Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
-
Size
19KB
-
MD5
234280b79cc09aaa05de48c6b5b8a60d
-
SHA1
fb13f84217e54931d1531486ba403940a82d6e97
-
SHA256
c4c5f4d2570271ba3181397db505a1d7b3a15f00ef15e599403f0eeb3dd1d00c
-
SHA512
e718efacad19f1fb3aef7b22b3e172562ce05434832b372ef12c5f2373e08ea80adbf17907046524279e6c70b08cad37cc42e42f0d57f809d0922d238a8f281d
-
SSDEEP
384:4+QfPFd9QZBC7mOdMMytKfpC5IgSnbmFe7AceL6ViLAPd:Zcd9QZBC7mOdMMXpC5I9nC4lPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000310bd483fc99ebccca72b81220343ee7254d035931ab302d3d0df5ec054902cd000000000e8000000002000020000000b9fb1b8b5cbfe725bc8b2b47c2542aa4727d8eef53b8267161ae26a0d1cc12bb200000008c8d9e910338c25bc131381a9acb6a80e4b42050724d6c189c3beb75bab3032a4000000069e8a3fe3961f922308d26abd94f777a17dcb5eb7c13c253df5a32919d9591da75bd68b57fa5a6598e313b72c13551fdc69c85a31b5016cd462f1d3d7df182a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6029746872cdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9315E321-3965-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426191256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28 PID 2072 wrote to memory of 2744 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7c5668a84d107121a0c7d23e39f4a3
SHA13583ea38a217225f41d88bab2ebfbf24afd0b498
SHA256b5c49061c9243392517744563c99360d102518c72b1193c633009e30ae42cde2
SHA512586151d984fae435224c796261f15ec5409e230db589efec423ade24e0a12bca19914054adc1fa852139b1e0b6ae6c8aef385f5b8081d0207afe4316e50caf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592922d70aee4294ad44b05ed3296b81f
SHA1839d8ce82b2e0fbed57ac0f32aadad6a2a04bb97
SHA256836dd8e06450032e8c9d42d6a84ed8cd2027666120ad98d6659f585837cdbbbf
SHA512b3a37ed5a63fa82c54d32e19b070fdf7d307d69b203a34f93816bb2968ee533813dd0e93ae48e2c685d0b065b795c9b34dc5f7423b025676dbec6d65d19f5a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52814ad513311007717843d91d7c1a06e
SHA1e1f566ad64aa9b41ab18ccd51156e68ee0df30d7
SHA2564a8e5edbbc3de0dd468e80d56f2a15ab5a377c17e0ecd52ed40de20f728fccf2
SHA51241249afedb167f4ecce569f679b8c6898a9651eee3181692f466d4551c87d7c098a0a302cf4fc839fbbe260d5c95f2572fec23dea3aa4bec4dc6baad340bdb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a50a95198f98159aa3881c190f27ef9
SHA109c6122d225f291d1d5875fb77ec833bbad4c049
SHA256712c7b0348719376c3cffca3823c13a0d9744e85a9012ed48d529fc774d76563
SHA5129b2a2c79995e2f9eb1fde36b32396fcbed67e619c7e657521195e32b53a57c9f550062959d2e6c690b84c8f1c69ff1cc6b2e855f044e76f02d1262f9d8092b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1b5db6abc69cbe39bf854284eba2a2
SHA1375e69f409540f74b3168fe249c8a0ea2d95986b
SHA2565fa5ffa4d5575593c330df48e4a7516332c077bed04fe9dd8e7f2adb96c0a8c5
SHA51250b07e2b6ce25a09b0461185168417e00ae745d5db7c986dc8823092e44d843a2482171b61fdd2348333436515203959a160810c74c8b2566e61f0507dcf9cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a07a8f49642265372caea7c95d1372
SHA10470d7b5cf25251ba40fb8717a19ff3d274be875
SHA25619d26203fb6b85e70bc5c5bab82c7effe2efcfc3ba297d6cac9dd155fb1c72df
SHA512a40692e87e259ba78740df666a58c100a4a40da76c207b1b260061c5cb55a68f37c2ab348d12cbd13ffa2778878f587fbca2cf43783a4189e52fc5b84a880297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ac5b2b03bd938ba1dcd658450e4b8c
SHA18b25e7512e51e5c9d0bcfb27ffc02d5d5906e697
SHA2561585933ae911597097806d9262ef96fdb5d62fe2989f4cabf2c83de68b0f48c2
SHA512f0e7c7e53e18d4bad5aa8296e7cbc3341159cb5636a76ab59c06db11c13060dc20a7018e9060eae1fd6e6e369be0de934cd473229510d85ff6600b89bb3b28a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54418b0000871423b4d7f810f6798b23c
SHA17e7ef9ab4610c1dbdf2e91438716dd4a3d40b26f
SHA256b1359202cdd5c0692763271edaf0d8896fce097330155dee5378aa9d97f34035
