Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
2ed90ecb4e934d8bb93de6db84ec7726_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ed90ecb4e934d8bb93de6db84ec7726_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ed90ecb4e934d8bb93de6db84ec7726_JaffaCakes118.html
-
Size
4KB
-
MD5
2ed90ecb4e934d8bb93de6db84ec7726
-
SHA1
6ba9588c1647167f4db5e1ca345298da428b4601
-
SHA256
655208e7daf77debea65169207b8d3fea3b0cbdf12c7ddde3fbbbd1bdc1a2ca2
-
SHA512
bd4fa56cd86ebf19fe332d419414bdcb79882401a79b0179c4e5c4deac20cb3e7aaba9fd0b044c7c148f0d2744b224e0c5b9adbf476619bacf44065c2ed21de9
-
SSDEEP
96:ziEcP3OymV4MSEPBDvV0n47ej/hgOKiljGR1QnyneFlzZCAnFn/1Hq:zijP3OtV4GD8/h/KiZsQn/FlFvF/Bq
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fbb9e6cba2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23C600C1-0EBF-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000eae0904aecd5f8cb04299564f39c98d0db683a32d5451717cede5d2c564e53b7000000000e800000000200002000000026ccbbfe0e105282bf27a5329ce48e88d8cc2bbef7af813b8f86a14ae7468d2f200000002b358ee4dae4977b2a827a518f99c8829ee2b73609a026d36c46f45fede8387940000000c7a44255316f9841dce7da82509b34b49f78d4bddd1311d3b9e55274123edae5e6aa900b181f0dc00064086b137e48c93052815f67a42b7ec2f5c1a44c8cecfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421501825" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2624 2524 iexplore.exe 28 PID 2524 wrote to memory of 2624 2524 iexplore.exe 28 PID 2524 wrote to memory of 2624 2524 iexplore.exe 28 PID 2524 wrote to memory of 2624 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ed90ecb4e934d8bb93de6db84ec7726_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ece637eee71a0b308aa3572c60978d
SHA102a63cbccab7f49dba468eb0f62ff7ab8407bae0
SHA25634e46aebdbd4094489c08c6e2a46bbade1ff0cb83a6c06603308c845925157d3
SHA51218e5cb7d5878ea5a81d28a0b9e7f1ca888bb8c83272e753a2d369656962ddbf46902c094fa6284ed50a6adfcbed5abd1f7048ec2bdc75a7511b1cc75e9e4c599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd4920481abc4aaf13b1a7dba91aeff1
SHA1148340547d08bfba1fae755da176b285f98f8a25
SHA256c0db7fff8b1275fd946a32fd64a539bd4d7cdba361b866bc4da9c3fb122630b5
SHA512c0777ebb848242df125a892bc5444ab1e2c41e7a187a3833c723576f1d85042914d46344fe84a479b2699b0b5946c4a64ae1e51d2f2363b79a696c65d6b3629a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528e1b7af81691629853c7065d92b5ea3
SHA18056c4d43b733197a4137440f69bcf79f95ec289
SHA25642c320404daf6d5debfe0b17cb00bce1a8ac3152ce467dafe1d06f17d481e851
SHA512bca7bc6a2a625c3d25b0a5e36b2062396dab89c648a1218210ec9278034007a541dc6e9e527be9ba9678754d666d5b15f903b172f63fe50d057a1dcb24a56094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d516c6286dfcce5427853563f77c829
SHA1aeea6c378242bcad2c3550d4bc528353eb25da92
SHA256491ac3b8ec0a62b5558792ebcc3163f1973e60293ffdb02a636910a278527750
SHA5124c5a788276dba6a7e22f512cbd956fd58234806cd8cdc536a1d9d3f43a773e5f82f54418311e38444dafa573670f89fd872156409fb2004a212e26b4b172a4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e40bf3c9dd14166d39ed9b6016210c2b
SHA11a665ac25f4df87f6d47840a096f45604309ca07
SHA2567b0bad1349b8e0d8650d1749c01a825973d2435b64a5cc0ccbdd8c51228df3cf
SHA512013d44ae6df588285573096ff3ce46f0fc2985620f82731850c971151ad222780907f2abe0f61ecbc5d0f747c752751ae3e4afc9790b5e4b0865a712cfe36b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc961b0fba7b3073bc508f93eb8c0e2
SHA1330ded2d49244dbcaa0690e6e731346952459b07
SHA25658fc7419dc8093ea966bd667acff637285352ff0165798c210df6d68c8cf310c
SHA5122cd4766ebc7a962b0794a7e9658718aa5e1956828928b1e576d38e41037225a3d2a830ea48b44f0aae96863832ccc39f9522887641805fd11c7906df1d753a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c894bbbc073cbde6a2d3682605f00ca
SHA1ec9bbe624f278cc5fc7652924664781605c0cf57
SHA25655104cf89277543c3a925b245ba9426f24b69372ad80601607f4051d455e0a5c
SHA5121d9918714670f49bfe25ae10afd0f209d63cb1ae8d4b7bffcc30638e465e8530f4880c5d096f090232161b5b4d53959cd6f9171b69b8cf7e301423378f481987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd52b6ddef98ca80eb7acdf196943ac
