Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
302839e99183ea20f633a0eda0b42dfc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
302839e99183ea20f633a0eda0b42dfc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
302839e99183ea20f633a0eda0b42dfc_JaffaCakes118.html
-
Size
753B
-
MD5
302839e99183ea20f633a0eda0b42dfc
-
SHA1
b50f8527a12bec2be1772069f4d0820ca3a3a062
-
SHA256
71706a0430dc710ef9f27be972b65abf68337c9327db29f27701b69e56248b21
-
SHA512
9ea285e9a62a49997bd3f433e3acb7d321b8979a77606d02e0f9814e175a5fe29ddf1fb676c4baa9ec1756ef40433c36a85c586fcc9887e635047836c0987b6e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421522840" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000003759fc5c2217f73d0bd801b5f0249b2063d78e2b0af06b00ac5a757944fc569e000000000e800000000200002000000003547690a5a2064aef6867346417d04d6349d7660dab713221a4d438e5b3329e20000000b6ffc2b7fb72ea3ee4f3cbf80947bb502a9ede6cd30153b6d557d54b286e5cb7400000008677cea145a73e7514207b85566b9c17ccd7acf5e0531a7c34dc3a0b0aa1c8e46d4536cba125f39a607000e9252b0efb598573ce0761a42e21bec80574054db3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c80bd8fca2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11B1F571-0EF0-11EF-9EA5-C6F68EB94A83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28 PID 2700 wrote to memory of 2540 2700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\302839e99183ea20f633a0eda0b42dfc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef36105b9ecd4683a4677835aa4d5eb
SHA1acf699d09fa832419a2525826d5780f1d711a984
SHA256d62106b80fd2742e5b3f3b621cffaefc398707beb5e4ebf0d64c76a86a2cdf17
SHA5127b7e35a4cf7bec7bf4de7c8b30352bc1c456e030ebad19b11e83e3f86706fd276a82f87d12e93e7f948fabc5de13342c9dc40440dae588d878a3fffcdda296af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e377273e8b1bf2a2ebdb5d6396a8d392
SHA185dc195dc1cc94a60e8eab2ea8d0a0a0ff459862
SHA256843e6792c6f38f4e6069e834841334d49805abf6a3d95d536008f7bfb2b41679
SHA5123dba98b01130d035606cf5c3222b9beb822a956da7695c2d30a6124139a43fa19f6f91cff58a648de5e7eebb6cd5c420df5d759cfefc608725e74a5c7b68fcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b890aa92d634020500078bbd9c4b6476
SHA1f81d6233c69af8c2fc9c8783b6bf063991523da0
SHA2567018e2f860834ad35dca8b11ac0097587a05b2beacef9b0e7a70c0eb13978833
SHA512fce311ad356966251ac5c27c8a1620cdf5a6c681eea097f825a2eaa43798153064f6d26da955d88ab4615c7cb52012a8400bacdebdb757c269fae22cc19e99e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e14f70765b1eb7d54f477303281493a
SHA12e06e4ffbd73d6e5bddeb0102ce093cff551e36e
SHA25659d4600b047cfad5c2232108e7d25fd2b71f5a9b98798cb8e9ccba75232e0e26
SHA5127a95eb962d6ad6b6920d436623a50a684d3a87abea908cd92f19604378e81dc11b634abd582d92eed0f3e7ce766f93236cf3f5c2f2ae690aafb1c65d1301a1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dad049b6a552605d2fe60f37e09576a
SHA1b084174098773934669b3275e30dd605d8816c18
SHA256f1d1e4406e116c866dc08472e2f4f01d0282cc83b3b1844eadd15a8f7e84f631
SHA512b81f6dfa004d19dea60b451013a48ebd1ea9d3a4e8a9c7d8843193696d52cc7f76165e78a9344c0e69985696be41d56d30147733c4d53f8f2a148279004fe3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ac2f20598de5fa33b806722894e2f65
SHA1f2eb2d4f9c9a765b72c23f53e14e71d1a4f76a81
SHA256eba5a41078be6f1b2e6ccd5a46bdc03ebe71b13973bd932b3381cb868362cf84
SHA51201780c0ccb1067bbf794e5caff25ebdea8a32c28179a61a269a849128145b5e65ca3e7549483d50c12e2a712dbf784006aa00a794316a446dfed4a41aff9a7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5719094265a97de1fd2d3970bcb5cb778
SHA109939138e36e3be3aae7999393171d33bd1c88d7
