Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
2c1af26abc0cf7a90c3f043c864933a7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c1af26abc0cf7a90c3f043c864933a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2c1af26abc0cf7a90c3f043c864933a7_JaffaCakes118.html
-
Size
94KB
-
MD5
2c1af26abc0cf7a90c3f043c864933a7
-
SHA1
ca02ad3eaeb11ce657131100f22c2b4105f206fa
-
SHA256
3dc6a639c93f6166210463c632683eb88a3daaa8bc266a445cf866abd1cf4de1
-
SHA512
81d3bcdc6c159843108a22840d92b3bc4cbddc08aa2c1dccaba50959d667597fd82c7bb33a93af2df762a924f716d6541cde5dcda1135954bb775f68ea4b6efc
-
SSDEEP
1536:WMLiNVl1YWkk9FL6AAn9f9ZM2+Qp7LtqaydQgZOBdkrY8mgHC+qpEyW:WAimDFBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9004bba563a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005abf8c66c70dcfb5c018726bf3d3405351481005863e632f6859889a129e59e8000000000e80000000020000200000008dc39cebe73b06ad69bfc02fc9f8c37d75fc72f1f43c95fa4228a61e1b770aa320000000ab8f4f2b94a1237e966c28acca252e04b91d7c0cba2372ed7f467dfed45d4c7f40000000fec20a57d31cbee9abd7525512e46bfff648f1489ee9a204eb7385983da2cfd92371c78e24083e145ff71a6810659a7d351a99325de56e18c206aab36a4c39c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D01FBD21-0E56-11EF-8C92-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421457017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1984 2344 iexplore.exe 28 PID 2344 wrote to memory of 1984 2344 iexplore.exe 28 PID 2344 wrote to memory of 1984 2344 iexplore.exe 28 PID 2344 wrote to memory of 1984 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c1af26abc0cf7a90c3f043c864933a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5666feaee978c85fd25413b6e007ce903
SHA1fa27263dd83753fd4a7b6ad5a4358acf2368e7e8
SHA25657b4ff1720c926788008c20e3f457fdf6b5a87aa9e2f4221edd9900dd87c437f
SHA5129713bf2044506117d2c8cfb2197064d70b6c2793f5668431dfe89608740d97854bf0a77e2db696f5a4cad31983009f7d8e71dd5b62d8db83d2562d95fd2ecfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349794bd7e933fabdb0660728e752e50
SHA1320b44fbcb566340e09fd83c712ae70f2a0c2755
SHA2564580405f57f85393806a50305f0eab9b13d5faad54d36a7faaebcf621b2536e2
SHA512cd1d1352d81597977bff79a1277f8d6993a4c9b873b7687f94218e01c2a4c6b6b2e62f619bf682ae200f89c18beebf75695bea4baa9894de10894f63d2dd53ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578c4f23d47ae2c5359d6b18471fafb21
SHA1196b707107d1820830ed4864fd9784641049a471
SHA2568dc798d06b2ed2ea7df9a3c9459653c9fade3a80992334eea40da73edf4be49f
SHA51208a4bcac2aefd0336f178ac49ad1ef386d49229bc0ee9bf18ff371005d35b9ed43bb19f952cfda731486d5270e17e9190154bac80edfcff9301155aa44582790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5093bbd29d5caa8ab9ddbca167d3e63ac
SHA1e2d4abbdae677d8b081bff61d2d42d8473790f67
SHA256e18a58ca0a9acf210c00ba84c645e268a10e99f5083b003cb57c53864190dd30
SHA512ca9562030b57535c53c695d3c9a7a4f07d59094b400c741b4ab7ac5c552044da943e2f5d60c25ac8ab3ba485a59bdb32c9189f430d6e216a6711383a33ea1575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f041ed6479c46db1131e7d9ca949f05
SHA1a9c186bcde05f9cd2ed08499f537db6a6142fcf2
SHA256e38ad97df847bce8fa4de69f693af1884c431ebe8d61057db12e2b25ad07f1fa
SHA51257d20780627875ef356dd4a28a073b6362c1fac95bcfede8d51b79aa460322e4ca118f36a01952223f2b31ed79d45930d61f2dde2c781a686fd1b9cdbdbdc502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d083417cd533ec62d8672dfc2c9e0e30
SHA1ed04544d134bd0c7882411cc0db4c1a2c8f19e50
SHA256a3dceb4f84906d74ad0199672ec5cea8f1ec3414715e926458b85e88be131935
SHA512c20f8805aacba4c73f5b028ed02207ff2830b24e2aa26ead15020f81615a3af818f1908c553362cdb4cbcdf3ce3ffff1b8da9ee0ca28cb539fccff52f94e5355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260c4f5eb5ce78c7d12563f8ff9a6ca1
SHA18e5bd85cba3b7e46713a1fa8dc931257932add25
SHA256af0e66bf040571a167ee2384cbae8a151f8bcd75e6578eb6a69b271ade2c4b6c
SHA5129388fcd38a53bd7e3b11d6d47c5e1728904d4c5942823941270d5035eb027b0b6ab50aac993dae32c477abdca5e04620c86667043cf141b7c3daf657c815ee88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb91d14ebf53b5aab5b1e2395e205e7
