Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
2eee2354fa56173d0574b05363965a77_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2eee2354fa56173d0574b05363965a77_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2eee2354fa56173d0574b05363965a77_JaffaCakes118.html
-
Size
67KB
-
MD5
2eee2354fa56173d0574b05363965a77
-
SHA1
9301c493b418a49ebbc919c406e047d07b3befea
-
SHA256
d095d27f6a2d477025ab745146d0e0a7806ab9bdec2f900b880e339bf7625db5
-
SHA512
24cef24bae3d6cbc408537c58d5a4032020acc3233f9b5dbc2f61a2671db2fabdba9eb9ab68564fe38c152222eae1241ad9eb294849689b036ff12f04a01b87c
-
SSDEEP
768:JirgcMiR3sI2PDDnX0g66fo7yXCoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JfMOLTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10975C31-0EC2-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ac334a1e40583377adb960e0751698f2257c172993581d9e0b9bccf06d6332cb000000000e8000000002000020000000229a42d6a9000f7381be4c292a432a090a864d28012b6ec73e6cb73d7385a040200000007842030937c695bc5cca6e4ff47b654b7cc5944d5058c6b39c40e16205a1647640000000e59ccce1c9be4063d93d5a9377c57889134c7e69643457c651ff6c7a66b8d62926b350990056c735837247f14ae10fcd7d8447c05241b2339fd01a83008f13dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ee50e5cea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421503081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2168 1704 iexplore.exe 28 PID 1704 wrote to memory of 2168 1704 iexplore.exe 28 PID 1704 wrote to memory of 2168 1704 iexplore.exe 28 PID 1704 wrote to memory of 2168 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2eee2354fa56173d0574b05363965a77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e2dadba287940c26156ec4e872bac3d
SHA1a32c96be6f4206a3db72aa847beac3ae0e2c83f3
SHA256333a2d38601c6365c2c1f197f4924e5a3ebd201f2f175694cad19fc0f334941f
SHA51259895d721e7e5e76d20a99d6ffda33d3c8a236a1dadd4ff57f5f059bb5f745681af7adaaaec6ad8be26b1d2040620e70e51a9ec5c91d3be30fea1e89eed84c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07cfb5cab275c960bdbda17ab663aa1
SHA19105ec27cce1230059292749cdfda33b6391d37c
SHA256401fc2b9d92e42f84ea4079819c37d86a77d763e410d63c27f249e80f1186155
SHA5120c279a7095aa600f689b27b3e26b1eb13b121ce22afd9e6e6c44cdbb2830072f02772ef0baf8dde5bb03212423cc96946d51ed896553391c4a78abf8dc605e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fad0e91f7e36f20c34d798def881794f
SHA17731f4d34289b3add3c824ed133a15e24d47fa63
SHA256a9f908b617377e6422e88b5636385a2679d1b7e5c18b8a898f27c2c6016de727
SHA5120dbc997f1c9ac9ee66d2d163c5506cd8049ed6bb738adf0cf16ec8d634ea0ed4e66953c4a0ce3b9cdae055dd4d93d91435bdef4de3cc28641347fb3064bd1fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9ffec389014eebd82d70938863028b
SHA1fa313b3b55971e5c1a1ca37ec370d71fb328151a
SHA256756975002585813aad24c91965f70ad2e1d2bdfdb1b64eea6efd175669f29f36
SHA5127d4fcbbdf3c8be54978b2053eb35972cf490de0c87dbbf5e28c4cd0d9d91cf665f5d07df8d0b0dba2d653d7f8afe611e995e981e9bdeae992546002aff365512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7503a429d015ca22405bdad44a82ba
SHA1f699b91e9386391082c8a33bda9b9ba31bd8bf15
SHA256791d03512642edcb4e9d7c3ce375a3634047cb55812f95bca0b00dab7c0a5b31
SHA5123e777b0e4e5855a551a47b3568a491631034e073031e0593fd1cf645122ceada29fc9223c1e1d704f524c2532cb3726e4c0c84dc4801992a4bf45ee3641f2fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee3a172ce7633206552392c43502199
SHA1c36b903def8aecebf08fa9b9fa85a9d0d8e189ae
SHA256226b1bc0fbd5d8fb0f35b176c47e16a173718324e0aa112a79c508399bbb8a66
SHA512434d4a0b602b53d5e33631c04aa12481e516e096e59275309ee8a6348149fd2811c163996328e96e81e0040775f87fd5c15f0271e3b3099db32a92350104b262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d79e2ded82b42ff998297569ab76a30
SHA16e5d9bcb9158b4b34028fb09f6eeea490215c9ad
SHA256fd1f04487c647f553e69f5123a4cdf9958f88e59f184cfa31da1c0b6eb6cc02b
SHA5126ce914844962a0064a2f98a1317669420d88fcd44670d3bdbe91069033dbb9624d9939847f325d3244f46fdda1a316b6ab01af2410d148e9aea7834d2597f5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd2723963cb79daacd65d6e6e640c40
