Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
-
Size
897B
-
MD5
2907375ca25817d22bffc0098b7a9cb8
-
SHA1
80e8a52215ae073e4c75b2e37367448a6c025eeb
-
SHA256
81ef074419de92f4ef06a02d17728ff65b9abae7f558d6f8ba558f158583d7a7
-
SHA512
9e4f3a96cc736a41c1be30f67b638dc8ce2fb807a95a8f078407214f5a6fa7ebfa027cfbeb1f3af506418ed5fd36c7332217cd21bb7ede25de7fdb78c6aebbe2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421403503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90026f0ce7a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37DE2E11-0DDA-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d7b2b3b5b5778f41bcf753fa033394b2f4342675085291950358852d66d89ca8000000000e80000000020000200000007982e208dd60360e267e4101f41d40bae1adbb52285750501dd19524001f7995200000008816f080a0420d955c55705dde3680576edfefbf440c48095f47c4b99a12c7614000000070a2bccd9572ec61b5c639e733dcd67c5ed93dfa8e93dfce32f1866dfa37d679b2712a0478baeea8e82d718e4d117e34ab60430dd8b3b79f0472788f3f33bfaf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f086005add4079699b2d43c22249bfe
SHA1510251dcc2ae1695066fe3de3fc4c4cd0606ae1b
SHA256cdf50f152715e50975d7611080054327f2174a493e08d17f8de79c88780e3d49
SHA512c818e16603a13b1cd7f6075b1fa74eb5aa269fae59b295e3936cfa6e5dae08c1efb866922a922d42b523c9ae6ab4b70b1c889138afe7205e5910bc02b1282a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54597d80fde12aaaff42fe484be46383e
SHA1d818a5fce78322bff0bf4577ca736fdb50d5b146
SHA256dc86d3e02743c7e92563840e5289660d0d72078d8d3936e435e18f03956ef123
SHA512864abe615a51745a9c44edc83ec6deb20b6e09b4a5449a42a25e04604b4cb9ae7126a489a389f412241328e5fed67ea52923a1569229897e3de354367f3fd123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575d08d85584f51818126b0b10be70d9b
SHA1fcb5dfde0ac4ea5e4db6050d47d9f2e19b0ec265
SHA25615e69cd21d21a13890e966b6e1bf523ce15ac84846ac34e24273defd58212c65
SHA5123ef6ba8b07fbe845b9ab8a3f0f8988c01e224b7cddfc8f4bc8bcb0470c6bd1fbc2e2e2ce29bbfe0302c1d9a9b3a1f6b3213af5ebcdcef37b62f531eb674be2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa1ef624e981efe4df5fe0a8ac0d688
SHA1544771a1a3735dfcc470ca8ceb96c9abeac69035
SHA2564cf968317cc0927dc4f3c4c3d1217e0ae583d8675695a652579cb2f55feadc37
SHA5122dae8c79e1406038da3b713cbf1af427152fce27e835917da02277fc0059bfe00c80d5f227ae213cb0e80a96b8c21e6ce24a5586aca5b18043745d3a263a1eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5395d05a4728a9245576dfe162bb1cf3e
SHA13667673f1c59d0a6891dfdd214ef53253f08b3f6
SHA2566c5ba66558b1c4bc6ca2ce5118753628f9cd7805f6031b6096cf64b17bc39cd2
SHA5125bd0c82b5d2a601b731b2877fe723bb9c1245945f28bab13093f4bab9becc4408b4583148e2f02b1d1d1b1eb8893d4ad3c2b7360d146751ba60d8b113a6df946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce9f1b79036c11fa257f997bbd59938
SHA149f473115941d5312c0af0e123312a385d0ed95c
SHA25612df3df64be47c9a5d804195db9b4e7426e67a53882d4cc99a8887a14292fbbf
SHA51210469ef66b71bec58015007a0898fd3c98054dcb25a68095d77607fe90883a07f57c148b4e192d46e9e799b93cf49eb0a07a5591ac29208f09631f2316222c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e76f189ad0b4130de0f93a5e0e60c6d0
SHA15cda3a83b8d6fbc472d0ceb86204735543a224a9
SHA2560619c8cb8a28b6719ad97d8899c35a3ead5b1499b4a316ab5f8f6babaf36535c
SHA5124a3686f9da948d4c027fd6b46945b37f2873d1928392cf2accc4d19d8fdac62d247910d1b96e63ab41448c519c363cd2e04fcca0af8a93555a8d90f0e7a412d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a3d7fc05e528017a08eeffa00e2d43d
SHA1c14c0b6b3289bd0d0b0889d70be18520e72478d6
SHA256b8eb9514fa473f19d66e95fbbc05e12ae52b551a124222de80545dfd10046604
SHA512fdb102d27be339450651b71c9436297910f20649f2328d4175df59602119a2ad04b663439ea6351a0807d8e91accf8653c2626270a42e70133198798b50145ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3038eeae340f4e87ad344ce086ac1b
SHA16a42ddc97f0a2390d6ba3ba1365eec6f5398ed26
SHA2563b4bd1dee6a840a57195faf96f03dce504707fcfc548395c1741586f5ad968ea
