Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
7eec87e59882fb15bb0e5ef70777dcfb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7eec87e59882fb15bb0e5ef70777dcfb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7eec87e59882fb15bb0e5ef70777dcfb_JaffaCakes118.html
-
Size
141KB
-
MD5
7eec87e59882fb15bb0e5ef70777dcfb
-
SHA1
41017a70e87a9d8e977704c032bdf692eee82d42
-
SHA256
b4b03db1764c169e38d826ff15a05d8923f0c62f562cfdb17f0d073a47361d50
-
SHA512
3b4ed4cb99594b9353c695c729e7ed26988e06940f20a424164a4f29ff9ced3f5572aba86ba18f7e7916524b779bdcfbaeeee7f5035dc5a65736de1cb83afb2a
-
SSDEEP
1536:+2cnYwyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:UyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001dc6f5e133228d4593dde4fa1ff795b200000000020000000000106600000001000020000000c305e27fbb4174789f5b9b348258e628c358bbbe46961228437fa12466bded1f000000000e80000000020000200000009cf94b70dd73d14dfebc7e050cf0154ec9a13ca04e996b23a91033211dd0c53b20000000547aa2d08020d9e0268f421305493b423f14528c14f6803f316bfa91aad3444940000000342c0a8331b4f41c027db1ac605dc701065e5860a7fd94b177752b5bd51df50ee422f48e73b51d091e3e146463401005f4d781424828a9bffa0ab05c961f8ce0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423104209" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206c34e95eb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBA7DEF1-1D51-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2716 2184 iexplore.exe 28 PID 2184 wrote to memory of 2716 2184 iexplore.exe 28 PID 2184 wrote to memory of 2716 2184 iexplore.exe 28 PID 2184 wrote to memory of 2716 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7eec87e59882fb15bb0e5ef70777dcfb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce873bde7584592cb4d95ea90b76f8e5
SHA160de7889efe3369df0e63d49d12623afc1433e56
SHA2568bc4018d9748064065619dc517c78523e5f700a4eeef110be592c2f484e35859
SHA512e16c6ff0ee9da8cb17364bb3a5b47393ec240fa569f237100eff761410b057bc1d5e4716b344009e9c4545cfcfec74babc8b1c4f9a5a15c918897ebf6ae6ce60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9900bca5d64f74f6a63b2b3a757919
SHA1dd61ad82a2d0018c673410c79899987fd25ce4d0
SHA256c004c553aac633065723b3c0657d8f4bf95710066972f86d0d954748f01d431f
SHA5122acfa02f09b3f3a785e8d39c1ae52af538a24c1306b7488dc632e1ab5448cebb2a5da9dd6245a0e5839e5022fb01dded71ae3fdd43f88b07d41aca9c67dfe1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28723614a0b7396f44c2484dcd66eaf
SHA15f62a6f6bc095997c5278e47e2031c04000ab0ca
SHA256d7f49da4defb9642b4baa2f68d95bd5a86589595d3147b910b8e1e63fb2a266b
SHA512d5f18606029cdd9b68f0780db04f05bddb7f7bd9de844f497051e777f4f8ba1b97822f1dec71779830195a36ed3bddf3393a74a715fcafaa04357a2744be5270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c2a09bb8e8d32913293f1b8f8c3998
SHA12b65a1f77f9d7e9f3f16711d6802067aa0c6c041
SHA256a73a83e886f1746b5bb1ee2a0dbbd4ee35452e18b0b6da27700736c7f9d0194c
SHA5125848415867b9f41af839858238d91e97cdcc54d473e7d41db7e741d678070208f204c1c78c01c308284889052352e3eff1bfb96c0f62cf1aeeadee4de06e62ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b728afe0b7faf1c237f330eb06659c
SHA1cff805f2a4eb93061d4725d4c721ff3e99421d6b
SHA2567a2c35ac63c09dbfe10f9130a9cc38a21326e61273436682a318e8aec2124fb7
SHA51279c8253e68e7e470d62009215b9e23fd013e0153bde60c1c05182105f969aa79c5db6e30cd0ccc651c4ebb561a4b9fd30f9d9fbd59786e483f732701ff9cc185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9829fe84f23e83bb58a06a29394c314
SHA14b3964387ddfbf52b94622a530be990df6c4924c
SHA256dfaa27b659792f659e55aa134e5693a990245b451fd9c427e44d23a9ebdc19c7
SHA512db059abe566a3166d02ba5c1a6cb20ee77c2c14dabaf1c6885551e60d70565bf728895d2d94cb7d85b57b35e3409ff53c84e6ceb21b8042db71d2f99e69818d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a4f52fcdb089775c0d4ad2d4093136
SHA1f4e0261bf0cf11ec0f8f70df8e04f4a971deac36
SHA256dd56dfea932ab0c69d965b2d1d265742818f12c359ee54b991cd07c66b6ae42f
SHA512c9cd9e54781f7c5855bcc999b24a0cef0e87c82bf70f8cefdff6b2fac2b05e5a36eda9dac7ea0b90fdacdc70ee263dd888aa81c90b479caebf95693274056713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a3bad31e2cccf2be2b11fc7a64e268
