Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
2e1819e472f3464a1f29fa8ca77cc937_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2e1819e472f3464a1f29fa8ca77cc937_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2e1819e472f3464a1f29fa8ca77cc937_JaffaCakes118.html
-
Size
73KB
-
MD5
2e1819e472f3464a1f29fa8ca77cc937
-
SHA1
4a9ea2257e6f7fa242b312a3431f30f4b0b2c11c
-
SHA256
817fc9d79693e69fc4ed9e4793dc0e096608efab0f41426b6224b06fe87dd046
-
SHA512
0ef3d9ea63565ae976440bafb0c2d440e8d5631f6dc85bb856bdf038e8cb0f98196e7d090c022a401e02ea9990be65dd95fe62eaa925f202508c8dfee1f6ce1a
-
SSDEEP
1536:5HxDEa/t+tdjI0mzJrddCFnw6VE5xEUrNEouT5mCvJfF/vzafxkAapDCt3Xalk61:rDlt+tdC1CvpF/vIxkDDCt3XalV1
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d57655d897af34e430c6289a9225f092f4819e66b3c36c2fefc34956b79eb257000000000e8000000002000020000000afd14b984cf1216bd4c72197f60a57b637801e28a83841189bf6ab4e0665f3562000000085e4dfcbee68815785762fc34842a110375c016c20d814299e12e530518c542a4000000054af758a568d071098a4a805578b74a71514aaba089195cd0f9b3c9c076a7152fd4da8eb32de4201d6f2350daeab9139bc5442f9a413694d42295996e8633d15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421489297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3151F51-0EA1-11EF-8840-6600925E2846} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0109ee2aea2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2724 2800 iexplore.exe 28 PID 2800 wrote to memory of 2724 2800 iexplore.exe 28 PID 2800 wrote to memory of 2724 2800 iexplore.exe 28 PID 2800 wrote to memory of 2724 2800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e1819e472f3464a1f29fa8ca77cc937_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb1c9da5903a6e3b001af3d5d15b607
SHA1e59b89f5d49f7678efaf9b0ca683ee6b6ed5cb24
SHA256775247ae4c1f317f356af01720947f0d40d340dac8f73e758503284b66ea95f8
SHA5127e142aa236654303904ad25bd12fdd06c4d63502b9f23f88727dd23baa50a3e67a6d69e474812f68a642519f2caae00d7acaab27f37d96a43005c82fcc5e87b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbfabb28996db606abf6503a479f2705
SHA13c87db085980fa382536b5910ffd504fa280d651
SHA256fc522817b5d6badb76310b38e76d8db2e78e6ed6cdec3ab85b95102b0973886d
SHA512ed20fb8a61606d206c3d6a9416a0c7f8fa58ed0dd9e36f417d1195003986fa81d708b005b637661332898fa91f4fba8c6c56ecb9be2a17a73c9a62e09cd8bc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57391d03856d18ee574c67c37cb30564e
SHA16d351ef020e2daceae4f5e8d9cb72412194d4560
SHA256a69ff5597edea7e16a91776e0992e730b995c31b555f78e0393834be42069c10
SHA512cb750a8e6c9bffcf25dd6022ed2121b357c2c728bdd939589205d090b12b8ced5d69c539cd193d715698d29be7136dce5234a52a1e4edc3dd87e16d0dd8444ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd673b6c2b6a669f580bac9fad83fd32
SHA1f6956a558471988f9311fce90689caaf41806b0c
SHA256729a4c319a025e0b324cb3bf0c52e60a8f313d4b53c3cb9673e03654d9be6098
SHA512cc9a18d072fab476096876004dc27b32a88acef2d23a7f5989880469d5ea969338970a63df0b0456c6a435e177f4626c9d668965d6b1c8b475768bd63f651b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d57a7bacdbd9a2ea8839e79a03035885
SHA12cbc07a63fe5adb34bb7a5ba78f9bfaadfecf0cf
SHA25639fda3a1cd81d0d96ad8bb640794446a58c4ee15ed41a3b7e376a6ed7fb69577
SHA512f11c897502bcf5006229e25bdd6578e94b4a720e5464f72920d7a950a1fd746a50e604205b024184eebf86663de148c38ba19e0db6fdfaa72fe5b8f8b1db18a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51865f843c986d704d13c655e07e42888
SHA1be66b50fc802e14b2ce208b30422407412f28705
SHA256ff6b15599a0e23ea919d0ab5e5401abc5d94034ccdd2db78a570c62d86625648
SHA512f3a95840a5715fad926aec57345c090e01cd9497086ba14ba1e317fa1c27d6ad31b095605b393cef441a380464ac694964f50238dd33679049734da27e599906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e225177b07f66b6621b62b093bb930f0
SHA18b80014c9ed3cb19655a2b40f71e75dd4bd712b0
SHA256422d22d45bba23dc761e4aa8592a24d3bc49ed41a9b68c2839d04e6ad6406a9e
