Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
2b7d8fb076b7cddf39210dcea10b759f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b7d8fb076b7cddf39210dcea10b759f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b7d8fb076b7cddf39210dcea10b759f_JaffaCakes118.html
-
Size
460KB
-
MD5
2b7d8fb076b7cddf39210dcea10b759f
-
SHA1
bf053215a742ba488a1bdb55082d1cafb1f9b4b7
-
SHA256
10b6c4d01e239bb3d3acd866b4f0d2c8a6e4c5602cd868c74653986a2f6ed877
-
SHA512
da15e80e0a77b3b95973fd2d464f8db973a33068ad851e3d51175992300c4fa6e940a4b1fb12939deb8d689195f13727fedceccd4c7094d2f21c08f60cb4e2a9
-
SSDEEP
6144:STsMYod+X3oI+YbsMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3d5d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000df11a5eb23264252a55b5ad92e5dd279b722a47b636dfd501a017c7de07ae42f000000000e80000000020000200000001401d77a7b1dfcd466049200cf05a4b596e3e625c78b8133430482be5a27530c20000000d56ef1b958635161a695abc2daec80c96dec1265adbefbd9ea55650cca92616d40000000bbd45e935bbbbd54fca15b34493b86e3a156a6fd8e6759c06453b5a506c10147899bb3bc572fcfab6843f03a995cc21120c1c1237ee76fcc1c6f49d8ac8937de iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421447249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12813481-0E40-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d075feea4ca2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b7d8fb076b7cddf39210dcea10b759f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba34e82b577d0b970e8b7722af90184e
SHA1b734b542105a15d985113318fc92a73bebf0f8ce
SHA256e28b0ca3bc8c515b1dc54a01075ea4d8c5088eda141d88ace366e2d2c76dde06
SHA512d8e1f310c2db511503d1a83443d206d750890da8e6e3091fc758621adf9c41dfcecccf708b3e2ac9638c544850b24fd0efbf0511d614aa0d250b45111bd67096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c204d7f501a8ac8b31491a0b666a01
SHA18ea19da313d060f69dac8d633b31426c2d14368e
SHA256757c1061fae0a0589be26e6e5e5eb56c672318670dd2126cdcf88dff6d8afb54
SHA512bd463ad3a2ffc502578e151a5c7814776a1b67e36982cd897f489ab00885e919068bdf8338771d84fae0d009339ce1e1a0d0f5dcac6f16857db9233c398717bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f3048d4ac55cd7cc8328ae421f52ac
SHA1a840e389f0a3cfc8d06afd7b1174fed4a524adfe
SHA256e9eaeac19ff174f9e9e746cae37973ae860d5c59771e4662394a926ee72a623c
SHA51229d320a882257d688394673d1ce965e51889cc20bc2b49bd97bf19d17a84edd1ddc18f64f11591cf5df0ff9b03f6b055656a1746fffbd6f63330cc3f27c36dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5400a9d95f75a3901387f7963fb04ddd5
SHA141fd91058d9d14f104cd5e78cfb23c2c7fa9be14
SHA256867e5540129f68aba11eef85306d0bf32c991a14b6e9adedaa8e769cc854c540
SHA51209d1a25c2a1c10efa7c9886028d2888d4249577296927d93f3deb7db815243ae4e808489952180a5076fbb591bca223824ffb09ac11dd13a99b79d22280bf6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea3207e2661f8df81040275d6fbca90
SHA12d3426c27d366935d31b4f8f7878d22422ed48da
SHA256e4f3186b488e573e10cd986ca6a887d27ecfee6161dc1140fd69a8a77d03f43e
SHA5127caed08ad742b533b9e8702f20e913c375a758ad96fe99e3a7088f7eca1e7fa404e9f9c4a4862aa6e5c15d3b1742c611f2bb91d7c2e2487ef88baa6cff42430e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffeb0ca4750d15fb615575ac4c45e52f
SHA1451d45cd0c50a4db8572673f455f19cc70219dc9
SHA256fe8ec259c6a3a42b32de082ad74622dc740f587c41238594e30cd383c7065d14
SHA5122e6d62e1acbe402159d72e08bdc55f4cd34deddb263dda9b8cd41046e5cc44d5775f8e5d8bdbfee8b4d3e75f2bf2aa5252cf8ee3b1ebf93c77046b7cafb5cccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b2ef88072b4aaac9584dee10a6b8e9
SHA157bac15128c5d76e27af951c4d116cfbe7c5c03b
SHA256a1ffdff7e9fd5032ffa2184857359756e2ccbd84cd1aa65f98f8e94ad0753167
SHA512fbd174772125ac96fee45fed79d6a7022d49ba3425be8616d14e6528fabf47357eed6234e404399aeacce8f913591e78f20b2ea4f3dddef5f8c7fe6eaeaaf1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb922b18fc77daa5d8c1de7e16ed99a
SHA1018354e3d469803a267753d78b0913564859b453
SHA2564fc5aa1474bba9cc610874ac1ddda448eaef6d28e2ecb2785a1a1b08a044c62d