SHA1dc79761436a3e8599519d3b49eac82dd6cd3bfa3
SHA256fd3eb46fea1998c8fd0768c6dbce6941cfeadf3c3ca83d2b9c399ab1e8ddfda8
SHA512101a0f622dd1482b69b0ab75f73b792371a1cfe4797644cdf3fdc988ef728df80c1bf7917cc3aca13c2787345378ebb71e15854b38a9eed7d3c32ca42e26cad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d6a99662321aaf6574cda674b595415
SHA19d89586df3ba67cd884fdf513e8a3899e92e74eb
SHA256440a1b5dcbb2d53112b94f8784edf41434fec54e3332f85001be54d538e5ee0c
SHA51225582781de283ef15f963808df32f07f45f87b27a1ccd4b794e4f8335918cf3ec77778c07dc12c24161c4c4a76c4762f74bc3a56a2669e01586af8fffa580e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6332492bfccbf75db29e0f7065336d8
SHA14384417a634ff1caf0ebea6476fe20670b88e323
SHA256c57c9b19d009f54d4c2fb26ad03efe3023bc2b252c921ecf07783042664f51b5
SHA512c2548c07f77ce443f26cd93e239e72525b3d289ae4b67f20fde82fd835a6fc06d23e3f3e0f2aad41aedc6e30f1bc51024dbad944ff0b2201f10f96cb0db29fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4e3055bf1ebcc4f74d4b8c9a3d526c9
SHA1398e14486f5af322542e0e6e31ffccfcdb69e70c
SHA2562301371a3641828c44c0f064360179e227283ae587e1344d7971d851e0073569
SHA512037fec37aa48b2cfeb24444c6890c16ac5cd7356862670c25d88cd5611986f6e8e6e2131e02c9b29de17d3fb6903508ef599ded9b1b5c0ac313b4609ad85e404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b510427292c8fe3ffdaaca57a21b315f
SHA1f2a231dc4ea22f1212c3700a513da35975897562
SHA256e8a3959c07ec9d64f3a9bc395582a67dfe751e4400382c44604f74123a02148d
SHA51231a22108f7e30e984a1ccc74d46805fc1192997841e984f5a26bd09f8cc6db419368f24849bbbc4426d2df80628f330adacf7c7414b6f35fe571389faff758a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514db3e31e399b4f7a1f917fbe85aa0b3
SHA10920e6025f414f9955695beb46910a0e2da6b5f7
SHA256010358f99c9c183ce450550cf35b0a3ecfa726711d3773de3a6cdee4cdf4c334
SHA5122cb1bb95eedc91fa9a61829df6280b9358fbc806b90a29b7ae1d0e64317772aad4a61d3ddcdb452c8ecaae63739cf3e6369d917064cec82eaabf48eff80c11d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5021b71ab1f6bb3cbb7e90b6c027138a4
SHA1774bb92608c9485e2500d671b5c5e4c2978439d0
SHA256b1273d64786abb1ff0d48bbb8427eb7af24f7d29ed31c818d1537365ad293e84
SHA5122d248a6d3f8cbd7c560d52e4cf3da0436e047a4e45785fed9aaf4aa26ac4cd5cc89eb374a3d9106a3669db22ed0cf166d6540fd2cd5fbe3ff1e766d8116cc7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff98780ad730c43a4c73a239243ceac
SHA18266b3a870ee8e76f3199fca5495fb10f3e573d7
SHA256d5088d5224e0dfa8e98391718e09e7f19e400816e21c45cf0efab67ed0f6e436
SHA512441bcfbdf13449ffa4dbe1c6c0d008fb13c797270b851c29e854180afe2c18ff94a7f41704e7854fbefee707834143dc72fd98505c38a7d8f60c42189bdbda06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e4719c12f138429236fb2e26389ec9
SHA19a4d4030049de1658cca19d5cafb5f556dcc9d02
SHA256c4241789fb2cb1cac4ec13010f96f81429f1e57c0ec7959791d0d7cfa7459dc0
SHA5129e2c58a98152945cdf51dcb242b31ab617f85502235ab8d00be7bb9cdb1022a0320f2eaf1dff5175433a09206de13234434d391d2e0b2c2c16e5ceae6dbd8b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ddbed89133e8c87d7e1c174a77bdba2
SHA1b5aabae2db13513965eee83d44ec93cee0697c95
SHA2565442795b01cf6355907d58d5d602054beb80f29a03b5933ef19ada4940ca05c3
SHA512ef32e98449ccad077ecdd47114424f0c2201a88de89edd3a01f71abd518fae147c2af77aa389288b926f5b6f8cb5df65ac82592bef9f19abc1142bd09dec84a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546dfb8cc623bbd8fa5ce5d9ef8972268
SHA191e797e5390a2959b653bd5bc728f26a6b651685
SHA2567d0fe3c8c49a3d73c24c2891ee1d4473c9b3d5dbbc0461127068a08c9d3042fd
SHA512f0989ebce4f2a2709ddfe21e97c06d02db03a4eb20d605bf337d34abb23397d92ed6a83543727877165d1e8f95ba84770cdbf792c22e39e20a2539021bfb6926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b0c4ca05c66ac7b585aaa9b12521d0
SHA1185f103a76955bef9ebe4e0fd294eaa194cee15c
SHA256303c356842f658b21f62686c871c15b22c5c58a5b1121b00bbf906a3bb56c0f9
SHA512d810e59f9f37e0a2f811567cfec228467766a99c6333ecea8317f8689091d0b7a8f82852c79dd90cf422a1623f9fcef388feb192347ea9d111d8dac96dbc248d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a