Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
8b8440da90fc996a4f86a79fa98fc68f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8b8440da90fc996a4f86a79fa98fc68f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b8440da90fc996a4f86a79fa98fc68f_JaffaCakes118.html
-
Size
3KB
-
MD5
8b8440da90fc996a4f86a79fa98fc68f
-
SHA1
ead8b7ef9889ec0958a758fb59c28003c491caa8
-
SHA256
aa9618735adcda4011788b731865067c373d500bf7c89e2b261a9d56bd31aa0a
-
SHA512
cff80919805060f8d8a25085a3bb9b2605672b4584bf6fca084dd4759f399d34468b6f85048cbef693764428245c8e58733459d2efb8f9c7872c12765b605ca9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25FDD711-204D-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ac7cbbb1e476f544abc64189f16177ec00000000020000000000106600000001000020000000ee7b6d324b55aee7cb8ca84cb56f3f8fd9706fea780de357dccd3876cb1299c3000000000e800000000200002000000009e6844e6cb4fa040b5fd570aa397b57b5f0300e07886788b351fc1b9ca25b8b20000000f673fa8c65bcfd297c24f49b8c3c4abc342787cc7abc9fdb7fd4b2814149c1ef40000000292ad01f7481850aa15da45b14313c621023702a6de9d195db4a0a10467cad08bf27df34fdaf0bfcd5b4791d3afd82cf5c38ba61a68edae34d7dbae1d24c0c24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423431987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fabefa59b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28 PID 1680 wrote to memory of 3020 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b8440da90fc996a4f86a79fa98fc68f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11632348f1d8c3977c61362d59deea9
SHA18d5624d3f8d746ab2db412d81746b4498ccb7e55
SHA256c8efa63393f6ea910749c3bcc122bd46eb318eee78b57780eb4bd2a9e571f667
SHA512287b7005f3acb90591152ad9793adea141ff5c14f154ae91338581de700fa7e3ccbefc7965ce3ef6900118a2098d1c301e6a537096783ff7099c7fce556599ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23f4c82cc9e83ac96cdca9930f3a90c
SHA17dc242c81839fc63c48f0353b5101dc961d6ecdd
SHA2566b02643c7c30f311e3b710d43417ed64825d62d29cd7d608dd65fe40a4831274
SHA5123070c6cd6037cad0e63f1fcd3667fcd6335538559fb68a4d3707e817a1333c430227a728659cb7960c86de07a4f315c2b8b5e0cc142d06918c1431a48363827f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae35dcb419cc522fe7bb03dedfa8125
SHA1298bef8a1c630cf98aaa9b342067f9ab52a414c6
SHA256a7d5befccd29e004adfb10584ab970488610df03223f1cb8aed45ffde0d62c51
SHA512494578c89113d0931145a52c2034d6809ee80f89b93d4354c4da13cb39bef47745a183564b316cd97532dc16b92aa839306892db4864ea6f87e086ce7e3fb1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c68b974a0876abcb491ed3e403b3e39
SHA1c11da35a4bdbeb49c15732e914877e5352c9aade
SHA25696a938a5971caa10286ec64684115335853e620e9ae1c1c5a5b00aa96932fc02
SHA51255cb44e913cc91ce63330321a453b69943bbdc9a95f0bd6b97969239695ee56ade5479693f6f32a3f879a95fd9b06e6d79f03a096e5a3cd2a18cdc5cf65cb7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9bbacee3c8a573ae610471d1eb4f5e
SHA1f11f2a413d57a96419437cb2f1faec5dcdba6348
SHA25659c7bd608e5b58185e03897d199a817bb2b55f4ea4127c62c319b92d2752cb48
SHA512ec56a0ba6fa794b546e96e8f1f3506ed21a35dac17f37791c6861b4f4b1889fab18505279566030f2a54f4d288eace0f0e51451c07d4106afb0725e76045b99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc95c133a02ea25275ef3951f208fb4f
SHA1cd0c79061e1397e3ba6df8d162254841caa0ced8
SHA256e4da3a376263ef0ae2cb72b9c094c735ea082414244121ccbe4b08e53b0793b5
SHA512cf3060d29005c9e48873c898e553554e446c577e96cf52804ce0f3c5b5cd503d6d14f4351b8674dbbe557dd60cbe4a23f1dc165dbc40ed5457c2f2712ea04b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f86992b23dcdf6ea208372735c8cd1
SHA1155a51e56b7720c6f23708f7518ba7e0f26c513c
SHA25653537e3dd1cb6ca609b8d2cf3d7f77cb2d6bf01e44703232fd509df8ae3650ce
SHA5125d60f7af752916e1c3ea20b92450e907245bdf162dc87ab87447c87955249cde788eec6b2442ae4b458fb1c721dae322b6caaed128e5bfd9a617e1b2c7093b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba016d64fc8f42a783a4b853f5886dab
SHA11222c1467da587806d1ac1e0e0319b3fd94903f0