SHA512cc673bc1020e176137c4f3a1d4a882a36d1c742b65926cc2aad68135fcce56b5da604707cf42ae488e49611eb9dd592fff0f336b5b7761ba622cc026c3644c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c70990731c0bf57c3c3dcf5b1b91bd
SHA164705db2745f3a986607fd7213a31ee02a53d115
SHA25674a77cb59c225a547c136d064fe449b9978edade7f473103d0ac8b7ad17ca2f2
SHA512c226f6086cf1812a26158dad5b27721a178b37683b270ff94b146195ed3fd77e26afc85137b270839337e467f015711e9951258386470c09070b38c8cdc1315f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f3c0de26ef2d0ea7254cd253f143e09
SHA13e78084819fa956e095b6178e7aebf1ad44159d5
SHA25628567482d56a588833ebcf07a92ff8e77d9e72adff8d33acb31000358ad5f939
SHA512d2942c85ef7724f0a7c44e1772e8de9268e96f2de79579f62987a81bf88120958c433856dcbac1e6d3522bb109ab4f21990913128162ab438bce47df5bcafe87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e701b375cc5be0aee08393c63fb6ea1
SHA1900b730b7c095b77bbe7ead9128106f54a8d0b56
SHA256fe699c421490a0c42ea96b5cc2c13ccbd69a870f2ccf746acc7a9a3796c2d28b
SHA5127bfdd64599c5cc163c7417a600ea16fceee1ee7cddee08867f3286d365f061714e6abc41f1b4d5e0e8e65e51750ec8b627702c4fd294b5a83ead86b13be21749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5016dcd23ba90b73de9697c585531eb5f
SHA14b57034a6d6ec9ce69db9377a677a5748eff49ac
SHA2569a963b97931060903dadcc4992c0aca0daf3421194321d3d4f9502fdade36f9e
SHA512a3558ad90eff9cad039dc530497fac61e6f12f469eb5a7c27faacda40d79a4e21851b76bebc56a5762e5495124a6b9dfbdc9c3904f5f6fcc49bf185cc7a0c20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cffb783f306c01f8a3bd8f80c4d77b37
SHA1550e84fa67211888ef97ae1e77c15543bb8065b5
SHA2565e9e8e1b580b874b20b83e0c1580d57e9eb2850dab4e77910e7ed6b2c60e235c
SHA512f2f47b73007040e026de3c0e412ecbe63d980f4460f3cadf8ccfd4ff986755ced9d806b93c5dbf18142207f0f26b12a57342c78bf30993ca3bbc5c3fd1e6afd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9176c4d5803dece9ba95bebafd5872
SHA1e2838438961d1e47e15cb9f85796efc1e328c88c
SHA2569f0ef7326b10e745691f6cf0ec17a5ff2ab5067c54d226cff3a89b8790e39de9
SHA512b247237aa8eacf8ce8385a49d670d08a9e9dcea4aab201e66ac9e4151ef45069f68da5797705b7ec2ceeb4192ac2d17daeba1100972e611b644d48522821868a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ab8f0f6521f9fba0cc8d473249c63d
SHA19fc4e3585638069a5f7b676dffbbf9670bc525dd
SHA2565c50650261c48f04dd4137c71dfc71fe10ff4e2f8b56d34f7582eb4df140e6ac
SHA51245513e8b1c1d2963335e1cae4b4cde0a9db5dc7b51e322bd7e7ea961fe9ea2914e1dc36203ea3d4a61e66d1859e70d6daaae462d8e73d67237fb0b431484d2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8e2e2d1da99c7d13996563193dff6c
SHA1a031052b0d243daf2efe2ee770bd050fe76f72a4
SHA256bcdcef1f479fc2d2083591d6690ee75d943b9bf56b018f90fb513ed6c8149af0
SHA5123581189af2dbfcd6f2462aa1d2a2d74ff5da34f2cb9646b755a6e6c1089d758dd1908e922f2930aa498269edd51146b550fe968c940cca3f57a8a853b0d2de71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d062206513609271b56103de0b313b3
SHA103c050b80f8aa366f6f4d5c74167da9f933d87c4
SHA25626f128eaa498c6ad6d8732e8050b4b83da2c0538a524995b3b6f5b7b60a85f8d
SHA512c832012f3408bca9ad48523159860ee544dc3dd5b2121ff42eb27d5bad5501cf1491af1f030d365d810f6fd850ef16da2332e426cf98e1cbc92e12d279f98fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484e99b0bd13f84276e5db3fabac560c
SHA140930fad13d626986e1cbd86fb0f1dad10c7f8fa
SHA2560ab44afb42dfafa545e199e24ed3efca77c9c2f0d55b445a1af093c744d52cd2
SHA512ffd3c4caf466024134b9be99bdbf55121a48e3e7c6b2e79f28257321ec62b56614e009bd4d16eaad62d1077eb2ba1cd516e1975867db794e1f682e7678f01a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f30529582f6b92ce13f3ed375138a0ef
SHA1aae0c3cb14822c18e11dd496d61c89753f0a9503
SHA256356ccfaf745aff6b643af6a5e36b079000ab5cf9b366bfdcd65204b2c54e057d
SHA51215c3a96cd42c24ca7f8bcb4b5a58b60ff735e6c5e2b0f7438ed7fd3ada43c4813b79dddc84b7e6720815fa89041a3e170bbba87f6322229c4804645969f7fc7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a