Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
8b5c9429444c048ebb5cffbc615ea7c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b5c9429444c048ebb5cffbc615ea7c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b5c9429444c048ebb5cffbc615ea7c8_JaffaCakes118.html
-
Size
859B
-
MD5
8b5c9429444c048ebb5cffbc615ea7c8
-
SHA1
3c002a53fe3f3e6ed3208e347ea77bc5993c6955
-
SHA256
5cef8df20f27b0e813564f9f3333ad03a3f76e060d3b9166a4e4d741cf0f5e5f
-
SHA512
09a30db45daa8e7a53e11075940395e70b59806ae8b759550242d3b54615261fbfa1e6b7798378c898abbbb1066229225d50d2f7482dc6a1223e2897ffa9b10d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423428362" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e015618a51b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000013ae3b9fbf01ec5e0f6bbef51836df97484c5246511518f286d198bf8b88a6b0000000000e8000000002000020000000fbf219a6f257d82dc2a3034f936abcf4413ca6551ab7bfd6d7e5881b0019b3a320000000dceea5f51309afcc5d5b56fa096bcde1a663a21fa3791b0b229e03d12413eb784000000040ec9b13ae1e48a240f76c654c3b64d135243f150e0f6d809daf0dcc22a21da237eafd75ada4620dfa75215262e3f72d86e6ad2a1defaa872901143741d380c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5E8DA41-2044-11EF-A585-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b5c9429444c048ebb5cffbc615ea7c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ac969b9ce0ceebfdd0b6c7e0481c8b
SHA1383fded3edc4189f5a3f553fc80439d5dc2eb3b0
SHA256e0a4caa625c999437b2e33db5605af58501c1e4ab5ba4009928b4b6498bbac74
SHA512be1d3ec0e25d9b369ea2cc938edc3db13c31e8fce4db6050744bc6653e86abeec77d2d5adbf7eb624bd7abad80ddb13e68b77189c07ccf04a2a0fa8a578647cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6ae250426a343a0fb0792ab7733c48
SHA19c6f1181baebda20889304e638dd9b7f9c4c49e2
SHA256c37e879b7a941d8deddcae476edbc41874ac3dc5f4e34078d0fd4d5b9eb6c277
SHA51210e314249bbb8735c8184f4066acfb1f1ac66f8507ad2d07911e993436fc01bbf42a72fd9cdb53706a004f92a4e6de8cae4a0ce5cd345137288b5a1997ebd864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c9c2dc7ab6035eb6ed67148e9a5079
SHA170eabaa4a371801284d3a5b16f7fb188795d364c
SHA256421a60f08488d9391fd69f897cc4462d41cc195d1f1ee852112643812d407564
SHA5129660083fc523408c35e7248c4ef8b6a7cbef35d87b7cf34be8567c72b43d74a0804290f92335b009cfa061302bdec40fed0cdb9c74fece5d4303beaf66ba54ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b868d9d0f2eeb9e25ec55c94778bf7
SHA16d43c241fc913817040a323923e937490758fd18
SHA2563a6dcecb209bc4ed5939d975e36af481fa0dfbc817c89196dc8e7c78506175c9
SHA512c37a9511fcd862bd2844d5755f6a964fe683eb56fe09b962c722952673ae2bf6616163e3121a056ace91564b6dea87d2c768ee80f74c41bebfc3a7298bf63b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a5e2aa31517671b864dbfddea1b3f5
SHA166db3e873ad00f9eead3405ecd28c8d21a0b6e4d
SHA25674f3356b292bec5a433fd4fc1be1052f3b428fc6d71ce0aac5dc4942ea966a10
SHA512066be143a2cbdb46914c2b5e07aad5da135066024041866f74072cff0cbde38a0cc1c5038bfa821361a2dce887379374352c9d32ba1be5ecc227dea279d5d1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f250d022e27b4d0af76cafd63d04a3
SHA1a09d39f10d90d3204429bc757629457d3b54c278
SHA25681266c5a3d85dbbf14cdca159c361f33ee82e5f27878ed8166f11dfcd4927683
SHA5128d2b8a7b0b173d1a43d8262645611a49171131c41615c502469d2057ffed2da251bd6e1e3d64b4907bee81d3315d55a6a56dc5d0df7959c9036b863e5fe666dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8ce136af78ba68b8027d7feb2cf4de
SHA15ac7fe7a4eb4478e401337f8c6630b977eb276da
SHA2563844238a095b1eb2205fb8a2cd84c0bed7d82bfe07f3d8cb2573571cc7ee92e9
SHA51279a0a246f10cd07edf51274225f82a7b29ebb57a2145dbc5760b09823d6af8a8ce94e423a43302dcde79c8b522d8ba30e30fcd77b4da16deb52c9a0f40b1ac37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a8297f9313a40b1729f5a4e5681497
