Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
77b1b6320787ccedb7f47d823c3b358b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
77b1b6320787ccedb7f47d823c3b358b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
77b1b6320787ccedb7f47d823c3b358b_JaffaCakes118.html
-
Size
6KB
-
MD5
77b1b6320787ccedb7f47d823c3b358b
-
SHA1
2f7a891fb7203d30ee224a61545ffe071574686b
-
SHA256
f1ac3f96f5712bf46e52cc055452390afa41f12704d25fc2b7eb39ca50791a47
-
SHA512
058fcdd53e3e7a302ca12593ce6e8da6ddc319c7dcb08d69954a2f4dbad93a47070ad03902dcc5ab81b3706b3d3e955ad42a614f3d7170d83e7e931b1def2c41
-
SSDEEP
96:ehb3MHTQvsUuiDSRt6uAmBD1iGHWhWJsKpl8lpRL:ehb3Wys6DSwmBDkGHWofplcRL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422940664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3299B1A1-1BD5-11EF-B411-768C8F534424} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039c9e8d5028af047a0525b553cd7d61000000000020000000000106600000001000020000000f6a125d76bf45dacdad204309ba359e80fd50bb13c086f275af28404830c7793000000000e80000000020000200000002004e0512fb0e0a69959a31cb77b25771ae2bd4dea39fbe17d34080ca00587f82000000013bccb7e5da726cfc4ed7d4c8f1e605493c39a3a8f65cc26eff7a0c52761ba70400000009a7473bb6f853f1d86f933e89570047bd2781f9a85f610dea17f7e572e2447445f6ecf06da9e57ee548cbb28404ca94b8eac2ff9442bb73d1b3d1b0e71cd7a45 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c80e07e2afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77b1b6320787ccedb7f47d823c3b358b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89484c29a329eadbdeb974b05688479
SHA1dfa1b127aa631e28731e990e9a8fc4c75253fe5f
SHA256f8469b3fc4b3f79624a44c96d3aca8edd09a93e94b1b09cb7cea05092720ed17
SHA512713df1194b7ef1a70fdb3511460e59801119f200666937b37b07b898b83f399ec918d0f65dfa3e7178e3d5317ef26a2e97d32413fb03e53f0f2d225d8fc3738b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714d0d7495d209685d1cb533a0290206
SHA1a467f7349ab85f210e47b2f76b2686078b8c6638
SHA2566711b07ff86f888e9999fdc71426f716769f392248b07f87ba74ff664e270175
SHA5123e999442c1e8ecd39aea22d0d5e528b9059a0f91ce6f958c386ab370ed3cb9347d275ba886e45e864ebe2f8ae612ad15d46684fcdef2f40384a0282d89beeed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebda0c564229773624d1c8d2f801408
SHA107e30d6e1e8e4f2094662cbaec3c37ec312f9a77
SHA256cde52331743216e1eadd53bb2684ec080e08e1fa553194e18eb90e9fa4223cc8
SHA512a3e3348ff3f2e8ffdf2ef8273d010076c458c31269957e038049938d478c77f5b91cfdf3eb99186b6ecbcda24a6fbcb27b1f7e9924bfbb29d8be2049fc737f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500df5c493c5de45871e6c05c7425dd9d
SHA1af571080ad9941de117c9bb6fcabfd598e467ba6
SHA256f8c1c45a11f47307f94279986aa018e82b8f0cd33eedb6c0d3c7239f0d0a9e92
SHA512e4684e997fa97118e32b1471b3d5e7a20a70cdde15b12a3778e7f6a45aa428640051d283ec6bbde1635f1123288791f415446dc009c12d55e36e05f1c174d9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c6833d880b322244f7f7ccee8ab35e
SHA1afa4890917ece2bbe23d014cdd8254b8c1d256fc
SHA25605ddaf3fa93713465e461200472229daddb62dbb3b9dbeede3eeb0fdb61206c0
SHA5125899b46f355753d1277dd6f139e0824079a91edde06dbfa9cb867e56105c3abd5364d5f96ad5c81d01a1ebc15e4fbe331b75dab50fb39ff61091f25dd410275a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478c1bb6f9a816caef468b121ac73ac1
SHA1619a8507f266232963f238dcdaebb0ae5086f3fd
SHA2569a142fa4054afc39b827902ac0a61869d2b8ae39aaf9ee2da326922fdce32a1b
SHA512f66d31bc77689317d3fcb9941140272655634b44acbbb9212482ea02869d16168917a1460d86821ba74f76404eb29f7631add5f04662b1d0903b2d9b9bb128aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551950f282583e2bcffe4a4be4b344e82
SHA1f473c57bff3b5ad87f95c5ebf1733d8d110d4a8c
SHA2564a687364bc4a8330c2465726c5c34859e1789231389b4e69a132f7d69f1eed4a
SHA51298d8502a91f3dd1c2ab17e22c1c675dce4c8b333017f4c0b86bf9b4c508eac3318da0f55ca4786b9be09e08556e2f8a7f1d1a6582cb6e78abc52c7098aba89d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f1ec1eabdca573c824857f38247722
SHA1188dc50d84985eedca93643d1f05d84ea72ddfe6
