Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
23947edd087dd5622f372eaf4303984e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23947edd087dd5622f372eaf4303984e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
23947edd087dd5622f372eaf4303984e_JaffaCakes118.html
-
Size
7KB
-
MD5
23947edd087dd5622f372eaf4303984e
-
SHA1
25f0a1a435b7dacb61a13ead16a591ac4a08f707
-
SHA256
5b0caa32e01ba268f5651afeadf69478c419bf93b2f0c8c4902883afdc990cf5
-
SHA512
ddf38ca3269e64e0ea3787772241cf0bf2292368c5e7bb02af0a9485c0f0fd8382377d9de493a44b186ec5b93b1c2c65c1bf85e91f1c95969930963fa1a36e2d
-
SSDEEP
96:SIniwv0HXt08IMnoXKjl63GL4X9U7tIm6DTIBDD4HsfuyxCDeD4XKQrgFf1Gj2w5:SIniwvePfo6olKGmNvfu046uw1aPvei
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a47867b2e867944a5a74777345bd6c200000000020000000000106600000001000020000000655881fe1156c0f633d87ccad1b5de272ce8aa5085ad9aee1ac1ec652c30c204000000000e80000000020000200000005153c8d12f9ee1fb95aaadeec2f98fa5e10d21586737f2148f8dff914d4d99ac200000005c7f544a9ed8567e1a95447e310230fcd134ed23a04e8b8e2c3c17681a74f3e540000000414a01e37fc7703c7e418d2d50e0edb4d3377bb09c239475b7a1fbd6ada971ebd92358d06ff2a0d0cd4783296d34b2a7ad2534ef05488e294c02f74c7e2c1435 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3152D411-3977-11EF-9591-6A83D32C515E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426198824" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0464a3884cdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28 PID 2968 wrote to memory of 3020 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23947edd087dd5622f372eaf4303984e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a525e0a3f83ffff1d0574c082cf38b6
SHA1064cbb6d101ecb195f3ebafb77bb5c832ddf52a8
SHA2567cfc67b0919c106686151bc4cfa26b073ec3c029ee272ae097200b402eeb75b3
SHA5123df4cc8fe692935c4be9f87bae94f930649a116bc400fce92f27cd2e8a4bcbb9d702963c192801367463490ed4a6a07b1d9c24494ec25640288e38725ee1723b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b23a2a5aa4785a3944ee620ceb23948
SHA1ed04d4bf6f95d39391fd1b9f93c4e06571a08f2a
SHA256f04fbc5766161b7d194c48c6b170309d1dba57dd7396db35190667bda99dff8a
SHA512ebb0ca3b6eb4000d2734a800f2e02ee5f7273cb54de0f84ff782cb89acf994aa91e582678be93926eb2a3155e43b5c6f3b2f3ebee25303e321f7c210d3ed8426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a912b091fa1daccaaadbbe71f6ced19a
SHA182639a8ea06b3dcfc5e4f2d823a0bb378eaac6cf
SHA2563457d6ebd2832b642ffa3ac0830a83a4e491affa5ba899bf32a48eab4e5425b2
SHA5125968045d3fb21e482af50a8f6c90e3f4ae6b745a714fc9737595b0cc556febf97bfe7808b4c3870e9f4eeb3647bdfd23a03030769136a9b1e4bbb8d7a501d438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac05c62b32bba89f754c1da1c4b6b8c
SHA1d71d93d33469b0a34c435683d49964428527e8c7
SHA25667503723f10aab2d97154397d3a5eca09a3cc0cff508a21d8c76a1488f27d581
SHA5123d7a37ba8bb36e393c2c7af5718826f9c127ac78ade81d1014a6f90c8d3d2f0a4a54093af5d05cc4b70331071b71745d8b8755aed352a8f08abd8e83a69406f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cac187f8cb1fe678289de960074fd33
SHA17cf711861a641c300c2b0eee6a269ef231f97c3e
SHA25627f3cd6e4eef40f08428cd659de243c8be2b9f8c8fecdc34e811499c92756d33
SHA5127dd11ee7491ecd6d83e86c49de8a6f9a1f984cd69156f13e8976ecf09c491f6ac065ce280b1866a8367be3ea9a160b045bc8adefb33ea47394f63f55847ebe7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53123a8eca25e9319ca615cf825eee1ab
SHA122f91b56644c413583e3933677a8b78662bcebf8
SHA256d8422cd18eaff13b62a602c06516a7f16962fe3f99d6a9fdbf89b8d7d61d9452
SHA512eaba46d83ea5322dd251f0281b0d7c2cbebd396f24751895a42f258539a73e037a8b3a8aa7111629ebad8510067b15ccbcb8b9967ab5be27eca3ee20739d87a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d35c5cba2637dea5f3a7e3fef97556
SHA1c6a203b67b87982c7df0b46438092fe9595834e4
SHA256297eaed5863028097d6ec3c0caf524cb94d3e9d006952130c3af401dfc12e9bd
SHA5122f3b09aa48c50f83431aad4c6418125463b4d0cf44cae71fee17ef0b601185b419fd676313595498881bbd8f69cbc392b213981b6dacd3199addc97db500de9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949eb0788f376b1c378b0c4db05b1f68
