Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
726d4ea3b0d9731cbc64ca7994ffcf5c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
726d4ea3b0d9731cbc64ca7994ffcf5c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
726d4ea3b0d9731cbc64ca7994ffcf5c_JaffaCakes118.html
-
Size
40KB
-
MD5
726d4ea3b0d9731cbc64ca7994ffcf5c
-
SHA1
d7314a102e4b40fe690b122a27506cc57df63ea7
-
SHA256
86ae8a5147d0262f906ea278d242148e9c3e8a2701fd547d5ed8305986ddda64
-
SHA512
ee6db4c70db87cc651426e33a4d5902a9174f2953e7202e2551758a000078de21a74c314a506b980c50f4e3af494118693f1327caa60fcc70aeaa418d23ee7ad
-
SSDEEP
192:j93fH+8LeH8IniRcLGPUvm1ETK5o50NSZE+D4r43anRY5zgkkS+UGYNs9o/QzHLZ:j93fH+8xX27Y525DAjLwZfcOvu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422812999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4F3AA11-1AAB-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d232206c4d36d84b848a08bee26cb8f90000000002000000000010660000000100002000000077b599440fc686587d565956e8d725899f45584ea37f2fbc6799b43463fb59b1000000000e800000000200002000000008eb2b0da649e159e9d44676a8848aa2f04899605be4aaed0423d1e19fa137a2200000003608dc0d5ac6ed2c99f1e59dd14e6f5730ce83acbfa12d09fbc802c04f6bebde400000002d5850c21273c50cb81aecbcc26adfde3c0f890312ec02ec667ea12f2b9e081f0590a58e29761e3a427a92dbc9971117354f07f804a43a8afc96e91a7530fdb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d079c9b8aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2380 2416 iexplore.exe 28 PID 2416 wrote to memory of 2380 2416 iexplore.exe 28 PID 2416 wrote to memory of 2380 2416 iexplore.exe 28 PID 2416 wrote to memory of 2380 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\726d4ea3b0d9731cbc64ca7994ffcf5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0463e622eefc9d47e6fec25ffd1da07
SHA1af8c5921a3c025f07cbbfc5d3aa38d061fc97691
SHA256c12df97d82152ee2f72fbe3cc563d8ac19c9eba2ce4d8bf96039f758a8580323
SHA51213c1b3d6facda9cfe04a41c651974e46049d9ca5414ac04820498168e85b6bffeaf13c6b4a57704a3017d00115238281cb4afef58db9e4c8d34650c195e405b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573272328434c211b171de0dcf25abeff
SHA14d0477cb08f6836926ff61450d8f166a49fda64c
SHA256fd675e8c7260b5dd30a66ca32e4d29d9a3182f251c91b0364ca8246580a39347
SHA51269d9bdfcdd73a06c31bc730cbc18a00ca8a4f30e315a5e2630b2e4abf3c50d68f35b6c03500d53c5ac5e2f49ee5b9b9982b531ef52d8be08bac91a6b86f6eaa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4256df0c3781bb8a71d0575b8af63c
SHA1f76aad2303f90067d47cdf7e4ce2b1b7c2b915ef
SHA256061d1ca722c5241c51093d8a2e8dac5cb25fdc71c3a7c4a2a8eb5678d6bca0d9
SHA512173aa0bf23edaf643b49f94eabae53cd3d01ec52fc1c63f27cb09f0d5ee669a6b655a9afd89c92e555576d28ca1cae41733781d6f657ba81ff65cb8ca9f80855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfcb349507c5d1a6966373ecc2c85c9d
SHA124b09adbce70fa4239eba6beb63f8ace614cfbbd
SHA2561f602f1003c04030bfcfee98005f39c52dad42039d6a8814747ecb69eb741ed6
SHA512837dfc1d07f1d5a983abbfe05ab47c75b1516cd92f29cd3a22892f1f03741b22418c41ecd7216fbc1a07c157db5388f2aab1abbf954c1ceea7a850ade23b3d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538194acb1778c2a9faf009b409e3e41e
SHA1d049c62a2f8fa32c0efe81b495271e8ed03960a7
SHA25696b5904b8e6da9cd61a7a2c24f4d056b56c25c46e4996e0d7d01ee0bd6f65db6
SHA512bb50bbf006bd30305c03f5b3304580d0dbc23a777474696f4810eff0d9562daa556c95baec597829aaa9ce7cb1572a583991d138c9eac2442b9689b43ea1d231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a5dbb29b018f7d45fb23d4bc0c977d
SHA12dbc769732b7255809bf42aee7102cca0523928b
SHA2560ed0f4fdd49dae7d44012a7ba64ed74c4bbc167f7056718d6f48bea083d76d44
SHA512284bbe9e667f163a6d812910b1d9df828f62de45c8c96560e5ed8ad2dfaeb0590099b0b99e5a2e4ac7cad095589e016e53a9167137f749692c1893d47dc39418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49634fab671c58cc82be202e39dd3b0
SHA1ad02331071db07543dd47695edfddb207d7820b3
SHA2568f9aa74048ca22df8437f7ef67c57b480855ca262aab90a5636dc08071dcfeb9
