Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
2dcddac693dbfc9732b537f70c910f9c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2dcddac693dbfc9732b537f70c910f9c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2dcddac693dbfc9732b537f70c910f9c_JaffaCakes118.html
-
Size
77KB
-
MD5
2dcddac693dbfc9732b537f70c910f9c
-
SHA1
c14452de57a571ff65151ba6bd2dd456103fc4b5
-
SHA256
15b9de8f08876240e09cd189855bddefd6558ff857e5ee5e8e1b60125e4404ba
-
SHA512
8747e654149cb2ba3ff570f8748853549ac73879932bec2c6255ff62889bcf8452e0cb1d304587ac2f0650792b0e4b6112ae06f2e33c69ccbfc51d4c87e10938
-
SSDEEP
1536:q/SBRSJahDYUKV3RWHXePkLtk3sMFvCeHAeNOZceXc+D87:q/SBRSJaKUM3yyIrXtD87
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421484542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000d3d01534c9a084cb15bc89a9544689aa92aba588c50b98dd304d1b1a88abc58c000000000e80000000020000200000002d6f863bd5184ed595bafa84496f54bd63b237c6069e1b65554546954fb8efc5200000005dd198c146b4361968f8dc53e1e522950d182122b84afa5fd84791d59e3cddf340000000b5c782752efe4ec7e126c555fe5a0d36e08c6b2d9791fcee59773ca8649d7056dc8cfa3feb222c5a2b66c2bf86df7458d216db7f6a50e3289ace66f8e42fd4e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E55C1091-0E96-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5040d1bca3a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2136 2980 iexplore.exe 28 PID 2980 wrote to memory of 2136 2980 iexplore.exe 28 PID 2980 wrote to memory of 2136 2980 iexplore.exe 28 PID 2980 wrote to memory of 2136 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2dcddac693dbfc9732b537f70c910f9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966ef504c7722318e51ab6c3736bd350
SHA186d2a805c9296fc318bf87f21031739e557ea648
SHA25659482a2c163e37655b200a076819655b4e89d3fd053e62985909259acc5c4d15
SHA512ee9ddb63aae5d07e4498c66ed1dea1c7a37f60bdfbdc13e5af0f26957bddc75c9a1ddb084c6392ad4bbc89fbabf7b59a0166969833708a67bb428ca53b45bee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7bafb8e731b56175df798411537398
SHA14ea4a1504cabd3ef2628ff190320691469534e12
SHA256ef43829a67715060a85abd3f12eb34f0e4ad16da91f69d2b4f4c97577f3c9fdd
SHA51235cd893fd98b4fcdb44e093c90773c3279b29f205dc248982e972e5382136c88ba467fa2284aa57ac158603537a3a75d998e4822a45fc9d23f84c33440009201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4628ef8022c2bd0e1ec22f09b7f8e91
SHA1835bdfa8b27d6f334bf2278e50532dfa2d6aad07
SHA256100462aae60f86f06e9ebc86b3058587d18f93f901f4d25d48647b45b4883147
SHA512fad87b90ea896c87ac3326cf1b5716b83a374195b2967a90a9f5ca7f4b2c03c5129f2de3a8c45c21458baf7e1aad9ed4709b08416e582d969fc556f92822b265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad8ddace1f539e42b6fe41ca3284f39
SHA1994687bf6600276ba17c60e784fa9dc324c592ba
SHA256a79064c0ef4f1f2d6f78cee1efed4f1bec500dd35658c5361299ecc1cac6f68f
SHA51225b9899696de64c516b8dd751e529741868aa49325a8e697476229574b830552ef4ce6cf4263da74e68920df96d4c45c2d4d679c19027a5901423eec062612a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cc3f75c65bfcd383f17f70372e37f19
SHA1452a625ff2f6162c0417476c76959ccc295c2315
SHA25684a9a8d4c5e28e55382a9e4e5f80f3c4cedb4a3f3af3f7d7ddee30e47048e1b7
SHA512aa643548fab1cbdc8acf5836b2652d86f29175b5366301bc3576f9afe6edaea86ec8370ff2919276aa147d8dd93ef665bc0d4a49311285f3422c7b0c7a50674f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50033c7e97bdb795f583c990dd6c64066
SHA16fc39532d654323b86c1751392836adab2b101bb
SHA25679e9e41a8b8cc7bbe53432a4f652e434513fc0266408b3760f17853843302f29
SHA5122a60720625277e981c6514f121474874aa5fa278757109690208d4fbbe94360a294fe65668be40a282dbece7484ce14b056111702af65b1104b856690670209a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57493ca2c49b215a133787d32db89ee22
SHA193879bff574cd8663b65e30ce77964b3ddd0e681
SHA256dcde47f1bbca949a797608ae88619b0beb11383985df13c9fcab1ab3c738a11c