SHA256e018787b500f43fa100ebadbb7ac5ef0b488a7c2c113766f931d685731b25dce
SHA512af87b1311a02ace3d8a42db61967702023a4cf7e345cd368b0200043183d1e02fa9bec42db4858ed9d609bcee8f92a9f495433e8b85a7d7675f2ee0e2cbda940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5ca001d28cd52c52b8f0fef1fc015d
SHA1185ef25e4070ba7bd97fb14ac912ab54553455ea
SHA256d0d60299b46105ae9f50f6d6e8215933ee32ec90674f0f7b75c25dd51045a61c
SHA5125ec3627c807b5908b152c53c0c35018f2207b19cd45d1a7e95c57a5301eaf16b4346bdaff33b207fe333d1fee03a5f7b0aa061fb0e9dbf6db6cff93d4e46e0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67eaf3d1757aa14bdf82ce426ad62b0
SHA12868dab4c96b0f20842eae8b846965b90596fcf0
SHA256b5c928c26047342a79a2e446144ccc03ab0603bb6c83f497d99ebec8021ccb6e
SHA512ca99f69b062a837778c4f54d90d912a220012552809508e375efafa511d1ed9d5e01cb284f410fc7c70dbda44c7edd17aa022cf03d33954c00232c9c38440e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54549f910debd21869948c453764c4aac
SHA1f1025eb398aeb7a865a579102c10eb3e53d5f116
SHA256420e62e8954d40e96d5812c6bea9adb22bc87e3dc711968f19c89aa462262e17
SHA5120b10a0f0408edd37446646d0362d035435c008b8be710e45a4733499785762c1ad1b301776160d0491cbc160d73dabf4dd4c09d9295740977d634ce911bba596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cc3b60d801ba37e884e0ec6021d8c0
SHA1096dafa590bcc5fe2b8a7f15b501338df21f6084
SHA256743157237e1866efbf5983be8c1310dd13daffdf208c8be8ec41758b7bf7caca
SHA512a290b6e1dc46c6630dc91a7eeb6ee7de0430d7effee77aaa9b2e572f2a2c14b8ef3c3ada3fbc9bd43274f824c65ef38e64964ce94d37ef71071804e4b9159558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56014984d5edf3048e789f2248dbe1047
SHA10b3bd2f7082d410c8d2989ce3cdcbeb4fce109f5
SHA25647769091f9868399dbe247c3f76aabf149484ae414ea324fa9d9a199ba7c1b9c
SHA51213a1afc5bde52f38a7e2ce5af8ef62330751ed9ae9a11df96dad1b4c1a20a073bcd8aa2d17be23ff20134f2e3ec1ca0c944f2ae5f4101a86bbbf94d36d9f6096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5715efa5176b8a3fad3e4188e25056
SHA1b9b27361da1e4d77ec27c72be282e5efc7c223a3
SHA2568694c101f0440160d5fc124d0995300947f6aa4bc4bba4e89c34a40bc954a4a5
SHA512e2cc9f6cdaabf03a38b5dc15bd37ccc436b84e0ef7b4af6ae11c91bf3d0ef4c2535995fc5b208fac0d36278959c583fe4762edaff83de87a969217b8243955fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501ca51009e9ab1b2129517b03ce5bef
SHA1b7d0c4bb6cb7904f36ed48672821c546fae1f360
SHA256cff603d3faf1ed8080b4035ae77437815332e16e7628c2b95595bc7843602ed1
SHA512390ed94d5ddcd18511e7304673222b6f1d38fae7445ca1c979dc204cd1263ad19fb03d2f1521f2ad6ffa83f696915949d8bfef8e509b222c2ecea3ab6ec9b9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56cb6a72dc6d4cf2169d92aed2f5736
SHA1beb988bdba72ea96f58d257f54f8d92be2c0d6cb
SHA25620cf64cb3bc2f63e1553d408ebe4fefe4730142b6597d58d64ea3a3155f87a5c
SHA512a427a6487618f5d796069d4d9499118cb7a045c66a9bb01a0d5d7f0899180812cf1d7c3f03b5af7ffe3a9a96985584900b30025c09cf46f980ca76e1e3018775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5981f36f9a2e19ab1793e84e32d544
SHA14464c6cd6fb7628795e88735210b315d1ad874f6
SHA256c15dc50a8527c75553f15788d044142727bb562505421ac1068dff4ce0cab4d5
SHA512f57ce55d7c6ace4a1c41ca2fe9a5e5b4f3187342a426e67d95db1fdc289f3332d3084b187974e709d12b6f9ac8ec1ce7c0e0e8ebccdb26567efdc1e4a34fab3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587933cf865a6e2aa4b33c72a35ac2e66
SHA1e30bf6ceecdef6a8a0605598a6e09711336f603f
SHA256b88323a3395f682c93945d3fe70eb8814084c03fe6d818a155e77bc15442998b
SHA512964829c9d2c76d08dff914f3098ff20551f77859dfaa15183ac835331349c7fd819ac2e059f0dc1bd740ce42298ebde636d5acc3c93445354888fccb74702a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1347182430d2e408351335225ea029
SHA1fc343886c547ee0e026a83bbdbdc82d73224a9d1
SHA2563c511b5a0235884fd77771ae432903811aca498f5120eb7d96b210284152d169
SHA512c43ffc10dc46433a0ba5a039967289c33fb312c20db719d435ece0ce9d0ad33d9c48b0a423c257da9b0abaf5f93dd2321c324427b0ed299162816123856306c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b