d242a5f7ae874f6b19001826fc2f5a6ae
SHA512cac45182460b080d0532c74c99f61f0459e8019ffac6331e97353f26945f46c1c055755d046c2bc5cdc4b3b2e507a54b8f9d2383be9f7923c8ae7461c941788e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d5c9d34356e8447724f8f8b2924a791
SHA17e1f8c3ddc6ce182fc62d4dc097def53926728bb
SHA256fd8fce546ddb0d644c50175723380e18cd0e37a571ab5ac6e3ea7d8e68d395f1
SHA5129ce781db1a777af3e75fa225a015fbcd42b350b8e16063408d2ab1336924c6e3b8a08b836e4626d14b009278cb597d1d15970abcf1686b3461146c9e94cc10f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581c5fde3051806286e5c7f74e3440e4e
SHA1a1e0d128af06d66b28372eb013fc32d24b52b5b4
SHA25645503c610cd9426c59cd342ff39566e1a3845c362d0a1443e9e8df795a1d374b
SHA5129ae5d821042a3d5578fa40eea28ac219c3f5b3f9139a92a08841baaccb44d1423a1ef1211fcc1dceffb373ac0969666e8e07e0fd55791638b9758e5813ce0f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b59e07af8c1a575803e5a1ed1d433b4
SHA17b98bf37d544cb59eb2e2e00be1905b0fcadabab
SHA256bfce19e871fa7ce81c4a9b5112faca0075407bfd91f93fa85bea92ed10a79561
SHA512b8f87874be0cbf92af97df9d070df452c57e15f887709f33f23a6ea9e83c37b1bdb8d8b2c11eb02aabc1e77b54d73c2e66034f18271e87f4f01f4f0b114576e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731135effc5a1f717c66c405ae1c0b47
SHA1c31694fe68b93f19baca205387f1a3f193d77dc4
SHA2560eea8e39d3b7cd3528242f222f84f8296da1cdacd9f7015df0797e8dc703a3d5
SHA5124efe864caa4a382a0ff7c88d3c28ae2c80577b0f9bdb5fdbb7a36a3d87cf828845d3b87a3fc50ae92725de43a2db619883559f8ef229bf43fc5481c179987b4e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a