Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
1ad5f1caafa7c75cac57f55ce4ea715f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1ad5f1caafa7c75cac57f55ce4ea715f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1ad5f1caafa7c75cac57f55ce4ea715f_JaffaCakes118.html
-
Size
90B
-
MD5
1ad5f1caafa7c75cac57f55ce4ea715f
-
SHA1
a3a26d46b5b193a4e82791060561b11065f2a4c7
-
SHA256
ec677505809408550fd84cd09d243504c9a8fce561e3d3af02bdbe0da56d1b3b
-
SHA512
bc829124779a72b4f4ed3f93ce5d231675fba6edf1eeeb65cdd2df668033dd7ebf79cebe93c51da803b0facfe81118403d15f7b44d7fc1aeb33dff64f9198f66
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{829EE871-378F-11EF-AD38-76E827BE66E5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005bc3cc7682c2b3f05d1cd34fee53b895bf4b4c6e60027ca1339797532b5263a9000000000e8000000002000020000000e3683d326ecfb4e5bd461f31d0c0f2600e6888d8bb9e1e7ba075fade0804661a2000000011c4da5f83ba0c9b11b6519e36dfa6ffd92bb52a97d6139a4747268d832f1d0b40000000e8cc293afd1d4b77b745f5b8b1ce98cf3f35461387a73292cef2762132e4fc67f9e1e4146ec83bfc86105398df53cc0bee772855f449b9737b85f336caf91edf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306619579ccbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425989365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2548 1732 iexplore.exe 28 PID 1732 wrote to memory of 2548 1732 iexplore.exe 28 PID 1732 wrote to memory of 2548 1732 iexplore.exe 28 PID 1732 wrote to memory of 2548 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ad5f1caafa7c75cac57f55ce4ea715f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51015fc6159c0ece30b261251e1c0aaf6
SHA110f58e9c90f66617a47db4e446341c4e399d344c
SHA25670d78cca26e5d203eb358b3cb0c851e10d843b5c3ebf2da1841f998f65826f6c
SHA512996a65760f0443396aaf9640b61bc15f9e0c03ee3f01e78ed924f0f298a60960cb53ae9d59ab5fda2f33dd25e41c7d990c257b7e651be2b6c1995e8aefb48116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83293deae34fe34d0bf2b586ab9c1bf
SHA15877990ba715a8b18a9ee129a9d64b95046215bd
SHA256eb6c8607ddb81147d5e3b866843ca1498bc196fe161df47b19569c40f71fe1a4
SHA51239feb4277503716ae47cd036f3c25344eeda469ddd9098ce802b7336fb6829824805c406d1289cfb2dd639a8b3bdacf19a2cfe2e6627268327a2d95cc28c9a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dac8b3187b11be3461fd72cde4bf502
SHA13c15efd7da0ee5c6fcd6186ac2b201991e162e1d
SHA256b765a3dc2a721c66d3b0898d5c88c6f8bd1bd782df6a749b433be21924107085
SHA5123d2837f619383e3424529c936139f4dd86affefb7a50d942111353b88be60320e5f0d7de7018cfd91bda4d4028257f795d4123ba1d41bf936298d89650dcfca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79ab3617514d42c99452e26102300fc
SHA1f9c84d4cb9a840eb898245153df1f53b7b5f065d
SHA2568a242d0bd661c1126632a9ddd64a72fe333e505eb1a3ebc0a91be85a5620b6ac
SHA5124f492c37574bffee0740e1574b510e7dc9383c055588e7d6af07b998247d35772c6034bd4c3a77a015414797be1ad425dc4b464cd766d1a101772e39d7b84010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc879388fc12638c75d4f16089c2d3e6
SHA1137d3df88b8f7210999101536fdb632cf1269db8
SHA256f7b0b72b08067d7b8ef5c5f6b3eb51a031b58b38ab5b3be677425f162634d10e
SHA5129e44b38c72c14e41c55daaeeb861d8ae85e6326f3bd0ff289ff225e2ae0e06b9aa15ef786ab24731e4feeecf90c05ea60349974af509a88e8fea1e6da3250ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443048486282bef41ce32b7bf084f5cd
SHA192378db460198b985389c494120698ac3eab427f
SHA256e8fbceb1e8c09f23b1bb49096ee0c22c278cafe1db03b7094f8caf617e4e8020
SHA51284fd566d3b7595741030cd8cba278d890ba1e21ac6b3b9e8d066e44a6aa7e8060fb3aeb290abe43d611315dbf42794c456834aadb7248bdc4f410eba8d330463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df474a92d14028ec84ae6f11513e8c89
SHA11ff86f6553953abf28063707477959d46fb689e2
SHA256edafd353ca7c3ecdb6c3cda575a5888868e182b80d080d622d2eda5e898d5a94
SHA512d37b4a0f2d783bc1eb6d4180144177945941011186544c2b97c088d03cf79f6adb34b52fdd998bce070dd94132fbba41d4d9896b900475d3768aedbcf9699b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3dd1ded59f00d3dc01f411c80ff1ae
