Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html
-
Size
301KB
-
MD5
b0db2fa2bfea880e41876dd37e1cff2d
-
SHA1
3ace46d9d2e67ee98d11f60abef149d517fa7be1
-
SHA256
3f57f6ea3ad81203f16da80843eaa7a4b3d63433de698a06f1b26aa1dc2ea6ae
-
SHA512
e5f370a4df464e60ea268d75371f1f113336f75873aa0ef5bd9cbe9a6149576bd057dbb7ece61573d5f1c464c8c15aa7c561f8edfaf70ce7807f7d3acde1ba66
-
SSDEEP
1536:v6+SbTTFZSjT2mNkltM/jVII3IbIre0MtBm+6oF2JLnvbnv9cdZ3B9dE63s770Ju:C+SbTTFxmItCVI26PTQoiTCw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8602BA1-2B75-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506df8b282bfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007746543046760640bd3a8be955c7a89700000000020000000000106600000001000020000000827a6f457c550bbb44ee675daee6832229883618598aebf26493bf84bf5609e0000000000e8000000002000020000000b0111eba477a8890cc7a15e1cd062561862305dbb6da2212bbc1df209be9c4e220000000c91f592eda516173e45969194abb2eca14e0898d5fe106e5d656d4935a83120d4000000022d74a4717ecae41117dfd540153f075b32d08acd06bebad0be0ef24ce72995c1fa89d848df14cb315c5a441bed7fe94c4fc6548bf5d71c904686655cb5cd755 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424658947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0db2fa2bfea880e41876dd37e1cff2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ca0b3264b14d06849f108a5419dabf99
SHA1bdc007be23f13326e8e89fdff690816d0c3c1495
SHA256f6ffe94fd9c049580258ca1476d1e5be9cfe8fa4ccd15830fad4b937b956c9ab
SHA5127e73767be09a75a2e28a0f5a26f7087288ff29234729657c194ce64e153f5405729e8dcafd53acbc3da6460e10935bb45a0209cef7a745d03cc94445aff10bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f4f7c4041a36593a823a1f9f7d149bb
SHA194ac7d8493e932292fcbe158f9d2e1206218d435
SHA256e60cb3f64c2b0b0b0ddae8159017b44866a78cd54f3c755fea3d53b87ece85ab
SHA5121a1f5b8db1556ddcdcddf6934bc71ea670a71a03dfb6e263648552d5112c60816e977bc671b3dd756cc97d0527927b933ff407035813ec8b79b726ba7d01e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599ae301ab92f03b8d619edc606837ad1
SHA17595d4a8f78f333d30a94addd5d5034e39dcd693
SHA25614d1b2d817d7dbe230927a6da715a5e7b77c90a683f17381476a7cc5f901bd3b
SHA5120ff980452482fe30cc83acc510d28e4e028d09898fcd61ee33bbb84134c36fddfbc6281dc0d47d2eb9d74da49089e416a3475f5b4b253341b42fd31d7f05a197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef27caf5383db80e4ea51e7118f75f6e
SHA1dd2ac73fd33fb8de548b879ac5db4feec0d9dc28
SHA256649d479d77b465bc0a44af544bd44b96b1f3a4768599cba0ca5a46bbc626d2ab
SHA5123cdd03033510590b62a01d4986b043dd9361ca634aa328e0468c024cfdac6ca8a174c46a6c9ef6f9ce954947d250d78da03b4b3c7df4139fcad4d9e243fb151b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51496d521a2398329c49bea3b7cdf6cf3
SHA157f739bc41a40357862c2c8e6bfd1b05bde89c82
SHA256205bf1b6525ca1c113a3199d67712fa8f5166b393e59e4167df190b305690eaa
