Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
29aac0d4cbd1e9186b0e129c50a514cb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29aac0d4cbd1e9186b0e129c50a514cb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29aac0d4cbd1e9186b0e129c50a514cb_JaffaCakes118.html
-
Size
839B
-
MD5
29aac0d4cbd1e9186b0e129c50a514cb
-
SHA1
29a6c788160ec70a66751be43cbe7450274a9f5b
-
SHA256
628bf4c37bf045cff5ab1b4224ee97dd574f89fe699fca30836034e8b0e3b389
-
SHA512
7d8072cc955b7e126365738fe2cef16711a2e948ca0fc67e66071db06573d4c5874420e4d9256c681fcafb9ce5549a8ac0380313730e2edc28e26f6719b5eb14
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04b3e0b01a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421414699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000084586c246a8dc91e1e95925106ef8ea6162ce98f47c88574042d686ed9d4f922000000000e8000000002000020000000dcb369ed5df5186ae157fca18c897aabdaeaae09d162d80f64f84b087301e776200000001cff33c7a1548a5e1c929e371ebd791687d49f570527e95aa8ee4bf96ed856a04000000059c5d75af6b28de3dbb8fb097b113cc1992c5c93a258dcd5aefb8553ba7334e668292824cd8c102537246ff80636fdbe35f0b9febdf545f8e80a41bf2d03bf2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47640FC1-0DF4-11EF-8C27-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1296 1548 iexplore.exe 28 PID 1548 wrote to memory of 1296 1548 iexplore.exe 28 PID 1548 wrote to memory of 1296 1548 iexplore.exe 28 PID 1548 wrote to memory of 1296 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29aac0d4cbd1e9186b0e129c50a514cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e9abae8cb52fbb19c29cf4dc69b9e8
SHA1a94a810cf0c99586108c78c58419f0b771c5aea5
SHA25616f13b85b90ccca8bf917116a14d4a8c5592210556a89c52f0bcc67755fd7909
SHA5124e18d6191db507d3efc2a2fa02b419e6faa0b1c1e8b2431d1b8f1e09c0d97a9758b108dc53f3599bf15d72b3b7208fd73015d511543d0e16af932e184986f705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2b87c4baebef54228bdd9ec8fd402e
SHA1db78403f51d96d3ca211c812d9601b46640b55eb
SHA25629069296b1f709647cbbe673ef2efd3e40cec2ee5e9eb37b7eefeb8eb7a90e14
SHA5129feaf95032e4dc1910b7bd1f4176f78fb0685c8628268c648b30a28271cba8cc4ec9ccb68c06d41d089c576d1f9953bfd0fa436bf7a0508faa300e4d395181d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de0aab6ce12cf0edcbbf1bfaff78d4a
SHA1e6b5a1466ff735b0f8a60ee9d9ea54f231362ccd
SHA2563b63f4420a51d326e1f90b932199a30f0172119ccd6750db0e411b503aa8870e
SHA51218f9d576622cad3e560d84948b6f55bf83f8160890cb789c2a85d8c533c0687f159d24f16541e384c211a028a1748d6e0436ba3d29266058f3ba19d1501e2516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833715d66bc4d8c1f872da0f40864252
SHA163add9cd52cb17b0de41de4732ad2a3835893b2a
SHA256ad9bb7d55e5f9e53197987e99958c760aba2fea405285996aa0dcc2a104fa17f
SHA51200eadee5e558f6c4433d4ca42fcfded397150ad93d7f4645f9d7899d5fe313e9c51ff55a219ddc52230be920b882441b61efb0e3d1eecf51b0a23fc4c568584e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c41c95cfbc3617443bc12c9d6258cc
SHA138aa13c55d9780ededd220472b61f2723574f508
SHA256d2a3749da5fe05f692c1608fd729330d24526e90fc806f6d7f0e0796b91930ba
SHA5125049a81f2ce167b437058f505fec17b473b8ed1ad5140e85c8931260814e08eaad0a5a8f0230fcb7c9e1363543c8fb832610cc0620d0ded7f3402422a5e9256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a1ecde17a7ec613f4f1a1ed8ec3a1fe
SHA1d0a015f92265e0978b8d3b80dbce78bb731ba681
SHA256663af6e47cc0d53f06604dd6c11d4dbce0d2c71a419d67eb63cc2f22b1ca964d
SHA512e6190b614bfeb814064291668d174b724b656564a638d6766dc45aad768b4550b2b989d441f9b612b9c3ff1365ed332b9f20801aa7ab0f2013447302aa775d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0108b26b2470aa6aff9fc6d32fd930a
