Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
86f9e55a5b0d58f90b8f205a8891b5ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86f9e55a5b0d58f90b8f205a8891b5ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
86f9e55a5b0d58f90b8f205a8891b5ac_JaffaCakes118.html
-
Size
660B
-
MD5
86f9e55a5b0d58f90b8f205a8891b5ac
-
SHA1
7751a61f833608d00872cd96cbbce544930a1742
-
SHA256
27b828a3b79e5ac25f3cbb34ef52782b3a10af3c497dc97e438f5c4687b15b4f
-
SHA512
cba2ec2762c916525f2fb043b5c2e5272a2a74266bb74e8ff444d6d63de1e8eeb0d24af6623967d86b7ca81eebd9d944a79168b7198a055a846cab215af254fa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05978081-1F48-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d02efb717a05ca4e810be706589955bd0000000002000000000010660000000100002000000025bc5196263fe713f0ee926149389a79902e108a285cb865ff49c7220651e082000000000e800000000200002000000089a38dbd720d802c463288908f56a3b4b6d3f2e003523b78f9d5d9e059afeefc20000000f6f33ab40c0226bcc7b8c6caf78e9eb360f2acba5d17ef1eb7473bc47234393d400000000fbce6ad1df20510017b4a3129b157c396495ba6de02972f0bc1f71c57427dffcbcbe2c7d69c86adf9a513d88009f27bda2e025f9a62179503deecf8b2c01cc8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04211da54b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423319834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2924 2228 iexplore.exe 28 PID 2228 wrote to memory of 2924 2228 iexplore.exe 28 PID 2228 wrote to memory of 2924 2228 iexplore.exe 28 PID 2228 wrote to memory of 2924 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86f9e55a5b0d58f90b8f205a8891b5ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55868a69ebb517fadaefece00fedeae4e
SHA11bd1adaef70a67f977989883476b036187fd65c3
SHA2564d9d48da602bc21221ed43ca89b4f11aa7208a4a69680d05d25d057ced639f1d
SHA512c41df7df3fde1bcca149cb0235b84865bd506715dcbf518099d8754729f7cffba02af301f95159b250d3cdc0ae7315c2eb87446109146f08554b762d4a10d234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b919ce337789f7a71d766a9cdee07f09
SHA19d525a049d41b2dd8495370fe74b70581dae717f
SHA256797b4f591d78b95c61e542dac83d259a0038b02a120a90c085047101e0be605c
SHA51242af23617034eb3cd7261bf124338948fb67a67f54fd2ebe775812b30e86b5335bc94da375d2ccdfdd5d9e7891221a2c0eb25f7176299009db8a12b38b90a41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca664c6b3023a1a520c2d2ba615f54f
SHA1d1f2757d69b25b8a8cca2f37f1e285e4dd734a97
SHA2568eca2954fa428a9630733967de5333722e012c26408b3d015a005a8305e34c4e
SHA512f4ac7cbe7ab9b21e84cfd42f25bfe4ee73e7f5fbec84c3dcdce1c9af62b2e5017c975de44744acb6c5e04cdc435bd95377a517507f61e20d935d0bb82dea0907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17c20ccc675a389943f654b0b5c7e99
SHA1778081ef0fba87471412aaba307fd0de885c7151
SHA256f4fe3326f88974251b7602056e0f3b6f0f0eb6186cdd0354e28fd6f75ab3967c
SHA51247f1dc9be33be19869153764d97389b5f7eb07d2c2eb0ef9d75182803d33598e8df839991856c039a7f8351d5a7db61914491dce2b849169f04068f7d180e739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec776b344b1b3b43838ffe3f2cfb330
SHA12cbbed90db81949813fa86400d6866e382415c44
SHA256581cc59c3ab292b9a0de2857913a2066f7ed39dc9a2526bb9eff8a6d7849484f
SHA5125bfdb568c10bde9e4e1191e829b5fd8574f724ff4c89ae242a73282ed590e5472f06b21ae1cdad81e3faec4556a0e76b66e1be2470c3f38f07e67ca295caaab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafe7008cfdf0610f3475156815e60e3
SHA1c0a949382a3e6eeef4e4296784ee981339ba82b8
SHA256522c1f04fe38ae1a3bd3c15e6f3b6dab6c56b09c72d74f99ec45a0f10dae56e6
SHA5123a364047127bc616a08c58fc5250fb4a6eebcd1b0a3e9da8f1247fda05fca93240ea4db68fc846fbbe90cd06c7def2eaad4c4db288e6e7b1b01b5999fd7ea8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b6a7ca225fcfb619dffeb8885c9cf7
SHA1dd753a767df941685a8f20db068c44e14739ce55
SHA2560c57c3fc07d7c5d4f2de08a0ea7ad93fde74aa070b2dc85f5e8f4b2d366c921f
