Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
2d92d658ab703c57640d42c02d7ed310_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2d92d658ab703c57640d42c02d7ed310_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d92d658ab703c57640d42c02d7ed310_JaffaCakes118.html
-
Size
460KB
-
MD5
2d92d658ab703c57640d42c02d7ed310
-
SHA1
68177ef7fcdad26a1e98fc8cdc9646b854ff558b
-
SHA256
f3e74f9036deb9bf2d80cdc68fa30fd35c363a78ba038e012dae0b2bbcb4699c
-
SHA512
af31b5377a3feb151411e2a504c4c2070838fab0cc7f12c694caa4eb910e32ad491d2cc6c8f0188470e448c36c18145fbe85addd49ab168026d2c90e81c2f648
-
SSDEEP
6144:SQsMYod+X3oI+YIQdsMYod+X3oI+YhsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3j5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06ca6039ba2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421480791" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B1B6031-0E8E-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008bd9d8cffab0bc547ff06f9ec8cb08344d582e787d09b3c3e5337f844f53db41000000000e80000000020000200000004743e298bab6b24ffe0f1c794760a1b52924e275b42434f1d37f4d74bed12d39200000008efdc8e25f44a41f3faf165e52937048564a3e83abc23c4778aefee4fc960c7b40000000f312b7dc9e88b058bd8f86d782704047a2ce88278dc9b4ee33811c3fc4d11e754ee6a431485d96b7479e3e40733ba03b5414bf60d0ce9dcaeb57cee437403ee9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d92d658ab703c57640d42c02d7ed310_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340100852b66987538e76b2ec7cdff04
SHA187f3c9b71674b1f5864bb94cdc86cb006c2b3f26
SHA256a800bcccaeb41474c1a00375a7822e70b068349da004f71bf3c43b1dfe1daf7e
SHA512a23045927074465f7e7a310492e8da75b8c5543d06d5a7f91d82bdf54ff9dc1b48da906b741dbef91eae43547084731e3f51ff00c1cbeb04d0fcb0df899887e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f81c3d82c8746f4bdd870fc3a62ad57c
SHA19c08feef72d64e64973d8e5fd116dc441f998aaa
SHA25624d71fa8d8c2fad2ca0dbc0f1e22a329ab79b04469ecfc3bb0b15a3b52eac980
SHA512bd6ae2cd9e1ce7fde2a77120839171c9c569e75dbc251080fd918a8ad41293faae955a84327eb8dc2fe077d83038d9ee7941ae4c2d752b45007b6bf30f2bcb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ecc767ba75c3578962f29a3dbca4ab7
SHA1a92c2da60c050c560c9fe580918b92111ab1aded
SHA2562b94685fe25050ee735bdc114e425415e94846ee6e4881a9a12313d2b166e006
SHA51244c53c8ba56122dfba2aad39647842787f5fe2e5e9ef110e8d76b12278f4b71ac13fa0c74a215e093af1ebc2d65bdd0d6e978cd70e4341296c74b4d37a0c8452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5111decbcff9548a52fbb796721643
SHA120c8839a2699b75a1797014616a49f93c4a81337
SHA256c7ec1970660fc210168d6b0f6cba62cf74d05d934aabe0ca9131d0d073b6c13f
SHA51277a97af6218a26ae145b16b7bece69c4318dccc1a7a855f460b7f4459f380541fbbb838fdeaf74a64c256f936910be975d5b9ae0c26279105a319d69e451f9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d0e0aef9c9c7d141d7f3a78b550670
SHA1553e6d2784aab44ef7d02d0d8d8cf35baab4a4a8
SHA256cd788c7e42d41187b804b88526eb6db5f4bbda530b37a904546c31f35a32b4b9
SHA512f61df899d62819949621847c0ae465c4b95a89f4084e9921d9c84e24a06117aebbec4378f64c5e8249c7eeef480d4f28c298c732492eb386a78c2344227c42e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc2c2562677848a97921f8511c81025b
SHA1064d4d97da788dd6dda38d704d94848915b2817f
SHA2562d84a7ce65c016c8b5d94a902254404f6a32c5123762e3d268947bf1e9114d8c
SHA5120de0e748b3278b5f484ad2db9bff877f379a98f02edfa6a5226be420cfdc482bb03c5f00b0e37f02f37902dea2719271d9563454209340f03792822a003922f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3404d71180960cdcaec6e656ca2c3fa
SHA18fd1efce81a221955f46231ace96aded34009907
SHA25658c43522a759fae4301a1886e052c251b939294d1e8d99da9faa46085e32f299
SHA51201cb30d5e368f261c3ac5225bb34439dd689300f55c4b1f689cdbfe858848d6be76f874134c44bc237357844a233beeaf3d93e1555efc61b3faf11ce2163b324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5273a227e8f26b775d58acd140e99c743
SHA1e2ebe6370bd5225db4715ad88fa9366d213dd35d
SHA2569c8d119140824c49cfa42e785bc6cfb4fc12a0b5bed4beb6c89e68094e4a6ea2
