Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
7d3aaefa279cda05ae452cd61e0547ac_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d3aaefa279cda05ae452cd61e0547ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d3aaefa279cda05ae452cd61e0547ac_JaffaCakes118.html
-
Size
2KB
-
MD5
7d3aaefa279cda05ae452cd61e0547ac
-
SHA1
835ac6beffe4b14cf6b7d6e8bfb347491cbb32f5
-
SHA256
2e7eb658e020e03bef4bade504f90319673e0f2c53cdb4e94013d2a11a01e0da
-
SHA512
7fca6097ddd876a7bab7361ab17a17c12754a01c90a64c9b0a1777f22e0257587cd7c03188c91a27038f30fac2b44da673cca8b50bee2fab9f994bb0fadf348e
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5404A3F1-1CFB-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac7cbbb1e476f544abc64189f16177ec0000000002000000000010660000000100002000000031f52ead8ac07e9836f84251076c8f749c983ca7fbdba93cfa5263769255653f000000000e8000000002000020000000bea084ff1f730b245dd6a18546917ca38590924df704a96360089ebfcf636cf4200000003cb1ae0e5d88e604ba267367478e98f1bce90e011626595d956b6300cbf02849400000006f647d9ed30a831f4f7ba11ea4ecce6cb0eb558550c4db6d0a7c0f335421ad2e28e4385acb3487b31cfdc6ab1ee420aa36439645b55e2c13b78f62c5aeec84df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423066992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303fc32808b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d3aaefa279cda05ae452cd61e0547ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541da93a645be6ba30b7ed968f702a657
SHA188cc4c23ae4f6035f7c6fcee3c43d7128609b462
SHA2562f38846ca0f48acd75d990f1d6163f544a34feb1e276230878e1b343a908c888
SHA512b1b942a9ec8abe68f7008ba4db1000d7ccc46b748f2ce3e16a14a9d76241661b4d80c649efe9a67b2bf71b25291f23e62340c3dff4e06d1e1e2ce32229b3320b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427b72d20a031843533e16673e5e1228
SHA182461b2b7aeb2e09bf5c2afa06d9cacc4b7d2eff
SHA2569baff2cb6836c780cce41312041233a3aeafef64c3948be0596fc64f3edd2ea4
SHA512063148d03c0b447ad4de985bd61ca507ba5c3b63c3404b8288c6b8dfc3940006c458d1613032723ef6af5ba5d3514d7753f8632d6cc9071f1c8502e64363e4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566eb24f428538b7bfbac7a01b45ca25d
SHA1a039738efd78da0892e2820e38f362e42c8250fd
SHA2561058ed542f2bb6a94381348686de11f87bc4ad23665a1a3f1fbdf2dc4dc1488c
SHA51217830618ec9b92b2f51c835feb5a499c2ee9e89c47b2c88fb9288c594cf174a56a10f1db897176dfc93a9cff67348a90db364317d54326c75d1da3b42b928aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5465effab4ab9851e8756b8fae82066f5
SHA176f357ed8f548ab107fb2617420db9be216350b4
SHA25602fc396cd40192bfe2a264247fc26bd08e217fa759a8ec026f564ff1f7a16e05
SHA512c90bf0110e4d7235700927fe0d85010419b9ccdc3f96e3b9ee34c3f30ff2ffee81ad7032fe78c6b6af798664124d101e822d087be86cbdae42b719752f90d177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b80a0fa026b7bc742e75cafa330841c
SHA131b1c32a438b61d87a37df182993353c0c12e76f
SHA25630bde02b1fac554ae1a2f43ddf4f1d27c2f9f06b628bda37f5e825b972d84569
SHA5125ae07d59563213fd987e3982631a62af7543572ef7fd73f45bfc6498f9bbb180cf752e78d94d06bdcb08ae269a211529b38a39b6a2c3b84ec5f1d3125b3cae4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d90335667c585ab45bdbaee7706666
SHA19e7b6c53281bd480e2cf9f93f0a6982a3d6654fc
SHA2560c3b5b04773757772d9b5f45236eee3f9af8c47215ed18af9135c3753b40c523
SHA5122487127ce5507aaeccf55d8963d42630e6dd177c5f147714021c3596fab64cd3b32b4574f57d2714e15c7ef366032a4b9f255ad1e2d63eadce45ec653225b4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a07b40e6b10d1be94c301e82ca5556b
SHA198179354c466df495d04eef08f6943e217080eff
SHA256886def5f6c3b9a522aaabd1133d2997b4951c3ce40120fca4ff39ee57023f5cd
SHA512859ec30b219afc57c34a6be19701a0533e319823557cd610bdc21438222f9b428c4201d843edae27f27125474ddd42a1be0a926e1502bba62287e2d0111824e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c5ce3c8671bae23f8ca89bd4de743a
SHA15c2ed23feacf4fd4f33df948869b745d9ae5332d
SHA256b20e091605efdec6346adfb93d04ed74fa5200eeab4d762e8a2c43487ecaccb6
