Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
2c8577d9793c969b1800fe6eca2b9714_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2c8577d9793c969b1800fe6eca2b9714_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2c8577d9793c969b1800fe6eca2b9714_JaffaCakes118.html
-
Size
94KB
-
MD5
2c8577d9793c969b1800fe6eca2b9714
-
SHA1
38e427ae0f9a74d3ad5a83a04c5493a4db3c2356
-
SHA256
0a8c7e520c115665040f62abacfc92b5e25cf2fe90732eccb96ca05acf3ef91f
-
SHA512
ecd8e841909a1263e33585e86549ae32548979af4b98e04cef410cf075cd641b96a5f80e185223c9c9a12598c44ab60b02198bf00c83101c5ca288d9a4b3a1cb
-
SSDEEP
1536:WMLiNH/FLGfZbj906A7LfH6HDDpxy4FE3yzhZ1/BdkrY8mgHC+qpEyW:WAiqD/BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000033117e7fd159ce06ff83d4bc5be217251107d0a3cb8757160e409272eee56278000000000e80000000020000200000006c74e4fa742b094c5e356bff00d64d0813c8bb39cb82ba9d90a9b96bbff1b2cc200000009803a13d0fc37e4219dffb12004ccbfa195ce9c567112761b874d6a182166da84000000065b94087e37338e47b9b93bd0c507f837d6398a6ad59c1a71e151b37538d70eae7ff42433d493ea927e10f8f50412700c02e23977b8ead8bac903f7a40834ba5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421463988" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c65fe173a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BC912D1-0E67-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000053a6cd03d0c21d06614c156351ab91cfd191c01f40cdc7c222dc871be12ed202000000000e8000000002000020000000a92d79806f0ded8379804944d82076eacde266ffffa980b55f59980adbaf9e23900000005c65cff7abb0eee5540298dd1f670c1c97059ac5515cba12c62fd168c0a26af2db07e20def06ff1f09cb3d987ac046cd743274869fb84a1cb2ee1bfa949a307f63f95b2349e7d57873fb6e36096fa3dd583f3263d901db3e7f1eb89738506e5ddbb6923ebe7f8dae4ea7998234432d3a4ba6ac86a14a8167a04e63ae18cc4af690e43894b7cafd79cc21c944cf32c04140000000f3db7fd4390d8fbfa132e68893fe70ed5bc6e52a8523352d11ab40bf0cbcc6cb5cdfea9ec8238e72dd858ac3ffe001b058affab6183484f32c26bbf8df7725e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28 PID 3016 wrote to memory of 3052 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c8577d9793c969b1800fe6eca2b9714_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c1fca3db3c6e79d9b8cc7eb50f0bf9d
SHA1a0827819ade46c36f3d112bd1fdd5d60dded5722
SHA25698aa29022ade039a0a11f66582d78f9f05208cf9a999aba22c5f246257185b7d
SHA512bc6aa4660dd63ca6a4a4feca4fa86a9c0e6db9888e9f855022c6a317c772598a7ef96271aaa4f828aabfdf991373397f19ba7c466f2262faed14bc0f6eed444c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f4c1d9da3e7621e0ba5787cb3191b1
SHA1ce40fe3544e39be4a66bedf722d881af3dde5f38
SHA256d3f5b9d95cbb56d42d9273cc983940d88f30b6a821180c3f3b83a9f754f3f2d4
SHA51235e073cbba629db332849d2a96827f197d9c87e299d14a74740ae024c4b89e3e97dd321cb6edda5ed62d5fca16c3e2d41781e1e9c40c3d4bbad571de3aab5bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c494164d5963866de240262f881639
SHA143998670774e623ec9f0c9409ed42effc3342816
SHA2569f21a59954dec5b98a3af4b191b9aed9c304c252d285b417d839cc4f5f27fefd
SHA512ab94d95a662faa42d0d0ea58d1c47812b86838759fcc49faf5b7d9cefc3851d2cff2993ebe4eab5774cfbb88a70d72947fa92007174d12600d4e88cd70766004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54920150771928adab4cd2572e4ac2e9d
SHA13c205e1f4256d82b78f5f5a089a63d880b65bba2
SHA2563a0fe3df6ec12016a1d995f6bfba4f45d9e1a749affbbc23b63b241fffcb6b86
SHA512c6777bcf8aed46047f06eac3cb6c88b63dd6d00905bc99b917e3b016e819b3cce9268dd752a0e1c66c92ca5d9911a9dd07ca0a8444f28ab279184ee95c2441b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab87a716e5b8f735d6a44735f2e6500
SHA1ab17f1442bb444f977799066661ab311934fa67a
SHA256b332b34528dd2815e358448b930a1e393ab53a7feec5053c029f0b49ed5a0f3d
SHA512d91e205199be03d470e7b3831a0fd09033d4ea03456cd60f641c15723e419b6b57558e3e329dc15dde7acbd088256f5590c70b24a9bf058afaef0203c2f3cf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a6fbce0f500f8ccdaa1dee8f8b90c3
SHA102d4e95c8b5f3068b03e7844c7c6f58976bf65d4
SHA2566cd90523c71cf0bd55de0723f0a0c0aae45d104a8fafb1f6a0518b3d20a3f5f6
