Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html
-
Size
460KB
-
MD5
930f51b5bade6d7b2ae88260778b4b9c
-
SHA1
d67a8df390ed25fb1358547c0b352a01d315d634
-
SHA256
623480897f2132b9329576d580420f0fc594c1869b57974c9b0b5e9b124e1d58
-
SHA512
f5862f1c38a2a69ea58bd24108deea2b3eb5967078bc7d5171d41266056df3c0e44b039c42fdb5203871164399904e104a193d1e2c0780589d551197bc39dc64
-
SSDEEP
6144:S1sMYod+X3oI+YQsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3M5d+X3R5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423621150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006a3734e1be337f448da4a628e20939cb00000000020000000000106600000001000020000000b0e97c5e807ef892b336a1f5247dac60e0637d4924972aa6504b2a7a07359798000000000e8000000002000020000000033978119b721333bcb2090f7dcf3df5856068df6c9cd3dc782e0400938741352000000052c76d815ef6906a1b0882a6c99f6205e8817b9796bcf93bd1600b735123b79440000000d819d638769355baa24ab36eb93a28dbee7afdd6a2613c2c54b6e36222f743639af27bc674634a4e3082b7fbf6e8668ac379dbd014a8c226c4e9fb9817356a25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207abc6812b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93E676B1-2205-11EF-9001-CA5596DD87F4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2948 2916 iexplore.exe 28 PID 2916 wrote to memory of 2948 2916 iexplore.exe 28 PID 2916 wrote to memory of 2948 2916 iexplore.exe 28 PID 2916 wrote to memory of 2948 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\930f51b5bade6d7b2ae88260778b4b9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50116a1e7003e5cc5c637ab13f8a53ab8
SHA149950d25efc68a2fc3ddfc1b45b008b944f53e7f
SHA256d1d2812d23625901db67d563b8a3580833d364bfb720aee0eba7f887589322ab
SHA5127efb1be7ceee870cb99c57962e98fb2ce574c0ac8bc5905f69ac1ba999a43469fe3a339a0430f583b869575ac697769e34747dd73ed8eba1e29d5d03a3ca155a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fbc0c8a92e4de736fe66267ed392ef
SHA1bbd0df05c3c801d704aa872ffb48e9a665238a88
SHA25657b48778b2875e87b631b71d6a13fedec8f3692f1e8b3034690a540614e4e12d
SHA512d775d228f165b103407d6896b5ff0961cb2399ce41f7a3387144dd3429000dc4e6edb9815612a4443c4ccede6deb69c7c8b3cb62897da4ad447a7645cc7a77b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ca01b362bdbd2faca144c8037048ac
SHA177d5de4e3b54dbc5d407dc79b781c9729f51e8d9
SHA256d55eef4acf728f1dac2980558b5d79dded63017c6f1033d3d563a27802d49375
SHA5121543ccb38c5767b3fcfba9b230af50689ea92f11a813c9a3c46251ce0d98cc9f44967a97663433e4b3e855f5ace870f51de5d4c39bbc83ee5d93f1bcb177b544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a349c0b8b0ce5d11941260212285339
SHA1f4abfd274bb7ad861ff8378ba4ab8dfbe72fbebf
SHA256f733bec16cbec017492235d878df50505f7007b4e2166534e607a751896c3943
SHA51272d8a696379a4f0e394f23417944aa52132e051b7dd0f660903928d7367eabc0383784efbdd777c0264b31f1da7fce39dcc8578f9f61784e1f97139010c1fb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dec0c6192f36dec4528c81095f1875
SHA13b422ef5f0b2aef3c6a85eb51aa8e284bc080782
SHA2564de56253ed9fa9bd308339d86769800fc7dc9871ee77dbcd619fce483c5a28d5
SHA512092929df1113b983e78b7de0ce64fb8677db56dd9e4153337307f7847482f3be72f7a88fa5da3aabedcc4c764edf2b7d11b84fcc5233e146ae460d39a56cc449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89c7b9a26629cab439cbd1c90543840
SHA112317b0ddd558a261d61f5f976d60012e69014e8
SHA256273ec10c8c1c80e1fa9487583dc6136b43711eee2229f682411403e9a7af9964
SHA512db9ba5ce0d9f4e5bd98eeffdf10e0badcc5e77865bcc6f729cee9c5d5ae8067542494289bdfc3e9f60fdcae41408256db6cdb3f7330d3a082414eb27e0e5f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98e731f7dd2bee0bb08306ca54eceb4
SHA10331602f3be4db83873dc9a78464f93da010c18c
SHA256aad6a9c2150b9c06b54faa0203ce254b4fbe5de041e53651913cf221c452495d
SHA512b1ad192c7ec06873fc397b289d17692cea5879746e680468e147aa84c2261134b575d1351a332b9d18678c67b48b4a59c48d10cbaa8438cd19ae5fe2c9d9b25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586cfd26fbbc1ebdc280f6d95a53a256a
SHA1e14364a6d2f82d60f7ce8e694e4268be6666ada8