SHA512e6d9642b15f20597fb8febfe2631030d7572aa66bfcd37a0fb9b351924dc51de46deaa7fd8355d8253fc233743cc91219d507dac8491aa57074046d75d6b2607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c82b9dbbbd00a3ead9b8b35e79a3ad
SHA1b06373e19011047406047339b2dd4e2a9bf5e7d3
SHA2560b3880795182058c205fa84f786b7e47257deb650c3c7c9cedcd4177a5a156ef
SHA51263ae2aabbfb9c6076b7f1094b4852034a23e4292b933328c3457b13f64924269e8e6a85e2dbd363bb4579ea172eadced01fc9f1b43d3dd91757086d8be955a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d938197bf72576d7b8e26939df3e572a
SHA1257036eb4344fe64afeeacb1f280ddb1b1762b18
SHA256788dd509f4b56149ab124084339d2ea64991805ef76b293de69868800e466385
SHA512e549872958d7451b9aff0d22b1878cac9b5f0a7d83835661ef40720902b2c951e76f5800289cce927d164d93f8d29887214d2b822ccc12bc72a94f573bf131c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64b28efbae60aed1c2c85d2e847b993
SHA1ebe1522a65b39e6c7feea9680419cdd7f537f939
SHA256a6e3ebf21f5254ea9cf99edd6f86cd6d694d1ad95811cf0a5fd28687882895cc
SHA512f6e108897b59f75d2515db54aaff91f7676192b58b98a2709427bc54481fb4441a13061b0ebf63890debfacc6172e3c23f4ce1115d5f7bcce84bd81485642edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53626a4d68ec0ae0f24769d207a7dff21
SHA12c32b992002d40e483e9ae1789b146c3d1d7d2e0
SHA256bbf33ad5824a4a3e50aa85403c5e98f80d080d2fc47bc59163a2513993ac4627
SHA512ff031c853ce8c04743fada1aa94535e998ef7fa3bd4f004ed1e31519dbcb52bd2b4b3b2b827b22d16f6aab96a109404b6f325483fe1e309815a23d06a4b08b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407a4973f3d5d90cbf3cdd7114bd17b9
SHA17f03e8088f554acdb1ec9ada37d3e37d6ae2f691
SHA2563421c49712405bc8bd972980b83b83db43900e0b3fbc8dbf1625276c502c7e4e
SHA5126b7e41d1c9064175fa1692335f658e4e51bda4df246c4f2715db9884d425f9e1b1f550377d23ed865472543276075d93c10b90787b862f8da963d22b3bb35d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fa6cbb54c5de320c2ac95c1fbc1ff9
SHA10fb2229e124ca1b9317042a2978dfcf3061e2d2d
SHA256bda16b08fb10a693be5b80efdcab1e74c08ae9ac9a459736f8205cf8341d9d29
SHA512b532635d876e72c36243de420ac78078f0b0012962acccf431ce11144b381ebeded61526285d231a27f89677c2f6e2a97026369393927d979d39fabb39b2ca84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a2d8153fa4147e4dbffe1c02266263
SHA1393e230e1e5882d25126860c2c0cc6dcb25ccbd2
SHA25626cf5e1c82ee49988b6e89c848be27dbeb77534c3a406171662f85a68667e0e2
SHA51275bc9bfa9f3ddadef302fa211ac4aaf1220b2495434d97cb2985e771d55440fc8a0f69ef96a1dd9afa49ca5dcf73b2c959eaedaaa1e90f33fdd12aafe116e2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460e4e8095ecace40358aea86f5a0af5
SHA16fa151e695e5d9849054178184d7c6ae494fb119
SHA256fadccc2de932956f3c85d6164faf04a5478043390124aa3f4ae1c1cb124e47b9
SHA512e94fe85c78f823eb6ebe08692113d76fe7c9c7f7aebe623daf02fbaedde66dacb55a24dd4eef76c02c663f1ef01927311c6bc631dded61d0473b2989e4b2b703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac300e5ae1885695e1a6ec9fac36675
SHA1d044562028477ba920ecb2e36241dc0282f7a461
SHA2560b047ea7e22aeb860213afe7917742ff1ea2676ff5fee0a5d668dd039c2f4354
SHA51229ecdc310c1cd9413340f0221bf2328967c29a5f3c3e0a9a6e6b05e526d40150e401b341cea706e7be351af1a1dd45165c20e36bbb6d5bc1e959cb868578697d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcbe87f94ae04960f5b1d1df5183782
SHA177accef44f44024d554631b4934d402554cbe6cd
SHA256b7080f9e0cafe22353493ce8584f4a6079bb68bb1d38477dd3517dca4b1b6694
SHA51244c439f57a753c665fc5015305f3916cfefeb282664005f4152c9cf88946eb157648f5a7d9623c71a27d221a23b74f2afdec1bfe1c7ce9071823796b89dc9251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8ff81ae05a1929c745dbb03c933389
SHA1124cf9c64dca58a917ec82bb39807ec156d8f1bf
SHA2567887d6a103b998e03777d80e05025d0fd91c6648b3301381f274514feec87724
SHA51205b8fa3b4c42f9ec4b886cdc9a438d2e5953fe758688705dc0ee59b4a13ee7491b7a90682e50bbd4a583a73397c0041927c5e8969285a7ba68bbce4410c06928
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b