Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
9238251fc1c2cbf43977daeaaa002a49_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9238251fc1c2cbf43977daeaaa002a49_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
9238251fc1c2cbf43977daeaaa002a49_JaffaCakes118.html
-
Size
68KB
-
MD5
9238251fc1c2cbf43977daeaaa002a49
-
SHA1
081652814ea255d6948114934d473c04ed091e3e
-
SHA256
0b6b5199132a22edbfadfab54bf993ccff09b60af3c8299a7e6c0ca3222edecd
-
SHA512
7798504981f24696e4e8a7cbd29c306b553967531466d8fd37bb5ac4387834910031ce138d4706910632b6775c2d7bfffcc0e6314f69852c49a16c35bf218e65
-
SSDEEP
768:JinbgcMWR3sI2PDDnd0g6MU6+jrD6VDoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRe:J00D+r2VcTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423589233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c2e51bc8b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{447B1A31-21BB-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b75b13bb5824f6601b34e5058fbee46ef42bfee08f9e55e4cf6f61d02d64b564000000000e800000000200002000000068e2bbfdc481f9f5825c1b3bebdfd9c4cc2b349fc6b58e02d66b97249d62480d2000000073fa72fbe7f48e1093ec3006c0bc23cd74132c1f2d95b86e838ff328c1b693b940000000b1376d61c868e61b250bb7851f654ddb046001b5b539a7c792df20632416dd8cb830658b6296e6f39bc02797fbf33328b9fcf81c45134e1da07b578931916850 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2896 2044 iexplore.exe 28 PID 2044 wrote to memory of 2896 2044 iexplore.exe 28 PID 2044 wrote to memory of 2896 2044 iexplore.exe 28 PID 2044 wrote to memory of 2896 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9238251fc1c2cbf43977daeaaa002a49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d1a01a10707837c49bda9738d7e7b6
SHA17381e7794427333c11ea22697f8cde2122fb7901
SHA256087c34d039567418425a9950d01fc5e81e2ff17e3aac5b126872e7b8808a5bc2
SHA512c20110e2be5ea512055e26bd0c2ce94c25934e35784bb963d71d821d18c08f4a7262d9772ecee0ad21474d9593423ccf3f2300a5e94039c1aff9a2f7b726baad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed8a5a3fd17ffbe725de9e88e1ed66e
SHA1d06d576176d3cbeec5f19efb64d0c0a1c34ec465
SHA256912a94c0b9f1df2d7a70e813b6c436df774627a69f51f002b837128dee5f83b3
SHA512c67aaa3f63ff698463d9907639c16f95c8aa69b0133387cc5e72dd73eed5a49c5c79dd7939ee2096b4f7da7c0fb41cd5ffe1be37a1e3f4255b936e1172edacec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689bcd391d334109c8ee104b3db71bee
SHA1f1bd7956b3f688e095628d29106efce4742f300e
SHA256dd94064fdc35bed9899832959a2256e6bf69030962f388b67ce102c7c4d3786d
SHA512d986e74bf321ca79b02d59964fa26ff1b7ef6760205e72dd056b9cecc7880918f3e3594883199e6d14f58812c0f67eb9cc9b561ff0b0758f784b2f532e288b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0ab81e34f80e4f7606ea6ce411b606
SHA1b0c5d6b1ace3e14d5d0a4f4553babfed0ba25208
SHA256198a08d8d27fe54f5d15421eb70e589e41a1614af2d209b08d42e916816b8ffc
SHA5126b3b76b3f0f7ea0d4960e02ff74004efb06540fcdcd1a57e51a89249e852b302f1aa7ebb1b41894fc44cf7efa49c7943967ae686edc516f2643f1f89f8156189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55559a3c075e04adda1fba60a3f9a32db
SHA1e4a84b514821f61a509e0955043490dd5e73671a
SHA256dd49c996ed829f1044e0b8777f389a5a7fd1eb43225f5d898b82da51a97f2de1
SHA51271dc644b32cb62d409e4c96b3444958b4644c0320d20114c7aba51ce934762dbbf36546c8f87f91aff67af4624ad11f3116d210c875a31ee2c39fcaad0e6ce84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24f842db5090d2a7738cd981c421071
SHA169ddfe1f16188fc2c01da539d27b179e1b38f530
SHA2562eccbf93ed5dd4ca63bcc59e9760f39182283db07a5cf4d146a63cf9e394b1b8
SHA512f50bd0dd6472e1f2509e814adccbd8d4178695c95f48d716c4d9afc9e91f7dd1081d6a08e423093ed6dc55da14a9ee8f02a5ec60bb084079226bb80f2e35c978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5a69406352245e9b99fb6ab27442d5
SHA1b1831fa9e9dc20d08111ceb62e4cacaff812bbeb
SHA2568fd7669169425048126126e6848b35ca0d405498b88d722e6ada236f6cf258be
