Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
2b96fd5257043b6120e1f6b4f48795b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b96fd5257043b6120e1f6b4f48795b4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b96fd5257043b6120e1f6b4f48795b4_JaffaCakes118.html
-
Size
67KB
-
MD5
2b96fd5257043b6120e1f6b4f48795b4
-
SHA1
c24b5489722d3a880df77b269a79186dfa3fa60b
-
SHA256
b5ff5b86fff896fda8649eccb9241a72821d7b259eaed609d5aafaad40678555
-
SHA512
799bc80345e632e4885ba6b539355fab0bc0b7ebd5d0dbe9849106b16ffb4032abe76489621b97eabb3f7b8a3f6b6b577004e0ae2ae8bea73c7228953eccbe53
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6UH6/G58/oTyJewCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Jd5Tk0en0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421448768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000009373b7f3bd41a9bce085ff16cc2023e0b0af364d76d36a3379af37f04c453ee5000000000e80000000020000200000000e9b48a2e557a2f735f17abe4bb48568843a636193b2604a0f40056976d0bcad200000008c7dbed99d08832f24832af18e040f7e59dc1f94d05c088d2fc8352d1fb4206640000000ae37c5aaea492b559ba3267335bea60bd3eebbf74808706e55557f7789511bdd1d169cb839d60d838b16713eb9dbac3bc7174a02b9cc8714fd1a0b33acf2276d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9009547050a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B30EFC1-0E43-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b96fd5257043b6120e1f6b4f48795b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44e97a44db158adfd3cbf123386b74b
SHA1b5c678ef7330d50c57c867979d63521246c6d84a
SHA256180408de573af115de592be360b1956bc4d8c6047ce15834cfeed009960e5ce3
SHA512d2c082e4d88a7089c01343804df63e3d1cf649ce16eb4207332551a92721433472365e2f59bc8718efbd900595d507ee626d54ec0a4049675ca89a3d1397d7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e515b023cee22379413e2be16f283fe
SHA15a9cdfdf2e385ce7daad84a6e1cb129a3e25657a
SHA256d665b28dd3f7980759e38ce7c8dc161e6dc4ae0e504a38cb9f26ad7abc7f9516
SHA5120f304d8e1e47f6a477190baf6b8661243e30bd43ced3c7928c628099ec90266508dc51c71458ad45663de1dd1bbf02a23f2ec87a2a94579bf35134469dcbe4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca7715f1b8eee9eb02724a0d3043bbc
SHA125df450c1de1bd9de129c11667604b9ee8542697
SHA256ae905a192c5ab5dde747e4d2556dad2b5ba55eb29f113d07fd3aaeb274c26891
SHA512ea9ea6731c96f400e30df18f1d880a2aaa90e7caa73f08d51b634910ad32723ddd9821922e05048f2c5e38f3f80c04058a31dfcc81d6ef9397dd5cb8598b0d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5169e80622e973249a22147018a0e1005
SHA11bc66bf310452999853caacc79830b555a9f6268
SHA25602cf7ab0930e43c13e301902c2e9c6b61b2e965c8a2f18ad9a542cf9d7ed11aa
SHA512757ea5af504d20c407e015bbd34384eaa03e5ab569a8c70a2d9eaf84cd0f64275ecb22c9c814ba9439880c983496049b3a66a12e3737cc435a9328af5d3d3938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c27eda9061d88e85dd20ea1b5740fb2
SHA1f15dfb4ff3c8c4a3e0241b15cafbeece881abe5e
SHA256fde459966c5caa3c2698df56722dd832d67a2db538282cb72c61fc26ee17ddd3
SHA51211485d05169abe2c3f4d78eb8ba2f8a14c684f1e51a25bcd979174ebef1666e3f96cd7e4e5334420b685f335ca09426f3e95df446289047c83a42abf29b8135f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1bd1ae60a7c9aba2363d5c718a306e
SHA104461c52feb5233cb68a34c14dbf742baa7d469d
SHA25627a54ce65b1571d203ddacc551c8e2c4dff52d7489128821cb7ab25dab3c23fe
SHA5120f2be451d70463891292577b4682154126595b8a69b75fffb62480194fffdeaaadd3296189d95b32f42622983c5c18c6995d2fdd8612122ade03019d27e54615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a339ca561e885a15bf315749826249
SHA14301c79cb1d111d9ec6fa9bec93cc2e791ebba1e
SHA2563db17525b9eaec976eec5bfdf28025b3d17c60d2e35129930bc4cd1446226cbe
SHA51285a407f0b5f53fb23d70dcbeac61e562d5c560b643cf309ce0589652990a9f4220cc4a0023d6f277cb470eb30b33e49423a6d1513848bcb034e4752c8390bf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab6d97f53c94757c8fad9cff37efbf0
SHA11e96dfb2faa623d4eee4a3df2a8e0356fc07b08a