SHA512fa43986231cc503cc525f1d702a48fb4f440db1c02bdae3c23e0b8c818ef3827e044b43b46866ed1bab5cb6b61eb4793c20eb7535642bc3df9d1d02317d79e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56133651b72d52c9d4ec5dbfd6e1386db
SHA1b6be8ecfd9e2a68facf7d7fe8889ad6ff07b9b8c
SHA256575becf0317cddcf93637521c84b3a4c122b0ebb7a21f209a0a801a8ab6320b3
SHA5129548966efd9b7b11438c4ff4fcb186a0e62e59d4d69b4f56100e0a81588bd190a834f19f51ecdb9d92cf9f00ee9c0ddcbaa3bef9e3157bd981c17c753ee8fdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a724caa780096b57475321f96f647d3a
SHA147ecaedb60a79d28abb6ae35322876851e046485
SHA256311baef4261a83d11f6ac37ea00d8f19b38a8434c2a61b3e45806222d6aebcdb
SHA512fac060c85546f2b5864cd9a796d65a1a56a51ae156947f53e641d4a534df58780df4a5e98bae7e860fa7a62fee42e6074777289d89fdc1e9f0255dd1d5078b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3adc0688752ff17d507be4072671feb
SHA10ada68b5bcb1ff6e396616ee1b59cde803cd0efb
SHA256305b5d9f40c2d0b7af915f6a540b8bf46681bc293778feff9e24b09103743ce8
SHA51268fe25c02cfd3cab738f428e3af4a25aeb5bb59c2485bf72b29620f6c1867634ee634ac0754b681fdc5e7695e26becf870d58d623ef5c22032ccc297436f4383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc3d5fbc576a694e9fc84c0281a867f1
SHA1c36c483d4ddf78df79f3076870797b3af6def402
SHA2561a4198670010edf19a3a2e99a5f88f2e7e2aa3c2ab63a786f14a5d50896f0d6f
SHA5121cd9d56e89685df8e1441652b63bb68a1fcf8a88e2753b4bc6f87bfc71025566a91f8fd0504ad256ce64b11770cb71fa18260781e3c3a41c332e7c1a4b43e63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5cdadceff7f90f82606471ac4a259bc4b
SHA16509e54c407232faf644b1dabb5d4faf4e9725b2
SHA256cee67d3e8eacb2e3174fb3397c80625f265af08f6b059403c4d7f50685b94dab
SHA512d475d3526962d73128eca51b8765f5335eb33375a321d09fe06cac3a3ca830440328491a875e5298a5a63cef18cf07aebb0cf012a7f32fe557e9a499c70cf6dc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\rpc_shindig_random[1].js
Filesize14KB
MD56a90a8e611705b6e5953757cc549ce8c
SHA13e7416db7afe4cfdf3980daba308df560b4bede6
SHA25651fdd911dc05b1208911b0123aed6b542e9d9f04c94d7504c63d89ca259ef679
SHA512583636571c015af525cddd5b8dc2ac9964aba5a7a9b0acd3908e4aeb4c2ee74cdfaabe49b0aa13d7b142748542426864e91e88e90d7f73bc647f0bfecb0ff7bd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\544727282-postmessagerelay[1].js
Filesize11KB
MD516f1b19cd042265a234dc208fd7efc64
SHA102f67c09980ab6057f073d29f4c3f2792257d3a3
SHA256509be2bf36ff013c9a1c31ac54b751aac2401f14496662a16ea8af6903d21b27
SHA512652ce3d209d5d4c1e39f06e41e87a14a3174419b8c9cff8e5683846afb51f9f4939c41fb51a7aee67d9d26db80b370890182ab7df089f826479d3e5e2843566e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RSAB58HZ\cb=gapi[2].js
Filesize66KB
MD50fe383a7ddb9bbaefc3105b3297f5583
SHA1f80c9d789f251909c7560bd91a9e1b9a10c26362
SHA256d7ad4aad4e48174c30ef21fc32c9380659d2c99a5c39680e10ed9752139d8683
SHA51231de1f59377bc76e5d602d02273867ce750bbbccb7edc8f2803c0188002ecae6752ac3ec31c2108e64b0d871b01e6a8a06711969dc68bd9823303def0e7c1ee4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b