Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
73bf3fb08c0ab0685f79c48d08f497ec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73bf3fb08c0ab0685f79c48d08f497ec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73bf3fb08c0ab0685f79c48d08f497ec_JaffaCakes118.html
-
Size
5KB
-
MD5
73bf3fb08c0ab0685f79c48d08f497ec
-
SHA1
72e64aaba9152518a73378543a2cf756d3ecd36c
-
SHA256
06372fb746edba2d0fdf33c360d7ace1183256253cdfcf1e4dea4400db125e19
-
SHA512
c2b00c5f911ceea6b1163daba9dc7779f93469ac3667935fe3931a58d371b5c0b6750e7c7f810d8cb21e205dcddcdec0470d1ffbc1dcde92097dddf95dad7aee
-
SSDEEP
48:Iov37F3lGRgx/XBxfi2tkDA2ioH2Eori2f8HIOUWwi/DMKMoMMLiMkiUOc/kuov2:ICVGqhywsLu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422844996" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01ee88703afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73580501-1AF6-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000035cbadebebb1bb41bf246bbbe0de3f4f00000000020000000000106600000001000020000000dce74c581ac3158b8bb57969896da1101176a06ac4693311aac87778779bb688000000000e80000000020000200000006fcd2119a4101ac0fc13c82a8921d09c14d6ee5157e60f26ec76cf4f2872d4772000000048f207fd6d7e8ac4347f0730c6f7d1771d6dd95de917b9e85dc550858a75bc4d40000000d70ec76688f8887a3ca57001ab14a682611a8b5d0019fa02ba2068d27f1aa3734878064ef1a7207c84900190ef3094d630abcd414727e2713aa76519f5bc9b24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2696 1612 iexplore.exe 28 PID 1612 wrote to memory of 2696 1612 iexplore.exe 28 PID 1612 wrote to memory of 2696 1612 iexplore.exe 28 PID 1612 wrote to memory of 2696 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73bf3fb08c0ab0685f79c48d08f497ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb45005a12dfeb7638be87206a3c0b05
SHA15b36252d615d45c0ff438bff42ef376d62a22256
SHA2566b10cabaa0985ae876649d5b63602a1af9db1ef43222c2995a550e27987cb0e0
SHA5120d2c464a78ee63c3cb7cf5108ac11bb7a075fbc21053729ca7e5252e21ed1997c28aee0f429de67a45e171aa038ed40a346259690a583cb242b2ae74c98f43c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36c888a36ccc71273640fe3b6b77e74
SHA195be1c093d9e5f277de0bfc3ac4be715b46ec4a9
SHA2563be7c6c3cf9e68b2aa3fac016331245713bf4c7d8a50e6dcf38d02f45fbc2895
SHA512c191a3cec79fee225e05efffa9b95b5fd5045422478f153d77fa89dcd5bdf519a6d4d09bc644be77d01a4902ecaf64339bdcf94973e1bdb91f85a78203b1a110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac7f21f875b934f948b3b80304fd88d8
SHA167d692a82fdcba52309785f809678aaaede680be
SHA2569a343869565aca915052e9ad6fa7a402c8d7af819e6bddd6c61010e18fe4d307
SHA5126fdfa640b3d15a65fc57c1f7a00a47b1f7e9681b9d5a5a688ff512ea907b2912b0a522b107ba421d3a12d30d7ebc2710505dbb319d6c3fbe225e71f9e8ff1392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e4f8840f2d4035dcb2ec3895e2dbb1
SHA177b28f96a91f2335c8366dfdf56fe2cfa9ea6fc0
SHA2567524a5ebe5f17ee36348bca4450a7d312af2a23400b9e2f48fe8eb203a7de1d8
SHA512f59f65bb8c7b4c3980fb306185a3bffd88b6b77fa5df31d73120667aba777a2f773b3915e80139bd54b2ddda117a75937505699d6261ccc160bbaf4a2aee09de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47ea7bbe81dae104f52181907ae36c2
SHA1f37cb3af06cfb7385e39b79fcdb98de79b332439
SHA256245e9a9a110d532caa3ed12921b104627973dce325704c8a6bca6e6ed62b237a
SHA512fcf7398532c27968eaf3e1b7a4e98861ddb763013009ff1cf72e086985379e02c3b797e6f1b0f8b992d4238342f490453b41f11de31a3462718f2db5886b6eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8178381b690524900a99d773e218d0a
SHA1b6481985344d389df290874f25a032d3f84fc9a0
SHA25616766b8b60c2b000feb06589e8b08adc9696f85f5aed50afa9d6d151f665e2ea
SHA512fc67fd2de2eac5feef032b85d49269fd8c091d583412b6c970b06a69a250b93f79a5ec46f887564bd4a0e955caf218e6c6c8564d1a6c93cc51cc06d61fe16385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5254a4492f8ec9da2cc6b24ca5885991b
SHA1ee399096983154a73395a1c83af99b0ad10f9e3f
SHA256baa4e64179bffae0046ea6b269d21b956fce5835715d0db12e13dca7b2b7a5be
SHA512678c8935dbf32c2df19cb8ca86e884e204541cb49b896c8e1a7fe5117ed322b6341792017d17d68e28cc82205c9b37680e33ef2f14c38412a17a808bf9883c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535140fd21ae69802bda8827da03bf85f
