Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
8b83775da4d8fb66bc2532df929015a5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b83775da4d8fb66bc2532df929015a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b83775da4d8fb66bc2532df929015a5_JaffaCakes118.html
-
Size
45KB
-
MD5
8b83775da4d8fb66bc2532df929015a5
-
SHA1
20281b2e39d956838a6eb7b7e2fbaa835e07978b
-
SHA256
489e1da834dbf3a97104d869243a8842c1c09e61aa217a82b44db2df792ab6ee
-
SHA512
b05a5a46095f17ab9a1acd8611e2dbaf44876454980cae7790fcb43df3f212022c05d41636c0e4bca0d4f41014ab830e2196d99257b64b3c68869d41b275f6e5
-
SSDEEP
768:SqQiNcOvU02XyHKcc2HfeaiDktVzlUqd6eWmLpw:SqQUcOvU0+yHjc2HfeaiDktVzlUqdomW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE97D771-204C-11EF-9A09-E25BC60B6402} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000049e13d06fb950c478c118e93372fe8b1000000000200000000001066000000010000200000001ed5df38c8595b48123512cb95264728ce84ef196dde5780c28af90f7c9c8920000000000e80000000020000200000001299a251bb3e80439c8b4dd9603198c22bb99fef3166e6b98ee205b6d8a3fd7b20000000c170e2ecbb3ac8a867e8f61f38c6075e50a51b8c62496920c6548d0931aa6717400000001608aced5a5be7c12f8644bd161fcd427efa266582efe122dce4c3b58fbc4e9802a9094a7ffdd36b4c3725035ea15b3d198920894a699fbe2c1169099695d3ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5032f8d659b4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423431922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2556 3008 iexplore.exe 28 PID 3008 wrote to memory of 2556 3008 iexplore.exe 28 PID 3008 wrote to memory of 2556 3008 iexplore.exe 28 PID 3008 wrote to memory of 2556 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b83775da4d8fb66bc2532df929015a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f031df3992676ef327d400a6d15657
SHA146e351d6ec1444f96ce1e393be4218a82509255b
SHA2563154873d0e1d56d6eec5cb75f72cd6f7e6dde1140a1a2ea4b2d4cdf08c5ff28d
SHA512a4905d17ac16edca74c975283a779fd4d59e1d8e0883949561ae16ea84243bbe2f2c591ea9bc6aff8b21c444b6a7e3452616dea325b973bdba91c3709463adb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f61db6760068c133fcc32251a523a70
SHA11bbbf75980e21cfc90febf2bc6974b501b5f748f
SHA2566266458d2845efcd123d765c253b21b8066816546dce854bafccdfec1ad585d1
SHA51290901bdbc5b79bf5cf93aee1f7f87f49d4361db429bd8ef2caa9f482bf4ca48c531de66c3ec4ffbbc1433f3369627486832720c22389438983be66f49c59e756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584da14965113cfd249576e61ccda6df5
SHA10818cca57e80f552e9e30084da4a63cb54e49728
SHA2560749bd66a3855c8b1f647fe899bb4555ff9603568fabe2263906def3ab040825
SHA512d207a1fb4d02e019ede5028c6cedf5b54e4b45f202315719eeb0938fffddcd34e5318103d331b68f85cdaa9d6baac6be1d7da6d1dee49f3f9754c19223653b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d363dbfbb57907027d7dcd630935baba
SHA1bb609d554e10db00808b1fba6cf86007aeb959b4
SHA256e8fc9191a6860a220a117103bad4ece755fac2c34eae6a7f1e4c8497371a9679
SHA512eebe66d2632bcbfe8434e193a1fdb9b02c1d483d9b62d9fe764ce0893c57db080b270e22e6d923a0c5dc6a25355b6c65de55d1363ba4495fc55b953310c00bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824903012b9631688861a1b664fc8ea7
SHA1d834c7b8a4bebd4ecc9c5c34c8209e53732cd59e
SHA256021e00a5433f172f66bd6ebd4313042a49863a5d56099cf83f078f8b5fda6918
SHA51268571d5c7d4d95c1179e29cb41a62d11f9cc5e355a7a47fe10c7093203ee6f4a4ae8bdc5f7bcd98ce02f279d5112b5748859a1f32b78e63277bc16149cafafff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5927a39999b596a20db315ab139af9
SHA13ba2b12a865e1ec5c03fa2463dfed1d022838ec4
SHA25640a93fe29f3dc000954abb969e5693b4397acdb0c88dcdc9469bbf38249acb80
SHA51217efd58e803ce839474e6159cd0b5ed24b9c308b65f74999df12f8af9e25113f6910fd119bc41bcb1cb0b5e3e00a6c1acce0fd3ef83a480ffd938a93496ce31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58138304d708e5b8f4259c501966ec667
SHA18f83484218d1e7d19f50ffd48e31326b3420d2c2
SHA256051143301042b4d3df0004dc0ae07c6c4dce6173ea5b7e2736657761be55156d
SHA512fc064a038c80fa6c77c49bd044dc552daa946c8a44006740f22fbe326d5caa514a464c3d2092c82ac72d1f02e71073173d1243050a3d3efc427aadf73517a2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a00f07da8a698418c7266608d8c5ddd