SHA512cd48f9350cf592519ccf47b5c06e926ef7d95e08076fa6c3787c1529d305104aad77de6589d7710eec903af37f017af4f02908b49f3dbd09db307c2d8f3a5cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4b4fe47578a5b780a4a8cac816b0b2
SHA138c69e678d6300dda7ad0d56caa8e6466a29ba7c
SHA2569f7edc643059d8dd5505e59187a01afb1e9b6df4d3329989406aa28cb7ce0d85
SHA5128e3059f5af4b467b09d3cc39c3eb13396720b17d7d7c4fb069f8e63eb696459a46783a3d1ad8348f32f20d3dd87a1bb67a6b7ea8945fc39c540ea5166155137b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e34a17aee72f598892875f37a5e8a90
SHA1ebf012d3eb76c5795318600225438b7b7ba63257
SHA2562c1235156beeaf54a7f82bbe9fe80a37fbe7a0e94d98701d32e6678516c05440
SHA51274e15df31e1463f2081a3e7fd6ba9b958563e32651fef139e999e8ef8fc18448c54ffd35eb58240eee216957e4fb6213423d7ebc824743f57339afab2a98890d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f9543ccf3a4f410c6df05d17d7be285
SHA13a06c949e2683176966208ab1902cfe0ef5ab53e
SHA25666c2a90cede2cd0ac703d433a6a61f9c5e091b2fb9e5aee3a14afcd2beb74242
SHA5126860786571835da7be550dde824c487ca9db67e987fb38703c5732a1ce7382f5a952ff8bc0c3151cab80ac8501f293639873324c7258c74e33dd5b050fbb5882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59507a3f6b8d0694a7d8ba211ff8c8f38
SHA10c1bbd06e96c93f29e7780261727317a62b0d4a5
SHA2569f250674e9e6f397871254ca2915e85541a2253fcbc1b26dc8a257e1000e5772
SHA5121b968562ba12eca6768795d4d4d76b7570df25cecbab1c40b09095893e4edf48ffefef25f9314e41ee4f9be4450b88973df5d0b5205fb69453df912f4db974a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745538cfcb7f5c51a09819e8a1325d7f
SHA1a028a0db6adf87db3203826f1cdb120b2b9dd332
SHA256970a534575605d0bbdbb0aa9e0ea098cf343935ed7a5b026c2b4873e662a62ac
SHA51218f3d09c65ec51118fd71e2f9506f73a8cfe58f4c921b40dbf9fb430b7ffabfe52cfd4307b6294f38a9c34a1229e2ceaa86fe1f9fc741bb96e489c9b21382067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf01425b253489ae5ef409089d09b59
SHA19829716e5fc5c4c274b9ebe9758e4c94d7df8cf1
SHA2565e2d2b03c7cbddbefceddc658339f4e00e1318dba75f64274b3a3e4bea5e7f78
SHA512313d5d537aa7a04ed0800e32e90ca797270f7e535983872ea9e80ae487a18439e459482cd771bdca58523ce2444cdfaea9451d8acf8917a54c93062e089f188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b6e097b1cbc52da226e919e7854cbee
SHA1dc5ec77e86dd665072c8b6bc91551ba9b5870e68
SHA2566973c8ae377e86da346d5156137430c2adfabbb96698fb646c13799b3edb87f4
SHA512d2d38ecaa8dcef4b60708e1539745242314ad61d93372cb8e629db55c23304e866d791035300b5008813491ab55296e3d1965d92ed18b8d64bf0461d050e96bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8755a17f5e8ec991df69fa0a2600f21
SHA11475099db7cc03de58e43a85cd74d69f2e5d77e3
SHA256e5b2870fc25c27b6ede3db53f5961d7bb684946f5cd89e4894000ac975fa41b4
SHA512e6547c05d6f6c9f9ceb3d11f4bb3e9ed27390cf8c93e94a3c026ff259a0a8fc774c378a5d8eaf1a651008cf22ff5b97066ed38226971332ba0968124b4015382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5985e304b5f5d5551e7c06ce691512251
SHA1f53d7eddb75d606e7e22a53b123e09d3e6642cf5
SHA2562af482844200f18b60b70972d61b08abd9d379c600e7c734747f09dd70394af6
SHA5121a3364421998f7f9bc4d50c0ccfa4c434c728ecdaa3727b3a53071a7e2ff5791426c169cd42feecb84982828419e4100289b19336123f47cd335b518b4649710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b25a7d65b128b909604209c0ee7dbb08
SHA18f98f470b9963a352ee9133b544041528cbf3bcb
SHA256976e24d089c9b76be4a79653843cea5521a6c44c9f3da111700261654ee7ff1c
SHA512c5614b295d67204e9843ab172ad62be54f31ba381544d343f1bb42790f4b2d0407a29ce10e633690c80e515767f2ec5384881855220baa1e1fae9dc2f2bdca4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5badfc8810d73b188b704ef1f90059886
SHA150eb949d1935152fdbfa48ca57545761f64d6d80
SHA256a70740c111033fac20ab980ccfb9eedb75126ba4b0fba9b762587f2d3737fe22
SHA512ad2cd8b16291604f5bcbab0a2fcc992623618118c5998285a0e3a574c006a4d0cbe6f7df4f9878b83c025be15ae6d497be7c9cafaedf49d848cde697b173756c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a