Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
276d56e18c1fedbdf8bafa4e03940807_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
276d56e18c1fedbdf8bafa4e03940807_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
276d56e18c1fedbdf8bafa4e03940807_JaffaCakes118.html
-
Size
67KB
-
MD5
276d56e18c1fedbdf8bafa4e03940807
-
SHA1
cf314b99f984bcb77dac393fe55c1d9b028e257b
-
SHA256
76327eb62be44ec20aa292b9563284a07f6a1e421f41fc8625fc47f4d2938952
-
SHA512
ce17ba2f1ec73beda40d173e88ba52540c097651a24d473c8423591fad0851a5badf191789458d127232c178516661fe730952990783cda8d5b4ff09f55909c6
-
SSDEEP
768:Jiu8gcMiR3sI2PDDnX0g682LpaKvoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JPHMd1QTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fcd378a7a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4388961-0D9A-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000673e8a0f527fc21ef64f1f88d6579a76b5494b404d7921aef8ba0ae5eaf064c000000000e8000000002000020000000560fb5deceb81c3ac506ff49d066041b83babab9933ceb77a59020b568e369f3200000005d4fd04aa2fa31a79b6a560de4b028e197912f62f4197487a19bab4d47139f26400000008111467d2decc84566de93debb86c683fd326158bab8977e85fafdabbd19da820d660a41654aa0a71fa44bf3047f7fccb73f4dc9482ed230cd9a28a489ffd17a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421376197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2920 2428 iexplore.exe 28 PID 2428 wrote to memory of 2920 2428 iexplore.exe 28 PID 2428 wrote to memory of 2920 2428 iexplore.exe 28 PID 2428 wrote to memory of 2920 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\276d56e18c1fedbdf8bafa4e03940807_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc7fac3a14302c40e9e29cd57c482407
SHA1f48a77004d8a378c4cc7fc95af3c4897bc1e5f67
SHA256eb790b7c467afaf1709ce3c2f8aac28e0bf9839060390f4bb1055a2d4de35736
SHA512166d1aeb581ff34591cb6755079c2b1825ba4dcee7b7e5e8ec74011ba955e573608459cdb930dd61fbe95242149b16ec6c9ad5f597aa3df7c4c24ff94d0c0d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc4126dabb344f4cc937ad31a9d1dda1
SHA120fdb4fa5714441e32f6f2a8d06e7e7ed74c2d89
SHA25613b756b0fc5bcde3d136291e99d406d7a7e2884306131873b54eab66889b9694
SHA51285281fbbaa1f94c6c80b56b1d3d9f29a4028c32d2d3c771e3162c6b264375e12ca683b9b120c70fa427343dfc222c3d49b64b7a5405a0cc1a3e189ea8093cd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d780d53d08ece373d9c82abadb4949d5
SHA1e0bc4044ec69504dd5334c07a18acf113a41b73d
SHA2567599f22e29166d7f62d18d689dd11ced6d2de883fba436bbc1312380ce31ef0b
SHA512133a82fc0266c88a93c2d12e93d0d164e408e6e45662b4de4d4b7798d2e4bf68ffe07f5ea617ce4b0fcff3cfd32d40e6537dbecaa6987740df33eba04b36efa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc41e0f7ba7e45766a1f1ea828988aee
SHA1e939c64eee67db90032e852d840592d4e0917169
SHA256f4c3b032ecdef3a1d4e64106ddaac208472f73a0c7ea2e9f859ad8ffb4dd8a46
SHA512a2ff594e66a5d8a166abb5af6c39404de62fa9de4905eb4b10e9edd85dd2cfb63003c027cb2eb44683b8e291ceab15d388684c0f767363c02b73cf36af8cd6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5542013144775c244bbe9deab0f1750b0
SHA11638732ac84a1c95d1b4fdfdb91849532b8a307b
SHA256096419c548ca7d6eb8468035932be38ca8e6761b5264638ae944430e62b6a458
SHA5125809c770c1bab0b4f2136c01df22f66e44e178a0e49d82062872dd31822a365e239f6412bbfcd305fdf496e2e66903f8abcb9cba3e4ef887c5512fa364cdf2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f5e89f469e7b4f0af20656b8f3be8c
SHA1daedb51745992856b13800bf3fd072a965e3b91a
SHA25682364f21657182c3cfad6edeba0948816f0b7c280bf675e874f060b429599bfc
SHA51229a4e6d7de8fad0c51a4d3d02712b4ffd8aa3cb7dc9414cb5c518d63f95a7638149466f1dcbca146c70e689c0ab94ee8d75b0377db919d93ea2f54ccf290a73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e6364b17bfac591d281d893ca8ad7f0
SHA1c3421d159f45db0e0cdbcb36ef827fe93bd8bd91
SHA256a316f7e6f20c4b815b2f1510e18e738a5b86b038543a1b7bd7a5e12d7c4545b1
SHA512b7c7f28b324ed3abea34c544c3faf24e7fdeb091e92f2e17a389c07e2d71df502dd27d7a8f7423a5987f3d029861257f85cef130ac8e248f8ddb85b57e20459e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26c137e5edd053e339df4d892cf34ba