SHA16bf4b9f7efe0ec747779b0135ac22c88295695c2
SHA256784c6f74df1b361c90c0b10f9d230586a2e96c2fb1e9c09aa0d392c7350f6323
SHA51287b5b1c0fd1a2970f419d4c2186b4a42493bf662a3f1e82a495e915c772e34bae5659393e55fbb267c99ce30957ac1d8982f95ce1f2e91036eb0229c28706bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53baff78ef0846b564804a81502de4afd
SHA18bace931bed676c7fc334fe795f4e2833384b48c
SHA256d1233b4b47a421beee0f64c4cdb047b1d9f910611505e7030a92817eeeb938b1
SHA512c896f82c512e7eabcc9dbc2f34a49107d9bfdc9f91785e9ef33ffe5ed90ebb481c099edf8c9288f63421b165ffe7ea0454dfd689ebc9906324e12a35d59b3a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578307c30ebe925ed0d77d0a69341cdea
SHA125655ff8e52433d5bd65f6c23ce44ef884d2775a
SHA25644f37d492d6c284fc30407b5ad69b8a0a439654f0c423bbd913c2aa197d62d00
SHA512ed34a7c1cacc2216389c89c5536aa759f25c912d614721d11e000b2c9868c953674790c295e52dfd0204790f357fef1c3aef28420d2107456dd886f51f03ae00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a22f9a8574bc3cdea70bb9f027d93e
SHA131ddb7dcc85f2041d2ff834582f1e6d689f54da5
SHA256bc9c5d29f79e72ff68f3fd7b29fd6119ccbceebe98fab47b367a116221537e2b
SHA512935fd59b586c01fc597f306421a9f718cbc02ecc79665a673c05ad37288a0f9992e50ddb7f86a79576d8673d1ee495b39630c898615547f0174641b895faead3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c8d72a8bf2dd8945440a26f13b1f6ea
SHA16117c344b4202c5d9f116b04336c8364ea1bee74
SHA25625417486f62d0cd7d06da27dfcefc21e3edb9e6d709bed232d0fd407c514b3c9
SHA51214d2ab2924f8d3cdc0eda61a9769d8f825a24f8c45778efc22469d15fe14c3c960e53860a7c5eb8efd602006b304d19af5634dac27044ffd0a49a2028d7dfd53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2adfabed725384134fa452015c8125d
SHA1bb6dab78277d1108c50884b98f603ea6acb1abac
SHA2567fc4688f346a6beeab942198694a4e22bda001645d103bc1158a82e917936e1d
SHA512e3e55063fa91fe75c21c2ed73ff89a68fcc718ba28c5f55a858ae30b8948296ec925bb89e2dc1aa959bcb5a7a153249aa4c0dbc56d64dbed388a6867c6436705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509a3ca5a2ce90e854c726cf9e7c14be2
SHA156f6406c8cd83de5bdb6743a6e9742358b432989
SHA2569424e1e86204c41bc3e013972492586256579e708932815fb1c0698b884c3e42
SHA512effa35bc5efc25e5c187cecd63a3ee9049139ba42c775196540e8da3997a9f98e65428900bf10a159373f2958e7d6b2d8b61c26595e498ffcb1fedfa35fc5413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5501ef87f46c1ccf605fa2d00c85a44a2
SHA154669e651115dee506d866efc6a1e0b208218fe0
SHA2564e8d5802a529bd60c2b7cb0e7abdd4ff799895ac4e4b96660f497fbf33865f9c
SHA51295abc85cd7fae2ec6351f85fdb4e877ce9c40e4ff7bd2175ff8134df3c22e94f21f4e9812ff93ffd852f694aacf5ef5781de705c955da035ea06ac9b8103bd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e5758482a80ed0e69d36db338b1eaa
SHA1971397bfbe428c40282eead1efc7de52cec35d0c
SHA256e1c6c23948ce7a5f0f7235d329c14e01eb4965f6fc3e0b89829e8b6bdcbe3ed1
SHA512806faf0f622c1578d5f1d155a7240444c0234fa5e793f5912ee5128bfc840870459e7c33b676c06e9c8aaafab43e890400a87d1feb55f1c43e4727dbe2ef49aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c2f2a92d8444315f3aeeb9a58e2d1d8
SHA16aa8fe306549757cfd122342017d81ba65fe6cbb
SHA2566e77cf43af565bb36acc01f9e32ad8cbccda5b0c46780aeffbce29f8cd152012
SHA51231e6c5d9a67929ab28ffa7b52981512d1468d6eb6a57fe9172ba23aef3a7330fb4b9f5c46ccb3057e01268d62301ccab1e9cf00839143f0bda24a7e97d017a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83cfa15c616ff005438b2a0eeb0b6e0
SHA1503a0a6656f1a1b6d896b5ccdb9e9c6ee7c31429
SHA256c008ee3f2bb4a427ecd42ed24b568a270cb083323918af3ee48ca6082af007c9
SHA5122b898855b0a8bafcd10e0ca8e307de04feb947612861dab6a19c50e0c920d27097cfb2fe0bafff4f4f04ce4a1e9d76783fe0939f1f9ef0bddaf08617829afbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a9d8555fd360f9687092bb61c1ded9
SHA12d9e1ef129230a44bdb0208274deb309dd5dee27
SHA256ae1a125f07d9c95f2313324ec96dd0879bda0a54a6bbaef797d356ea3174b9bf
SHA512e2ff014f75f88fa8737a6765bb35952de53e7ca3a844aa8ca55a6cc232886b7d53d735d96e3f1a75ad3b28a79dca5e6606a0028a4f4b6bd51379746ac168e8a4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a