Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html
-
Size
969B
-
MD5
6f04e99a7882d6b30042ae6de22e52d0
-
SHA1
2dee9cf68c20096cd9a2cccbadcb193192e588cb
-
SHA256
80172181dae3cf122c6023e2db73fc595ff8deba81da3453e0e4fe3362282f88
-
SHA512
9b569d11a09136dc59cf7e83a2a7f5acc9968a5915cd73dffb824efce707f70691406a0f88cb6f26ea756fe15e59ef02f6bf49090ba3b2fa7852b0a69d5e3a0d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8080c036f1adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005d823019918d2345922c4bf40e68aa950000000002000000000010660000000100002000000027c9b86583d01d58d00cb19fb1ac9d98b7e0d28ad7b3279b1483fb49e3ae6398000000000e80000000020000200000000a0e75e55ea209d4195105d94ab24880ce79781f951961432d11c6153a8d09af20000000691cafe5e5302ed2f71fcf5b4b29d2f2ab9e9647eb2102baff8969eacb2aa6b04000000084de99b1b5af015938faf1e728da517e2235270834583ae6f53aa4afee2b1c30d7f7627b1cc8c74d4ed51df64967e015bef56b01010058afbfda36b466d19e71 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{623A0471-19E4-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422727285" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f04e99a7882d6b30042ae6de22e52d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbfbd867934ac926e79f258bb878f1c7
SHA1b5f41886a5a63269ca3017e5e5a5183fc3659ac1
SHA2562b29b4a5011292c0fe762fc6aa289f7161abaf37022f5d9d3a644e9eb559a1ee
SHA5124e2332e9635bc8328773356e1eaf84a3d4097cc2f59f14314a739e4a6606a81a887b84d55f036c1c9e60cd828b7f1bedb001a53627967cdd5cf0ff96561eef9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd95c0b2ac88173996d03bc0a7c79ed4
SHA194426e045470b703d5e051337db25cd078b1641e
SHA256daed55327a101fdb7429cc2ec5a5a1bba08de666d9e4e57000ac489869259b96
SHA512ab26fa82594293f2e1f25b2063dfb29e47fde01b0e653c705c1be4f0f40436b46ee64084e61cb1f29f5237c8afaabb7b92113d654edfda82f49aa440411e191c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c7b184a775c17e937a4d3baddea7b7
SHA1c9882dd83820cc5efde69ebcac62149ed5cd7d04
SHA2562fb55ffbe519da9cc8b3f8ca8a80012014e054d1ac26e838f79ff43ea9894b2d
SHA51260026bf2d4c087ed7819ccf42a77c4f65f5cf7a3066fd3c670e9461026c808549868ba9a7310c0a4562d9d055d25c108cd8c78939fe8d2d63f2fc62fe0ec78f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca3a68f785aa47ef4150825dffd860e
SHA15790aa2171b3b2d4245a1d734b4ca00c312e7e0e
SHA2565f410615a815bda72314facae7ebc3e4e71dece28956871183c9d8bd714c9a07
SHA51215b00fec08e464f1adda4c8adb9f7fc0d437b29260d5d808cbfba6e1dd65fce51ce1d4cf35f2c94411faba7b2b48c691bd90167814975aae2724b7cbfed62d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6faa3887b8abe897f427dd8a4ba136
SHA16aed4c562cc69e0db27913de04e6caafd7838f2f
SHA256872394935dbed49f76800566f452075733a657ca22cab90408788a3a8329c503
SHA5129fad970d1e0b2664e6a9879c04397235462cb59eab0fe40973a620063fb2925e8b76206c7f3f80041ec0b805c807337964d8e5b370cb728181bf2c631e64c8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6faa1dc53bf90d8d314f920a47eb1e4
SHA1a447ffd43b399d890a92b181ece4a1e7881f77db
SHA2567bc1eb0c68465b31d4b97fb80cdf25e5deebd35e8baf2305dde9420cc04fede3
SHA5122d3a4170c6bfad9d8baaf33916a2f2a3719bf61481873f0b355188b1910b88a2c425d4439dd2667de0c1048e8631e07f58440d0cb10d3679d3aa0e9eab010dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55022414166b9447a437e830d4e092815
SHA1a199867b6219dbb9fad0be2084312eb01bfe7f33
SHA2561b9d970207f460c79e28e10a9dbd8733b4eb9dcb41bee4f8d10cc7bc17263b80
SHA5125c7038b34dc644be5a699fdc5ae4b7c15bb84bb669e1672e7faaa5945429f494aef7dd033ee59625b865a745561bddc6c225b5d2cfb9bcaad0dd21c80088b573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba05931466779381b83dd7b0abbb511
SHA11d21a2bce1ce73557a58f342b9f60270b4c37610
SHA256c75e90340a98139dd08a14be5df83f0461589be72dfd6fca60e22a37cbc5929f
