Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
2916ce041e7334c34ce4b9a0c580ec95_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2916ce041e7334c34ce4b9a0c580ec95_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2916ce041e7334c34ce4b9a0c580ec95_JaffaCakes118.html
-
Size
72KB
-
MD5
2916ce041e7334c34ce4b9a0c580ec95
-
SHA1
7779ebe3fca6ba52d798bb4d041032d5578e33d0
-
SHA256
267362d36a61be1a635a311f6edc3c795e2641b67e5588cc4a62ed98c63207fc
-
SHA512
91fafa856a82b530a37d704ced4bd10a5a42609d91d2bc3362925c2cd7877663cd8152cf0802fe903b98a9e1be265224d2c989f7636620e4421514108bd8f16b
-
SSDEEP
768:Ji+gc0YRdsI+mInDD5BLF0gGe7KoauZoTUTwC2aZMGMdtbBnfBgN8/lboethMRfl:JwAuuTG2c0tbrga9nhMAnhPW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000668ad82e4a18672caf7a1d77398b20097b774673f4691d5ffa8a5f05b9d257b5000000000e8000000002000020000000eb18f6fbd86a27fab8eb9f24371980ad5f5b2a036b468eb10a40b948fa5ed7cd20000000d5ff56bc1716d229070735df2a4a3f0c17695d26248727d025f162c7fc015b1d40000000abbff490c6ae8023384d607dd0f20c1f897f074fbb0e1b6c7c3642e9fee09dde85954066335fc81ff0e29240da95bce85130042412798768382b8bf2397cb031 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07647cfe9a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FABEB0B1-0DDC-11EF-BB01-66D147C423DC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421404689" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2916ce041e7334c34ce4b9a0c580ec95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4a224e86f793396eaacb1e90644939b
SHA1fbd26107c2dd7f4fc92d3eeb28f8c961af5c3481
SHA2561024eff430b4e0f67f6aedeacfebfe8fc46166b8e96a264667ff91a438c852d4
SHA5123ad036ff5a6fd19b84b822b5123a588f5b5e931e25f78ef3c192aeda3e48feee169aa975879c9717e3974d6c439f12b513f5c3d36474526ade0444864393b0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e979e4ea667d1bfe60d84eab444f63f9
SHA1ddbe5133a03cf04a48de09bf297e19f1449ce18f
SHA256bbfe004bc68010d6ea0052b04c0709c477aa936afc34ca2a78787c7346a3ded1
SHA5122a6149596a85db2c1a3be5805e4d58c2c42b23b9b657aa77ec0a0450e63c50da90335edb8c4b72dc6798900f3d1757749e422b0739a1bc93a08f77c52e9964f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e4e0087f9106ec42ee117854d2e52f
SHA1191cf92afab869c43c314f0a6671f8f53d7f0159
SHA256e32e550f78ca07f1a70e9124300907fb6d1a7fd6962d42d8cc9b35022ea707b9
SHA512212190b338d8609a3d15da90eb4d8d1e107e49dad81419ca9a617e5e2fb39ef2e1c91b55cdd4924d2bf3439175596e0f43aa27bd35bf11ccf00b23504dceed98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc355f0a29400262c2ab42465411a95
SHA15660bdf30f1335462451fa33eb4ca1d2f06e0cd5
SHA2560bb4a76fb1f1a983119673d7192d17685020e941c8e27b7e3ee1c2c7c9087b73
SHA512ceb33fb5a5c27abba6ba5c98c7d6247f7b294acdc6563d88c4c105a243d7b3091ffc8448d7597dfb7103c5fba885fcb95e1a3926144fcd02e60f7669fb3fa2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e30f01b5b6762ae8d84af59052fd0ce
SHA1fd29f76a3873d5d78beb725bc5a7208401bb1544
SHA25600ac677ada786e48bb4ccba2e45892fa501bd510ebb15a90394f8ca12184d097
SHA512d45b14e835d5a81c62e246d92032b2caee8d0d18ab73cc24d14c9e29a778505596b7a5a10fa6353b4dac4a697172c9c6fc4f7df630668085895b6acf0f7638d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ae66e2b16218e5b98509926bb10c69e
SHA1efb8093fe7f1ff6c29c6241aa6ed70ce2d59ccfb
SHA256bcf14c746aa302902cbd029f984d712e0d5bc7aae9fe6244d77dcade1e3a1e45
SHA5126eab9ccfc5ff7a40595a9858b6e29f29df530821eea83d9d862fcd68981eaa4bc4ff0f9337c1efacec777535c4b6106a0d68e5addf39096f8396798fbc6d01dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5072a386f06f523a07a5c2144d0af5269
SHA1f8340fdb15b5fb068c2331207881dcaca7abd3c5
SHA256d23e528ad8c90f74b1c3d992eeca8db2c14c47762e2787662beb2a5e02ba481c
SHA5125ace7eaf26b413af0d4a24d36ccf4cf33aaed4babd78579fe02c9007fe2448abb7a3f1b521dd6c5c08c9e61f7ea6d61134c07df67f7567ef5976d86ab175e16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4afc9ca351710a7528b73be96306bc
SHA1b91166a325b7f8bc2a644ce6eea6383c9f640f5b