SHA1866f9d224e3d6ad0fa71b7b1b1fe8f964ca8e806
SHA256691e88277c146b1ac523e497a16b076b406291400a16e43e8f2b334e9e6b7006
SHA512879365d2e9b10c759c8b0fe25cf4bcf068541b33dca7ceecf53220eea2ccb433c5c8cbe563eae155a9dbf735d48026f28c223820e52625c3d78c6b2eab36d65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e1aa6705328f136c2ceceae7b7dc7fe
SHA1e539a8572587d9c317682aa835af480212ff6878
SHA2564e95afc17b6bbed49ed2a8cc6fcdc4bd4ff852c6cc6be897a19c1983bac4b59f
SHA5127ced5ac24a1a8afc87c1469372d74c3f7bc5275d3cb2654fb3f98fea212e78bbd9d626db51b76be0926492091578c2ab82d924e926f7ed7db515e2458d78b8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553e1fbc1ed269580cd8719917272646a
SHA18c961a259e88a31f60c2d1e79c9bc3fa9132e391
SHA256a770e6556632563a0a32b4c21fd3cee552069a4d3744f0f53f577d6b60b4afce
SHA512052f7b313b9ed084ee203f4039fa4748b23c641ea89a0fe92d5e3ba437120e8bf5e8fdbcf3a82c2543fed1e57ddb34f4c3b18004932600121ecb67fd23defbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45f359ecbeee1e33cda2ef27326b589
SHA11cbd0019ac4e219ecd9eccd1da49239e025771dd
SHA2569272d261ad71ab4e63fa951c97be978e33fdd84c2683c1041b6018cdd09a220d
SHA512f9f71fe822a80192648b8a23acde60cd9c5ff9000d1ace1ec17334304e5482058fd50f0fb2b98d10f2348032a280f90f33cebd67426d7a130797ed641b5b68ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0053b9420c3d73ba074e66fc6cb4020
SHA1c60cd596a09b0db1559e59800f1e5046bbf42d71
SHA2562052b2dc4dfcd44747f068fe85099651b4ef4dc1dfa359efe125d4caa0882987
SHA512ddd9ef0143f3a0d7c9784cc2b9d1388229b46838ed2b6c0533a1a749b18eaed90d363c334634cfdf7209303c695e4c5cd7e43f9ac873fc6d33899f5284c983e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ad135d734a001b1b2a73e4e9f50bab
SHA1aeb1634e5f72e7a2f508e9102d76fc8d07ed9397
SHA256336bbafc4efd314463eac0c5b7d4fb7594fe5ee23962f8847da580cc65faf706
SHA51244e78ea7c8540b6769010a92ccdaf0a50b29ae48977b2702716e2d69b8fe34f27e7ca1727c49ff6ff843a4124ed845abe13d7ecf3aad7cda6fc92a0e20a09519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d75a0b9b42641bfb3cc9edf8fca58b
SHA1f0fec6548ca95ce6be18578d156e400d9ad081c7
SHA256cc2fe3ee0ad70b90d5b53a92a263dfe473a87325646420fef710b3709e76876b
SHA5127a7e4fa792a7d0ea3534e87c1fd9e381d255b3e7cdbcf3bd85d58ef750337a100350a47af2f2f48ce3c7daafcb6ba87fb2a0194f550f33f19e574de9bb504010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ecfd3d6da04ef6834299cbfea546ee
SHA18428a3af20bd87879cc568b5d817e0f1159c65d6
SHA2567220acb211919fc2c8c39041a2abe54bb7a4327e5c9ea43a9ba7295c245ec1f7
SHA512205bdd5b0da8c4e77c74476846faaaeabbf71444b88073eb0161b47123af64e6401367fd529dae3fa76f955fde2cccfc0d8175e8c7ad6d27f0eac49b1a08ee08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56867eefa45017c5bf16f729ef7283cb9
SHA1ca2dba9314070e1bc6fdeeb9492d26a1747a7f37
SHA25632e741cdfde8ac840a2b9bfafaccac2a53d81b37481e85601046bf94cbacf40a
SHA51211ded1000444df909b7fc9b2e67868356597a24ac2b6e3b4a10e2c5b97ad2ff06f8be95911bb546e7573266d52b2d0799662eff6d66fbd71bb834b3c1573c74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aac80f03df878be9cd5854012d58b27
SHA13048b3c7d662c39f32a82d8d1c7f051072ff4038
SHA256939c223f67667a51c355954592f3543b8c70112452d4278825634d2ee67244e1
SHA5121eba019efa66489a7c4421e651bf41db4e56f14a68a0ba464397941382e2b087b30fd3b834b1a906f27f7fa15c52d44954b3f5a3ba833b145e21267cfb1d72f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3fcf401fa20c404ed7435b77cb6f7d
SHA16532fd6742a84b188cec325c0d29de7f00ee9e41
SHA2565b9b3bfe8d8f2c4071d460026f75439442b2db7faa1ffb94988f16624d57310b
SHA5127a557e2f396ba18bc3fb3831e43e6b0517f7359bc46fe10da7a177d54ab72903ceb47bb51bab077124818e351b94d153da60e81a6d3953b1a6e031727d4aaf95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570de833cd114c14f0d1e0d94bdd583d6
SHA19b0d4936e4a21758ac52711b08502e91c71cc318
SHA2568806a6f8051eabfe9e61824e1867a10d3e9bb232a6a09e75ca7ccb5fc28239cc
SHA5127310e5c635a78b634c8b8416c80f92e11aee46e6d7e504c498ff7f0975314060870ff1df35b3e85def42cfcb20164f79346ee8c60d87455bd0eb25671169ddaa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a