SHA5123c44b9300246893c7a42c89dbba416c3a8507f2c022c3fad0386eb9741268fac75901c3a905692f27c3f554d3e18f6e4459d102d71ad128b2b292ebe97fd2818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a24262f2b3863420a39223208cffea
SHA16c2c2c1f4d704b3fc0db13fa09faacae361dd855
SHA256adc392707c51092a8b1c37aee1f16aec11023efdc02536cf117a13b4f5d55e7d
SHA5129482e49828f15d4227325131eae8e45abb37244436da7d5d66fb348d7a8adb4eae69bfa8929cdea3bd4d06b2f7ffd7f9667cf13b1693a4888cef09728b510068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc9061a7dbffd74215ba456648f27be
SHA101ce92db2e19dc85716b831d8c0b137b18d99dfb
SHA256b0a94c4bd55a59a98938af20fdeaabae798788927323f8af8997e18bc268de1c
SHA5124983daa59a15366615379144c597550bfc577bc3236c028a70fb494eeb597e349740e89e768b2f9ad1f7521e010904bd61caeef0a3f66e856fe0ab452640852a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f452b787cc44bea4df456abaea9ae1
SHA1d8d68f1623c1d091064631c0b783b941dee1b7c8
SHA256ed579caca76b2c3ed82583d39a2402b5b8e2e0e5afcb8725bbd1ddb876210ff9
SHA512b745fc4776d1cb15b5d58c56700dddb1eb0cbb4df9f11980e2bb2d506cba6ee41fd94b78201c564890b3575a06b5173ddca1cd46f50ba32d5f9241ffb2b7dbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f9a49d80b3081f3515e420cee00712
SHA1bb293f6ac3e73c587901d54e09e3217880ffe877
SHA256b384e0679c3e08bff6d13455810abcf6c7da641fd37972d5b682eef9401d65d3
SHA512c5360b3b1a2cada79bb90aeb812e2e3bf5b53101a12dc421dd546d80fef62d834fa225841fbae9a05877041184e522516431d7637614fc6b4b82b9b8a5cc05f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53164f8662866720b6ac2094133da3963
SHA13fe49a051faf8a8705dc7dddce8b493eb87c83f9
SHA2568aebf9f82ed8c99f83be0a703a4782c71badd259a254118a4f4ac1ee5e0832ae
SHA5120ea32dd9b967b3fceced0811c9f6a716b23ff0eced6005df6e428c981841f6c8a6e7de379db16cf507eaa721fc74ab8cf4f60769cff90a28517925e3e904ea61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd8ea8df7eea0cb37ee22184e4c4cfe
SHA1b2eb4d520451be40d37402611c81683f96d6a008
SHA2565ed073ecb416316c300b6e0f04f2d02e779fff86fbeaa3851032c73e2c35fdd8
SHA512abce7903d5fd4390a9303bad45a0dd96b34836eb027ba21a9e8728876e92738ed5dc28188e837768595495ade7d97984a44fc2f8aa5a511f196d5c92cc5bed8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c29d3e9515b6255a15c7cbf3f041b2
SHA1fc833e777b02bdf40ec2e5182afda2f18419ecae
SHA25629b23eceaa542af23b1b75bd96794ba2c746107b3a65ad8215525ede21d2c6b1
SHA512164ef6a9e59f3975140ba4f4064ed47d6ed199e3a14a0b7ed95f9df7001984e059f4b102277010fa2a7cb9c067881572b6d5c70cda35dbd4150f9854320f17cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893a59f8dcc5e5b3e796ccc59a478516
SHA1718d19b025cb114435e44762792a99b8dc7c6fc8
SHA2564d763aed5323d2041ac65c9f0236125a048f1205efd5509dc464ba56cc854f73
SHA51295bbb6018a887661e0e59c8d9d38a9ef6e130ab5b7cbf11c47911ba1d6ea6315e6a972037d928050cbeb3642f983f03c81f49d7fcb7e4674bd850fb5b7579dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f1ff8bf3801eef1059353d5d329d9a
SHA1b09e1fc38abbe514ed132468e49a9ebf381fcc09
SHA25669041a2c89aac691ed975f7ac19918c1ad3c3f967a2d30bfa76436cc76a7f488
SHA512c8c69e221c72f325fce1cf3b0df7c90481f2aceb360db0957b8107dcc33a4ed2b2173f5e1602bdc2bf74b423a726f8dbbbd7ac50fddad93b84a51d891947b2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89a53408f2ad14090ed3ef72e4d4393
SHA173d371d077df981b217034fd197479acb0405c09
SHA256020a6daf015863a2625bf0e26c8d97b1ff5624a92a1056c5a359df1bc4c881c2
SHA51216730a6a22469734336fe989c20cb228d02b0016834acf8fc685dfd1b3729de13d52e85202d6d787e00c59cbd3c152b210d33268dac1d4d3e9a20f648f4a5762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bad97bad92504d0ba2273b1dce4156
SHA1adebbe369d5be3e48a2c4ac523c043e15edd4848
SHA256bfab1b6227dba7690cc12c102578717694cdc35bbfcd8865169a14651c68a744
SHA512f75fbe1a99f744c3f04580b8602c6fe2c8d4a1be15e39425774f20915b3b864c7be9e38aa557a0626283afaa13c98f4cb188c65f0b47876092bd2b096381e6c6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b