Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
918595aecdd6535c1e87bb075942b81c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
918595aecdd6535c1e87bb075942b81c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
918595aecdd6535c1e87bb075942b81c_JaffaCakes118.html
-
Size
76KB
-
MD5
918595aecdd6535c1e87bb075942b81c
-
SHA1
fb6b2be6cf9471b00cd0e261b17682aa643c64e8
-
SHA256
67e34ac37d0a1459c7f5c9440fa8888feac618fc61ff28a0fdfffc863388ed59
-
SHA512
0a1c71fb839088727f7e2e27d0a44cb74ace316df9e4c220131f97abbf3a252b22f86893bf0327335eb6062489c85036c09560f33d37ab24e89d2762c730cf37
-
SSDEEP
1536:u3turnNZNy5ZbdKfIWuPsefrlkGovXc+O/Svx1rF0t:GtONZNy5ZbaIRVfrlkGovXc+O/Wx1pa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f7bfb2a4b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE3A74F1-2197-11EF-9E38-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000251521e98f876547aeb392f8153f231f00000000020000000000106600000001000020000000323373df2d22fc26bc9d77e9630e5f187e32449e585321711e2275fe18f0ce3f000000000e80000000020000200000007162b8053a8954a480061162508be54a0878230bc031a1c83c48941622012ee820000000d753f3efacf57c9501e37233e18f869258b16c425e1ae6a91ea2c1db434b5b3b400000004d2b5ba0b022354578da7f86ec374d6aeb6968d6196e5a3716f9dc5d351d6d062cc4e6757187707e8f6dfbe25966256fe77c887c2ad006c7c1d59cceaa576db7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423574033" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2544 2160 iexplore.exe 28 PID 2160 wrote to memory of 2544 2160 iexplore.exe 28 PID 2160 wrote to memory of 2544 2160 iexplore.exe 28 PID 2160 wrote to memory of 2544 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\918595aecdd6535c1e87bb075942b81c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b401e76ec67b44bc2c51aa835fc5d37
SHA16e5a765c217d64e7fd06577ef92ebfd2883e121f
SHA256c9b9df07b651921312fd432cc29a59853af29f62e99efebb667a544549e2bce0
SHA512f13db7161b0ab437ae1d5d87a8f9b07f4011d42b9f4f5c74d549e475035002aa44e4bc0ca073b64354c003b1d730e98436246702e4a652ed7bb8e3d65f8f3291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573345fc56348133d144f66f409372c87
SHA1bd92096adcf5582f581a6cfbce93d401a76a71b9
SHA25692080c48d4fec2f661b5a8083ad87dc28100910da67432066e711daa4c73bca7
SHA51216dcef84ebbabddec6b16c9b3394cea05f7d4bf89609259b20101777754689f8c1c8d538d51f76e4b834703cb47e01b23d2d249955d3f35002be3f3b1e1f3c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f64edb4c885f97fe872b7d077a2241d2
SHA1b6a69706d43978abaeb6484233bcc5b43ce53487
SHA25625958a7898daf0fcaa832fd32c0728738eceb97d124761da7083103b52873c99
SHA512dc7f952a4a96f81b08203f7e99586abc7d969aae837ead96fafa4fb3eabb41b2a105e7a3d5ee65b0946cbaef6249ff0caa3f0a644e583e780260512658b1178e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a42e5122197a543ba12965c854a7eb3
SHA1e8493b9204941961f1bdc608015d479bddeff61f
SHA25673e42f0047ab01f22d37068310c6454e946d625a6c55f8723269d4bb0d56f29e
SHA5129e5c45d43f3e6d7d1c0738f438bfc20108fcb123251a1d8bca0308d2d8f862db2c67ddc8387f0cc12b56ca5f1e7ea431694755bfea69c9e7653ded8f3610563c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586732e94bfe05d4340da406d0876bcc3
SHA1d29c5358018db025b17eb7ac6b46d0a5d5a89e9c
SHA2563146a1515a554fef33b99016ef4c252c8b78e7b8d40f08e5ed07144e5f753495
SHA5125f171b33ae50dc09b865e0ab0e3b0427d705055a173b35078d85002969ea386a58740823808d94638472152a0810f3954a199b022cbbee3ed894633119ef79c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a50e4eff59b2e11dac865e04be6b7aa
SHA17cc191190df2f488293cb2e14be22f15d09c5858
SHA2562be5a3fa91d4a387c7efa2cb5e33b1ea60e93f347296070c79e89d417a1d54a5
SHA512f9ef3a7675796b452d7d82e72354df04de93f9c8ced4b28a594192b62d10c6532fc72f4aac7a0cfd0bbb203f556d16706e06787cd34863d091319e7e110fa3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5958d441edd18312afafd2dfbb502feca
SHA18c2fddeba3f8ef8412c715ecbe133aa67824904d
SHA256714d13cc1250c10a48006d5e56c6a9c5c0e5ea51af567770132046f36030f478
SHA512178737687d894cbba6f2e282701536057def36628673281d668cc4046051e9a3fab5b2efab935e364a08a4db0198ad0af7bf209ac2d2ca6c6112a11be15c2325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee2f09e14d547ec057be098cb7f53bbe