SHA1cb08bfa425980f64a50ebcfaa0538d6917af3079
SHA256c2e5dd8a35c1be011aa413ca76dca993121f0d09e69a6ae47e2b1e60fb3427fd
SHA51274f5295bbc8fde81b80fb4ccc0d4076e92a53f84009531b26c9b5d9c9b30e5ba26091559b479fda1e962f5ecf4f3b83f9b558345a7037ece250f47565e123df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3f446d2c40134e00e6bdd34f737ada
SHA12132747de62410ea3457d4a88729a9bf8de59a2f
SHA2568b2cdb32f3164bcff71a8bb471886ffdb78a6714a4f49083082b5641628fcd6d
SHA51214a749bf9d6b67edeff62800ed1f0401f3f354115990ade70256f53b3f7b64c9c805a7435ff16d4b8ee60b57ffaeb60edde2d2bad65d351d553ee9c2aad24bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f4a5f012909e9749e67503d610335a
SHA1c3113cdceafb5f62de2abe6d7f35c1523f0588b9
SHA256a2c336fc12c8eb70f9def5db09d5763dea14e6478e35552fdbe1a5d6a50337a5
SHA512df04188cddaf2805c9fc33118badb18ff5098e51453d7482301d9162c5e4879f74995d4a3da106722965f639f8308ccd7387c0e7c92028ae0d0794392cf89818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1fbec216ad78e38e8815741ff347ad
SHA13123ee6c297a9348704a6834ef867a720cfd3954
SHA25686a08300267fa314cf62a8a45e5c219d5579416392b9af28f68fa9cce8238185
SHA5129c9d7735336e833d7e3375e142b7e0718c6c226c97e0e30ab2cd6e725abdc295e57b53b1cb69df460d1880a2bbff04fd4688a0fee5b55d97afe5fbe76672b128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a71020a48e1ae6701ef78fba2dc093
SHA154050bd9dbf03e0a4811f4a18c01a30c291b3520
SHA25665497610371858b128a461b2c237ab717c3aec66f934753e3495864fc568299e
SHA512bc70ebead6b6881f4acf9f236a02fbebb262c7de19ad4ceca8755c74a00fd8e15285def6cc4f9da57939eb4f5df5c6c91708095ab88a16221985c47651d7b738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cfabf4396e57fb8112ddad0da3dbe4
SHA19e79fc03c2023035a3a9d0489dcba14e29b86913
SHA256cd93d4b7d0aff9818683efc319d6161a65c49027f0069f9a81b6f0b07e718025
SHA512239d494ed4186643cc689ff76b4b2b953ffa4022eb23a60500f3e73c6030c718c01c5c08d8bf3d8ad6186a0e01e1cf41db1ce822191f67839c69e4ec76de00c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9368cf0eb15fb605f0d7973b148cc7b
SHA16d03950da7e6232f3d9d9f9e6e5d8dfc657da576
SHA256e932a3b308ab989534314b9dce2f6ba52966904a1b061a4069ed04c6d8b8328b
SHA512f4af9829ee448939195f2bed0020fd66b6b80ac87b5de90a60f5dfafebddab1c4231e183d24baac36ef30c4e7bc1932b84fee17148d1aeb5621799ba0f16a94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520298166667e8cf7260fb5de96c77e42
SHA158a51a12fbd359e88859d182bb4e23d5389e1572
SHA256d15b7f81303ba307cf761e2ccc4feae32174dcce523dcdc7ec2b5704e8180930
SHA512fc67429f403cbf60028d1a3a715f6a04bea0ae3162a9419e422b184a3342f2c397aadb14002e2ba74147149e3df24ffcb28842be77bf2b833e09a190e530799a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ca922e169543ddad3f0bc8c6aca353
SHA1851db17d35eea6fb99f9981917e4aadd8d803167
SHA256382d27c133906d1f4683f69f209c5023c1dd4a2def77b7cd92f7f697c8d049be
SHA512bf4a9ef78bbd9bf82fdb42bebb39ecf63299e11a199536ba99c5c99032a5f8f9a9bb7a41d59598f2c1f3680d89caf4f4769a08bb9c7f5a71bf7e969334d6821a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c693153ea3ebeaf9e309c735a7aa90
SHA1f4ef261dc64ac623629b40589ff92d851b4ce2cc
SHA256e0edbfc62c281e42dd3556a238630eda8771020ad64713aa5980e4c86f41db32
SHA512ad12b0ed848ead57f0b28a9fa9ec3d56ea306a4acff6e4129c0bf6f1c09aee0b040beb256de0ba39d93ed9a2a9fe79ed2b3a8ff0641169e6f29862fd20807e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b11c8a2c6341e5ef0eef3f8cf931b4
SHA1069bdfdfafbace3d3ee89ba5c689aa6140697a4a
SHA256dd451a3df7d3cc0818bf71f9ad94ee2d114823b1ab6077b356af1afa82fa8b7e
SHA5121110737a45d07e0c76f9250d562ba5f71af8a335c7ac74f79a160d2f1685bb997716186d6b8f08d9352a0134132ccc39fab58fe1b4291a479ef40ee4a363f351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be65976f1a802f816e608fa7e21948f5
SHA1970de11ebae58b585dfc38f70db80fa564b5b13a
SHA25614143816f9df85928e2e2520d944f460cf71f90040b20900b3a6cc5e2e935951
SHA51290ea399b4ee05ae98d8329f81b875b7e8b0b2773db808850b5b6fb3afaf368b1c0655ba2c2ccef86da4e22e05e3c00efe318b9018fa3484ea9ed941ef5bd9dbc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b