SHA5120df80506d2e883953033ccb0f5b599395a73aad7ce3ccc0e52cbf5ea28d800f7ef9395f8f9162221e25b44e6615fecff9ba1b70055fbfef6c30d42998d7d8fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d4807c6a1abe5ec218212fa3c7366a
SHA1a325fbaef16c6462484a25eba599274081578ff1
SHA256097c82b5f82a45914ebb73dbd3a579c30df664eb2bae5249735fb16ab4fda6a7
SHA512e01eed4ce4cb53d7e3d402d449684ae06f130aba298937fde0cdad0334eef4bec389a754a4537e82827dbbf038960f0e10042320ae5d2f432bfbc071b6ce21a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5324ea4d64919aa94f0863ef6bf72333b
SHA1fc06ea73e3112996257fa4422c60001ccee2eb23
SHA2566259ce6efcb09da0c5cd2cafaf7a405e22d2e9a8ff7fe9dd588c5c7f9495cdca
SHA512e9afff7776a009a6f1261c5b36eb0dfa5674442c339be7cc0e10b9cb258eafd3e81f0b8138234392b4638f5405ded324d5e1cb2ba76ffba46c018909b0196f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516053abfaab6b5322f71b2baef9b6f02
SHA1e6bd550bfe69e76b6893771716c9decb1d841c2e
SHA256d1f63c3cc260444a0cf337cb5f78f6acefb818ccbbce44b531327d7308616480
SHA51207ea4b639f360e7ea194969df5d7c695e154d6e27d0ae0d745237da11e32fea873a90630664af4aa408067f508c5abece352a18b484ef389697510fa0a9a8533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506803b40df3d7757ca02540d803dedcd
SHA191ef79144ab791767840df6b2d6f16450d5f0a1a
SHA256b7732b8536400ca90651b0f8d5f994835af4e904b6169ff1c68bb5ad85db3178
SHA5122e0c1689aab95d2ff1f20e05e12cea774e96e073f652a9709ba5e855d2251daadce3d9e99ad5ad2e34f47673dbbb16cb311af0ec0b95606406d97eb7eb9492d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a523067f971ab1be0c365ff47413e54e
SHA127805ab601c2441251ea9e2049c515ea7278dc88
SHA2567dc4258947fc17b2b162e5269b763362a6796340ec74a78f941fd02744d24f1e
SHA512457c9cf2a5f9a2ac6b42d9a45b177a201a983eba574a28e1b64337b9a3a573fea4d66aef9cf682254883cd9bc90e7fae225a0d9a79f1fce4efbbfe8bbf00ef5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c946b840a3346f086b1e5200f29f064
SHA1af027692203eb4dca039c381851495de6c9f6376
SHA25689de1f05bee812b752fd7e5290ff969a86ff839380361baa7d75cc0429f7d25b
SHA512da0cc87587b7d5faae2a2e81b6c309dadfd34f605d5da1199c9022127cec16b375c92e437a32b9d1f5304f83944d2f77ffb4d3d96e528180ec2084ada39813f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7a9cf1d9de5d490b23135470c711bf
SHA16ba31a68709f8247c51373becdddd99632729bf6
SHA256dffd23dc06438d7b41ceace49e700b45316f4186e4fe34b54a9e174346d3533e
SHA512f42ff1385e3ca11c51e69edb599408c79fe7778f8a486834aa0d5dfd34cd51240b8983d0063f5698631de0d40b33031c39baae8707e4ca1a7e489ff9ac567260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541df696abca604215e261e13a8c639dc
SHA1220c7b7ca303c1970df98556d0f94fec0c0567e6
SHA2564a62335f705265bea5324d07b56d76d1987675319505dd297163d94bd6d7ebb5
SHA51236a57c358bdf2d23db63d1aa4e4963e15eb2404ae97efb42bc5ce4ccd1a1f77edb63d131312ecb4fa330775d425a71ee1bd3531b22066ea4969b9cf21425828a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b869d128ea3fe34ace02321c119543e
SHA195c54e3fe73286fcbdc0518b3a2b8ca5b610430b
SHA2560f3949b64d7483566c652d3caf12c083792a5535e108f5cf535be66dd76c7484
SHA51224fdab9a2bd736e0b89f070cb432527a2edb7cdb3ba0a2b2ac0b055a9d9eee4aaf650f042793e3a45d5d2fd69303ea3eea96f1584ca05803806ccafd540fb74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56892d6961c319b6e0b5603d65211e5cf
SHA191a35e61d3907c787bb16d56da2be4bd773b8a5b
SHA25625ce7328bd103412695676262592d97a617b14552c5d09533d50cf669ffe6e8f
SHA512f752377067babfcf43b98119bc7dd7ead2162697e476d1dbc63890e57311c3d37a55ffb320da074a8747c99b476e11d9d3cbaac698de7a0e8eb2c80647b95a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5199a7ed4c20232b4a6d6a91db768a
SHA16625c5d19a7f51b644caf98f3bf64fa94339077d
SHA256b039dd9606d452322a3574244dba89e9d67c792a0a387244b21f6357f08c14ba
SHA5122b738a21615dc80cc8a3cf4b3759face18f1facda681e7b747c612cddd5433285de29c5793bcf6c29d4e5b25514625fac914cb769561b386af3d5f631645c4b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a