Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
2e02006baeeaf913760d00abafe076f1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2e02006baeeaf913760d00abafe076f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e02006baeeaf913760d00abafe076f1_JaffaCakes118.html
-
Size
67KB
-
MD5
2e02006baeeaf913760d00abafe076f1
-
SHA1
626e868b1f623fc53ab4aff72fa52f315addd1b9
-
SHA256
57cddc31200cca73e65bdafe51c6e5b1c758114e9cace7fc8fac3ffab8c136be
-
SHA512
a4874d55739b1365fa910105e766338313a16d9e7bcec6e5d5a499f145ed85ba28bdf39adf05b043659a2636b9ed14e862a0c7281105a4f02da0294b38958157
-
SSDEEP
1536:SY5JGEjsdh+ImvM48L7De774obsmxYMXNm0vpefr7B5decFpj+Tx8EQcVi3fW+D:Sq3DVi3fW+D
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b7fba6e77dca06177b0749bc7b7b448dd86d38962b4aae78ec06b219b4ed906a000000000e8000000002000020000000862f242d24657ec8395f6aa3898c2610fe5372f7157c1579e6524b36534757702000000023d47d79ecc7644076ec6546d0e60ce34d6c63dedf98dc338eaa2f3cf83ff00d400000006eaa60a7e29fb90bf409b148ef5a9ebe72d957bda194a0f7da7c0c41f6b3b73dc4faa77e8ab4e88d7533c499253b107bf88134cc95ec7637a6ec883c228e3b81 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003f4d6caba2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97AA4211-0E9E-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421487845" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2532 2328 iexplore.exe 28 PID 2328 wrote to memory of 2532 2328 iexplore.exe 28 PID 2328 wrote to memory of 2532 2328 iexplore.exe 28 PID 2328 wrote to memory of 2532 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e02006baeeaf913760d00abafe076f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5048ce97a92dae3daf7e8ed918df966a7
SHA157a52126753f2f6d38ed6ff475f020b79f3309a2
SHA2568517a4bb1437e9f921502b439c86d0bd88f8563357fc6576fcfd1de6ea020242
SHA51250aa5e49f5565f9007199fc549024cbf957dcfabf4c51bb131e38785cf5ae8e1674eb0b4f9a65d0e3ae54fd88be556890e758c37cd2168e4e3c8226959d8ea5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6db7610761492df783aa52f6dfd4709
SHA1c77beca6c4499c15d918dde65d5ee6e62214f099
SHA256eabd6a7ae2694e3169a755c1842d0a548094c2fae67e460429ad103805617c4c
SHA51257760dd237200d0a42f763efea2674bfdc50e0b660ec29d7f0f61e9b87f3dac24f70c4a80aed587ea62bd5dd870615f76368b4a7c63065fa420a06881d78f891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50499f99e842f956bf29e3472dce75e7e
SHA19d56fbe1c5a107369a31f142ab905052d68e06fc
SHA2567641fad138c44b22e094ef21491b780d81fb4a9c713c08f2fc4b671fa6c2990c
SHA51225891ce564d14ad9b81b25705c2074b3cd3370c4f3c15ab56fc3fe288b0c8845f645e309f541eb62464b8f1665863f7f754e5d0ca999c9de859f573ed591a760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c7330a24eb9adfc439727922ee0f75
SHA1bd03c7936157d1cad4b05e9bb289679f3e055957
SHA2562706b84bb712aec12e35c2b10ef1fb7e18e8377be98ea7c2d7874c2fbd93c0e4
SHA51235c6c15fead8c582c3a1499ab1e89b8ac59f4fb057bdd51e534d51fb5948623068978514415a8558c0ca63a466b815f21eec9fb79143373316ea72882eb229cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dbb78dfac4e487389e6ee296147b79a
SHA10340f9d6a5f3066b7d61c3e058f7e186fb7ba454
SHA2565cac536d5fee51c2eb872d30eb67c0eab1af989590af0ab6e10ffeaecdec6015
SHA5125c245c7643955e4996826d2daae212c4769beecdd172962e616ecaa780a061c6f0df6c05e3b376bb0c9404a3ff8a5965af88743cbc48dd2a23f3e07d1a68dbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef825861b3e969e61640bdc5b00d3ef4
SHA1405a81d2c1c391c56f4baf5a1cfd18f6c37ac1a2
SHA2567e41bc645fc1e55fe86cd86bb50f9e1804cdd04666ab1867355dc5914efed198
SHA512cab1d5a025a1dc508af04b31e9e6041c269e671be1fb76c5fa88d41142334dbf5934faf1520d9079769cf3baca0b97ab71daf54b73c4586dfc523f06526546a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5311eabfbd0e2512654626deffcb88b41
SHA1f2a4ffd62db1f558c4582f1e0c51edd051cd1e7d
SHA256ec52fac94697cab50b8655cb678a91a76727bd04357f76c94a1ec2c5bbdd1235
