Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
2b2873e6b14005cddb547b1cf95a8522_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b2873e6b14005cddb547b1cf95a8522_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b2873e6b14005cddb547b1cf95a8522_JaffaCakes118.html
-
Size
466B
-
MD5
2b2873e6b14005cddb547b1cf95a8522
-
SHA1
155d2e69da839a912a0afc76a80bd6db0e70012f
-
SHA256
73cfdc3d1e72bb18c13f273db29906b171575d5e81022de06544f20fe200175e
-
SHA512
f82281e1f2d203e328ab3551fd47f0348bd1007f653424976b218f952f6ee33f7de775c29624d4cc27e3686624257973a1f9124f7a34fd1e7012eea152a80378
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a021016c39a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97607671-0E2C-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421438882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f7a4a811155decb5314889c88604ac147c7d36e9ef5e1995d761b5e112cc5b15000000000e8000000002000020000000c91fa52aecc5dd2183f18d2a647fd290c3ad35cff89b6222b24baf1c808aaf4920000000b8a11db49f4245a5a5daf94e51375eca031dfdd614d50a8c8779bce3e02e406340000000ca487d6f7045ea8d04a40e3a96d07900957e7f3a2eee77dc6c5b49cab65ad2effd560f2f22308eb931051231ed50cf15d18f6011a267fe9c8b866d0f1535d04e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3044 2100 iexplore.exe 28 PID 2100 wrote to memory of 3044 2100 iexplore.exe 28 PID 2100 wrote to memory of 3044 2100 iexplore.exe 28 PID 2100 wrote to memory of 3044 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b2873e6b14005cddb547b1cf95a8522_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb8fbcb6fa6a5043ab410a86eecc364c
SHA1fb745ddde201e8bc01588563dae2f91c7e6f5d8d
SHA25692acbedc4968259f22346d8ad3b4fd0bee4d3f59ed9018b761b3e8b20c08c926
SHA512d771c0cfdcfc90d3c6fa737c95d4b1f4e7085d76fb7ac5695e1c4a5a3401aa3c5d4016fbf82721a1916340dcc3b5ad141769172b9d5f87b0c27127182741a1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656f1ba09a1957ee23c5db4b5ff9dfd0
SHA1584d588d98cf3baaaf9ef19c69f610be7d8970f5
SHA256d8ad9ede189a65d480720c1abcf24783a85d5d5c8df3e248c525dc230e75fce7
SHA512ae3af5cd014bb77d404155b31d1e149a6d3292cc2b59e80bdf1f7a373c1a06405ce6fc05efd21050d60a446b572b2c18be5e46cf4f0599102befc73ae3d48b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9e2d245d30828fbb87cdaf0a5695e3
SHA15b3fc93fd049e0d26ac70958b2b1bf7f84229fad
SHA256b2f2c806c2e7fb86bc193dcf68dbaff8892e1ffd45680f3b82b5d93a4b005432
SHA51206c5ef7a5b8871d317aa42c5e11e376fe7dec54173b956559012c498a044f40aa68de20c2c0ef8858f547f43b0d54b3a2c6e77dbd44fb2e1317c364b423f822d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a25529380208d717f9dccb4c86f7047
SHA1fbaf512cf415cb1e208cad83518dc217442ee65d
SHA256b9d7d83cdd3471461af963f8d9b533b64cfe03e495f4ee3b327d2670034483a9
SHA5122ea6ef329c33636eededcb4ea1aeac425f9605ff516eeb952b5e90dd19754ea62edd33eb3f58aa073a4a3a7bbf3e971a483595ef64088c186881cf4080ac9e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a224f5aa9cb829fe86f093aedf402894
SHA14af580b6ae6f20827bddc5a040c6d641a7bc28af
SHA256d0c728af4f4c8a4a387aa6bf57917c3c59331a99e881cef0d35f5e39eb1c3d89
SHA51243c005221ca23c7bf12b6188010de4025fa36eae289c9cb0d5375d7d721f92cc7f7612f08a5ea32549529012e145871e2a77d846b735801581f6e9f2521023eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62ba5a83d38f4a8338699fd12f05465
SHA17922d36f6dba354fab99001b75185c39c0504ab5
SHA256f8b7a6ebb3a2ed0e2b8782e2ff2c38405f5f077750e2c7286c5f8b6e7a9e804e
SHA5125dba384b0c853c3288e68d2224fd4168118e506e5e71c0fa313d4e94dffd8269c15978bbb15664e45848b19ea327946179eaf7dd27ad8010aeeb5944913451ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972083cede6aaeab9a3468fa45879b91
SHA1939f04835812d73c5783ffaa47c98661083017cf
SHA256442a2889a70a5f8328f40910d3406dc532a44b98fe1c108602d4fedd351f3d7b
SHA512f87a967e41d9af2c3132b54da73a14902d4165b44374289d82aa16f81564a88f90cb09fd4a0ca865f48b36fde7b5b431bd4242bf0bbb54bcc522165b87b302ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea7a1cf0b58e5923ad3db81f87755e5
SHA1b8c62ca8aa268704a425437ece17f9a717085c85