SHA17369de8d3ab82cf7e1da2fac3e4f0712cd93a7a8
SHA256c61223a08f8169b8a6f29e13f78770bd685dc25c1851a4b1f74d44b7d92f128f
SHA51261f294ad17d635f6fbb3f5c260717f45a50ff072939d0eb400056993dab90c66872a509f3e466164f366b80ed112aee680e2de2927bf58b7fd65cb1c439b8900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527302eb565825acbd5210f44b9c0dda6
SHA12ccb1d8a183fa00857995ad2dab8245013ed8b12
SHA256cf2ba30571bffc0c4f6956bb11c30ef1ad254d7b943aefae1e86dc2b167f68c1
SHA512659cfac874c8e1097ae260321806881f921aa95add06c8027a3731fd8237719ac6f64929e3e6a8e20d202eb55ead1ec3c36d8093fc90a0bcd639b4118de0855c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae5eb64f1f51a19d9bf04f2ac4ec87c6
SHA14e150713ef865f2beab78e844df5da6898b52cb1
SHA2569ba180b7c6b99dec19a0a21549f6d09a6501ad4c852449144a69b937873a03cc
SHA51211116a57e23f71b434af55a51a88dc13f9ca57424200349fc9271f4d463c72f6da2a80d04111bd7e68995688a70ae151f7846685ec5f8a4d706fef8de0728369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5103c505ebbf93f4e540ee7d8a627160f
SHA19023820cc7d5ee59dc8ca985f498e7b15f60f741
SHA2561656d7f0184eecf3da6517c5b541a6533fc37eac747096951b7a6ae1b1ff10ed
SHA512918a389948eca17d98801879430c54a2b727acad371f8e476fedcb86424196bfca4300d383797d52d58be1f0a3237090a6c802e3d1911308dd41b5cbf54d83e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee808f538d67f5e6ab1c5e4e02eb730
SHA1d45d1cc5aff3f8663f780c70c39986ca36da08e7
SHA256f05030d99927670138006a2e99cb8c2a094c8f381dc0a581b342fca74f724d87
SHA512fc7975ea27ce267f35e4a2c3b773a9b563d139aedf989462365c8de697bfbec6161ce19d3d1c7dd6bc7d861e204b56592ce323c5992cf496df90a5ab59a15fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d74a2b6851adeb33c3f0a3590a0f73
SHA1c6ef4418bc1acae805c94e11f5f2a49a5583f794
SHA2568e9165eebfe9ddeb2f883e700f0d16aeecf4c3c61b860ce522df5df06f94446a
SHA512236b80c126e400d950876e1b0be224c32a2ceccca86cdb9355342c03cb14343b87ef76fe818b86eaf1652e8f68e62b5fcb90b9741e44f0aef6c595c3705e0687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b065177b806d0a3d1121b45ece53f5
SHA1118b17b73cef6cbd51e8b7e9c2dd56899c0c906c
SHA25670c5d5d3b26c9dceed40a1ec984e877a423dff7091c34a521478a70e66d28c31
SHA51212719bb2a03e795453dd243cd587a6c2258c0d6142cc815df177b62355fefca578e4913719f1fb4d05f9b2419431fc5388ff3a2feca3907b5cb0c051c45a4a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a4b33713540e4ce93ce5926ad24015
SHA1a0d53a11962e65430c86508b84cd3c98ae2c05b0
SHA2562f5f78f043edc3a7c123a2c714b9b466ba47337d6c1268523e67a8e8608f862b
SHA512343dda395c1e07e805174efbe18aafcd7112ec974d2e37e12e8b5d8756b87655e2a38dbbe5865d51c7542429698779e65fca76c6690b54845c7d5bbd55abb8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e31b8f4d2a2d2552dc7a6475a52cfd53
SHA1795a9357ecda20888834696b03d0e15acd504fec
SHA2568b836db1831f0c5ec9c726835c330adb526b09db159c79d9053130eb1ffa2b16
SHA5122f9ffd51b1d2fc8af5f7d58b5a4e18a78c1531804a5e2417afa8027f9d0514dd1b2db758264e08712b5a2bdcbccc1320f69a01af1e877fe1222bb719c65bc835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86386ef64cab5800b5113ada2cb017e
SHA154efbe9624832ad1cae11000d8d76d21beb74f3b
SHA256bdad845cc5300efc551a64a5cb8dc8d19c1a4e47e939e2269f75e0a7cb1d7d0a
SHA5128c4133d7354cec53f2f47f7cf82e9b515c222577f81c7e8887bf2b1df458f1fdd54b0a0bcf02e75a3e8d0f7663f87525462307efe0509bba9ad34c523dbe9c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8eba6f9c2f68f30d13eb2c75b0cdd3
SHA12f1e82eb38419ad41031646e2e43bf54143d0178
SHA25645731cc87b1704ba5be70640adcf715a2d255ebd6bca66202b620b9306c02823
SHA5121a1b3aca11e0e1505c93131a09f5a58ac9bfe44b55a6324a15c19d8926592b75b00a5d124f3445bd96c13912f2f925c224a4d0bf21671477df7829e2ea2f2191
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a