SHA512eff17517dc2a2c69ce82836b7d8e344ba26cd459c2932b92adffe41dcdcb9f24287a8e4df7dc0c883fc88e05c4526414dcba332ea88bc36ff1bb4e25736ff606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df3a321983bc9602b751df1bb719e136
SHA1252cdc85df334f8b932a320145fbf696a6928c02
SHA2566995139c025ecd74bc641652f2bbcbca1b4de9e7ec3075f3271e444e546df6f4
SHA512967a7ecbb13c4b76f207f3d0696cb44e573d30efbafc6fb9e6d8adf0786a5dfbd307140d7624332b23630962c866616e328eb39f3bc9de96edf5f24b9fdb1866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0087d27d25a7c0a642c0e596cab682e
SHA1983b63638c51469bdcd5900ba8d66e41ce134b6a
SHA256813e9d544d62fd38367635183473b12bdc01230bf5114010c54c2ca5039dd41a
SHA512704daf88838fb13e72011273dffd29760c32da413de9b9f89d6dcb7a25138ef7326cd2932ce400e5391350931052e035510986c8d0fed0b77a7b16b3d4e544f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586fc3c8d3ff2935bfa4899a1d6db30dc
SHA12aa01a8c732665c199b4cc5d30caeed37d79012d
SHA2564acaba68065130925785681d9bb3d8409c684554b6446e8018e68c88fd10f10a
SHA51293605a26d0e8f5c382a6d718ab5e1629296e664b5cc5f893e3337d495fcb1eac1ed3672839a95a4f29b42aeb39b48760fdb619398f0e8c7790ba518dd218cbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49331aa5661b5cd0aa5f94915783727
SHA1ed716c0de8ffba2196540224b01a1aa19ba72b3a
SHA2563b7189878fa026efefd3fb1c78606c39ccd3d8e2c104bd3f71f3a135f69ef9cf
SHA512d7b21639001c88578f8a482cfc0189cbb247ab8aca3c771e387e16a7d76525fa4a93ccedbeb83fd9d71e0e7b92829bed452ff471e548ae1e10769248db37c920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe0cfaa984cb87ac8fe8cf5051fd10d
SHA1a5e0542474200b9269993fb73837c21890741bfd
SHA256a2ba8447b0bf6f40ac354302b115eb28eb8f8e970d6f04db11138eb1202ed400
SHA512b6a4e3cd1881e3694f8ab6f72e92e899b12a16d0a1c0ab02e2a9b3716db89eb266f1aa410354a7ad837e42b6618bb9a57192d000d316283fee29da83f59a6857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7b8ba4a2ee35bf7c4edc78dee3a251
SHA1360b376cac44eb566eaa53ce7c6f631b6bfc7ddf
SHA256ec960e2e64ab7ddd72737d9c59f9f023e11ba6038520637a6b6f6ed9c821e76a
SHA512cf87930a53158da969d1a9101eec3ea9582e24d4f6d01f4282c6a71c51791ba1a706bb357cd44c51cefc4e7ed7a59f2d91a8bc70976cfd5794fff1c2ed009c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db498e8ade54f63a763c30956b07fd42
SHA1b47188cfce6c4e458b9dd422c5ea2bc411aab4d3
SHA2561b86ed8388410d9a680672d1f3473b9a731589431dc0ab4047ba9363963a6fea
SHA512133e189d64256c4127c65ac61535408cf6236a25c0807053c91770ce0792c652cb951c17b12bf0690f2d08d9444ad46be3fe647a499f4044caf7a200ff1410e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2aadf54b85d18afad2ffaa98806e65
SHA145acbb6157dc90547af9f0ba358963afd7549ac9
SHA2565bfd2959f7618ccf47476b8756e1a04d0eaf759a4df54668bf320b1cdc1d0d83
SHA5128c6fe7046ef59b232382a6b41ba4148db137957bf5d3571429a4a5c25623396e5c7971dec62e2694e7164f0c1aaf6309f4f6e825059089edce3e7ce2e6e44918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827e80bd6168059a611da836483656f2
SHA194a71eede5eb245be5b4851c034109722ed9bf60
SHA256b47dc562dad5e1e0df2058e9d56611a97a0541d8567994ecf4680b1ff58aa1bb
SHA512442d761d75b8ac9d101a2bf04b0d690cdd1f591af4c29049a63992299b63603a1c739a84ea8e29d44c02ba23471a75defd86c4c229a1a3f43ba3e0795536dc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda0075b0bd16dfe4267a71e3e0f15c2
SHA1fefdbc80670506c095ebb3c413c7ef62aa4dbb6f
SHA25685fa5fa03872fbd3248b701644b864e25575ad99a8c55dfff94fa67a151b091d
SHA5121deba818c0e4b4aba7ce069f51794de6e211425ff42979b08e14bc4d6532c3112a232f451fc7f8d6c3a213ec9a99c73c346fce4bb2cb176923f2916e6c5a11d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35812302a08f0e121ebfcdc3530c8e8
SHA12d0f4660deddaae89424eac9e77f894c02e36317
SHA2566ec9487a1dc91353e0e12b599c1a05caead31cc6576449bffaeba4357e71c3e6
SHA512e6f23ee6a3b520c502cde1125efa36f21c29586f50bc34a8a2fad8c8ab3a66eb542cbc27165978af2ad7929f0ad8e1da42857f454db2e304533b72cee54b5584
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a