SHA25658dc5c1ac16f4e6b79e31872ef5b1ef65da3d82a3f43d03619e6ab4102fbebd6
SHA512d9185d68385a1eb5f46077f20697832cb757ff9bf1367b0bf561caa8c047f60af234806a27ed8b97637a08a57f2caccff2ca827c3639b9c2154da35fdc4d2967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585129f65da16c8bccf3056da1be24a32
SHA178a43c51a9f4301cbf88ba9ef071940f8579f792
SHA2567cc6ffa6e737115120e2e371a4f43db5466d9e03aa08e2bc6411e77e15c92dc8
SHA51232ce25a5b91148ab907b21cb26d8f3792b618a65039d9be5cff5900c5f96002d97057c61dc3cb142857290bcbc522c899c60ef6593b84e0f4ad0a0d74d46ca65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220180909b973aa7905aa83735b33b60
SHA1b26a736c77f0461ecd71e871e32fdb3467ee0663
SHA256796840e0cd77dd562351cce85d1d429476c82a3fd0fa62f61921d928ea999217
SHA51211bae08ad4c9954fdafa42c9a4591bc347c70711e35c1e43e047d10b20f759f918b41f38109bca25ef2ffe95b676d6b239dbcf2f86e8cec1467dede68231ef06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5400d6cc0d6c5e1f8a2024e7424d71f69
SHA173df3f1916ec435686b5d75530b62f23b998c855
SHA2568a6f2b26e9e3fdd2758cca382b9e261a9b74a2411fe8b70145d7f7d5b9c23973
SHA5124ffe7610168ca6f65045e6e6c7b7dfeb02cc986dff2d4477359c8e9a4c0bee7d590c873a21751838952e0187eb59d0d29e2fb069ebbba2b6bd8077f0df60071f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b747c549061c55b3321f73b4f637df7
SHA1ebbacf92a57ef68b1ba3054f9c227d575334af0d
SHA256531fe872211a5d1b70487f08add51507db5678a8c5b875bbd376e03c79514b39
SHA512be9e879830aed3a2cc81df196a8fa47a99993d25156437c5f0619df94d4901f96731407b89dc3540486ff04f636f9eed6999507fb8bfceb40f5fdb531391f6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444b02da7781d0e5f49fec759cf63893
SHA17b9b399ceb39b8e07185449a876afefbfd0f2d17
SHA2569e4ea17c916b36e48d9278724e5484cecf452520aa1d62dca014a2f17c669e71
SHA512e268b01bda2ecc99a9c38a2cecd3acd5246f504f96f38265e8f8244dfe4f591288a2b01b606e72f637c97c06920d380ed6e55d76a29b52d648ecc5e9ea77f640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a086468325048ba4b27b9e59bfbe85f7
SHA17adabb27bce014c5e64b7f754e5005ffa3d7f9ac
SHA256e9579578e32d936f5e72bf98f33effdf4b2110752a8870ac552ae7e955477f46
SHA512733298926fc4af2849eebb374102e9701ef873e914f291c2a9b14f1ee6e239e5b912c90c4d86bedf4d77eed0e92673e710f5008f2bc848ac1231d3fec70b3f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7e863363e900a4790e3775a8980c22
SHA1d376ca6bc9542fd830be17c7255dd177232dc802
SHA256dbe5c94d98650fbdbca5b2dcf32e006e4e63518bc17e315c86892520ccb699f1
SHA5123fd96c9bf2b2401d5b9b62325d2fe1e39c478d38b5f0389c071e8de08d66a56f68160ed1d6bae11b89889f0bff577a5646ba76ed054ade0be58a09e503b0d858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f63f4eb4349db4ccb18f3cf994d2e4
SHA1fe6db935fb301b1af655129b74e6bf1e10400a16
SHA2560149012c1086be4b8b9da2b2d77c4fe017e78c16794e668fd67cc9ca86d71f3a
SHA512c32455496e9c36b01ff248b89eca8dff3c01693187f1539e02fd8473dee6f53ded687bf7ba1d123c0440fafbeece2f53ad06a3ce9bfeb48b4bb2031a0887f9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578da5559c15a739cc797d3a35924c707
SHA171b4b26b5e71dd79ba42eadad193824b598ac939
SHA25673450fcc0813371397767ac03415c872b229bb305cda84c58b496025d2a404b9
SHA512fe6a37909143246aef21f6c09fefbd5aee18183a502fdb8cbafa30eae1e3e274ab48ae39686ae9a890c243d41749956e3c14e43112ba590fd96083365df36c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ee9bc78b224fcf23a6150e4642e092
SHA1a822162e145dda928ea22965a69fb5330298fa0b
SHA25628ef931ef016c52946be327c6c17f223cce4e2c8741b728fe54099e7c68f5726
SHA5121c3c2122a2583ef9636fb554f260e8e27a91a4fc3358b3a47cdc10b21427702f570cf1905f28890997a6dcf765e4d9ffbd549efa53e00079ce8b4b81276de8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc5c43c1d136119b8b5c02115f892d54
SHA141dbd0f6c57232b73c776bd1090513a201890575
SHA25655015d920ae2add11f044cbd7252d09775457391a6bade334e57cf3206449b20
SHA512bdf80d4058a1669c69926900b3d4e0c2b1f4678f3802b43a9850ab2d90600b3a350de4b29ccd2351bcf11b905354e65390236b8063b2ed9327394d8fff93c9bb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a