Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
9116d778adfff6af3a32a87c654507f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9116d778adfff6af3a32a87c654507f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9116d778adfff6af3a32a87c654507f3_JaffaCakes118.html
-
Size
32KB
-
MD5
9116d778adfff6af3a32a87c654507f3
-
SHA1
abecb7a77a4ef7e7f151545631b5a97a56da9638
-
SHA256
1efc5bf84b6a670f5a924fd9e8a519da0ab7c0a38be38386c50a398c46dff7a3
-
SHA512
ee1a19bdea51fa08e51ec0c940068225d1c9d9bb2a6690805cffc4811cb5bac3ae3b8f60ddea0f7edf4ad8a5de3dc62815607dd41f490d6e5ccb55876412a543
-
SSDEEP
768:3PfqPfoeEoX5IixPmy2nn5IfCdIwtfm19b:3KIehX5IiA7n5IMIZn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bd5f9a8eb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423564540" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5C80AB1-2181-11EF-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000defe6c33747dac4b89f040595ccc06cb00000000020000000000106600000001000020000000066bd2110da30965ebf8e182915451848e1994316940088ab24f1fb325d4ebd2000000000e8000000002000020000000b8aaddd31536ec61cb06bb33fb0357d9d6ba1c59fcaa794fef2e6d9eb6af6e17200000007cc3801092497221fe1fc653c1f1806bd3e7d853e2169ccd2aabf0d72fe463c14000000052d822803e8b7af69f161d7c9f4b90a14664e64ba9e9793d77458501d69930b9bfc87be176a1589b7ade4d02759ca9ed9af7cc1d86d36fddb7fcc861f1c24be2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2540 2056 iexplore.exe 28 PID 2056 wrote to memory of 2540 2056 iexplore.exe 28 PID 2056 wrote to memory of 2540 2056 iexplore.exe 28 PID 2056 wrote to memory of 2540 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9116d778adfff6af3a32a87c654507f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53362a9777d2b6e542333145c30b2fac2
SHA16b23eb23684f89e2c5a1c053d8c99f86983f7aca
SHA256868a992afa0659ddc8520756226e102108abd4835101dd96278f4c33bbf650c4
SHA51273066d1a59380a2b652f4ad20c881082f952d5d064f5be7d66606de4d8331188e85cd9271ef47dcd8dfb27ef45ce8f769910fcf1776652bd8e1bc9755ef52879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d303ae15d88dea9ba45f310f973472bf
SHA138fe08f7b779462bb14af96820c61f07b649dbb9
SHA25644c92fc8ddfa73822629b54fdc4d90faf19052b15590d7f2c56f512bd71e83bf
SHA512f15fb860ebf701b7ae6a281e71660df3fff5affd1e7fff88f363c23ecb5f52f316929494938fa88a72f8510a55e1d8e6d82d82b9f0e6f09e6356da226b55e0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699d35a5ea5642b20253832c79a597e8
SHA1050285db261fa04d481dcd8cedfca57fb43a78f3
SHA25675d714823f38d7b650bdeb8ff62ad4243e6c706c686f75edce5847fa8160cb77
SHA51212fa1a46d13a486136fd32d5980e346f03a2edf5bcb1a33c9acc0927efe4765824d14300ea19fe41fabd1ae88d50937a5d4a1f9265fdb1287fb5228ea6c8b5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e0b27816a42e2561b1d467399c4a8e
SHA182e83cd42cb2c1bb7250e97404f4e1347657df2e
SHA256c04a93700cc0ff79e4590371423cab912809703a118bda14f089794b073a9771
SHA512cfd4e779bbee2de80a36f3ed60374585a552a2f8b7f48420ab4cef623c8fa9391672f132a1750405354fa1edaee36f0980bf4bbbb47134888bf97cdd64487c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f5b8cae6bb9197747c0d7932f112f7
SHA1b071d843c1b44e9bfe205bbc08af1f2d5b4a4de7
SHA25617d2f3a6f3b9d75cbf7883aa78e9712618b7e9923b9349038df77562444dd589
SHA51286389dff6a1a7c14004d12c34373cb7587e36260001c023eba14117e32736efa969c1c03790097c865093ceb8f926d417434df0f0f696352fd03d9ed0418802e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bff1784b4636ac78a731e2ff5db1cad
SHA1d4519ed1dc7a9dc9c626e8ddebb9fd504ee77a17
SHA25607e4b574c396961f3639e9dcefb11b599c67d4ef470ece91bb150e9af6f5abc6
SHA5125aa862c9656024785706eb38e83bce448c00a0e26464ce0433098b577f0371010f2dee1d27e7f4f314b6f64ed6bc1b57562149467d86499cbcb010d162dc6b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569cdc909f518df2453422098d69b510b
SHA1ca3e04a954667d4caf9facdcf1cb447130369918
SHA2560b1492c4f94fe4af61ceba5f30707efc31158bb047d201f96f434163ddc98609
SHA5128a8b157b3b487689207df833f6f428014359750414f7d9329f920193f5ef554099e199d2310e6a5553c6f5259b9370688ddac746e0092bb0a4506d640bec1d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b4da186d1fb404bb8c8a13b92fa597
