Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
2bf0756fb6c80c13794a3fa1c016b5c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bf0756fb6c80c13794a3fa1c016b5c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bf0756fb6c80c13794a3fa1c016b5c9_JaffaCakes118.html
-
Size
3KB
-
MD5
2bf0756fb6c80c13794a3fa1c016b5c9
-
SHA1
aa9a69455ac0df5053d931c56fafb31947fab7a5
-
SHA256
cd640af99b28b0d01e66016ee5bac572f1bbe4fb9c645792496e6f58285070c2
-
SHA512
2e9287bb5b26abfce25f49b268dff9ae330c5855307180b8d140646d2c72380e831dda992fdaaee3f37901135c9dd8c9d034043ec24732f6b52d40f4055c5c3c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90719c215da2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421454219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009c76351cc2f89a3e1e5708159adeb08dd306969fcd6bb28a9b1babb1bbcd6ed8000000000e80000000020000200000006c885a9a2a48518d368c224f8254dfbbc8398acdca6547de776fba63cc0ad60520000000415a6357417ba26ef9dcd8f658a594070d9984caf9497d1a45566018d68e2c7c40000000c8b8291b7a4dc329a0c043cbe5b7959d423e1214c49106ba4b79c2f42c97cc71a071c07f9cde544a975f32c128c705a54363bae18c47c3fbc8c49824e49b9cf4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CFA9D81-0E50-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3028 2992 iexplore.exe 28 PID 2992 wrote to memory of 3028 2992 iexplore.exe 28 PID 2992 wrote to memory of 3028 2992 iexplore.exe 28 PID 2992 wrote to memory of 3028 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bf0756fb6c80c13794a3fa1c016b5c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcea6934d985516fbc2382d9b787c8ab
SHA11d5fda8317aeebcbec26a1845cbd971a92f091f4
SHA256fb9246591b872a47c7ebac589532c48eca5f3dd1c40ed09ee74a0f397d97ace6
SHA51234d83e9720720a5c3e2df80ed9c8f6a83dc56a8a1d6784e048155f65b688056e0cc99355d9b1f04158e2b6f7fd774dda3e14e760a602016c6f0f0d8b5535fcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a39d62d6623c830dce72ae37f6effeae
SHA13b8013d6b6f69823f684b3a76a578886f5c60d89
SHA256ad3aa85c2fe6ae4dde8657f1bfc02cc8c040a3ed4599e640f4fd1b8663759c80
SHA5127239bd2e1d93ba7490de794d0cd85f6516c5654f22832fc58a30c93b700aa214a9e77fa86d4ca4843bb963d5f8409d948c5cc11a79cb94ee24d6d665c2cdc172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc78b97b4e03c821c92444fb7236a5a
SHA104e93223cada7f5bdaa820a7be1b6e8bccc0dccc
SHA2561008ae0c8e172f5deeb7838f2006bdd87e6571ef0488c76b7d2bb85a0cacc891
SHA5125cb31ea2c768191b446a304c5f7230e738f308488090bdc1449e5948762f92fd804d802d0bd26033bf0a647e5070c02347b4629cf3935c65751bce02a65b9a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa34443aee22fe1e99c10d3ea8ec5cba
SHA16a55a5cc88f9cb6f7768426c6b2ceeac3ee0cbd0
SHA25639240ef8d29b627d1f74fc5a5199a7e1c2ae35c14bd4cd9f5f60150f08aa6e01
SHA512c2d7c52c4f35d97eb8347f4ccc122ff395ea9b3523b7bbeee7fe81750230590f1e9c07e889356a0e997df9397828f63b26d506fa743daa3d555afbdb986e2451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57898911bbe834d73685e807ecac842b5
SHA1a454853ccecb51e874d58bcbeddf37bb1ace1242
SHA256c026ab0e148b5b702bd57462f7b30bf767c064ff90cbd34d2a9780d33e6f6012
SHA5126ba48c20e9ff19d8b08bc251bff5f8a18cc99c640b99c5d33b186e77dc10403e7a048d1f8ac6841dff2364524f056035722440c8f98440451f9ba44a43361c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df229d8cddb12ba60bf80ad2973c6599
SHA1967e4d6e264e34d592fbccb0a7db927456fca2e3
SHA2566e0b37a3035c1a8c9ef7b9897f6db01cc69c9c68509d233f7ee1e75b5e100d31
SHA512d21b7135b63305b083fccd3ac2b2e8e0824a27e67a0def9d3be2c961bb7f798ba31eb12426851820075835cc8ac4566b96ac3ef464467f5ca828abff861fcd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1959a2e931681dbc3f435149d11cb30
SHA165b9d481a42e20698fc1f4bf040222901ac647a5
SHA2560116eea9514d07f259e30b241cb0878f2652a74baad74ea6903e7d271de490b3
SHA51214a5e361f944f12ffd3349e2dec101c4bf9d87875a455a3962f4ecf3b4fefcc896c234af49bf583a92666506d72ef1b56d3954600d0723ef4bfdb68ecdb59a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590dd9bc6d64a1bf94bb4ae875d9d2081
SHA1f3e501f235232c9a4a93e04485bbd63db84877d7