SHA5121ef7c224a5920b39ded3e4898af851b836edce037a8bd7e219ffc467276d25f76abf8400f4ac61cdce87b73851282dcee683d7a19b30917b6874c9b78e2d981c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38429c90d6d40b14bec60986d609722
SHA1bbd47242d6eda875397efa2f1811aa36775f5e25
SHA256ad5f0dd501ff46bb29bcc2791d38bb275a74421eb8c0199b7760240e28511c2c
SHA512666ea115e6a71fea50ac4c3dd471a242bb88dd22ce2f52e16d3faa7b97cf68e62a74b43f5a11686950dffc9adc3afd3372c5d4e10a349e8cccf2c15e04a90ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd1f0d41bbde0ba2ac0690e9ab25d9b
SHA1ffdaa787536e77f4e21852cbe40dfe9fdf8ad3b2
SHA256f83e71c025bf8db9e5bd4984db98913631ee40ad709c545512da232b836a366a
SHA512b0e1ae8871963b2af4fd3d71240c5b3ff8b4b7ec9702c9a3712e1fdfe1d3809bd5baa977f49b648fce1f9e2130c6e87dd69b27b93f1f2b818e52b637f66ab236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3f8b9ae37d06572f8789b6a49d516c
SHA18d6314a3f17beb0223877b735364a09badfe96f1
SHA2565e37b5c52ebf97f84b51451a34fccc85d983212fd130e0f01e1df7435b2f2406
SHA512f7d064d7c34f52391055da73cb86bfdf0154e92b308436033e37395d640d38980d55740d43acaab51f00dbba342aaaf9c3c8fbb5c36e3c33aa3fde3b134dde74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8a83e2ef1ed08b62c3ea356ef77540
SHA1c920cfe33f8c82bd70afa653576c53da5043947a
SHA256d14bad3bce9e29ad7459c4117927ec82e22d96e049b64827d545b5d61958dcd5
SHA512e7b03819d27d39e3c3f39c21d5d4d117193a0c447f12fbef03d04da25b008e81a624be4dff7dc99499e5971be92c5c58bfef9ec90df2387d3de54155b5c9f84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975af0b7b5ff93dc5149cbb5474db22d
SHA1f011c3a6d2857c6ad13d30ca0906206de57d90ae
SHA2560a50ab3a34beda9dce550770069b8458d46a9a90fa1bd3fd5a72189c847be2b9
SHA5127ecdfc783845546947821488021bf0ac3378b876fd5fc9fc267823310e8e2a0ba54c8d44f91cf761857eaf5e224c8375e0b5e530da03a6aa116f280718eb47ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2f9f700975c17e8bf035bc409f6972
SHA123255dca86cf8dde7074039755044198fcc0d2f2
SHA256b1c07434704a7e8568e70f8ecf6d8959c1d4ebe185cdf1ac8d4eab2da3beb6b7
SHA512e4ce31ee8ee2320876e0df98fd4ac4f8e3c1df97ec71b7b8d3ab6e2beddd2c75eceac0df1fbdb87017c6fa5640a380e7a374f15ca1d05aebd9e692bae65282fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070b1092dd56ee72c843898b1b2a1c3d
SHA1ee457a4fe1aa1d57895bfe348a6d0a060d130081
SHA25690fe17c48c71c72868a11228ed7d65548e86660886ee345eb82ffc4065530e21
SHA512bdd4ce72f9f5de6b6f2191c02ac444271be2e396a0592583e1ddfbee9f2086bc6c1055a98cac64e2710581a02b3fce121d25460a5aaf9e394d4d777ca18184d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b54a093295526c662dab39ff38d67d
SHA1a07c0086b396abebd7ff457b7cacfd5221d94d34
SHA2560cae7f45fbc0307b32c85284ce8b9aa8d4d8e97655ae56c0c8aac5834fadccaf
SHA5121bd7568a5609b98fce59bfbe9d0121ec4d3f0e65ed55b013c3f4f0731279a9408100c33a1981e36c17651a9496674ecf9e45342cb255d27ebf34a2b85069e448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514764275b3d34eadda6ff8ecf44e9f0e
SHA12a075a48635c7aeb60f44441b29080f9a00adfae
SHA256826ef566396afa5ac49851fa5508fc23e96007eb3ec40330abed297b9b671723
SHA5128d3c9d9232fa4e7297c590fc08b24f36fb533a3ec3dbfab7894ed699b45b6afed7e30c4a4ee3840ded88e956c4744d5656c3ae9e93cf63016831b58e562f879b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e704d73b14c8d30248c561f70f2ef4
SHA18de5fb210a9eeaea10aaabbf64e195223b6ef0af
SHA256cb3d219dff6bb5b8ab5928a9540f4e954a1cec8f3a2f33fc5c21c960eb6f4e78
SHA5123cf28a7eda17c05a69b4c85ea5d55fc0b0f362e7af6031f6e6e1be0f689c312de2bc83ca2101d2608ff0617c883d406d74173208c7136ea2057653d7b0831ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc071bf8338805f74adfd7ed8a7c433f
SHA102ce34b03bd5a7ad16327d07617872564109e07d
SHA2568df40a83fb73940b4b616b2626530f764cd6984d6ac34c934ce68046377a8290
SHA5126c1d6ffadbbc8d73380efbcd441add2a15e7633cba711fb76a8cd650efa431d82a4ce4df615ed6fa8c44345e077447d55fa8addf00f324e6b0b34c1167bc3303
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b