SHA1aca6ffabc723896e65c5d43f6c495063bec0ae06
SHA256b5756d1fe8bf504423f1a4176b70c4532c59f9526f776f698a406811842fc306
SHA51226c7ef6b3528240a5a1690c053a5e8713b7d8b437586ed523aab76b01470bbd4a2461625e924adfb9326264021e248ced4fb903c3d932b261ea7f9dd3b22b957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9af1f8326107ddc0df30a904445b35f
SHA133b3ae5772f22b68902028b843cb3149e781b2f5
SHA25645b037a0e244c0fc087d588895ba010b275b3503d7f954ab58bce5a4a526fb93
SHA512f1870c17addde79d7bec2e198bb68c6f4ad5ea9a99561c39bfeec5daa1dcfe9a78016dde76cb35eb17e7a7b4629050f3fd5acaf8d0f3e3efe2f949559ee18d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587762a142315029c9f917383394e97b2
SHA1eb66b75e4e18952150ef251d8b50629cd7829c4c
SHA256fd255c805fa99b17396b2e21d6fcc478c61d259e8d312a60150b5bc1170b3d57
SHA512cb8341c4a0b81f09f3a26dc52d1c6011def57b821cef425d36e07cee01ae1f0c6df12e54bbf6519d6e753c021fc201188ae9e4bfab1bcefd3609774ad6132750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b2343bbba9259833fd4fa5a224b5714
SHA110531b6faca4c752151cf295195548ce2824c51f
SHA2567944fdc25e1e0830c5643008e91e66cb53e5af5dd419569c9bc0dad97115d0eb
SHA512c408cf44a2ea338da62384eb8b988aad1818d9b4c135048a0c423d3445a9f4b88794e57fce61bc6d714153c62175edfdd2978788352f03b02605ef6411fdd978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cefc3420602f1337db79e3c162d9e5d
SHA172775550b465c8066bd648b3fddc7b3e749e1b86
SHA25636e00bfdf7e53847b51f98f40c859612493bab609d072f3cf81c08e4254b4f72
SHA512319c22c443b445799abcedcdda8180aef59b31d3fcf5c91bd743e0c996da04f74c696b5df8ebd762d97e660830ef0b388759f4b12919b7c206596bec6099c32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa97bca4ce8d7e4e6e121ad7e47f0700
SHA11eeac3d0c9f0920f7cd8ec0109ba99da7a510778
SHA25602cb6f2cfc1a9db68ee9aa0949175ad635528c4ec681e544bdd15e21f261e951
SHA51278aa620cadaec44de295e5d3db1f10ae4194e1cd443c149f7e90c70493b831d844479e45edbeb64d1b999ed3040d0b1fa75f899d1d5fa36d668319f327a63538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e58ab16c1492dfefe2c463626f968a
SHA18fbb22c48950f36fc09b095811ea69a7e90113d4
SHA256b0913e564c5fd775db38006fcfca45b1a88061d17031c758e184b8ea297a7b8a
SHA512dd0225216fd0b96afe0bf5c008692e8ae6f6e8f94469f1e7ccfbbccd9f93c5552ee4d41b68a2f32c7165cbde13ebe88a8fb2cc009f66c3ecc8b6f56020d1a704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c408e65926f498d2ecf84b8fc37b09
SHA1d405fdee228e97e72d137153d779977898455d31
SHA256e03233312e8f1a5f30542ed223cc31e42998c25aae7c15d92ea6153cdae896f9
SHA512856cbb9ec31de7ab8d970c2dbbd8bb42e930cafb2bd9d86e57d6b3d53db0a40a001ce8d106788a6cc2ccbca2991111270c6e231cb1b35a5601bc94abc6eba40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd29d8103226291b0f9287e7123eaadc
SHA1bd95951a30609e56a5d6eb0161e082d8f8236881
SHA2567fdb45774faf8ce92eb1828887a93ec712ba0ee0a0da533767a1c3e4347b6122
SHA5128cc6d3cc6bfdfeb8df953e40c39642166f2c95572b5a44a07f936879b4a4250eb911b44f56f4c24e7ed9ee65559b1fb205b11ceff12a243d6491a512eaccbfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541db6e35067f3bb1ae83ac83ff649a44
SHA1466bdb402293bfdd81cfde8d70d36622532bb3ad
SHA2567512592e4d841ee8ee821d20fd1fb010cc33dfb77331c7a6450d37810d9e845e
SHA51205b64afb922860d4b38ea4b7ec84c561654d9eb1a9d0881d5e923a6f83ef8976977f1319e5a6397447b5202a96217e528eb75db588be4eaecc641db297d4e271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535dc0d682eeb407b951ddcbcc5b7262f
SHA1f59c92d54e227935963d4f5e4fb384ea02d9e38e
SHA25605fbd5e5fd198a8c5d1355e8285130c8e60b2e6570277af9bb6ff8b7481ec95f
SHA5126a8cdb856ae6d466b586e7ee3eda0797e6b7375937bd2171ffb7f863b280e25e436db04c9eeda5237f29688780ca0aed92204e9111545a680163eaeb220cba0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eae9350e744fef9d855b93fcf3e84f3
SHA1c4eea9852e530a339c2df9d2dcc467a4d21b98f4
SHA2562182647edb67c8b3a473439c829c46341f0f833f27be4469d623666bce988438
SHA5126ef0e961ce559a3c2145e82e7dfd3e3ced915ae2729ad8b80b63971368609bec2cf7c90a3052a226be9835ac0d8ca1fe10690ea4cbc3733328c6207998dd975e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a