Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
389c6cc704c04a47375aa51bdb09cd2b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
389c6cc704c04a47375aa51bdb09cd2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
389c6cc704c04a47375aa51bdb09cd2b_JaffaCakes118.html
-
Size
3KB
-
MD5
389c6cc704c04a47375aa51bdb09cd2b
-
SHA1
07821ce3d1569dc4ee66bc2eb755b4cddc4bb6b0
-
SHA256
5fd403801b372db7bee999a314c4ca3ed050fd326c39edc9c9738fd080d6d3a1
-
SHA512
9515ed5563ea472b2804a987c172dfc2cb2bf3666a8900b6923a00028528d720375741023c1ad64197f4b8d72da891bcae811d657c1fd1eca8e5e0893f5adebf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD519451-1024-11EF-8356-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000803b42281092b35fcc2a0776a4d64e7a75b0ab98bb4aa87b1d23be79f431c1b3000000000e8000000002000020000000623dba27e9517ef92d359a1733b423afdf59b0e8c6fd33dd0fd592e3bad32e5a2000000065f8b21be009b73b4f5ce7f634d46fce0b38d7578b063482906b5e804526a1214000000024c6b1748265c1333a0117f600bc6cae70aaf573a88c9e546b2375b0fa27c7f3a6c43b526ce8c640f6c9536f6c0f77c9a0e40ca4c67212fc39cd382d23d7811a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d52b9231a4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421655413" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\389c6cc704c04a47375aa51bdb09cd2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115228298de3aee660a29a2fac8e0394
SHA1de664de41bbffd549638b5f9d536624ec9453c02
SHA256e5e4d6a52b909a22391225446ee9e3db55bffd73c40f4220bb5c3076bbddb70d
SHA512469f87d2b2638cf7eddf89d4ee082e5e9d21d64dcb0e7d639fb2d3315eac46d606241d12db8bdd5c3e883b2bab801c5522f1f29475e8bb9f55836bdaf99f792c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ff7a73e0c5d26df8337e29f0ccfdf7
SHA18f0c2cb97367020d3aab04ac8235e0d25a9eaeeb
SHA2565e24ad03912ef5ac4f767637e8d52ecaceb6c5ae13f3359caac212dfd4fb34ff
SHA51292193b8592d2c0858ac2dc15b5938c564c6619ee0f0110938be27f81d099bd947f4f379607aa82fdc8aaa892233f70c8a8119a443cffc1656d9ac55026721340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53672a75e34f850db9dbe8c1995ff7d93
SHA1ea6eb4bc6b3696e1cdcc49e923d26314a503a3b8
SHA256b8d160d2d7159c10e3a5fc7254f971ca1b3170d98a0928d4c92dce28611f041d
SHA512e31fe96884106a58d021ad5ce6e7ed49860c381e31e83dbc4aeb9005fd798db0c1b648d57d724e431345d2f0d37beb46ead1279fd4cd92f93c21501c6ad7704a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b87d0862410688ad54d6755c1471876
SHA1ab77c226fc316d4bcdcaa10503286839854f085c
SHA256aef9e72aa950c2c21433ba96dc6d54f039854b9163c4551eda5f5cc998b5ee7a
SHA5127a9955868791c54dbdb1a2c9ad77d71f9aff1074f445bb19261c023bee44cc95d5564e331ee0d534993cc6387ea295675ac75a3cd4eb98f7cbe4278f1cb798bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef9a242794894661e2993dabae00998
SHA190cc131ab06519493040dcd35007b5103a9a0468
SHA256228ccddb788413121e724a64631909a33db46d8d5fd66c70e5151885da3267cf
SHA512954141f0321b2a1566a9d89a4fb30b9b4a1fd14bb16a59067cfd41d9a275317117e5892e86d911c61b2a5a8b7661d32cbb7d804090c1d6eed05d9bd4bc17f16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab4e25681df5798d220fffaa2be878fb
SHA1512d98c756b68cddd4f370c20cc712121a8e9c04
SHA2564e47f99d2ce776d537177cf6004e6c0585b15f9519805215921400035fcae164
SHA512c41de1072320458b020c49c3d4612bf398e32de588a8df5957ac1ad6b5e557b46a0956289367e9c96aecf99a3552af96ff046cbbce90ea03d1d354ad5401ee6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419c46a7b09bb0aff396546dd6d60b67
SHA16da7bf40454becd8a0d403f4326326e674eaec5c
SHA256d769ac4d0089ed073fb32cea32612493ffd65d6f862355945b146b75f3b7ee16
SHA512a01e71435dfec5cd3f2f91489f3e1cf1ef8b1bdce51b87c972f06f412ecd708c911272afed78947b2a3a48ad508f30b9d286b2f275046b1f50b1f9db598d1c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887d92f5271ef05c35378244e2e38876
SHA1b5a83cb09770bacc9804a180b7454eb028b6598c
SHA25630e97b543e1726bbf59f65b615ae59ea8de26a8254ce95a26beae1b6eefe7788
