Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
2b0c9075448488a9cac868b1d812ec5a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b0c9075448488a9cac868b1d812ec5a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2b0c9075448488a9cac868b1d812ec5a_JaffaCakes118.html
-
Size
19KB
-
MD5
2b0c9075448488a9cac868b1d812ec5a
-
SHA1
aaeae3fecb3fd24cdc7f88b7555ef2f51321b962
-
SHA256
0e25e82cd7ff102f356f1621e16ffddbe59c9b1c27b5a22df1a009c15f182195
-
SHA512
03a5f6cbcd59fb6987a7e7e3e9ddfc0282813dfdd1c8884ad830cc8fe1a9172f4e983ba708b4e8492a941cfcfb3ee613b12a7c6f79a958dc50731d9ee7244afe
-
SSDEEP
192:SIyaxx08KWcWmbvycGJWly5bcBuFPOPvsBNkwqY:SIyL89JJccFPPBGo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cb53be35a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004f2fa0009aa77145743f2f0b77dc21bf459394cff8e34f29fb4719eb0c2b9c6c000000000e8000000002000020000000532b413eb51a04295d85dc71f185688691463cbcb2799b436bd66134ae2e098020000000599f3b3e6629d1440972d00974fdf1440a60828dd472dc389f0f0d26603644fe4000000071261631a94ebadc3e1e64763a7c5b036f17236d16d7ec07cb4588f738dd67ef8e4cae0912e63ec24f93ecc6e394bf4648e9837aaab6db71270ef32c08a53eb4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421437302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E99D3711-0E28-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b0c9075448488a9cac868b1d812ec5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d6462c2b4e631ba17ee9b7eef52b148
SHA17cb8f23bc7b10746eba723a6a4cc7e7b61838a2f
SHA25617337a3057aa6d8b0351a75406cb3e67a02540f3f3c2e8e976a3bc9bc57bedcd
SHA512a245db55cc8fedfa2fc7cc3a67dd323faffa75a2f18a458e5bf6545fbaf3915d3d3df0f0679e1d7f70ce4269dbb2967f6ab103e1439619f381f424e0e2e33d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca51e0636dd7f602057d7d25c4247c05
SHA191899891aea343c3de67eeab4c97d676afd55cde
SHA2561d9b3f7b5a8139983e543390c22bb1270ff1f679d1faafcbbefecd21c36b07b4
SHA5124ed4d2ffed60e1518d88b2fbca05eb4953c76b7f39682683e029f938b133133f820dadc7d28f8c32e19faf61ce5c7bf3ecffde76ff109e977167aa18f416466f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59244eebe7029a68678735000235f59c2
SHA1c468640bafee13aeae58996d53ddb9cb7fe49c7f
SHA256f0cadc5ba0a00ecf33c352566c0e6a214a57388738b5c04aba0b468c3da734e4
SHA512be8f5b6f22f49385409634e674ae22c045575dab499c1fde9b4c47b919de3e784519d534ac1d5c23c241aba68bd67d812fe687f863304f6abc383edfbb378ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f4a22716a93c152529bf8af0a78769
SHA15ce2281c5ac350ddd2e2f094ef0173fbc30c528c
SHA2567c9c766ef357196d99ca73a45a01cd84accd4addd3af6a34df4c8b6c14d761cd
SHA51239802240a0ec4b820adcc0c6be9eb6407d0e74432db6124c4d1d24d9ab3017bf521348fb7a74087343117835a1d7ebc1799e5f4b764bd0f97d3431307db71e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf69bf14a55faab955e09e59e92c1f9
SHA16842c1dcb35cebfffdfcef184b6436c370c6a6f1
SHA256b0903488ee6e7a425a400c461162ee4a877e1183beada76238ac32008321abeb
SHA51279066c4493a352dcce34ab5f08dc3cb68551bc4289a04f1496ede2a77d92ad692c378ff9b386bda8a171266b6f01f5ec10e8efae04c01dd867604b5fd943b8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7e05908da8f719fd6324765f7178c27
SHA1e562cbfa34578ba5a3953d7bbf8de827a9074d0c
SHA256b6454b9d7ae967aacd5c2da78af98a9e669613990465c357053f9ab39d807f2f
SHA5127bbe85ee79c1c12e4299a19d59d07be9bbc531ab4716d4b72defb639fa2b55e3a197653a3f637fe523075d0f57d03303548b1070508e73d7e37e945011de983d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ed84575dff5337908877d80f36df795
SHA1da6abb3d78c0d425e23ab54a324bfbd52d3444fc
SHA2564e4c6739c54209ae29f23557ee3643b565b0715b0324664430cdc14235bd96b4
SHA51210996f742e4d6cd77fe248cb10312634ca52e9ac4390ff6e74abef7d7d70f4623ec5f36fc92ba25f4dcc6d8a3b5e36d1b3c2a634aaa079b49ef16cbfcc0dcf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea43afeba0c4e5df2770c0192441fad6
SHA1a7f5073c9c0791058e0f16adb5799ae810ce3994
SHA256e515b8d0afe36edeb27fb6674c6f561012c4c26bff8380f01171b286c2194fc5