SHA512bde12249504c7eb2682f8c2b62b69b11eecfcda2b3689f00104fd27f0504a8ef1e1a675f140715ccb6c61515ab4ca8e14c7926778d7b5b3281a3cebc6798df74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b1b449ccd552afb136521151e9ebc7
SHA12f2dbd595a304c44c83739604e9b3530cf605f76
SHA2564d7105c8b9e8ca0b16ede7653b550ace318e68aada8cb4caf1e12d14e4dcc14f
SHA512c944aba47ec740fa7e7d88dbbf6666f20b25a6ef49405413173b8891c647f88c4a63b909f8d53ef36c127396a124e01cf6d5062ddfef5c5deb3a212d2cf3eb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091810148f04f84bae6218237e5a35f6
SHA1268ee8b2ebafdcf8d9edfc7b7ea49ec63f273427
SHA256755463358c33a58d0041f2be6142cef64c2f32b6bdab91d03f55dab56586ede7
SHA51266dcffc833c23c018c5f1ad57e4d1a6168656c5e63a2d93d796e6333a24d1ecdaf5d501ad12790225b726576fde1bb86dc71ff576d1b7e4d98c5d5b5087cc767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2ec6ce0d78f4415a3b78c868f0e314
SHA132edca97c82d5d72e0a3ced477647365f32dc310
SHA256183357782eadb881619b34640119185668ff341210dc82965139c45ad138687c
SHA512aadd9e141d6cc73fd558780cc098eefd5856d7debc5e4f4d65a2db2c153086e5aa4ca886832db8e475e6e84cf1f0dbe0e0d7c98d94442293a153804451d34051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591231113a7673652491969efa29b31ae
SHA12a9fb74c4ed8a52a5e2e06a651636ed0eb9e83d3
SHA256c33927d012b6c7119de430ed83271f84d0f644f06168a2a4ea64391b11ace7b1
SHA5128406153e30c00b988cfc11ba2d05e5c17a22ad911175d4580d8dbc3daadddc125fc35ec38daf436dd69169c1339f056df2dbfee4d1907a7f38610408b80d5bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585003d2a68895b6a276860187ec40cdd
SHA142453b84a7a356fd9975f553d54d0e14d1aaba96
SHA25648d7392cd866b8f412ba738cb4559ee7f0cf51d5b171fd04902cb8f2a972dcc0
SHA5129f5b785ca52ea05b0b81cec6e25473ca15ff880ca1542e0846f3fbaf4cff236d0adb5e618269b00bc6075b3434d53372b15fa16f0a897d1bef188b02fa1e1c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5babb4a43ce22d9010e8163c205dfd27f
SHA1b5710dc031520c0a1870e4cd03a72f8cdbdecfd1
SHA25608e5c3e3c1d2c24fa8fcbfd45dd1212eab1efa8f65a5b6eea1be2c69751b47f4
SHA512db460b3096110baac12a42a5bd8b5497e9a09ef5ed570a95f9a4d7a137018f1ea6eb24f695596b1f94f83ec6d9e3f8a6781fba68fcd54dda1ae60db564997d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595eb298b9d2321054e88a224ed842c4f
SHA1d1675b86a0f3e388a5671cc7241ac897fe6abbd8
SHA256f7a4db72f3d795a0ba69cb7e78c5ec6439e8649669d6c6a8b214935a08fa69d5
SHA512190a3958ee5c2a950f2b1f7f42e0218fffb1c1e9f8c305d68e0f794c112d0885a81c798214b045261fc5e806db7e3bc618dbb13a23dcf7a8f8b11468559d1b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234d377df42d3c5607b3ab919fc72374
SHA1f71f51511af4a72f473e655435a29f977bdc5733
SHA2568f1e15a5b30347ae3cca829a7739ed5856430cd6c9d43e875546f462a2f7de28
SHA512a5b859e93cc5e2cfbbaa5ef26b10a81a53af2b08447446a6c743636d150d8839d0dcae357f04695b3ecfb7515636bcbe59abe0d86116b6ebae88f5938de4e37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168f38b8e64d64c7042408a66c1e16ac
SHA1f2da621507af3ebd108b150d96bca189e45bd3e8
SHA2566584d925901d37819ead27d92d2bec9e74af20e38c3947dd441aa3fe6fb4993f
SHA512dcc100a444a57a16f637a041f8a61f59a52c2b9b31de389faabfaa9e54e4afaaa8a9bc833e3e59c822574d114aea957ca4d19c50dee5c432d98bb508799bd734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a654fcca3ec45937df2cbba0ecd0ae5
SHA14e59b2356aede9fe3c1c86ac2dd7674ea290fd25
SHA2565923e4f3dca2417b1f6880e803b5933a4f26efe59ecad9d9d327d25ba2d1a251
SHA5126667c7afa4abc998dcf0afc31456b0a5c350673a98ad22867243810575e816864be5fed17ebd5b6164168a9f13413d09fdae8b49a98b7c853d91d01af38caa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555bd96ceba55d98362d4bf522cab972
SHA17b91854e964e1f6ea4f859cfc0f8a1722b295e02
SHA2560665c3dbb25e57aed7744b38fcccb9d63806b6ecce49818380803b56be25ea49
SHA51215d4b4471b456155fa2911773e8b6ee1ab85a001bb91caabe658f21b1b08eaa2a1be4c2caae5e8ba4a00cedbd089428d115c1af2667c73a6f635af6b2d43ddc0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a