SHA171b08c60cf23fcb602ac9f2cb5ca6adad8fc13e2
SHA25685df41a5ad045399dc6043c6d2e45ddd73de8995351f3d1609ff0b27ec3b4e4f
SHA5125d95a70d0df102783e31b6e5a69665df47d6e438fbe4b5dd789ce61343f845cf32aae3c3bd9899c4bca736e386aa028d3a90d491f43f1874506bee2eee7dfffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59186ef4048fbc64abfd187daa671c4f2
SHA1b5d152ed22a408a400dfaed7a0b87f52ddcf8412
SHA2565f816e6e8cf3cf2b3061f371803a1734dafa70db97cb3b65bcfa05c96825fdc6
SHA512f59e83bfa2d7719b194c4e69a32810f0748154989ddbcc933c28e08c49109f6740e3946090e99ab39654143d8edc95d9b75abd5464b8a7018b252eb5febd956f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa05218462006ed242b363bda9726a1f
SHA10dfe8f4e2d9b7899a91eaf9cbfb810c12d15950f
SHA25688635932ac7e9e58b173b6972f973bb22a19407393f2203d556862e0b2d933bf
SHA512d2d4bfc209fb25ed89d426702f82e7b093e6b273feb2fd874700f928931e94a397e9526b720f6425e4c67d7044959c99673d0f9231592e08ab7f48bbb1abfa2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560fb7adb4f5a27f8b02b34ae34c45227
SHA1ea880eb15c234cf96da18dd07705fc403d1438b9
SHA256de32bcba21e939c025ad98405533f117e9ada6d4a02d7e4e5f5a9386733ae92f
SHA512f50fa89843e9a8521dd52fde97cbeebe97de38bcf765f71883366e73883d85b8521cab5beab42ddebd89b675257c462604d5dbeb4ace447a97e110b241bdfe03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5536ca902836e37cb602a752c0de9daa5
SHA1052f787afb59bd7df32d291f058fe037396613a4
SHA2561336e212343ea37c30b8bcffb3c0daecbc0a1fe321fc488d07b823fdfd801527
SHA512af543dca2084ec79d12725f94d6122e32b8f2fc636c036fdfb5948556aee25e1cae2d4795aef7170e97c18f8d46696a596731b11356b80efe7df5103541ece30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5e580f00a9de31a6b80f2eeec94003
SHA1b4577bbef20414151ea1bac0b539693590a3c8e3
SHA2565921833e955a6c573c67e6fce3f3e631b79fa15650489f7bef20e811571a94a8
SHA5122e4c1be539e2ce8474b51767ad295dc6f1b3877a65c082995350669d8d7c4f3c881aad73464069b7cc59d5a538e601bb6ca947f01ecf969d8b1470d740c8dc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e481e85f891bf20966cdf01c2a64de
SHA16c1bd0cc4e070fd51ec015988afb880f5a9036ba
SHA25641caddf1b9e1328077674e80af0945c6d51c2302372bbb2849516f0c1c16f413
SHA512bd8b8de83477cb821f948af5dbbcc3727c30afef5776ad826d91304a69971489d9f8059ba8ee5f1032b7fbeb6579254c37db9d8fdda74bc693e76d24f275a119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57a2b3bf6d7d0d616db326681328336
SHA1437172f4825b03246b7f964a7d479e480a4dc6fc
SHA256bd12be99bcf340e6b89bac631fcf2431c7a74e628b5b0d6f82b8ae71722814b8
SHA512a362c960f8acf36b779a1b0ceb574531ba6b7018873ac019a238a41d525e8dbff3eb97bcd5664a64332d126cc03583a7630ccddc6e84c7cf36aa56c737e26d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629fa5f8f02ece47260329c8a1add6fd
SHA1ed0d66412f5ed8397278458958ddf90a5730a1dc
SHA25620c0feaf993d81a331bd3604f2c9081d96ee23468e6e06a03920c9ea7f06d6d9
SHA512d77ef2f8045329f69dd9d5677d8654dbd0e456b53fdbcfada2da19ba6b2e08fcb34aa98be1f9b790dc1b61214102f781df5dc23bf1b3bb642a92e2eb2c2727ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2bd26ab616c8495d07d044feb915322
SHA1de3940a5d5db1b1ac4ed4533d349ff8ad5d58bb4
SHA25690afe4ff95ca5ac88ab33c0461c360ce7a1fc09c71a41ae0e5319267c9f7333f
SHA512714460461892fd32bed9c2e609a179c2033a4e3d1696534355b89662920098b1984d4deb76484c5949a3ed6a4b9cf6332ca50543b1f9a9ed4a13f8b34cbf6e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d9be759203809daafd3dba8d5dde4c
SHA1439d90636f495943d463bc716e4b8dd571ec9377
SHA256e6f11d1ab97124df74e2e1e98e962be600d8f8b857487929e86049f22d3183f7
SHA5128d898aa08f7b6c18239e740b36e2dc31ed0e6ce378339651cfd3de230581053c80f1c21fbbd980c4e5772aa2f96da0e8356a251ca8143ecafbcc2e3a734239c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6add30698ebb1f41d9515f79abb3b3
SHA1b4e271cc8059c87feac868fe4e755402638319c2
SHA256ca5039d8d357498ac94e882defad286c09cb8561b7916f5db73be79f15052e97
SHA5121dd51c9d4cd1d8a8ddd61d44efd13e8bfb1110da36ce3cbf0908d02324e460b87a23ec45e292654cc4b0ac964aede1ae6d78b02dc64085eeb44123f98054b33d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a