SHA256645dd9aa6e205f23f426718cd3ff214c462f57bb2cb1982c07276d094cd595d9
SHA512eafb3514d98b16328f05641faf6e1688572d0fe6de219ea7fa7e3ede5d65d5d71e0ea2459533be9a9bcdd2df6c68f2077745076c4614c7f8ae7d3f373d32dc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a2798b0ab9be39f1bc26e6473960cb8
SHA185a9821b70d3644501e6e2bcc2d22be4d4880b06
SHA25664f8265cc89d20364e29c9f5cee0b903bf33a7cc3024c14990b0e0bc96391e41
SHA512bb2091150a71ed7e2ebada1826add645a9aca6cd2f833558ff2ac5e12e9804d0b787f28d1ef8e1b19f93ae52d8844b60218adf0ef13442f3adc02406a8cb65ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53123e20d52a7a20ae6003b222c3117db
SHA189e239735603db9bbd894dc8ebd8bd74f5f9f095
SHA256d4e5d0bb3ca0c6d2cfd39aaf1205bdfa210af84666dcb8ef09c91d202168c47c
SHA51280636ad680edf6e147bda3270b82cf6fe0b5ee53d55cdcda65405fff2aa16ef4a35050b7e4b0a450f0119351bd33d0ca27b4051ed278e396d1e19e41ef728b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4c14377c609c38724b2bc1d2fbba53
SHA101fba2095bacdf059575b88250391bd7e682d500
SHA2568230e77eff9b711f5e4252ea000af8991243a026f3ff8955dffae877c07bf90e
SHA51215daea25a992a3f472e091dc472a062a79421a15846f8eaddd16d64f4a2137a4a8f42c2361c8ee83b0dc4324a305c42e3f04fa469698a8ee7b0d4aef49ae0c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def9065dde44a7421878e26f4a5d00f1
SHA10dbf16402b8f40d197f4869b2513cf0112e3cc30
SHA2562094074dad7fc6319e1681017e5007b002fba843e6ce9e36a4f35b947367ba01
SHA512d21680783836ecb11d8e01f01398ab0fb92104b7946d973b05b608a33666a844434791a7a0d5d380e2be158fcef1be707d0a63c6afd0eb4b6f8cc3fa1a7cfac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b9057f27b8d8922f884cb3c515b735
SHA17f6234e758b4f04ad4f8b98500d04bcb3cc2abc8
SHA256c17c8d40974ea37e12290c3c99b8ce9e1a334ca92c145b13cc10e73658c5f710
SHA51227e2be75ec4f4c7b6fd6b7752fe3c313b034ada8bef2d8880a6a2c9f5a9065cd118450eaa760030662baa7d8599d79b4570287f0bda7565ecb9db4a8fc4f6153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc0edf7dbd6fc90153ca208379a25bd
SHA1dc627dc351ed06001a5ddb22d0f4cbc2fe318af0
SHA25688337ea0e571e0768651894a7d952996495b920d1cab5d546f047e1eeb0e84d9
SHA512c0e89ff0e2ce6ddf7f5b3fe0f5e54df884d0e53926011611b78c63a7bc633ddff07aa835f5a67f5bfb5ffac19a587851882f927791c9a42a31864df470f8e47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b173bf6181ca722a0d18cb11555e1913
SHA123e0ef442e4f038191d634f369de85a1e6927dfb
SHA25638b87c23828d007dc64c782f656a5ff2198fedb6011ca580797c2a46116371f6
SHA5123f8261211d641dcc3dde7394c223b1ab4fcf3947742501ab567b0f19716832653414347dd2e67a8c320e87a7ba94affa5e5c06495dfa9302acd2b543e43630b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e174cd028f18142017e1f13174f43a3c
SHA10b50f5199f153ee79d7393f1b302ad03049fcfc6
SHA25624f1436741a671ed9502295a764dbd6201d9e897bb63ad0fba68cd1cb462492d
SHA51255a5f71cee9c03767a79fdfcc92d01ab423b037e38c6632dc7b6fb47c13dc1b8a40f6498e995d18603322dd366f40d7b95e97258c2c3b7ac61c598750e3b4b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6144fa27277f6328b66791671218602
SHA16c04669474f36163a8744551c34d301705b1a87d
SHA256768d709d06d81552e957abd79d35e8154bb40e6eb189177db116169621e9192b
SHA512cdaf19ebfd3c50e2d4b25e236ed1956249b571c0cb60523d8f56b6bf6b7cd823ea15b72ac2745268067a06db84eed29bc26a7650f378ee8a26b045b8846ab7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518645df5348712feb5590c50460fde15
SHA1b2c528b1cb2fc3bb89ee5e70a8a7198930fd46f7
SHA256497701d3ef21253d2801fa8eddc6c4a3daa591cebc03c6bc4cbafd66b72f201f
SHA512e2731d244fa2d346f8a8a7d750bd2986b4bc2ea454d17d6c7146ee21eee2d5102429e06541a4f756ccf801d57cfd7a835d89987bd9041075cc6155a7e139fad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52971ce7699007118d504fd7ab7abf614
SHA197f811ff51380f3431d9f150e94292c36fdbdd27
SHA2563a9a90b1efbe662739ac5e37539ce9d5f160214173e27a7bc2011a3a45843d36
SHA51289795b2cc838cbb50a754a37ee28c813dfa5c1341a8d57ca7a2c4021fc5b38f011132675392e2496572666a0b4dfbb022f7789bc4b406ce86b88990f4b26ee8a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a