SHA512238baa76af22a27500c270f8d436508f426fb9504a5eb65a6f14615133923592f1f8155c48e38c9e2e230682a91b7631f8dc0bfaddd05c7acf3e073d94af4dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58050997bcfecc6973c8e7fa46f46d882
SHA165adacd70baa3d7b67745f8f6edcc44fc75dfe65
SHA256b7a378528aac1daf3a0f40e547f1a77e2a9753d2294ad3677a922e05e549b21c
SHA5127b129909ea292a9eb2ae01dc6435f103fe25a1507e5ae8b66b8e032c0cb775337fd7b16b825f40a1d6804846dbe35a3e522658bf3f99736b5b5be994ab0e3bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac18ae3b0f8df0ab46b365ce82f1233f
SHA1e4e51082d161bd20bd2b7c527f17508d44e8a943
SHA2568ea9020d46326f57ee1d7716e8b9b7dd3da5d86f74567489a304abf639930136
SHA5120a7beb0b36f02d1f1001ed07ea032a6ce814dc2a2637f49bddd04a7addb40a5f8bdfb36206de88e23af104021dee1616076d6e80f02b792f9e8d063158b0fecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bce784b433eacab14f7d390255f6ba4
SHA1929b3ec48c18ba36e6e0f460285e59650fb4db2a
SHA256fe4b4188482c76a9cd52820244a426148e143ba7fa2bec5f505adc69cfa241bd
SHA51268214a56d6295ca0e5ffcd2e5ce213c68bd24d9f340bfbd0ab560b23eef957a3914986d89112562c508eb605aa27033724b3f7d52d80c916f2d5b0de237f0e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e74751ab08da34560cbdc61d398a0f
SHA1b312168e0870ceb1f08f4436e0eb2a32633343ba
SHA256e6d73b97136457de59f0d93545e56a182706f1695d63924f6714f052f8f7d447
SHA51223fe9cbe033a8c8a1e25cb6c0351c6a598db12c5e1804b3f7d44cd6603b2c704425b67b9bb5e7a7cd989ccd513fd59c0c5ce98e52ce4b68d40064a427e2d2226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57182350d3bc3968ec616c62bee81ecfb
SHA125f13cefaf49b105d75de7c44250832eed9fdc49
SHA256892745619aac4e3dbfd45393a7c43ed374a90d606d85f0bb9b9bc4aed50494e0
SHA51294d5e168fb96a27415845d69ffa3db4a7e2c08ea20ea9c99a567f1f99b6a48f9f2b0c584f5d2383981b78a291e051629fcb41acb175b5ae52c69aded19bf335e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fbd681ca38a1f3271a1bb25b151762
SHA136e9152d079f062f4232252abd71ccb0c5d66670
SHA256e652fc571521ea4cbcb633ec96d5ad2e28f7a8a48cf39c393ac83b45a34d36b1
SHA5122cc259eb73040dcba20d2adf67b64ca983219ba424ce013a2ecf85b91eb3ac546aaa18fb4f448a622ae711105c4bbe7e3cf1313b2b1d3c1627822a6049433c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d7d618a0f3e8879ac814b93b9944db
SHA18fce3f57f84799e8763b9a7cd5fa6b78fb004fa2
SHA2563613d8ce3ff99fb518a25bdc771499a34bb03a3b3c4392880a741856872a8878
SHA512420c7bc3ce2a69697db5e781cba0ca7b9ca434a36dc04c295d6470b147fad8025a8403561e3f6bddcff230aeb4fed795f4e9d08c619d48a98c8e1b40123c5df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44539378a69eb49bc7048482793e2bc
SHA18636f766e653bd5ed1c9234f53033855d7724f8b
SHA256508769e5690311a3724afd4a68d0d02a6b9a4c49277096976b36226b2098505b
SHA51240484ffc2076a367fd833abb2e8745911e1e96f4d102bc62528d19d55a154e7302818a9cd99d75eb13a0b436dd7ac45c05a21ca3c8970b20226c3817df3a5325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51149a92c7aa8e48b363f2a738e18e96b
SHA1c552658ebcddc68f77b106b3329f3f7358f3c258
SHA2569c71951ed1d5586ec242f4fa7a724af0c0f8b498820c19a92139f06e21655173
SHA5129c37c27e52eb04d1297cca14ae6609d574d35fa549a0aefe7f3fdf17b2ab1d052417b44c1b074e124fc0f4b6097337cbf355dcdadd3ff46918163613fa1faff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b1b730c32c571b631d1c91bb1dc5a7f
SHA1b53110a88602a337baa14b5c68681dc53acbdafa
SHA256138a39749d2c6dab6e661977acc7146320df68f441877a97e0d24bc01599c037
SHA51272e22201e35c18f6201697a5ac2726d4eaf85c52811599b8ce3b271f9ee4b7dea0ffeed5c15869f2ad5f09ce2f6eee0ddcbdc751cb8576717bff9de300a2f172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53961c757903ba859f8d82933028b5a5c
SHA153ea8a6828d87c63ff89174435c545ed1dcda59b
SHA256fd4344b6857509f9b274d5f8268524ee2c9cf3cd1bdf12976955cfd4f36e339d
SHA5127e14b26344300b87e5dce71f9c7f81d253f19b655d9c754fa1f830c2feb0fa09cac510b89ca7da0d1136e5b73777fcf9f1e01f8cbf8e6880d7863f961aa674e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a