Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html
-
Size
5KB
-
MD5
8d17ce64caa33657e922fc89e5b4c493
-
SHA1
d3ddeb053ba748e537cafdd08d01a32587a67947
-
SHA256
3d18b3003653cad635cb0c4d3bd392d723a3db49f75f834b3fcec0751c77bc38
-
SHA512
c0e14adabc93806c885b84b13347a0d0688d70bf1fa62250f544f170cfbfc921d5bedaef2664f0f992dfe7243ffd4f701f22b805425fd11f8afd4739fefb46fd
-
SSDEEP
96:kzMx6hCzGyAf5gcSZSZST9d8E0MXQVO7+d:oM8hu7A+VII7MMAn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f5c39cb1b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000bee4e995094ca6492bd0f2d84be80c65790d4d3428f85ded224031f7e6ca66f2000000000e8000000002000020000000428e90482c439187c10551eee35b7ff743eb92d85446f40178c9cd4142bf701520000000cf425b3cbdadb6a4724acde4f889ee6fb2a34a51eada4fdec65656f479e7970b400000005941989f5cb027205e6389f5c40a1a4e7ddd85b246d6ae4739d0ed37a8d31e26f2c454f228768b01c23c31d3fa074628703682790b89089669f4cc27392f4162 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423469628" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C62DB3C1-20A4-11EF-AE65-4658C477BD5D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28 PID 1952 wrote to memory of 1272 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d17ce64caa33657e922fc89e5b4c493_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15428773fcf45206204561fdc85d260
SHA1ec2fd445d3dd40cc95ad6765efb6033bffa91b0b
SHA256c388382f59e248338323d23500e6dbb41b75b0df465baa7a146d77601ef9bfb7
SHA5125167ff09b2db633c8fb8826fdd295030198d882eb3c8044679c8a6a2e1bf0d7c7956567e6277b01cd6a470067e9fff01626dafb858a2dd81d1ebf6cde53fb35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbf0f5daa44590ffdfac604c536b186
SHA182b80cd0484da009bd4736e68a828d861dc9d5a3
SHA2563f843d3a1ebd0dc9f4f1fd9f22a12993f228e0b83d0abef239c0c33c8f27c690
SHA51242f14518121399c3f099a1d6e82c0c8aaed7583a03e3ad1ce05f3aff62eb5160b68ac10f02a2b2377ed48568e473057b17d156592e234116d0e9020a660d297c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52241e1773de76a58436b908bcfa762c6
SHA1c04dd2a00a1bab85e7ed3f8674ec44248cfa949c
SHA2566acca3dfee5ce531d11ef9f9a110d10976b088b885e821f49a73283a35959803
SHA51243c5e030a6e8f341cb0e1bead68cfa2eec94efffc191fc2955e95a89a054aac90e722633a431045b4b2392c35dcc8a92b44b5249f2873be575b5040063d532d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaf154f6a7fa2fe55510c2c57a096e8
SHA169cbd95c9ff46357f0e5c283f1a3743237a2cffb
SHA256ed8a43cd39a5ae76114eada262aa22d2116381ceb597b56cae50f66d3292ab1d
SHA512ad72dac3a0d522b5b012b7050feeadcd13be1f1f6fd0b8ca5b3e94cf3dc900168ce6b27f30a84925274d4dc3dedc08d332d8c8485a32dfd01c4429193aa096dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f474cf52afa6384687e7a3ade65031b0
SHA1ba4719e1a1246ea46f34a9905041ea9b33839429
SHA2569ff5117177377e0c6eb979a903f96daba7de9d9fe2a5c3bded194f844c2aa045
SHA5125e2d1e67574f93d4e6d76a7f84525e0762a59458b6ea1788417acf1c50d0abf37a750fb6b0e0f1e914731f9de942ac7e0aa98469f1977d0d8ece6def39679ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c035272f0a196b592c2fc5829b6e937e