SHA5120c0903167a348552636ec0a162c1408937e2bec290674ac803e62d799f4731f672a5c51fb3fdfedf2e7c911760ca4c0c7ddc1942c1cc3d3671fa26221c660186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559424a977e88ab6528b24c311d76605e
SHA16b9ffd5004ac42f2f803dee8b0b4c0813860174d
SHA25697e077df418e642bc1951980c5a0c0bdf5fe14bba6cde4f237d88fd6a1a4c16f
SHA5126e1ba0ca62d1f4256f8a64b873d14d1eaf5b70e7ef5b177212b59f47182ce94357f667d42b7d31a0574482adad891161a2cea89d0c82c6d79992dc36ad63708b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc07eebb13073083bb2757119ee4af4
SHA1b68db3bbe2989d22e2f9d9e7643e1571ff638e34
SHA2566efaee0e1fc9aeca112b1c64e4d1955357ae9b3e5e6aae53af06de52033ab2e7
SHA512f635c69985f47fc68d35b50290f010d921fcf687949e0c7c4329207805d22783050f8393eada0168c4751f8100bca0c546159f5eaf8d533a219cfda8ddd6e76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf413e3030d235396ce68aa2d9634f97
SHA13fa7528a71997c46a44dce7f986c6f6c231800c5
SHA256007200b43d2d47c7190da99fbf7042d56b9c07b6f4f33f3a8a96b4aec36bb70d
SHA51228e868b292003f199b7f3c4c49d933d0ec8acb0b3567b8ea00af4b9186137300aa2145ef107be5e9f0320f8a9f26b780cc897e731313be16baefd904d98c1d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5450dcfcd4054d07bab2dbe4c121fc11d
SHA128eff543a7f4cce92d475c8e0e5e7d5658f19690
SHA2562c1db37fdc03fe280c8a5c3d7816d04cb71a31a002eef5355e6ea813ac7d91a1
SHA51278f71665738a47e933405740d089168f187254b9afdc2d8f847567a2d76f824ffb2f053a6e813f0717acc2cc26d29949c0f5ad8ad2b09c80270a299f6c285b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb4467119a6fd63346264b1b8d6d65e
SHA1ebf557b9aa463f49a5c1ebfdd63629d1691ab003
SHA256d2308f7e63cba548bb61bebfa3cea3f61bcc9b76893193cea4ad4fe0e6751ec7
SHA512548c88cd64240984008e7dd8830a2d31800ca759584c60d1dfbaed483b9ba1143c755e5e0162c959faa6b040d7f3230a05c229ff9d2a9bc0ddd0eed44bf5c06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625bf8e28d2635c196e8cc8ef3a139b0
SHA1d6255673300ffc013714060186b5ce24a0cd91cd
SHA2565151e78466fb406f7b942c2cc8154368e2b558d577ba0c1557ff8c8eaa762040
SHA5123922d2ce9bfe279454f23315bcaa6453c571e53e06f40c6855b42985b8947ddc46a8e90727dd2625d08909f2f1b60d02f8d6be1714e47ff88625d61d28626022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b59ec88f5a3073de25567711679bbb
SHA176059443c2fd88595b9a5d34a2ddbd1c0a9ddf45
SHA25699d1cbd9d81975e0cb19ce10aa13e2ba1b6c42147e828e3b5f0759d1d98aa293
SHA512d860ab2e792568ec66de08f437a193f326481e69d9bbf7b609a9b0d82f64cf8ae4f612df3b166b992541cb0f2fb18a5a2f4a1b5ed324fc2821f326971ff8189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51660dd93251ca467915e055acd7d1ee4
SHA1f4c4db53d59d2d0cf858d6accc4e0c9cb3df45ae
SHA256ec8824a1632cad359e1b7fdf6025d2c3a9433e501f4571c334d24b5ccd5ca279
SHA512e682cb7df3b85eedf5b974b14491a22deb2c4d4e610432b076e59e3ca673ae03736db742107c508dd48caeeeb3135ab0525127fa2a276614c6581255774008ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb2576b6a02f236db153c623f69872a2
SHA199d53a772301517a0cd2b8d2f9c013f760b84b7d
SHA256f7b1e82a8245821e5066b772a873deb00197497009f51f87e34d3409e8c8e4b6
SHA512328fe50a4220c79fb59a108788a4272c8c1fd805b4ccc50c93e0cec4bd8b605d13506960e2bc728fcfc2ef6460f89c4c73726b64f8db2da638ea31d1c8066d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b7d1f8df571aa07f894e48ac263e7b
SHA100bda00fa0b818b3a1c710dc0ee6e0c8b629bd03
SHA2563a9727938353c4a6d41e6c8f7e165de1ca348555702d5f82a1af2ddc61507d54
SHA51218107e0340201d3f031bfb57d89834ca85e0f4ee5f9524923c8b36be0558634c61282e68a3cbcef240dc7e41cf62eb49d8f867c3c8bc0d49b56131e71dbaf36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb8b100aaf71fb12047853e50c93be0
SHA14ebe499e128bb43665667cbbdc9d3ab5042327e6
SHA256c2bd60118a41b7e53b7d4d61267fd320d7d51808389490b1de5ba6cba1f80529
SHA512cda0af863493c69eae2a7e59a19c52399672fceb7a4966dfb106e7aa8f13ab192b597b7e0398f315b443e8e159dab7102d2ad799efc92d6b78e71f770be8f16d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\Kraamvogel-icon-400x300[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a