SHA256e8d4381e2fa587fd792256831fd997310d4ee9b16765322f71dba9860aab0a0c
SHA51209c1394be304fcf52b054a37674b7dfde4199d6cfd16a92a1a14e05c1fef6a62350c26af42d71227913f5a46abe487bb02d7e19518e8c1928e6413537a03f63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7393b611d3563f72645a8b584a3d61
SHA1c8772749e3f582d3039c3aa465b8a2f980af4bda
SHA256d825d292fa8425761a8b195c6646d7fcac5a9c489e787b5cf17c28cb5768653a
SHA51214856b23eeb377e9c26a62dfe6ba1e16e9f4698f52d92bc2081791c3db6eba86fdd1c741ebd177c6dce780474efa9cee79f507cfae9c6cab9555e8e500d36053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152d05c9139f4f0695deab4829d13570
SHA127f19cb1a6aa8909a0b044e37b22fc77a67310b9
SHA256553466ee5ec65c9bceb0fa0bd650a841167a56b4a4f8480e47fb66927da335dc
SHA512425b244bec50e454723de8af33f60eb6c1a489407077cb7fb9e275a2fbbb469621de6bd18d8d569950b1b47d90d8914b1f1a4c1f2a1b272685d714f86abeebf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b955a173b9e27cb59423c924eca3139
SHA1177033dc99cbe7e008adebd86c6fe32246b7bdd9
SHA25669391429839752bfdc0191f9f7c52bc100d7351f3d57ff9b10778d0a5205286d
SHA51268b9f5b60b32db219daddd6a392077be052c3f8b16feb17290b203a3b948581135b4164e1b53ff387458960c23127d3b527329bd2d5fde6e9ce4d573d8980a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a1a29b9ce4518ace38fa96f6118d84
SHA1c9dce812199710fa57854e90cf34c718c8c3ec99
SHA256485a13ab882d1f6b3ed20b514a4d6b9a90b667079091ef350187df0531485864
SHA512a84a3697c7fb95742d1ed721b404764b6d5f5b482ca79eb48cb2f95b4b8d60089f14f2046eb59b31a0aa5d62ebaaf9921be0d7219ee949fb9a673e470d948cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be9ea841dc9a1b1dc91e7d699a86562
SHA1e7582f11bc50ded5f7a6e87938c28ecd64eb8302
SHA256592047a2f1b09fa21893e030e1d194cfb52eb276c402a3bcd1f17b15e2427a92
SHA51226a6496d6eff36b665a6564c375f1db26325ec8926cafd6b9dc610eb1c102caad9a7d93641e657e994b65aa3f0f3f27634f02bc47b2406f0f4500a4418c0f678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f49a499aacb6d824e17676b2730b73
SHA17355f9b8ad2855c745d2dafc4176518e0c9eb04f
SHA256b45ec7c9516b68cfcfca7c66846b72879d3ec445e8ce89e4bde59d35903c9567
SHA5126ec6db7113c5daaf2f236231d55720d740d578f3cfa33655aa85efc1923bcf4239d6f700fc1278f4a884579e7731cd3028fd5df9723be8cfeda12abe830fb1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566daeef00fbe836529cb9e03e88d50c1
SHA154640b5ed7ea1c6e693c1100214fd0e696076c40
SHA2563898af0f6671647adacaf6d8ef2ead67153de1f938463b3a1456ed9a3dadf60f
SHA512389b1e492b395406c7a7ce0b81254c6cb25d280aab9e341c1c6728b35985c981bc5c302ed30d1425b814da76b9692300120e0538fbd951607ea08d14fa3a15f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ff400c4bb164b690bcc25252fa8bf8a
SHA15805871f21f42a2d0480354a53894d6045ba0137
SHA256f0c68cd834fca80a0c28c6f0babf6695f7ab5ab7050bb599db79817beadaa121
SHA51255344cd676a8034e8aa1533808815e6341f74cff112241a18aa0062f74fda19bc1d0ce3d7725fa962cca19a0cd4fca19180240e6859dea34259ac66f224625b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fcaf5d9443d81d8548c65c2a63b6371
SHA188d4d4a3a949e2832f50c5aaf5f97bafba683033
SHA256134625caf5c1c8c4799ceca33dfa36843eb461b5c150a8f517910a21cea5e5dd
SHA512e2e52606c2ba84c6d4ecffee46ecfe79b1c73dad8c53731491643b41ea687709cbb584b2c72f05192b1851e094822f69591ac8a3f6a818fa837698b657a43431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293743aa5a0e7f4ec9899e5b5a73bee1
SHA1fc63e1253940c42fa9426cb64f7f7f28cc6a198e
SHA25605fc7dbf1ae4bd00835ca28cec7bd51382fbec7a78872e816589f8071375e9a7
SHA512b044d06eb662655505573b09edf2d4b18bd283aa7a95fc3540e7e46a659f8b8def56d03e1ff2713760c0497c5b7dd35c3621b80d33806a455d5b75c8b4808a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5643b15d35d97a82a4f6647eadd4ec3bf
SHA189f3a92c0e46c58553cefa85064e11f741ef393f
SHA256cebeab9436fbe4a5f166665ce9b599e75fdf6601083684e2b49ddcc5da923868
SHA512f82e8e691dbf8e5d79d3b33518b458d646a96e9c2b23de70e59b40b80620a97e3f54b2cdfdcb1812d7a2247494d967c16d00365a15b6651975624cf4b7b960bc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a