SHA1599536e4f50eee90039445cb5c4a7763c5236384
SHA25666eb3df8600f0ae5eb8fa4c70c5a4cfaa8c027f8bb7fed8b0c5fcbd32bb6d048
SHA5126385260fd286313a6a71ec0b54932ab41b4697b1aaa30ef74251119d42e47152a14034da6d47f093938995dc71c473fc5d2888d0d469419fbc55786dfa45f804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcae03ebec06c06d5691ad9e3f2d317
SHA165d873f612b888c507ed14e8f5f6facc0bd91877
SHA25609a166e63972a2fb008f8b57708504064c91ceccc6c8bfd5450d56b6e822b3b3
SHA5128879da78cbb38284d3a025dfe6ff0e0d99bf2ce07c419a4ccf7db18f25549695b28da4baf2898712eb430f4f3f105dd06df1c8a7aa4fddfc0f965ded6bc9af1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d47167b92b7893e20e9ef3ef59ca5d2
SHA1ae8c5e879fc78ffc5df530db667b04055b93da64
SHA2560034f506c97244d2c3e844dc6f2b53ee51bac2086bcae70b2c45bee62fe4e325
SHA51272090bd39ba341965ed5d44020c7f36783efe09f6b3fe1e4747663fc7bb1e315da3dfaa36594c8c7539ec8783e5a1c0bc429e704cbb217883a9e32ae529cf908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f3d56f8ed8e0fe9a0d17a4c14e9413
SHA18666ef19deb4028d7b4d32dc4bc06f96731f1532
SHA2560b5f88c0b2591a6a638cd47b5b5f2decadabf482737b37aa0a06b09e5c586984
SHA512d87093d18b1b48739c9e8054b8beab08e00eedd38a82d9dea184d01c56576849d69996b8333bf126504451ae5e9401fa563cce65d0eea3c4cddff35702c0e228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad847c15f7ef0b971a627b54a45ba99
SHA18e5730048690ef6d8d8a5611ce2a028930b05485
SHA25641d4b1518dec37b13aceeabb9b58ed8aabd33541f3f6d987eede1fda7cf5a986
SHA5123cf34a70f86ab269abf62fc40cf41bf27a3977da5a206815cecbe45fe84b9aac5ac956ddc29cb4d86c3e64c1685c36ef6dd2650e2dce332fbe4ab71e50cb184b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b66038f5eb079d706e2b48017b8425
SHA13a3d7720bd733d81bad70e6457f44865f46c5fdb
SHA2567727511cf810d19f1ecd94f77699b12a364a3ec3ff06bffd7f5a1f6bcef5348e
SHA512542f24511118ef8a333d167be38dc28ffd649589273324db947a3b6ca3cea499560531e455241a4f53f6fd23e1bf2bb7e0f5ab0143572df89f83763d9751c8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b72be0d07807c23a05bd3492dcf9e23
SHA1d3d1898b3157ded5aa8a8d85cb318ab3ebba7a1b
SHA256e2f9b9c35aea58f5f7b460f86546f3965c46722b859c00e6794db2ab86b7a580
SHA5121727b31ed073e03291ef0665b48d036e09464c94f9f7a9aa2918ac4a8925794646178efb04ff323bd168671878161a94dcacad028e510579ec68f0de805e33d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca9c38e28dec34703e58fc9945bc428
SHA15af2446358428b8fec2e8f57514abea4ed01febd
SHA25606467343b276133279c0a8d07fd680ac938762a8ac5f5511efc31be70bdc151a
SHA51202042d55918b66d04cf20919a1b4640014eab5f870b952b38e4bd8c9239aad5ce43b3c9fce06b8151dca34e681919ed6b09fda672f7313e09bfc05629e2e9448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500708b83507df5bd1f65321fa49b36fe
SHA173e9a51f9406b17c425c4c755865ffc81d07c0f4
SHA2567a95d438387bd40035e71a6b80cb5136d69a755cfa1f2a67af67e8d037c07189
SHA5126ee10aa637709f3df2fc077b4345c295fa5fbb2321d1bc16a6d83d46b92f0238b99bde65a34fb36a5b831eb846d4f5322c5bc5ba8debea6d1326742d5ba78f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c753e91be20fcec6cce4e3f62805536
SHA192c6d268996c6f417ca56d159f103bd69fb1a660
SHA256171de209bcab38c3015aa418616910c590e8cc03c251def9b7973b30b9f6d8a6
SHA512f7b2309e19a8dac47cb733ca96b6f0a1475f076698e70fa463c25da68472085593b544476a05ba298c8acce1efb44bcb4967b5696ed033a707f2270e8cbaa6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4082948b93a4c22946f108d97d896e
SHA166ce86ac26b625bd8b71ae71c4d7c3240d952242
SHA256383665211a1db5f1d3be0a454d146530a472961619451d9782ea86eb7810477f
SHA5121f89a677877ff1a850de918f27231b5e93289cf1c301693cd2fde321ff4cc3a475d621d18d44d2e02c0413ff6b59e40d85710876498571efa68e2c8069122390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58974d8aaceab81eea5e7b68ad40ea6b6
SHA1af0140e33e5b7f46077f3408c00c233b64976933
SHA256276fd3020d5f3dee08392b02aee345cf06358384efb67430405c07f5ecc5e283
SHA51216d84c4e2be6aa53420f3dfe874c1e9c4b2ddd3925d4c0ca024cc686b52e544adad8d1cea768d398071d1491e1d372cc228b8af20936c04980534a8e4b863b67
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b