SHA2568500a84c0621e1d16fa26048fa39ee5bc37f7eeac332b687f7f95ca106829819
SHA5129bb565359569dc76d7192ff1f5117982e1e45b7fa3c0007ccb38871a34e3af5f0b9df2a617deecf02bc2db619896cc377ee7f5951333a86deb260e576b19521f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbffe51d4d9b0674f8e04224cecb3646
SHA1f1aed008c8ac4992de30bc4f2e6c2b0a557fe4ba
SHA256ed06954997396f2c2241919b4d411f5b3417b62196f8e2e84bd60c6e402647f6
SHA51200450cdbc00dd97d19f4c32e4192b69a2bd234abf278d9bcd549b02a81de95bd1f891c32103f3c2a64dedee23b4ba21cb4c0e762d259117e0326977b754b7ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dedd2b92b280cda465365d6470cb59a
SHA1daad3fb8d52e41758954034e3f4bb669e539a714
SHA256199a06304c10f181c086ca610d97e939c19e417ee47e0978a9c3d03d89440c66
SHA512dfc6b4f3c5fe03106e4f2ba45bf2f0f85328de5f8bbece4918e51fd36ca0e6cedccee8d4448b65ef6ab93f8983b8f43ea3cca9c656483b6f35fa781e2b8dd6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3004960db6373c9bc8323d30fea214
SHA16c02a37058a556f0ebcfdd40b0ef9ec27e5cdb5b
SHA25635b44c3a2b893b3a39307a3206b62085eb074f56658ed882a6818aa350d26ab0
SHA512c5566463eeffa4674321f4f8001bf5eead942a3afe78b0719ca6ee1a1a0201dbfe5e711244f0db65653696b8f16cc5854d75589d07a44aaf368c1421bbfe1ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821bc2c808662ed43344d5b86a32d725
SHA1bc79c02e64d7403b1a604fb55c636107a12201b6
SHA256d5832f33497230623094e6ff06b69ffb459286eabe97dea651ed3c991f641a12
SHA512b58001830071fea4a3d67c04454c459254940b012acf1c05143796af1f2ed6c2499c9a44f234be76d8df79a30037a78372b474d1f3a197fb714e95bf27ef2034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54621b8907b8cd342656279a422a32a48
SHA148f26b324414684c7a2fb28baa4a5101c01b0b2f
SHA256d52acd35e388faa45be2426f20acb03c585e112699e2c636e4ccd663f9897f46
SHA5120274e8972fdc2efb47af648d933e5198e5f517844e6dd7db34c3cc1c830d13a3528f2873821de949fd56a6a3a966a53cfc7de54fbf2dee82d934005ed0914571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6977d43c7d77168835a3334c39fad3c
SHA19237614695f4de21be48d85a775be90ef6a10b75
SHA256f3f2193f45151c90b1f19ecb5a19fe410ad6f86c266997a6e1db9423930c339d
SHA5128a9e044aa2130ae2630a5be255a751ccc1b5370cbf5ad4261d26b84bd4fb82ee31eb2551d889532bcbf2dc0a519c44087eaa190a72c2272640af44ac561a3c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23bf6079890219ec270e4037ef542e1
SHA147c517712414db8fef62f78c9ebbb571a934020b
SHA2561a185645ebed51eaca60c231090663dbda796052aff176d33763a758efe1001d
SHA51226dcc8c94257606f85fc165d93851e4ae95bf8ccc73cd55b02e23f0bf8cd7590b045d660fd99ee597a1926098c0bb49b29f8dcf6250e5c09e745a81b49f7acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8497432c998297de6dc4d4c169e4e0
SHA154ea27a6052c24bbe92c322bf541496c9a9a2339
SHA256da338bbb3a2aba6aeea7527932334fcc484555a93407616bef62730857dd6212
SHA512e4653d309b87959fcbaeeef6e9786e015fed4b52059cdd6d9a999e577558e13a652b0e5e0b1b651798f77d4e7491cf5bc275cab9e7a936bee1d37f7b5a19e017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331789a44cf05464782d8ec66d9d4798
SHA182f07ed5756374994348c104969e8dbd12f05bc4
SHA256d323e3353ebc98820b16d3e81d091f651f1ef871e7616480fbffea6e50952f7c
SHA512b2b3d458198ec76c0e9e87d6aeeedf7423cccafd5bce98bd781bfb66dc66c28bb1a358deb8ff001b660da9d5f69f52b28c62724dad0397b3e45e0ea1aa778166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2525a62e2a2fe334c5f1b527eccc9f
SHA1692650c3cb36d95a21de8aa41b70aa7fcf619791
SHA2562782eef3fa154f5d216a6665fa851e5d7bd103806982a818922c7a9e6eb22ccf
SHA5122d8621803f5f0cd7c70743873fde8bfbb9fcbcc1afc280b2d6d6f6e577c439ca5dc71c60119971ddd3d0f7957fe82890febaee2a1674d8947ae8d220f0282ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d62e12591537860629f7b8ff339d37
SHA11329227c79196ca1ee08854418d474df2cb22a90
SHA2569232ec3efecac5c6001115f4f29ecbe2005f8b9c06f270aa2299f5f8833abcb2
SHA512569f4f2c6e6b675f6a4b495eb0522e260af46c8addc0d9741da1761585c2a67ea55cb14d332b5bd85c6287f701ed5f1bca950ce6b45f0ff7cd45471a81150cdc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b