SHA17fe03dc97322595525fcfbfa11cf48eec167e032
SHA256572c4878e74d359d43f7ffcc0acb56ece71196a50dfca22892c5e6fb3084855b
SHA51206852ad80cf9524faf656247397d9687830673a65d8598cd0386e5fe7fc9fe8f87b48aa70d0b8cf981b6b776ee262dd6f5aae1b6c1bee22114fe181f3c1c1556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535cb76d8de78b2d4282c7988c4a77a1a
SHA148b14f7ddc50e6e69c7334e05d4ecba4d169cbd6
SHA25697d5f0189839a024de422f04c09a66511435db76f38020d64878b4be3d4b36e2
SHA5129ef99182f3a66a57732f290056fddfad89ac61e3192ffea0bfa37615812010ff9cc1101e1a6eed98564f01931813fa5a6baab969e61924a4eef82fac6e2d17ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50615e38880dcd594c68e5e9a5914f3b7
SHA1b083a328f58e3d959bb6fd86cac1c1501f03ea44
SHA256a08f64c19ddcda3cad50553e91b537680b995133cd46300df8a39adae5f4b8e9
SHA512ee7532a286d28327aa46fcb1ef72e22df8d6eb8922bdaac85133fedebb2912fbda58491b232980ec81a250bc4c4dc2e3844d8874b64b0bfdf525130a56cc0908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43f09090229598dfc7ad40a35454707
SHA19cc2fd4a465863ce67578dee19f4de03237555a3
SHA256556f4f0d20d3ab132f1aecd4ff9b52d9044eb485382b3ccf4d916b573233f6dd
SHA5123fc8d09db20eacdedf54eb29e58d9d3104b83d46fbe58592789cb4d55db1d9d4a84a2b87cb473100bfc4ed73557c083ecd517bec67f26c0e80b77c36ae0ef922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52802867a37214a42d8e5f439fe927592
SHA10b00d68b486248399f97f0af44da97c96503e8e5
SHA2560d45128afd58315363036f550baf2538783e7985b927a074ea69c15c9a7e9758
SHA5124de8a9fe48806cda018fa90228fb2d6dca86c8c8c45b87c2fce25a3fd4658a1348f5574b32e098bf042d3290a4aec3b6e48af14a871bfae66840ceecdca0edf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec7fcc1ad02bd7dd091501bbbea6ff0
SHA1735e841f8293c68b6e48ba1c36f4391d597c04bf
SHA2560053735bb9705651584618d842fd0ec7c5c54b858e1bc4f1c7007e4fd17384f1
SHA5122062332230450b33c33466abe47bb1bdcb6335f71ffab1b8d2602150242e33161bf820b81d90405023ca4d0a80f8df8b2163d65b7247f4391ac190a2ad148528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186fae245537cda2e9cfef1f1a2c5a31
SHA164fbd956c576b7498bee1759dac01a91327ec3fb
SHA2561efb52499dc37b1d701b16f9434d8f24de945cf9bf069d5ea7bac8df1ef64d0a
SHA5127e277b8acee9d8fb7a62d1e20b94fb4a3f292c982828ab8a777c088cc9b2033ec565fdcd0c6becd9df37d7635b6f808c8e936c87dd3a053c71df488c3afeac04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1640d0a317daaf86de34412ba27ddbe
SHA1599fa1e07f92ae5af70de69a1cebbb6d82acc5fa
SHA256baac73d56d769577f25afe12e5075efaf59a334ba119f1fb2312584db38eefc6
SHA512646aefd9cb3d78ed7ed96fed1ccde560e214aef19b1421b9fceea92b23124cd63f50b1e885a666cf56275292f8a6236ac8b895b7b11d114e9ee2b69e2cabc7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f56b4cbbde876788c2a42f6273ab680
SHA16336b4e18fbcf6c6aa79e1d6006393b3e700997d
SHA256e137aaeb47073e10c41b1ab7471b6d1d408a3481eab14e8d7a2dd66f0484bf8c
SHA5120bb84cd81c4d1d4df25df87dd25cf57bf71b95acb62311b410473d14fb903527fe1e41460361cb3c3c27c1e20e5eaa2dae16dc460061dd0c033a1207cadfd923
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b