SHA2562461fe1dfe35e6fbc082a919998710559fecc42e0e0cc772f9bc4ec2917b8768
SHA51204316792e8cd1d4a90a9c35f5ffa7479ce3209a4b51a1901c72634e8613b96a88aaec29a530955ec31c692b832afc282296b9383dfa46e313827b0c299d32d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c3d892e45fbc48b7326770e9c80596e
SHA12fbcc8a8fab5aba86bac190eccb679df82858d04
SHA2562d23f9a2137f54021eec39a78cea674a44ffefff5c4ddaec9c362fa33727e531
SHA512df638f644e81a2c7dbd9a213d24213cf1de6edc63d17efefb68d2a5ece30a0a6090f87e8baf404bd8b1bf4db708595a5fe25a1f157d5af3b94806be1cc218737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e873f1bdcce7a4cfcb1a6ee264bd6f45
SHA16b79a390212659d2a8d6d89071cc40d2126ccdff
SHA256212ab608d0cff176d29b8c9d5ef12fccdd38de3814db3c50a56e30eacc7f4b40
SHA5127023c7f3ff54278f0da82131134ede427c410545bc8d68359a89132147dbd042f8381644bd10db196903b2a97012166a9555856ed206a9e55434dc7672563267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d79fd0f76e9a5ac95f819ce6a79f3fe
SHA10dab7f1e205283a3dc28dc78b8803f68a16615bd
SHA25693bcf2a6605e4e37e4284e083b601b73578d5f8e71a8338010a2921b4e71822a
SHA512e16580a613b0b9a7a775dc25809bd6596155cf4737e7312e4ec75e0b8c26bbcb4a5a7eeae8ca567149f7a55c86bdc70f767d992130a29dd926e7914bc066cb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b576cd3506158cc028b74da40de54dd7
SHA14cfd6489f1c36fee204be0a1356f1e383c395ee0
SHA2569871c0ee2e9d0e5207a4b7159179ff59dd524788a2144810e844138aee167d3a
SHA51236147365420f87f83e13002e4d8f6dc7cd0941609df08687c6a4145ec587f8feb10e5c597e2aae1aeb1ff1e9056d582cc54312a381ae7c76cd7cd05ef9fa8b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a23255937d58409bfa9bb3a5e60113d
SHA13ca5a08bd2f7eb86241ef10afe85f6a3b8a84873
SHA256ec1b107dc038a8675b9cd8e3e677e44c6ce6571be36ccd8023fb3c96d55ebcc1
SHA512e92ccdc24bec81c480d8f2f2c2eaeb69b65a3917a4df634559d8cfdb133492cf1553ce7b84586e64160d6595283a08222a416b4b6001b5b808243562c612321d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342f3dcc85f6010842a15998aed0b072
SHA11d42d40f99696a63edef7258f33cdd571364a1f6
SHA25611ba195e52b784337fc47b0617d2c8aa1c1dacb8699a3f4789c465cf0e2cc426
SHA51267d9c007f3fd6393b1fa1b9ad62b9403326415f8b3d088a20d840ef3d0bcaee61cfe2ebf9eb9051bc53abed25e700f4a68ae09dcd28d6f7566cb3c2450ad2866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57caf8a9d5e4d4ece9d249c1ad226016e
SHA1b8dcf5e4e69efc9299f7641e6b8929df83bedf40
SHA2568a620495d1d80ccd9a85dd8e00e614c7b018be2c923accfde85c5b22ca696f36
SHA512557a4ab53807f8ac3721a1d867956a40f38391473e9cf14e94036535e7e33baea49ef599d8f1cc56c8952c1990c5303591a6028c68add19f1923dd3e23567c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55841a9e591dcc50f21554bab3f71f3d0
SHA1980b33c55635e21d286ba2f23440ef26a520cd10
SHA25646bc08190837015c5fe2d598cd98dc070998afa384f4310b5e6ac9bc1f8d547f
SHA51298f9a5469f949358d3e36e0af255c1ceb128225b68831094844f3ad6667f9ea072d8eb7d1c581c7142afa3474bc2152b8d2d4eac09f84dc37551765d3ce32bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99218d7ed08748336dbe79052423800
SHA1dbc4888f9c78b6a71b5c8e27a6bcf25bc1b34b0a
SHA2561068b915eef94536adf1ce156755d683f627e7e63d311a1488ca5094d32c936b
SHA512904c52fae35ed9a8663d8786c93cc1bc06cced983ba3f398ebf708a658bab7b0886eb5c46320c8b77bdcaf5837e4cfb274ea6c8642af77ebc60cf0f598548923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d9aaba4089ca686849ac50de62b0ca
SHA1efc8402181b8a512d54e211f383eff06104710ea
SHA256738122bd19d7f8fb2db959c9da0feeb8cd129bbf9fc7e33ca6a2f8acc81f895c
SHA512c874798e548dfd61a33efc14a4e0ee305743bed3fabf2f029f63249a60c78d08209f25ead90f9d418a333f7ba2240e5a4aa452d940be83a667a750aaee425ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a8ab34a8b81e494d6cb925dd4e83ab
SHA1bfa42a56e7a4e5fb06f22ed83d5b1d4a23311663
SHA256b551f2243a9cee862449e3f8aa2ec6a04374b623228cb4de35ec2f75c88513a5
SHA512d3731815b8e20afec88db69fbc7515614d1a7ba0c2b6ec2da0987a2f2a329740aa282822d0425185c8b02701216ded461b97909e207d120627b68c142f5c5a5e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a