SHA512dce3f2eb1381c0f87b9c84a1d238eb8acb5ee33fd1ac189e08c4d385ebae841eedfc446db9be4d106d138b0b852acbd2f0d5a2e5c3cbeee81fe5776273b15950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516809d031630b6f8d82bcb8c8500b220
SHA12efbf1cb3043cc686c50630e10ee0f059e145c97
SHA256ded1c9b0cffce24da6f4f2eb54cee51abbc32a6c56984132388a10d127f8aaef
SHA5124e3f6003677b2542a7c7fc407a76ecbfa27ec9df3a4c1ce354b625132f60513a163de3692c7a30f3a9931ebad329db81cce1484af7d32fb36347f010b6034b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511630b9b1698949ceaec1c33dea3e929
SHA1b29548fbf9f6eb66081769aa566301fab9a69005
SHA2568982f89dccbb304849923c3b40fe71974383014cb7365bde49217aa13b5ee022
SHA51215c416aa5c568d7babf106c222971a4a56d08eac0aee7b795613673e5eb8553e4f6f9b1bd6e95ce7101ccd7dad0ae6945495a38313dd8b6e4497048123571f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b84351704d0536f4d8b4a7b7df1570
SHA133cbad9c974998ffe3322873bc4a42c136eb1f1c
SHA256986ab1f1aee9e84a63930451309452df6c5e93bc693c95a4ece22b830a73557c
SHA512a817e81d3a9fdffbff1cba1dd8878605fe8aa52ec200510703c4336d7daf7e63f2cde5e9360312de910c5baed74708c2277724862197f8c53a8847712178d627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567276df75c0455368aef2feba22fa468
SHA1f85dee70dd9f60d433142c5f9682dd70394d8ec2
SHA25676e48cd9d0b7d8c4cf03c66abdca6c6dcb8705c481c1c4a832f5149652566fae
SHA512cdd4ffc0917c0fe6c91617c6365db10b2afc7f11e4fd4b6aa36793223c3df118ca3bc540da12edfb4450680b84cfbb03ea260680d345890995188d8c29b45b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e458c24a16ced92087bb1a37776a929
SHA10c6bf32ee289c116ad6e18e715a468836c65699f
SHA256d52ac3942539d05ddb1ed3062775b589484d107f4a79e9b7776ed95c6a109f29
SHA512b877223a90226050c4d94b55f4361b31c7055c1a95568c3563a05b3a3f16fa415923ac469182c040eb5de9ec96570c1315ec939970bccf3cc251b6a52b5baf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53298deff8d7fb86316ba8d0a85cc27ed
SHA122b8e605dba8ac52c1ea6aaa3298128b0df12bbc
SHA256ce13bd72ecbefc13c89b5bfcbf85c72785aeb3f7ecfe0e2dc1a0ef0de8224a71
SHA5127234699a7b61027ef4784704d3ec4ffaf5e16cddca31b013ad9c573f1d762de3b8f94d4443305303a2ba99160b40a22260410c3361f4f8dac10c6dd7bcab07ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5172e9485fb92067568048fe0253cf4d0
SHA1771754512a5159b20990f025d037a3b03b99a606
SHA25629f3e820a1d27048c9bc3e62211ad72cbd2559bc21bd2a6fbe9e792d9564caef
SHA5125ca66704c02fe2016532015293a70caaa9939e46abf088f0d4e49c68d2ff4385704126d5a5c71672b625fe681b1d33e6a22c4346d5d52fbf05e195ff70c06d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54685eec4eae4c6a36ba927cab7a25147
SHA1359a70bf2e304d8a0c48df07e717d56a0ba69835
SHA256593ba799c1f7b56d8d4772151cbb1551b4661f3c843b60383d1e28f6d9d6f064
SHA512cf2164a149de5fd41b0b187ff3770f7895d512aa90f4854dffcaa566a26d926cc3eb386e7b74199ce595d8e2b3f5a308f0bc5dd2217b9e5ab79796ec4c88ffef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44c28c771d2dc8917539fd553b79f20
SHA16e03a809c7f05b8c4f690dcd681b9e06524ed29e
SHA256b60d63907d785508d3c67be770a6f75c447ab69a2b5538a4d325f24366721824
SHA512422b1049e1448c531a6e74930093c31eb15978e745dc195f014f535029a2986a4fc847f0123ae29efeaaa0cb3c6d54f1711cf1c25f0f1951eda789e63ae2cfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3a82d8ae886122b4d53dcf05391e1d
SHA144054f26ab092af05c7852f4ed5d2c21153c2518
SHA2566a66a1abf4b1318a67e3ecd6c0f06e608967bd8e2bea47b634e4b160027f4d9d
SHA512a4fb3173502c6acc30e195930c2cedea4f5cfea40b7940c52ce4f6536252bb5349fccaee4ae32c8c961deaad682561a8a57299ea51d9adb3b8fb607f564dd8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6b35074cc72750470e6c4dedb443ab
SHA12546b19aa1dc04a8765d140c4e113b51462252c9
SHA2567203c07ffa9bce918fa8e1c8b471467eb955839dc7deef430b4c8518c036b6b2
SHA512a90f326ca4f90c0dab49ebaa872688cc461139f8ec0372ea91d0235bfcfe897a78424f635cba75d4313800f614217bdc79cce30dd813b51b701d696ca776c89a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a