Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2c492031bcfa6dfddbcff5077b5c9756_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2c492031bcfa6dfddbcff5077b5c9756_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c492031bcfa6dfddbcff5077b5c9756_JaffaCakes118.html
-
Size
31KB
-
MD5
2c492031bcfa6dfddbcff5077b5c9756
-
SHA1
975de7448d2d867429d48625093c6f19f69e28a4
-
SHA256
b60a24be2a6f26701c75e4c632cba7ee0386511de3b111d00386ca93443b8220
-
SHA512
ba5b93c0d60171a2969a42f1c1ace2628ac8820ee3081717775c7c295751d455eb05d1f17952ccc7e88c378d4a305de9dc4891da5a4450c039652c38ad9890f3
-
SSDEEP
768:chpUVtJGuf3YpCCfImkvSRZx8+xlCJ0e3xyPxqV6sGHK7md8gc7tp9:chpUVLGAYpbOuxMGoy8Tv6a7tp9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f4e3722273e437a9b2a2c7c5fa01d17c8186033df511ae0947c0e12a2c0a9c32000000000e8000000002000020000000afdce03dc227810fe5f0582a34bba943f0ac455d4e3a046ea1754eec065c290a2000000082f1b4528dfced7aca5d3cd4154b4e0d2117630ad32c3572b40fee116b35db00400000003797abfc93db5199a5664d82b1e955aeca7768701f4ba8b5cf219cabe87786b6dd6e5c9cae291e224112896f7c0ff55b78d1ba06bfea5624a3a96c370e567ff8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103d1dd46aa2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF862701-0E5D-11EF-9486-4AD8236FB259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421460102" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1732 2208 iexplore.exe 28 PID 2208 wrote to memory of 1732 2208 iexplore.exe 28 PID 2208 wrote to memory of 1732 2208 iexplore.exe 28 PID 2208 wrote to memory of 1732 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c492031bcfa6dfddbcff5077b5c9756_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d1ca3f31185350c5df099c28ade8df
SHA1978c6aae00aa86df895e2d04aa968e42e2c98d99
SHA2564eacdeb19cff48df5f20d165bb7d192b126a08a5c70f462cca54e6db7d622731
SHA512a8141098d9fe8abe2cc6d8e726c5c76d55eebb37ce3845cb5e2367dd41b343ae8be811f0450f941699d8a39978076fea18367c1c3af233818dc640d90b884927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e73659791db6d07048a186aa84dd391
SHA1d21f8f88c5f31b0a658883c336791287eef1b18e
SHA256b95b3f7a662c52676404fd1dc36b7fa0b31609b7e0de7373d76ea67ce511e8d4
SHA5129ecfcaffa1a4ae994f15e95dea530ab87e759470d31291b4e1b59c8beb55b937576313507305ec59bdf4ad1ba1645b37cd17f5ff2e2a4105fca401b5b8a715e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a230666c34edd59f8602d683c8b6f7
SHA12436e027e16f921f1f0039f8c1209c9373f71ea3
SHA25631dfbf4ada7e3a09848e8a154b66654692d800a17a5346d4c9b042c7b2e15f90
SHA5128bea0c9e845629e07cb7dce21a5e89bb43d592455c5a5d4dbf4acc068c5fc30da6e0a45d5a3a339f765b42d81715a0e16139e62eb77f01ef478dde897fa67d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b721730eb2e246e71a7d7189e15cf7d
SHA1b9178fb2730c0d4f28e1f901f912fd313b64f520
SHA2562faec86c358c7c76f6b2d191effdb4b66eb312c7f01fc9856f68826e0e2c72ce
SHA512d6a426e32db9bd5ebe619e4606e97a97f45aead35a2400e2cb73985772c5d25b9f073f608ede98e9c1d881e75cd3b1f587650caa1c722711b23055aef1cc050f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567af8aa6a3e66eaafe10cb4b9691c685
SHA1b20fa03ab25c4d9752569d09483b6f26bd49d767
SHA25685cf08b09906365540353513493d784ab93c93a543deaf6bb5d10e56cb72a271
SHA51218a5967c4723448bb0f289561969c59776610c05671b1ba54c3950b25105a002ca003fbddd647df8b6059c6be4fad85b08cc666b00f3bead914ca5dc1c4472c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de27351ca3daf83980b097994ee2da04
SHA1afd990de0b74eb0b881f8b48a6bbe20cbd1cad9c
SHA25653fff85a727ec5dc0ee603207db21871223168ad3f49bc5ecce38e2fdf278f2f
SHA5128d51cdeb0110af5c52a1c3a91ecf49606fbdd146ab1cb46e63ea06357f14a2f31fe51eed461a96f2842cd3f991854b781453574869e728b1aa560faae092a68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e73e2fbec4afeb12377d94c1e32d04e
SHA16296e233fd66dbe818315c6983cfed5ee988894d
SHA25644f599defe0f23dec7d95c869ae3e14d2d9574dead5cdc7144f214f7474cef19
SHA512e700e7ef8272735370fdb7ed0f4f35ea6505579db2cbb6f81de1a1798197e9949b0ba54c7dad131b431527242005bb328ce2f6149d11b4369fc4f86a774d8af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f3aa204273bbf9322f71e460bcc6cf9
SHA1f807beebf14cd0e4384c767fa2d413861b35c2e6
SHA2567e915ab4bc2c9e2465293e714b8b4c9dc63342f78a4a6e8c01e2b0769df7e8a6