SHA1ef4db6594b28036c4592e2aec18e77ba2521c773
SHA2569a073c1a3e0a5c243ead3fcfed0ef4e47d8d9936f58d1bd18ebc3ce2d07abc61
SHA5123d3da387828b1fba1867d2dcfd7dace99ddb1572415896ec06e10824b5cb9fdc3d5b0da34d43c301b52c45d366876da2842099b3dacbb26d4cce24501fb5435e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580acb9f87dca9a22739507d1c8f89b4f
SHA1afb163c0f61509b2ca151f6a4b1e5044855cd164
SHA256509c802c73cbc9bb11257ed332dcd6475474a1281f652df3039fe36d1f6af566
SHA512d4ac40c0f15def1e55dfc05564dbe80e9d7de203c8f6ac5340bd47868e6040db0cc2f69025ffa0274328a7cd78bede760b0b07e88addc28af4963d14b36ea1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ed2b23df97dee1c5dc5dac5873e17c
SHA14f92951c65bfd740c923414ae56eab45289a39e2
SHA256d5b12fed726c3c4bf67b73dd809887f35b88af86fc507a2544cbfabbb2741c1d
SHA5128028fcad0b260a7f822926bfc51c88500f741fc64e531804eb025a32b9cd7017dc91eb4af981e7cd1e01d15a1239ecceff8620a4662770241f3f12bb6635e71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593712457142ba8be81025ceb4a4b9289
SHA12adacf87cb74046dfb948bbb752e340affb2119f
SHA25601c0fc4370a7c2ef30ced45899f9354eaf5f795db8651070d6425d93c727a199
SHA5121f1293cfe952627add683f32a60dc6e347247734c151cd65a51acc6ddd9b2cdd1bc2928af767dcda06a3cde9416e2f050bca684f5b451c3e4816734ae8e48a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef6712c35b04e4508655d4060f5c8ca
SHA18d99ce598ea92d401639696d106db223ac9d28a0
SHA256289d3cb0c90f55c6335bd6df161c6fea78feee710b44061f4989c0507548d283
SHA512d6d8be05378dd7500b65da233846269d14f9eb7da82b24d567b9fabc7ae7c2c8c0de0d85dacf41e6cc4a62cdaaf6ca9320e1df2c4ce1110fe52887b13e5cc9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d252c7c181a8afdaa9a67e5e932bada1
SHA1dcee2831494ac76a48dd2b21a8bf909eb95b9cba
SHA25694eae635ccbcf17aaa1d442d96b28649d29a832042dc72dbafcc28a5be9e51f4
SHA512696cebde211e697e38dea43e667659d15a728ae2da4ca3db63d8e6de66a01859c9ddab68be65d5aa3d203e23a6e112bace7715ffcf2f168f89efabc4fd063ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a0ae3186124ffe053c567bc1cd2f11
SHA1fd672afceddfce427527977c5eda27bdafae8fa4
SHA2566b9bff1ffbac1f9128c5cc9f3663745ce4c0ea7ab0b9c81e05e799721500aa8c
SHA51219965434b9798230fd12b6a474a80a563a8cc1b564385baa3765b15026da42ec84e26d6b3bb66a0224c38bbccf723b29745a67dd24e84686d3b4f285cbf0ae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7131db1267009202fe5cba1fbaae865
SHA1c003e0a35aa681a2a0dd6315bf2f978fd1e89b01
SHA256ae43f9badfba5dcfe5a11caa164b7f04037783b8ef80efa8a139d46876889ef5
SHA512e439d623620e82923a9681144c7d7993ce49339ff4ece2763f57d5f7ede86227b1f4220fc6b6a3a18c4b50bf88a9ff969338891818b63c296dcc1852f98677a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb30e2fa7f8b284310d1caa9994e7ed0
SHA154eb9ecb4ed1c03dea7a84fa66c39c59da4cd348
SHA256ac1bbeb1e64e93b7326c31a804aa5da7034eb2664de0cbe0f286eea86781f74b
SHA512c610384a2ba0561c85791124bdb8b50c9bd74302c3b20b422f3341ac3a5c499f7b94dc0a9ef53adb1e999536f41a7b707eee1c8612f34429553480558260da79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e677499acd76b2bbe0a2f92723abee6
SHA1efa9b44936e3815acc106806da3280600eaa8f7f
SHA256329aa91416d60a9cca4c480eebd4241298f1b1311a2a55cb2dc2148668e9327a
SHA51208f1de462707da4353e08f97f87a8a03c16f5a71c947e05fd64944d2fccd54e1503b948f476ea8ab44bde52a95499b5933f0a237aed63dfa342cffa1cbd64313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f81c01fdf9311e354d381929caf1b7
SHA11c66bf17679dd31f96d3d2ec6ffef6f60925595e
SHA2563a5fd93cbe39ead62757b6fd469a7f2921c87b2fbf17dddd1a5fe6e052853a48
SHA512d34fa57debee04f6f8d48c53997a95d1563e74facfccd7fec1e8ce58178fe4874d9f4b9d5e4ab013ab25ccb8447f7557817d84a836ba2be09d093db848c4ddfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b55a9200c7b1aa36b33fbf6bea649d
SHA1995bc2734acc7bd2da774f2feb9abc442a519a22
SHA256b0ed73f7ca92df9bc65827066ba1bdd46541a01156d57f370c668109c4838ec4
SHA5127e6af2808ba7dca1519324485d28b81bbcd5b2e9c33a36e79069f014447a13376cf116630cccbf0aa4268a19dae18178a2082f997b2043115eabdf77c6c5c838
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b