SHA1e6a6ae72ccf23debeecc1dacaf7c4384424f95ba
SHA2560bc35ae5216eb4c9f3f4ddf69409fb26e5dd542b4cf262d6f565493e939fe157
SHA512f94fa9fd2f901f18edfaa0cfa461f160d3d22d786860c5f5d5131dbdc37c47e286b546ce11d4a905064d87ae3224bb5869be800cf3108566dc5d12e2cd4a87e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59081fb7a94aaf1ceb55eaac0a5fc6363
SHA1f4c676e0bcdeb8eced442e76638f1a25aa51a7de
SHA256660f760fdf888259704a77c20ba5627acee5aa03158edbb204d79e1bb97e161b
SHA5128040203960bd346047ff3fec406f52bac000e9a371b563bf8c31d3ad9741edae720cc6e50593c1edb57fd8829a105ddb7f392f43797d4afa53a2d6ad9d9687ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa820bdc8b69078dc291c1089495121
SHA1e2183e278feb7f7956e9d8d199a74c71708342e6
SHA2561ddcc5521db7f24fc9f93cc32a05312423a1ecd3655338e0a86886675a1d7ca8
SHA5122a152aa4e4895e639168c552b277e689c53a6fb4279fec59bd73638931878ebed7450459b83667abe5e3e52ba2e534f168116a3178aa7f231553c14984f57d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501366bbff9a5617058a9633ceb0d16d2
SHA15350dc95cee1d4395467b5fadfe29a2af8fb23c8
SHA25678b6c232960df1fa28fcf11e1170d1d329023172326b2323bb1ba329a1204ca5
SHA512fa4cacfb7b822e16220c3a6021dca6e6fa06d9a69899768909138b42dfe9bb68671b3ac951ddf4d5ee57369155e39bcb1d05d0dfc584c27c8d9a1de3de910bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54690a2ea7da2176a910561bed58eed44
SHA11d66f1e58fd032cd312948a94398e16730bb0ed1
SHA256c0a3ef596f58145ec06da0dd74a1eda2a08271ff41fc2a9f259bef184d1c3605
SHA5123a31c8b0d7a907defc07f65cd6d3164b8d3011a9c1a4ba6ef3070427c88a13606ab9a30266b5a3d81e0b26c34cdd622e7c9ccefc6739bd36ebfae6f3903794d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585184aadb7a1c0ee460ee8099688e532
SHA14b2a9cd33854393293f5b1cd06b54040dff9cfcf
SHA256fb2339a037b555c56b68ab57571fd3c8500c3bb8ed12033698d4517a776ebc47
SHA5129da699edd0ff46b7be91bb3870a83088f85b05f40ce2faf53a8c133a5aea41d5454f946b20d7301010567411e20a2841d0c39b8d88832254e4423c4780e2d801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776f1076e14fdeefcba9870924b803d8
SHA1893e0f1c470fb86653f7ac861ab05d4d82282997
SHA2567b1eae0c17b1bef81b83d7de3236585072a2a422a1484095336bdcd199e9592d
SHA512e8d9131aa50aa44eba768b25a1a05a4c0377ecf32ec4888b4cdd1bb19c2b7619ba48cdc4ae5913039631d94d7590b47fc995f241361f8c3f6664164e272416a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab581c7af016317d31b054830e15e4e
SHA167b52e2bdd10e9de79822b33243f8545b5d1bd55
SHA25678ed0d67eb5c44e211ff18d247b84ab0196a8c45427b27e06ca8d5589d078795
SHA5122923e4f437498586bf09d25446d2dfeb7af8126bd1926439e5c2ee16d6be552fd880db79fe79a7c176ece16497199f94edab393fd5815d69b3c10e63642d8fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d29792c7c441806239dc2b5fdc1067
SHA1617cb75bf4c87ee39722be8aa4efdf750fbccacd
SHA256a2d800f0a32571032870b00ef6e08326c156042a2bec77bbc2714f2259328b65
SHA5125b666b6ffae430e16f3ca3b42c8bd895e9d793c1fc63e1056770fe964a6c7b48b15d9509db612c0efd6157a74f11bad37b687cc41341136c4829c506ed85dac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22e7bc67c4464ad18e26afbb0a053d6
SHA14f437c1208077335b184f2d96d3799ea3b97e60c
SHA256b476622d6c9e4852241f0e30f87ee838d8e0172b2f8ff3ca1cfe00d27ca1fb2b
SHA512cc2e69db0564b1e8399a5ad1c022cc5de88cf35d9768827dcd448415711f9f89e64af83e0f5d1d1428eeeabbfba3d7b0984e7125ad81af45e7478fe92be49ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf5fb7e86efc27da95612861e7f3022
SHA1f7e517ff5a11e320154b346fd24f5e6a70229884
SHA256caf4d82df40a97af38baa85e874c00f9d42fc8541b67bb8cc57d2d2f92fc632f
SHA512dcae14745642b12c36227e419cc3a19e68ec5cf2ca8c8bf8232319eccd5fcef24e1cdf07dd55587cfb8dca0ccf3883317204f825b0bc6891689c988bfd28a4b3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b