SHA5126d1453907e321b5c5199996a36ab3a9fce772f3806dc48e7ddeda1e9b590b6620f6c9049865284038ec5253b318f6d7e28a78fd2a75b56338a57a2ec619d4338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6b3a4a7064ff5c986730cbea624e87
SHA1bd000d8df51d705fcab5c2e6c8fd2566ad17a993
SHA25604db7244aae27fd20798c006834e5a620bf6ac47ba02e14455756077b4ff4acc
SHA51208d8bf47913a03620c2dae3193493da9e229b63022cb4c617638ac6109c8991ba6bc896ddcf363dcef1e0b19832e0219451bf2cb6b11c5d865ea91c563b75d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a0cd19bf43f9e959cd1bc8b00f3efe
SHA1b4d09a4ceb5cb380a890da9cac2174adbaae867b
SHA25644643097f85b1f84db87bf0e25398b38baeaeca3c5bf9887faea4fb32604c674
SHA5129bc6c211a6f7777651e4cff92d5b8111678735e1eb2201d4d27b57b9ad0eb6f3e7294575e3adb500e12bde0ace3f3554e36b6a7bbecea31eff004b3fef8c67a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599bb3d2f8a3f997f7fd23ff63910649c
SHA163da0d5390c9440f9952c0380c0f45cb9a43277a
SHA2561adb06d6fd82c41ab52e56e4302bec5a6845c58519f3f51a764973957f44ca86
SHA512cb981105e428bd9adbad8868a106941012bf167aa35e4244bfacafc3c8584127086c0b5e105fd0387d66fae2802b2e2924f55be1c357bc8ed925944b0bf7e781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cca1f8a9d3cc3fb4c067f6e6de62465
SHA1b9f570a552e708a36f17bdf9cefacc1e147f063e
SHA25670d5486a57b98ceed41542ea9b62b21aa0d17449b5a4af638a59d3caf58127fe
SHA5125622f47a064bd45e2f098d6c7ac797010687249596750cee33f20b31811ab70ac40f27b5351186ac94a202990486c884daafcd1abe95ba833f0b9e1598854340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ebf57a025896f9b810b06d266cccb2
SHA102012af23c61b1240db9179524bac5d58d9971ac
SHA25608eb1cf50fbc67e11eef484a3dea99f83a8c0b71a75774ac1da130a00edefeca
SHA512cd8b30256e306bdd6dab22ff2b2af79c23f4059db165c0666590babb873816153f4047957b27f61843b75bfbeff716df18ec7807987e3e72e29b026964c612a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f22e8ca2b4fbd7f017095bb86875833
SHA12e8f576c7562fbc8236734b240021f046d9acd66
SHA256a4a3501b9a68e6b322835158291a518ef6e5680fdfc50f1ad7166f25ad5dbf85
SHA5121ae33ce36b807767390c7e0f4d6b8bae5f2b81db31fb6face266980ef603f0519ffdbe7d0a9080675b21255f9cf2470de7b541e7ff34a885fdeebe756101c141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0eb5dc2e5911af841e125d0e55fa10d
SHA13ac73e164d64e824aeb8f9063861d23aa0d5e524
SHA256850606bd2b0a556b8024352546cb8c293b56aceb6d07b34cb9363cd4565c9cd1
SHA5122706d5699649250d62d24c1812ffcdf770b8ed0acd411c68a0984f43e156e48dccda43bb1412529088b62b32a4a2a1415919cb129f555b5444a86781b767f27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503dc293b22ddea410405652ccfe06930
SHA1b16d5c90816d24eb19ff689b9784ac950e4c8256
SHA256b3daa423c057c6d12e770a4dd9e3ef97c3bde0540c01207125afcbca2c021d44
SHA5124979745a8edcb4381c07cad7845d4c975177138366505e41c2df2b6f2e6737a7745ee0d8dbd2b28910ec949fbb56b150381a430077d1ffe719e5e84af6ee30f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1e49e4683f476bd650af104f11a892
SHA1b92c655c350ee30ad96dc0b9a7ef38b24c67ea74
SHA256f5aef496d8fd3674b114e38d38aaeb867a12c02ea5a8b8942bb1b6c6ed988d22
SHA512bcad276b1fbb1a0fd544ddacfbcc12706b644cb1c9b2a31b742476170d6cf6be839adea51083aa81b3b5a485092b5575f8960f089bb8ecc846768ce735d6d0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8f5ca7e045f67dc0189430125714d2
SHA1c92b72186ae865ff19e750a749d97850b4b604d2
SHA25648ed767ec9e22128db710d64f48f55b3e7f42035fe06d7ad27ef89a124aa77e9
SHA51227af4f4b92d9142ee78e12d85eaa8e27a97e9988c4687ba0463cbf8d4b045921ac138e03c88934f9c3d35c909a0cb0936f185a5f7a7437d74f73dc2757e53bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5266b5af8bf9ec73ea514e88fae28ef88
SHA19a3adc0b5d6d02deade65d002bf082a990a51cb4
SHA25600f6f04d4280c472be4c7f7b2366029e1a85b2ae72209e99f696fb5a94c484ef
SHA512c6f2afe288177c286ccd0346d4596ef3e0a2788dd3f5382f93f9531aa09352a76d810b548228b2973515e213593c785f04d66714b3f36edc2ac1fc6e13a72692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d099202c7142dcaafbacf5e30cb61a59
SHA1e17d7c7b62fb573d88d039cb57f10e2c1f1412d9
SHA256e46ed698dcae4c4e159db880eb3d60c4c36fcaa86f0f22a7f7e1cae3108677ac
SHA512dd340716eaceb165ed3f34f8da5a55b6e097d9e498098133147ae1f2ce6c9c78dcc32fb62bb0641f24cbfebff04f10dde621353bee1184729db0863a5c3d73ea
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a