SHA512aa92474f3d8040a6c206358388727589ec83e4d4d1fae7e4f46c2eda2c8f6b06c0150cf1ab9ca63d1613cfe39ca26c2ec530735cdb6c7bf6f4ba140c1ed91a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d82db69d4f1ad7cefce1c46ab8e95f3
SHA16281d9d4cd608b278315e11f16897c99ecc8756a
SHA256500104cf894809322138d529c673111ba0c81583960f7512b6b87c0402ec1def
SHA512522108a3353fe1c44e346c881dc5284b57351dc5998d187c954fab6879f3f62cfb1b149935de00269cce8e03af9424153472db7389d8f8559c210b5750e73d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea4ebdb4a7ea4a56448ee3fa1842733
SHA12797f494a5c1de0ef2157b86c54a360aa8cba9bc
SHA256845594495f4dc37aa613ce181835759a76876ed7b48c76a23e28f6acabf72e74
SHA512df2c4f678a93c44f0904e0cefc9381238982caea92d7e6528da092e038def61617eb857fe03141fa09201d990a2375d00184a6fb7443a38a71adcfb75a7a3f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce4cb8dd5ffb479fd11821b00bc2e71
SHA1e55b3b25dc401863d6d2671e93f605d22fdcb24a
SHA256da374791d96d2c1a664f0b37c7c24451480a9d6b2660d76fe08b69433558d2ec
SHA512c42fb9cea125e32fd224e0c317b791b453ef4be79ec769015b0f6c75c1faba4ecb245a36be09d1fa006864a20defa0b589fa36236f643b307e4fd5fa53c2292b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e118a6f1bbc3e477b00aa1eb15ad2b
SHA181be6b6bf4568a0e34fee1341b11180362b456f4
SHA2561ecc0766553d09f63494c2de8b4c13b8fb73898e6d4f23e33d88e99ae4940de7
SHA5120e7c77d6c4f59899b7d9a458e1dd59ef85f73584bafba15f868a17c0c4bd4fc3d8e6ab19fb1f2e05da193543ce824b1a7e7281b0d73093ea4c4805d1447ef779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745ed96accd815ace9270a5c2bc51c8d
SHA1b98cafe311d80bbbe166c86c84be4dd51cc68256
SHA256da3a397f062c15d70dae692945d914acc1a713b2a82932aeaf4ea945ede95835
SHA512d0fb2b78d513404e75806f392c0865a1ffc76779b23e596de3b964b5cc99f67d6ccfea092ee75083bed0897e7f130bf4ee493ee973d9b5ab4f11c8dd68b14a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16cdea578d694b2f3f97a997463a006
SHA134694ad04855e5ba8f49038930f1f75cb9654d6d
SHA25643a30430af5f2c1f31ae517f7736dcff047b7dc8c046531c0ef83c19f2157249
SHA512baecc206b4d802843f9515814f994ab6685d367479217618f274e6f33d6bb7da59ab8bedf2dae5c3b17937cb35e2fefbc416552e5888ae31a70a7e8e9a406032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8845b246712ec8a691749f9fe7a9a0
SHA15f078ddb20bb6e9157e22a8d129454b8961fb504
SHA256f206c6a4534d3ab6147b9101f38ad3e78fca0d5021a81dfe2eac288dc476c62a
SHA512be3cdc16f67649474685831e304d781f6638c9c2e5720b324574ba262db4094a00243013c586fb1b5353318c0b2832ce5e52ea0d4a9f947ba334a1ecce3aac97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6237614584977c89bb5208138a1805
SHA15d470de1b908b13baaac3c7f2b063b8e4b2e2404
SHA256795025f8e8de912f8742b08e212868121e8d586eeddf6f3539f813ff012c252f
SHA5122b5a0c42a9c183054d97a2d8e1dbdc8466444c2fa0c14bffc83a8f9decf02fff7cfeaa68bb7793ab770c8cd693e9104dc5e1c50071d076e05148bc61ca36e18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54065333d6a10ea0eb46f2e7dcc21ff59
SHA1eb07b0b1cf7b81df0dfeccc11af07c0647ec16d2
SHA25604a6c1458a0bfa21dee2241fbbed6a3909e858e344c2c7eed971a4e2b6f0a9ff
SHA512be28cc0b0cab6294ce05a13e9372df5b6b134155e2b235c6fc4bef12f032aa105ade83bff478a12daf71384b210cbd2e339ebb54d97efc0ab99a674397eff8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814cb09cf78a8f1491871417fa5700f1
SHA1dfc004cfb5577a3aeb7db254dfdeb42481b30b83
SHA2566796f64986ce959c97c685f2cb0d1632e6568dc29090f8a58b3f2274b40f3d02
SHA512da78878c64e617db5c2db830e6c9a6a1ca13faf8d122d7829e8e8e8c7865442e06140456e78de231ccd72f83df069ff0a9f34d003658abfe0510d3ec3b30fb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea3cee499b858e0cd5ac0e3e322caac
SHA1189c69bf90680ba7b9648c99ecd43d47052993f8
SHA256efda4e9aeea85ea99caddb747429c233b7136823eb72c5c0e8e1446e2734f467
SHA512c847389792d9c9cc41ec02b5a0e7268e06be05d5b6fa1a224e4e81a7c457830122043432a2993e44bfe0872979d4ad062fce0dbb0bea05cd931ea367a3c1dce2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a