Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
34aea55ba4732be4455b02387aa47aa5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
34aea55ba4732be4455b02387aa47aa5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34aea55ba4732be4455b02387aa47aa5_JaffaCakes118.html
-
Size
68KB
-
MD5
34aea55ba4732be4455b02387aa47aa5
-
SHA1
0e1cd9b5d65533cb43f7307ac9ee3a2fb3dd6208
-
SHA256
c809a58df4df24001e79ac965182c6266dc173e8888c3b546d8fede8fd06012e
-
SHA512
25c99db8e6c800096ae783b313de950ce518a6627672bc5fc238aaad4e5a052f1f387e4ccf3b9e6790b016d02236d07b08742f6d05f61e2f30c196f8bc48b9f2
-
SSDEEP
768:JidgcMiR3sI2PDDnX0g6MocXzI3XioTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JltwbTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000e6502a841ec4ed3717915dac1813c0ebd8e96aae29b0da9e84d002c1d6715459000000000e80000000020000200000002725f87efc8e35447a367510d6c6d81d3a05ded581d2843b11e39a0db26f96ca200000007e096f152646a1ddc80091b6102084abcc86177a5e8e20b27f1332f71ce3960540000000e40481d955e1fc5950da533b5a300088d0ec7652607bf125d8d42f9a6185cd1a8ac1e658b421da0044b4ef995e3d4ea90d403c2eddbe290dee44dd86a970052e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D9E8271-0F95-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421593914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c33362a2a3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34aea55ba4732be4455b02387aa47aa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c91c2be33ca4bba03df60652b4b3a7b2
SHA104fcec145aeb560b7c0f7c4e6f00268c56ecde07
SHA256fcb612e30caafe42ec28d49538c76cc082b2d58e4eb543e08bcffca82823c411
SHA51213f98fb64b5922742ff76360fbed9d093da24e5f797511bf43765bf8e7e6ddbc05010ba6592b57b70e907f5d8ffe5d1d5e2f9f9f4a90ace217112adb81256780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6da0fc0a870465c5f0d07ca9af86ddc
SHA10a87745cd90095639a3482d1faa53ffcec36b49f
SHA2564f247f89163417b946505485fed82333cbae938901958989a1cb15def0e4f468
SHA5128de61da852b1e8f0461caa4975291198fe46943b5fd507e0a238cb3780bd0fc1d0c4314960c61f7bb9eb2eac7957b0e275d22ad171e5353b4307945f8e9ec425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5710ef300ecc4b1d6816089007ca1958d
SHA11aba3610bb5ad24696e59ad8d284dd4dbe28b91c
SHA256bae5990c6f502dc914a8a487c64413c819177bb4cabb819713eb7ca14aa4ac4d
SHA512ba09da760d9b2aadc14e78e79be91171e41a11c4ae93973cec9434082b40b99979b89d64420ff39120d568d4fb9e15d59c786a79b23819730c0b885e8b0ee78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e67d9549f1a5c401dc823dde36feba
SHA192372bc1868bd527538ee7a4ac0b5daef14d4ee2
SHA256f94b9a97e28fdece09e000b73e0eb3d1fc31d2761f0ba0a9c6f2f27ee7851ce7
SHA512e024966725a9b64d374651db784595573bb771f5382e2e5b66e364cd53efc8268458d5bb16ac2684864a5240ab7ebe4b347315113cfb66c80a55361aca623995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af98fa7760219186d1d9c9c2ac498d50
SHA1222b284cfd4852f562129945eb7ab879bfc22882
SHA256c72a1cd50f1889e71c0ad6c3f1fa4d48af95d4be03cf7f8338fe1c2b532f4768
SHA512684149bdf9e27754ddf6f6919fa0d5300f27999164c95add33a2a6a4a31961c27f78d4a582522704c609f687e78410151954443b44dc297cc352bb426c4d424c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d27ab2a5a92dcbae4c8b501f0c81a41d
SHA16827fbfbd79fab60ca1ad339a251bdd1bddac9a0
SHA25608813672e4151f1fa89bac71cca28bac632e5144e8af21aba37b3586410c4f71
SHA51296eda7df4ab2a078792aaa4ea7594bbe62c0a5563987a7f4aeb63fb117055f8fdfdb06a3ff0aa73913d4818535c91e6b0121de36554841608f3c643406bfd9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573dc76be5ace3d7f1c86c0dd214d9c02
SHA1493c94a79992afd345d0fd17b3227135ae27bc49
SHA256431b24519b77ee884190bf56c6838e04a8323b23c898db835451ba19d2eebb98
SHA512f726d4df15e3de65718f5eabed31ccfac6a1503b432a7453ad6ab6049adcfdbf15a05eef3347859678a2e7fa624f29511ec8f77712e4ee9ac9f770aad8755c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba6a13ecb6377a708397d319abc2498
SHA1c48ba194cef193dc25d00521ec818bfe63d2d41f
SHA2563d0d59e99ce5d8bf3fb24e5f3fa3cea0115ec94da6b5135ce46d56d8c4529e4b