SHA512d98c562ec7631fa7ca15ddb0b643a775ea3d4678e705acd1463c96680e0e96d40807f085b77a03b8c7d2c01404b5cc9e07d13f223466b1e5f6588fd4f9753689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e576193a27d9cf03c720641ff8142b4
SHA15288e688e810b046a1b2f485213972eca65e3ce9
SHA2560c5518fde057dc10d8ec8fc72574d96ae94f08d75cd392530cda66c61fe1c47f
SHA512017c8ee99d34c460289fa4cb59e5c0bcd77cafa88d76c4a60b7644fef6e5f3e863c9f26cc6d58a9659d91c3b4214162af45fda192811378d01b5577e333f692f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a1b9cc2d47d57af8ffa954ae69c9de
SHA171a86de3526c846a9620d7c6e801f8df80da12f3
SHA2564a01c03c3d38299b73092433984a964450baa96c413e5d02432ab5b2bb347351
SHA51285a5f08c0be06da2703a916a69ab1d1c6676d718b07f30c6cd9732b529064b9d0a40760322c185a224f9fa12103ef2a4c30c54e4ff4b120155d76383e9c1025c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a989ad4af2298af9c6093adefc93c63
SHA1581b79b28ee0ac77b654d0651fbf74f1be98134a
SHA256f292e22db5f1da0faee7e4cf92846f479df1973c784ef21863a3ad7648d1dfa4
SHA512b62db883a69e3720bc2c2c95a70aaac6a110a31ddb1ff03078c4e2f3953d125702c55f96d6403fefd4c366f8c78d760c3cc3895c1d6a0d9ca0b225e1a5aa152a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f352794ecd0730a2602d2b62c4f366d1
SHA1bc5e28c53f13d7e4368ef2c4cd30cad0917e1755
SHA256196164a01f37f5f09715bbd5d653d752e11b3be9b4d485d4b1e1c633b3a5aefc
SHA512cda029d09dc8baa3ae9887c7c4e7f7ddeeb1fa6ea103f5f212b203f0bd6424f5437acdcacda01744e273dfc6283f6ee3f74a39db21c06d0161cf9d2b823dc998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a757fd66ed30ede777f9ade9674b167
SHA190ab115c1cbd14037cf47da3f369a61c8560f4b0
SHA256d5d1d12f131053ffc289de3e0edf54383ecb7a63dd2d84631966bd0d3d4b83e4
SHA512ea63c7c85e901d4ba3389f8a40c229c9cf8127ad6ceab36ae4d8eeb176216fe2f61db4d2d3a80917c7f44a7b4f082e12f48e982a96e1ee20f4636dfed4a6f882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c06bf43c676f312f82a31ad9eb680a
SHA16bad9df60015fad71f5b19ef10a2e3079711a4d4
SHA2569f2f91da4f8f3064aec0cde1fe8083b69f54c219f7bb42d2c06428dad89bcd5f
SHA512b2b1176f9e2f52d1f0405ad4299a8ebc2af1838fbbdbfe9a64f5fcb23e1ae365d873bec7c9efe3d66e2e1884038d640e0e12421a8575c3bfa9bcad52528de5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb614e8a17aff41c23ed90eaa966ed21
SHA143a6a24723d6553b01118266fa814af7a2f04e20
SHA256e3e05723499d46d914cc56a1707c27d420ad6a11f7b56e6d8422e39218824f21
SHA512acf5b4cf64e2fccdcfacc781007b8401d33f0cf39c0986de7f7ef557683b8878eca67c8bb53e8403e171747a5e8083206755c7cf2f02a6153d8ea4a0cd522d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdd6677c40c71aff6ce636bbcb4aaf1
SHA1d7b882b328a45b5f377348d73229defbb1b3af7e
SHA256bcbe31ba773995546f26908c00800ad245c37a0afb41c8de65e70c4d38b26501
SHA5120326ed221ceb82ebc06f042fe4b8441b2e600065010a6af70d9d0fce4c9f4897193d626df3eadd57521697b979d72e1a1c8547b4420b1de2aea5edf38cb8bd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560db8f8f8708df2bbad86c5935c3a2cb
SHA1d570be3ee70674abeb0ad6517b59c42951a2826b
SHA256d04d8bfa0abf22f9577598b00838aad4a9738d7a7ecfd86dc018f98be861bfe1
SHA51230be09ef9dfcf1189fca97afd019738a441e4c4e620580a9b4685cecb10248650aac3040825d3905d1a6e6c8165cea4b695059558343ba9def8c074c3898847f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5009dc7a798a1186a0cb3663d0cbc2698
SHA116eac3bf3889e718603711af6406bf0f1a186cd9
SHA256e948b4312ffc56cf26736cc0ff967282b38a637e1106b227e28c37acc11c74dc
SHA5125fef668a8f7f47af11176ca3565ab91d147f1e39d16fca2487299c7d3f334677824dbcc707bb80f824649d3ca961d40622cab4b207439b8ff512b16f1591f39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eb360f04205a065caae3e7714f9ebe9
SHA1f2353ad156ff502442728198269ecbeec1f37524
SHA25612ba415369af78e6c3e264dda5e57a93c5021d367b5d5611c6746798539bd847
SHA5129bce3c1640e7518a4696a7e484a318a94c30981c1292b894563a480122661689928a15d9dd3011e2c62f34b612d8d1be0230e74cdac0a7f4407f9a509975a6f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a