SHA1323935d5e409e6c9151af62e1b54079ca6bae322
SHA2565356022d3912e23378bac59912a62d59fdc23ac4bcd55c311b46dbc8c776129c
SHA512691ba14036c8f2af56202ec573cd8383bb98af5a0c602ce98218079a5a8d84fa441c69e512833aa99450d38a21e07a970c54865d18e04b13858ef679680a1f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0af3b5c16e6ab37c6058cd54c7deef
SHA1490b267fb37927f9f52bc87f58f3d232e1241fa9
SHA256230b61f19126f2761fbe8b21a7824420ddcf6b8acd47147634618af808170683
SHA512d7042efea56f3a5c4ff9fc7d48a35d613df11be87d12645198073b4bacd4002f8fe8f2efd2a28d2d417b10304ff2ed6135ef0d693cfc48ff7d6cc1fae22caca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f9cf931dc9d5c6a7ff0f8e9c9494ef
SHA10d8da7d89b5ff1845cf1d4e7c40d6cda570da000
SHA256ce809abc2a105a017c19bb6724ab831c5348dda6b4b5d9607856eda6696b40c6
SHA512a0619e34e93cc56265db434ca4b5ccbc3c2580ed1b52e025d9e780e1ceab1dfdcca026d5f955d68efdbc50d59a0c7bf2497ac3541382543d3123a666825f6c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58830516d03824888432d6a86b178f517
SHA1ed85cbe2ed5174c90fc2971ea5327e491cdf3dac
SHA2566799445872edeb38c672fbd7567f86e17dbd9bedf4bb07231f42cefa3f30fd59
SHA512fddd0aa40a159cf18480b5fcf6b3b3a582a4d0408cf95af3258aa609320b810ac51c750152cf227971bb21a00e4830dcba6d53db54415b97da9ea2e4a7c4c613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568aa5cefe801f1f39b43a6aadd3ff570
SHA18169c51045da01c9d58b801c061b6f71f8df9490
SHA25646bdd6e0b2611afaa4bd173e64af40249ca104cb88f405fa152bd86c1c2736aa
SHA512ff1466abe9ed58718e56dc745fd3500d19a07390579f218e814acb11057a0face7beb4916b22b591a808efe080db68a71b9fa4016fade086ff128522d59525a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eaa25753185130f17f4e18f02caced6
SHA1664f876a44e1d7f0a06e0a004c8226a7e92a5f7e
SHA256a5cec093541806e8c0dc6a3604f75e981794ad3f3fd594ae3e171599cd96d210
SHA51296d49429dd713947aac12630d314bf991add86aa3c0ac22730c2b9788fecd0f28ca3b59457f178967175822adfeb08fefb96ff78689f22b07295e1429558bf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef33c013df8e7e1e40ce6089f925d915
SHA1a62d06f7a4f05c6df2917f7bffa985577ff48ff6
SHA256b9a42065b827af398cc607d6e057480c1aa8c46a8bea93febfd573068995ce97
SHA5122482da59ad257d2920881d80433b0d33363c34dd5ac92d81f2528446cf5bc47cf851001248a88b573c855a5a24cc1b189a8e91292ab5dd6e2cf586c65799b187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0da053292f39ea0695df41fa96ebb70
SHA114046047d647a1a3761365b9608a0eb57c76c988
SHA2561dc1808b285792e1977c096525b519cd66376f77b0517a5552f3d1f3c94ee181
SHA512166cb0440d3087d736aaa5cbcce74c26c1422f97608cf0702cf6bd3652bb76743da5cb60f516888877275726d55f06f8070f9b72dcd76257c6c67f8362dc7369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d11bd1f594bcbf9abb1ccb0080440cdd
SHA1dd33cc42fac791ea253ac179499fb7aaa86d7023
SHA256a218a1c74bb3741708e0bb3542f435375704ba63f4c9d96cc4409dec48a9ca71
SHA512c83bd0c743c1bf8aa56c5ed6edcf08baef75b7bb81ce6623722edfd4fbbad3f4894cd6fa36276aca6700d897343db01bc79e582dfc572a5498f44c94376ce1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d87694fd9122c09c9c2508df005fb5
SHA156cc51bd8f74676c62ffe5a987680066b4441c13
SHA2565a6f28cbf2520de818b6fe32478189ac56b681eabbd6309176f34ede1e252490
SHA512798eb2cbe0a9dc36983a16904b21846a35a5477b94b94535566a89bc0dfb94f307fdb77b90d4ac60e634860bb7ecbda6aa917c90407e337febdfb126aba3c230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50796d2c6828ea541d39842e33ca67fb5
SHA1fcb424e42ef9d607e438b3c52f7b0692784c1995
SHA256f002d25f48b2d6c99be0a45741a0c98c757afa39dcf30a0d2dbced63f3012286
SHA512e511c169364239c2ac6d37bf33d35a46ef1543d288b624016945a332bc7b507f2efde6266df609cd0d48c0314c40741d0871b3df845016a7c5cba28107701d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec28b32cc611a253e3cb9ada57ee8aa3
SHA1f725b20bc2615d496e8eb0d0ca159288464daa94
SHA256e16fd8bd6dd2c74afa01cbb0da50bfad48d8c0ac55ea8f4a9881d92ddb9f8684
SHA512060cb320cf66f1b723785b34b2b7bb699d357cb1fe392d55ac505adb9e7a999b9be867547c1b65866ed7763ad61e207e5c1cfe7c14424987a3a8cc718211e111
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b