SHA512e64f14281f13bfd81063a931707a631f4f9bba4ca67caa25b3d02d90b2b1f3996907f53dc9d646768433904dbf792ba5156ad5faf4e8372ab3f10e88b0d93631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564979b26b4181f61cdf7f841fdafb350
SHA1d633a2f42aea2ad14150e314b87d7d26b5be1724
SHA256a989b15091d9907613c274c615a7ded2d6677f6266de09b6a0efe4d587e977e2
SHA512ab89a3a5c9ae27b5271d06ea4114c44a5a882444853999b0d5fcd78aaa2dbe724b3ea4d5de391b5ae743a6482f0128c06e6b604eca2b158d54bdabbe2f99009c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f2b08b1273d28eeb26130e5a69a8bc
SHA12861dab12a142a1862f31606b15cf1813efa0b7b
SHA2560dacbf22ab170950e575d90f22b924b558735c03021c709cb7e73b4aafeebdc0
SHA51277412818162022382afc708edc0b51e5131bbe7c2932b2b49e5f6534a3af9523ec98db83006b1a8bc59c46d4522a431aa8023b59c54a019b35bcd81cd5d7e05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56418a7e6bc928514d8fee5a02bd66936
SHA19a0b4a0ccb05053f72e87ba617e70f4a2398d75a
SHA2565dd83cd288a72d6e49ebe1d083fc6154e2c6191faab9d502d0e8c8e3598802a4
SHA5124f4598057807eed1ff791772de3cc528cebd08de28d56f982c62642eb7ce613fdcce001582dabc4f6099a48d8b7b17034c3879f22887031563f30918e6ad6af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d64d50d72880597c8065f5d154df89
SHA1cb1844481342f485c4eee29529c6aab0306e9238
SHA256b2a1657d8537f6098f4c286298c67524aa13523a15d06bd2e51b4e8d85fd0147
SHA512df3b058ab16ee516f813514874f8dfa1bf11634c6a5f7c21899bf4884a0e07067a47ef9874e6272d36bd11865f7e2c8fc9c3fc3a427bc017e38a6a39de89b33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58578b43325b69d0036d3f463eb3408eb
SHA18cafcf67692c9798ab311a8ae811d84115a27055
SHA2562168e732262015872f269f7782c04dbb95ea918dfcea2b26da2d408433aac3c7
SHA5128d08fcde27396862218cdb3c07edb8386c8a7fe7c4f850a9028a4ef637c950e8674c7073d64f77421c6bcf1a4f83626e9dc32e2ea919b71210f0efcd26835ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4ab26a50d91143424cea293df0dfde
SHA14a4dbf7fd6127269436a695e85bcc40a8c8e2ceb
SHA25662221c79032dd1868d0585d38d2b53c5caa6647743bf98e6111d99271aa18b62
SHA512af0b55e1171a87fe46476a02e18c547b3682e4435ac0fbe1229d8fd24fdca192fb6572ef9ba428214ee4beb8a3abc4e073406d6f9123145ab8094de8c3bddfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207e0c9bcd1cbc02ffcdbb90333007a9
SHA147da689282e95d72c4a3da64ef2a56bf84e6c664
SHA256b6fb84ed6eedd7fc8dc49094ea51098a7d721274a592eceb8ed7321b1cff219f
SHA512d07fb2f2b1e3c391f09c78718c330a758c884044c1f4d94f5234d3cd528c06859b4525c408b623850db84c8fd0798a21c986324d9e3fbcea2fac751bbe71d857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba56b2eb1a9e6df7e28d781da41f0bc4
SHA11abf13c78b2c1a1c0b3a32d3cfe299847185ddf1
SHA256cabe813e369b167e40f5a55fcbd8b454c10c57e8855d9e73537d79fe6c4cc1d0
SHA5129994c434c4e66f5072e85dd729be38e70b44d74a946139998bac6eeab1fd55dbeee6a84555517c71d51aa225268bf06b64113e89ff04919729eb47908a2cc785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c4e73e06566b7bc88c2c2d9678c686
SHA1ea70640acca8e9d342ff3745af03698b8de4b8f4
SHA2566c0a741f7237ec15c4834c743fd90bd13b6821731f25350c088542a051fd7bf3
SHA5121dcbe7ca8aed5a1da18926b03e56fa62d7968e77df50664cf1901ffcda0cd3cd4688ba987d18ee9672a584692baee6c6dac59a5c432a56b83d6d1c85befc117d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589132c5e326e940e6f741876e18cedf0
SHA1f46c9ec186335d56dde5e754ac413746a236b18d
SHA256dcdbaac5221bb82e331aeb39e119ae8da4fce1a574c0485d327d960d22effc6d
SHA51232bb8e04eadeb9da75aa7dee62a75dd6e801cc100937485fd79a4b97063ba78d55b9fd9f2f01092e2b61aa08173a0bd7910309d0213882589fc1c49cbac47784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55239a20c9d03d8747fceba34da352058
SHA18be2aa8a8abe3949ef365b6096c7fe661e72d18d
SHA2564e56fa4b4f36ea9469962e1b846c0b70928687cfdc5fc0446bd0b518f977f88c
SHA512a8841887d240e3efadb8774d4854d20a681c88f2ed84f983f8dbe1383a08cc288b768c281443adc748ee2cc1b9e19c319d77602d17b3cf0d1ab1a6254b156806
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a