SHA185f3ebc9e12645ad2b36171e71fe994f212f6c57
SHA256582c423ecba1dfc982d3858201f529e7328501999b875699d6ed6f6fcdadd0cd
SHA51226a71f3a60b903355212bbb071da9dbdc9a80ae6dbedbab94367db67817fc97fb8e6ec1949ac8e4dad87e2aba6c82fcf7ee6f060b808437b956c3004e2294edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb51ee73efab08fac2e2e92c033dfa51
SHA12fc7ec0133ffa000a0e19cd050130e53b706d66b
SHA256fcb0f15572f386613bf385b570ae3dcc98c26f717c834eccff08761a5c0590fb
SHA512739d373eebd02df1ac0c47fcec84b1ed553196174cc1cda991be3163e2ac7a58482221b3af273a174e721ead592a82961ab87f2c36917772f0df7acdef98e522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a15db8d42107997f054ee88027962a
SHA17c1513afa1625a6b327282b9fa2de067e877f1db
SHA25695b9304dc9598673c6c7358ff8960c77e02009ad55b9bacda1fb891c08f38653
SHA512b9e4f0887801dee0468b4d233d6ed53479ca37f123e88c4340fcfb00c07f37a1d7bdf6a8adc9b2044208b156545dcc7a71da7b38ad959482cc91396f5fd53c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f784a9d01ffaac42e9656481c604b2
SHA16eb9b863e8c7d44f50e0ae066ce01e73125a99e3
SHA256266df4cf926f0e815a022fb375b74d7799c59cd30dae077c5d3e305bc7d560ba
SHA512322e1eff8b10ccc6ee1f8a49c310a83e7c8958d1052cd36a70c885891a8121d6f2f72fd0f6d94faffd2b3898426a9f2b7cd363e97ddfc596d96b4e28d5a28aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577204654b50356ba02d472e68a0e86f3
SHA16282e832daeccd1feb10b145bfed9843bc9570ba
SHA25632a32e872355433941c7ca43ce6068cd13709506749ecf5cb215dcb78c981df6
SHA51267f2d6b1952d52b34f690b38278f9cab7742f38fec94ec05dca56b18acd89ed1d3749ea274c185b93bcf9c9f0fe37b3e1f544b537d721c075b33f555e8245f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57190a87e68b7648fb5090f4ccda3f0b9
SHA1f17a623b760421493a80bae9a83b739b0750e97e
SHA2564a3459c8dd3ccf66ae46417477716eb51411dc791f76f17fc7a278b37225c755
SHA512bdbc67d909952172f2ba95adce412a02a92f4903d34d924fcf13927c4b57b33db19f93e0fd0f593cbffbe1515a8747f27d4c10cc94d9bd0c2fbd6a4f4a6ce083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a095c863544e6dc765ab58ef468c6dc9
SHA13ffde6af9432b414948f07794a0f8f579440f5f5
SHA256439144b435e499817d06df6e98cbc2dab200c7b80ef764ea020d8598dd23a3c3
SHA512ed023aaf32c285bca0db8439f342aa1e85e472f3338b7f45f1604e4bd47f21bd0ab15e112b7791041eb41e73ba305179c5b392bc2b5de2aa42aa852e67ab9c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779bd65db1a7294915d9a18ae2c98e74
SHA108cd145348995f5501330fe2e582bb05aee4863e
SHA256c21f7272738f04d21b11fad742a28c6b6ab6021254c3695f446f5ddf1310abe5
SHA51246550f299ed1876467523cf2691dcd48860292c4f0e082e9fac29b2ff3b5b1999a73c8c4c4890988b390f714ab438d47642b072f04470065d1724b5d93507e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a2ef25d940f7dd761ed8eda6cce485
SHA1b4cb7485987f8dd7ecfe246cb572b0bdf4f99677
SHA2563a525456e949bb7b1e4e0ace3e8aaedd01b9c4c6816ad6acb5fcc5ae3fbc4fb2
SHA5125d8af73a9ddbde86516496c5e25ef79bce9cc76101cd773c8119dbf32e92134d75b7432715790301f57879640443007dea9337c1ebf6c9e2d328040548e8bd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671f5a3d2ee5aefc53a0b1905a6a387c
SHA13951ce17562f85934c10b2c82e3dc79e874861eb
SHA25661a3bf5258ec24e0488d1a36dc3c9d99816c9d1d936e84398b2b9ebc1f136fe3
SHA512adf113f52702001354f5c76013e49bb123360c63040ea418ebdff605cb357a145c351013ba3d913c5990fcf0fc960cf1d539c71d5a7a30d3eda63a6c0aac9cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2afb9a4c93b96e80aa83f42c3b1f04d
SHA15a3026d5b04299ca5520ad2d65e77531dc9421dc
SHA25691ed7d85b1ccf01c8f3ff6846f59045ba9daf4de2071fc511fda9471dcafc68d
SHA5126dc6448da7b06e63b651a81fa8c2ee993710549b9cf8a17b33b7ae962e26aa5a9f2a1378a302de11715c373dd65dd9d3455df91bb6c641a6f8f570eb7188055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547018e220d304dbb4c56624e139e32f5
SHA137e14b59a89c000f10d73b74b0712a4b0d1ec4c7
SHA2563c39ccbf742ad959c65250343eb16a5978f73788a776ff685f041a587b010ab1
SHA512d444bc6aee30b1cbb807520eee7d51ac00f59afeccdfe3c9dba85cb4265afa470f6b91c0775a9d26df79b0d82ab9f85c626959e949e026a7ea9885716782aff8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b