SHA5123b400b6ffc54034dc165b3e545cc4fc5ecb7406b11349a3a816908e004f02ad09c9bf38c08ad260f3670c76a5eb08058736003a21f03dbc6fadc97ba4f6a6ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdb399270ff4600340c8e741d1e26dbb
SHA15f66550c5242b863daacc6730cf606ce810ab340
SHA256430c9d7a26f651000fd561fe2b3189026643ffc5a55618d5ae9ae0e15cc9fcc2
SHA512f5b22ec837cf387ce5999704fb074531bf4958b5e48fd55d6df10ec64123ec75e68f40b9b047f38c044ce3e5a3a7f3e4b6a2725c2ec0b38fca0a39a1ad9ef2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2093dcd06640a761f5fab1e849edd86
SHA16ba5ff04503ef7c35573056010dc99cd8b8832c4
SHA256f1ae3fb0e2b8c03f15e95dd9fe95171655e77c7122830f29f626fefb8fbf2b55
SHA512acefbcb779e6bbab135b0bbc2c3f7a3a6f1a4521ec08b6c564866327c0c9aa1cee7c2a947c189e2dd6a22a5a66041f9ec86343c9a809c6ee76481d4eefe1dff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea867ea3bc063bdaafead249cfc134e5
SHA16bd4f3c2419942b030d84e3015fd8c0a3711d9e1
SHA256078b9664e4450adad6be4d86340c42529a6232329ebc51caa26cf571e2baeeab
SHA512d69e7067dff0088749326a77f3446ae9d8a90d9df070e8fdfc1e6d5a9ba5e3593e7ab7560a04df0b828a5f2b9c1f70275449303da7d81cab9bdcb19290a94cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feda02af6fd2011987e0634a2ef0b040
SHA15b5f4ffbab8b57535a009d035e78902aaeb9d68c
SHA2566b610d72ca6de0dc74c52c9d257a6bbfcda6feb1169b26dcc5f63632cef40b60
SHA5129f15367bbdd9eb16f77794d8650e9c140a0397eb39ff1b993f5232bcc5d5cd94e0da077daeffb38aa547a5eaf4fe21e263da874256e950a209702b1b8871d7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af6f26effd42b2590bd639226544435
SHA1f35adcfe802f13b1ff4c32c5fb4f3b849e83589a
SHA256d83f05659d21bcaf6fcf17d35e8941da77b631a14934dba6c4172450e758f251
SHA512b93f24816f6d31be9817d96aadaa7f840c189b506baa38c45df11e6b5719a382eedc47db476e48441ee194b7fcd143cf7c130754410aa20d7001e2fd79a23dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51985569dc3d42318233b6cc16b05cf74
SHA1881d2bbb3cbbe35b2f51fc8aa434b89c3c6db5b3
SHA256390fc61b573b7176758eaf3274dcae9cbc5c851762dba6e3e30e1f739cb60530
SHA5122f9a93ee4ccf04ed22fa69d1f232ff6dcb7210db8a8772d49b9da14e6c9bbbec935d81f5fb38000538d9eefe8b9d82bdf49dc96a0e2e4420147ec901ca61a503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d075750d6dacf6a9b5d7f10d37e0a235
SHA1ff81d8de9cfeed6fe1f5343c93807d7c9a551f9a
SHA256d78bc550d599a195147c662a5e99f74fbd4b8dc3fed8635a1762861e3689ec8a
SHA51279d5d4d7d80277edb27d327efec751a8ca1aef42734e135b64348ca676984fab641fa4cfa4391071a3f064001cfcef887f23cda95462586080742759f71a98f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f22d6ced39a6cf8b9eb79c754a7afc
SHA10a6f7f4bd16665cd938b1052d603d9a320162a40
SHA256d21feb2b541d0f4987f9e97e4d04235cb40965e1b3e6101507f898cf431e6c26
SHA512b00316d1cca4b210a79a2c3cb70099b20cf06c1d90f9f0edd080431a658751207b4f0132eaefa3519dbcc6b05e6beeef81f1f0fc066b06f7bd78adbfaf4d21f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bae2590a0cf82771d9014529c9ae1911
SHA12a833bd576f8a20f39c31a74ede4b61f40c83829
SHA256d157e78cfdf3a0d0927ccb3ebe4eddc16eb59d280c4ec05cf4f1035e13ee1d47
SHA512808d3f18c6f38759e6c6e876ac1ff229d237262c49de8aac725635b4bda2b1e9cd8dfb3c40ffcb3cceb66a0ad61a5895eb14291c04bd7a723653fe311300bc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55490034701db2a1e465d7fae3b48fe61
SHA147bcf08e3552529cdfd74007b48957816ecdfe2d
SHA25662b3e0889d97adda786f6a3321179ed1627c84c026fffa05c25b8ca82cfdd911
SHA51292dac7989b789e84a9b27d0e5683b1ae8ff658f77443cdb74b1cc3e9ffb5c043834f8378293e77805656b2e9973db40ebf3716810c950db4bc149d8f0eff52b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536a339a33ca8aa3e08687221f15ccba0
SHA14488342126b935a2a5943d9699f45e76aa657b40
SHA256f4cc39d45a0a76f7e1844e7184752f8bfc51087827545a74f0179af97c4ab923
SHA512672621512b699f056bcbe2aa32712ea7857614e1dfbdccebee88e522fc48fcffc65f40729c031a443a9c79a74fa49f46b1ac657ec0c62ab7c2d5514b495d65c3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a