SHA256b2e81384dc0570521ad2cd009b6adb377a94df0917bdb9ad9b1e29ccca1cc47d
SHA512bcf5662ae51448351a74ac410a921584af2ed43c35476fbc2832451b0a647d652bc29e55cad5ff5085f1b94c182cec5c3cdeb8477c65c1358a32effc03d792ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ebe98a33dc5c8fd5e5a330ff9378d2
SHA1ace44af20650b013f45908bfd283e66bda80e8f8
SHA256da85bd6c8850aefd0ca8794804ec8305409c097028e6224d4535ea17ccfc562c
SHA5121d002b87aecf0453b8cec8eeee40d089ba55d19c758b442cfb538262c448671e5e0c49c34b35d7c68e07c2f086da21b0bfa0f6f6151f2d399f113f1e326bc639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03441d23ec3cd5077281df72d0586f4
SHA197df333e8c79af22d5904facf1a9cb7e18d1260f
SHA25677def1efe9415275497779c806d08e34cedb51870df638135b52491ff160da8e
SHA5120aac4987561b333510c518fcf187b0ec9ce07f406e0f381bc0693230ee73065a7b8209c8f980e0e4c297a6ba3cf7f8de852262d1926a59376e0ea15810bdef5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e39942e771f5769ee3ccfcf25b4c2eb
SHA104bfe88cf17438b50adc389750c8cf420be823de
SHA256cee3c064681f580dea19f5cc24fa676b640d6a3a74fd47d4c8e469d7340072cb
SHA512bf21b847cb7896760780842ae7f6105cd1d298fef4878bf35a9ec7be9c958c74d7d3266f5b12a34f8e0443750a93b178b83fa5aa202078b14011e6d00e4181f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f77c4c407cd691ae917d3f577806cb
SHA174de1c0f1295f73a3c25ba1cfd37013c72e63075
SHA2567b501ddd8091c6475eff2c553072420483ec180bb5aa10c089f0a1cacadb5108
SHA512794dce965b7c4948d0c8d8be2af99fac0324b67e3b16e4ef79a8b5fd161b5cf1f1da80558729c958016f268c38107fc4d5f40f2047de8bee34d1896c70f1dafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546459df4dd7b9057ab9885ba4d460145
SHA101540936a83dce1236a46893fd0d5c17806d8f47
SHA2562b6dfc5c6ec646c4f0812cec37b90a8d61f41932e2f83a3e35cf9659e61e333a
SHA512b0b531d135e292492bc3365f0df0262ad0566136b804e1d61eda268ef5415e9fddb46f8d302221ecea2fdfbe8cc51230fc105dc4efbb081dded99efbf1f41762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b047a34f6aa37c0736119bae1b2af4
SHA1e68ccef0361c1af3cedd51178b7ba90ede86ffea
SHA2562a8537c78bf2e43fa0d7f9a833a9bde0cb29acf20e43611cf1d204087eb27fc5
SHA512779bcdcfd17aaa74111d19b963f3b0adacfc62c5320331bb1cd1e91a706f33b0a02ac34f77127782302b1efef72ba928196046ff78794bdea8a9115cf022473c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504923569483579ec87e56183fb971d36
SHA1d2eee2aea9a0c9a1d865e2d366627505fd883d56
SHA256f6caa1e879c0d42ea2da023f0d5959c159f3d8bc3ad6a6e7ee62475bcf01b9bf
SHA512042db434b954a8771ff179c5cb7e2a6aaf7a69cf4bb033be59cf7fd020433ef56cd4ba7da8d31fe890d537d70d7bdff9fd5f95169f836bc9e8497aeb7ed13ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53686de01da9abb92089a33f2fb0f1f2e
SHA143a9d010f10443c3f77b481b7d703276211d14da
SHA25638735e31ddec8618fcdaa1b39bdc42a324f07ce1f2373322920df70f612b59a8
SHA512cbc870bddce10f0dfef468ad10dcf747bdb3a4d303f09f014ae1521d53222203f281915a20f9b19bcf025e7848b161178a1e848e6c45e49f5409bc94d9460ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fac64d5d4b07345eb0c402ab54764cb
SHA18875434f0cf89e61df8e4900d496f85153126999
SHA25622d72f5e0d98c51241f30d491e5f38d73d509ee110dc1e4a67d229b5d7e0a2dc
SHA512a59caa70e8b899122ddf3a21c260b3fe2b7743216a43a80f50f7a00479e83ca8f950045185d30af5fe17731e10c3fe4c7b265b2983d89f8bd396f923a1d3fc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637fcbcc6119dbe36b51bd259965ae07
SHA115a983d4bed44cad0bb44c8eae0108fb7d3d0a47
SHA2566fc2c5932b568b8882e50b0115287d7ed7741d0f1ad31c2e0eb375289808884d
SHA512ba8ab083702902066f4a7e8392ee4564bb65e95b9beca7284eaf9d3bd5551b4e41ee7f34a095639aaeaffe752f23ff972572aef0f9975ec2c7875f6ca96619f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3bbe8bdc848acbc273b8cc25a68712d
SHA1a0e29181dd2dd514c6bc5022c979265246075839
SHA256cdb6c1238459f5146d61f06a13845012d619cc913bb84a9fc67bd8fe4e201885
SHA512e847407c21c2c570285aba9919dc89dac28f113cb39afcf1522f15cb6b4854883cbe8307e4c2fd714f9a4bd1a01653d57910e98db58176269d1c72e87f3b4ed4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a