SHA512523e5792b419b6854fbd60ff804431bc641a0a13d267d494b745e721c73ec6e0d50d08284c28b6a904fc741affd88a2018f772f431eeaca0f3f5b994222e1301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ea7ecd287ac475c290bd9e9a8fe4dc
SHA1ca8a056c8df113631776e6af1bad9f6b949d11c7
SHA256c2aceb38f427cc93b3dcb58624f3edffa6b689c4b5f6395b5d6f9e6368b3b9fd
SHA5129297ad9fe179f378c1e0badf43ddda65ebc62a70cfe652a120c530d763d7f37324c0b5a8fae06774838378b9097b0ac42b8c83019ce686dd5e552712cb40aa92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec9cad7648f62b40e77edf6b79cc754
SHA1da91cbd90979d95eac4c79712eadfc2041a4955e
SHA25686d3386c83492fe066a43ec0ab3bf928de4f3d68e5dbec514b62d1d3b0c9d5cf
SHA512cb8ce7beaf3fd37e75f745e572abf4feb072190e4f9c0fd89138295799672a34292f34ae3d8cb761ea4913fb8eb3f84a99ca1009c8d9f655725a23c2d2dc200a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef2d246f8c0030c359c6906a164643c0
SHA142257ee4d447f07f51535614526453db8b97ceae
SHA2561dde61537a89e918da9538e3b69b3754bab9537e328e76bf054678c20bf8309a
SHA51229585ab0bde130e39f4f96e4e06cc1c76ea007a8b18f49b9773dc0b80283f4a1748bef1343b6e5f76ea2ac80d2a8def2b5170921f6a74239457700a73a87c51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d597bf727a5e8351caf685a2da5bb04
SHA104459dbe9496332d9160d5bdfccfb1a579d0fb37
SHA256ff2ef0af8d3ba3065513b2fdb30cc2279d4cd98164fb565f111e1755e4c4139a
SHA5124981a885639869491d3cc415d4e2f0891de745ffeb57f1fd3cc89fb3ce7b3d03667a4d06cdae5e508656efa7d1561509a06978433544bbb457b9223814d9adb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d419413c93aebc099ce436ebd3f191
SHA15ce4a53b9b0a72a287e220b6e5abad6392ea059a
SHA2564e781ff4dcaa68d61491fda28e980e0dcb5acaccd58caa3aeb79e53c10907999
SHA512bc116ccb06681f2deb045adbdd2fab3ae795496a93d4ee947837ab13301f10a22aeacc93dbbebd04f94cb42d5475f78b1fce6c747aebf0698b7d05b028e54e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f17fac10cbaadb993077e985e498d614
SHA1dab5238582930ffcbc9b78acf0b41e5557176f62
SHA25634d17d3477f167045f39515f2f323b7035461e20e25e5d9f2e4d1e8354f7ef2f
SHA5121a9ab83d026be333a84cba5860030ec1643914d49a8162056d4a35dff286fed2db94aa3a58128e83493e26a5fb3d8a100e82056d0a550eff377195d8b8ae53e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b3a19dd5de8d28c48a83bc4d4c96e6
SHA1cde16a6e0de1aa2aba69a4066f5ef849692d7dd5
SHA25698e2413e90727582255b824f35628b95084873efbf54a28b4b05882772feae5d
SHA512d470b6a60d7bf77a866ab8095c38e3a0023eea0cdb5101def13bdb097a7823118fb27ee36f8f713cb3a6f3d97650f4f3c9db9377378b7ddb9e5ad9eb8efe0660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b39e5a143b7d666ffd8da04e027d127
SHA1eb433bc0d87e18b85fc6644a5ce52edac453ebff
SHA2568be322003a6bf3a941ac7965b2179a504162d0265ca7f184c3a180be47ae81b5
SHA5122ed35edd502d91239df53b051d15158ff019d7a56dc113a95c591a376ec1448973077b0c94f1601ff49fe56a1ee3b90336c010373758ab8e59e5d36ff0734824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a570fc9b39694985154906f0e12dea
SHA1a8a4fc1c8430d9a131d7a5432434a1f587218927
SHA256e0590d57b977152d5f017dc844472c2cb398476888f56636794cbe5cc3be077b
SHA512d0cb9e981bc16c9e3140c9ac44976ac1aa5d5cb85891ae0c590f44e0c494126853307810b6219616517864c46e3bde18492e8160126074a2aecec9bb53280983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1b0f43dd6000956ee29fad296ea69d
SHA1ba70b2a3432ef85c2faaab3fdc2556d6aafa9e69
SHA256b38f2dcd4153b0e33bde8dbc2c5d170d320ec444f0b48dcefe7845e0b230ac76
SHA51245c04e3c460a337b0c5439a475286b37025c8e8df447589d412a506071bc18b9a2ea9cf2422882d55d3ec00994632b1f7e01fdfc3e2f41ee9df05ce7407f9a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0bed05d264346f8d3af7db529c662e
SHA1227a96a6720d4d780f48f6768d6494112980ef72
SHA2560d3b010936269f645ec363a90e620de380b631104f00bc4fdfc06d3709730fb1
SHA51237c82ba2a041de5a22128b66d9d7b6bb0d9a46e27c48ae47b1da269914735097598cedcc4e21186760eab7148d3f00ff3c533e9859ce521d40bac600a9a76a09
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a