SHA126abef070949dc73e46c9a99615b43ab37c5a678
SHA2568a8d6f9b5c9bf706550eb4a38c98b75785ca4b418f568240bdd4a2accf8f9c99
SHA51259b821c5fc27434d6ffded63e1411b2893b4b4612cd8937062a76fd986222621435a8142a4d9f1accb732c8d0380fee1f8e2780ef264d0cca5b18d899a16337e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4044e1e5501b3d23f0120732a01c0ec
SHA1900d27418467ea2da58d5dca257cd99662656611
SHA25647f0c793e432ce6baecf2a009dce7f35c5c9135219ecd9ebaf35f24bd45fb672
SHA512a7c27871a8583d7bd067b4267ec1c014331cb3e1a094b8a4ba320761b1fab6ff1f4f739264f5996a76ff3496b2a96e8d0d57afe219584719a2cd1f0750a78ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5925315b4357cdddb24bb54137dae711f
SHA10851cd20ffe2c7bc369433a5c0eccc1b1785761a
SHA2562481727cd27ae5d273ef644d2fdadc17eae92dfcf5cdfd09c1211bae9ca1fc17
SHA5124e838d982dae3edb1be18089e7a483b4f46c7b98d2188e99b44c962a670554269a5286f6ddb8bfaf88455dbd02bf6bfb934180437e96ced2434bab21cc38e088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfaf0ea4c6139b7e878db4e5b5c23139
SHA12c36c581611f5a56794aaf5462437fbc3f884d9c
SHA256493a20336877674a5b0d5b20045f8d6ef55225e097c828e8a9991a823b70ed77
SHA512c7ee01372ed8d8dea42f3c0d1ec70bb610a66098c93edeb2be910029d0ff0c18555b65f2677cc94f2ecc71b2928c8f15788cf350c8da99941b0719c7f6a73304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589dd4cf1661b4bb8dffeb218ac30a170
SHA1231014dcbad149df4f1926e7c232f09252bba01f
SHA256a93b6539895a85b60ec2e495ca138999ccd224192778b7797124367d8e17984f
SHA5126e73adaa8213ceb40d80c5faa286d238028fdafb62681a244fcb294a175145cee6cf110ce93b81aae1b7db63cb651908b7cec38f39db23740095f6a4e04c8549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591fcf5a1f4a72ed3d8a403d50e5704ca
SHA10b95b1980097486cd738bb409bb2bd0a16be2ecf
SHA256e756d19669241f71cf5b29ecbcc4acbd80da9a96809cba2ec854e52a1b9223ed
SHA512ff7a4ee08a6f480ea2baccac4d5bf9c11df72ebbca2ca6b7afd2091af162fe76d375d9e4f3ea63436affc372d7650e42e5598b152b7be19236549b988c2823e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f11ab91e96db0e9eae9a195b22e23180
SHA1a3e29c64add6226c6e5fb99806dd76ceeb1780c5
SHA25663a27d8f079389332179db30d37dfac461caf433983349315fb3f03b5644ec56
SHA51260ea6e140200de3064c8f0bdeda03e761333e9341949826f71f30074e95e23d0c23fccb2d953b229ce832d26943c0457d3ca1e1b908cc0179b04a5dc7a46fc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b81ad62fa1008445963da64b7808cdd
SHA177be39aa74446b228995a09876111968079ac12b
SHA256afaa87f37c09c2971f299d629a328841b49cb131ed64994f183eda66ff414576
SHA512a6c73d79914606e4e5b6ab61e34b10489a61df5f35ef98165d7049f7bc5d351d42b0248fbde7accad588ee25740ff8a1bab3bdbd9c8cdece7d41fdbfbf47c5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d35f97536eb962b80f822e87a38e296
SHA187b4424250243e41cb40e563ff1e6684ad403f89
SHA256ab22b41f74407d95b047f4209f6d7e0d309d08a772a1209b268e291bab1a2062
SHA512e70b513370567f5fe00895f35006b0e4b3c67dd0d5fbd50373e08023eb932095ca51f9e4599941e01aeafeb9a748932911af791c4750c195f0b9dff3254ab602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536f69852b0b4fb01170bcbbc2f30cbbd
SHA16062b04075f62a79c42edc5c81677a17a4a0e420
SHA2569f5bc9db5e62168430d9c76f55ddd04abfbf75ac9b2d6e59b939a4fa3c882853
SHA512a6eed2597f7d9181733ad548f817840d822765a6e0999ee50bff6490d5d5023ba43b0e0f6f430d9f4bcf105e20974fed7ac362e290a2f33bb73e64a175b2d1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53911a12234f014b73fe23d12027a7957
SHA15630074529f7fef7bebb3ddce733e9e5b2135567
SHA25694e114b8c83bd6598c899a4d1e40904ac3ddb6ae837b3f9538277e8c59ccf441
SHA51268e1199f008f2a800b2eafd9df6b62ab309fc313312cc34be0bff668241b88801d415d3e6b54b65e250e8bb80c243e72b1bb71b414b5b339aaa460f941ac1a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565082ec9e61559c83274909ff6b4ad63
SHA153eeedad3dd36efdba8c13a06443828d63c97e9b
SHA25610706a0eeb662f98ae1ca785871138724a4f7dbcb67c573cebee1ea4dfa9c2ad
SHA51217c7f260b21bf7816317c2da6a9e4c37bfcfefaa2f711e2e61627c6334e1165798bc3f6acf60b5f6f27adee9fa81a713eceb6df774cef5e538427fab965902cc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b