SHA25679b7a899c83521fd54d5896b2f0cb2114986c9ebf0928a27df148962eb97d61a
SHA51210f07a013430cfcce04f305622bd2a13b3a339c5497864900c776176f913e38b4c72bd0e6708dfa01ff2ca7f904477fcc588abcfe469876dfa22d8f26b12175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d366f52e9b6127aae4b7e304af6347
SHA12ce249a67b7ead6dc5ff1ecd8d06128a3f36583a
SHA256357901224dedf240696b04a08520cd841ece16eca9e8bb66a2ce21c3b8a8dbf4
SHA5122e5719f81039525143aefa05aae04b6cb6c71b201b81e5a4a87272a105694940ae4061fcd0a50e209fa51a94fda2ae3edd67f72fa1f6a946039b03cce06b2701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564dee3750b740c8604dde1aed102ac8d
SHA1a60c49e810db14a895a71a4095cd738b0f4f2456
SHA2563574f948e2ce502456e2003ca9d8b44866be046d6a6d5cb2be737cd76076c30a
SHA512d3e8eacdfeea5c8dfef7ede8cbb00691f6d8779c0286b84c02acb12b8e345cc3e1ad96f0beae89da22574381d3b28e7e7f64dea9c2fca57300101d80c8194736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f239332ccca254181fdc97d6376190ba
SHA177cc84ae13f007a040dbbf88f820a2913c2ec8e1
SHA256d6e98aa8b6b52a707a9427c61c9767437ef6e41a1db1f2d3ec763034c7de1fa2
SHA5126ed557611ee289062c0e1d866a77fd1dd6fcf2ce414474a2a50b7bf6f8743d4f49aec8250f27d32574cb478dfb1606cfbd382a35d26e7f253672bcb4a35497cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ec71e102452f3401c77a628cc6a9fd
SHA14a4898d91aa723454817d83b5af7e3346aa5df68
SHA256d9b53d8c33b0b4fef55a2727be92d1cf27594ab369be4cdcb2562bcda25ef1d7
SHA512119fa83d6e390cc6967753fc0c6ff0496da81b46e9066499656b8691a6e8fc472aa0eb807bb94aed664899397a785f0965bd632c9038f0dda80334940809c913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f040328cf82442223d1a258b30b2cd0
SHA159e95c1553fc63a9b9f70dbe30d535e5e13eae0d
SHA256c5fc34723e38642565535822ce4cf12ff585adf4fbf5b5cb81b3391630aaade8
SHA512f04fca889fdd063e38995431eddf4861b21fb56ac59e1162efd0398bd0fdd91325dc579c6e29968c6a2bb8b776f4c0a5893992f5e3d83d146b84a6ea6a108eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb0cea61137df2d05594f06c89a7eeca
SHA10bfb7111864319ba61553460fb1c5baa50421478
SHA25649ee09d505dba04455be5e9d96d5a5153a9995525a56d460527f15d1a9bbdb7f
SHA512202a2f821970360cf19659ab0079932467860be686306dd37ef2e827f180d4bcd9b4b01d9135e44819a7ca288327a54e59d081f15b95b45c0a314fd6f89a75f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0898cbe5e9b942f0645d73d7e8aae5
SHA1331de8371fbcd5561d664aaef6ab30b39d2b3a75
SHA2564aa0eea56ec2c95acfb4e9bdcca758e93f05deb3b06ffe7245cabdea943cfc26
SHA5120972337820850a3403ca04deb7aca60b5b16c681c4d9cc242583d6b8a1ee5f52576dbf0595e406d4a8f975e530548ec099f24d3b0461733340046d957b5fcf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596e395493db8c9be8cbbec8cba6651cb
SHA1adb4cd2d4187c63bf4b05096bf74711cf9cda53a
SHA2567dfd0596fd5edcd180e061d9114842ee96037f7b69f7d5e2e9565336394df0e9
SHA51245501db4169e7445fc442b9715a75df84a413c09dba41ad16caeed72417c31ac317d08b5891b11a02416e40fe4ddf1441358c658ebcb23c0f3612a3059818f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7be60b6f2f625e3449763efaaf4de26
SHA19c17a10d762638b41875294be847ba2612e35a22
SHA256041e6dfd7f709edd5ee2016bb4efe71603f1de604d9611e232b8d165050efbf8
SHA51294d3f1193b1bef4e66c9b8644ae68044278a8f80647bfe52ef3d6cb16c4ac92d1d48cd292b123cfacc1c7b31a238303affadab9f6cdec83624669142fae9588c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f276de795fe5520dffa65e57c0ab0a71
SHA151eb6e45567c527c5f35a437a4096f95780eb074
SHA256757d944142120e12f28a74c2c3f17d4fc3ab807d1aace1301869cd9ea8a7a8a0
SHA5129595223d22992886070940e0891e3f6f39f710e1a7349c1a9e24324d1364cd5809ccc1c1f7162922e99ddecbfdd0ab32e008314886372bcc2f905fb2b472492d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a