Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
26fdfd29b483e9ac1fbe282e101a09ce_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
26fdfd29b483e9ac1fbe282e101a09ce_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26fdfd29b483e9ac1fbe282e101a09ce_JaffaCakes118.html
-
Size
8KB
-
MD5
26fdfd29b483e9ac1fbe282e101a09ce
-
SHA1
3ab3295ce24f7be5afc7477fd53eac1ae5d74b3f
-
SHA256
f0de1bfb18c5248bd0ddd870a4e462c170e2dcea9b6b00706fb742e15964932c
-
SHA512
387ce683ac35bc3790d40f9d0d0362ca52a2e38d7cefd63fb7f8e1522ae93e91b27654698f2954afe898c5dfeeefa08ec6a83c5c03dc54290ed0e8d551f63d15
-
SSDEEP
192:FvIpdSQmeOqSUPbV4S5gMa33JgSeygdny397bdUb+E:FySdeOqSUTV4S5gMS3EpkJbdU9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000561512b54a8c2fa5d9a4404e9aec7c41bf8e57d7bd96b419654c7ec08582ed13000000000e800000000200002000000088fd415b169e670f4c7cb0a98e7ab586c6ac32ea8371fba4d58f820652079e8d2000000072dec1fa39064781dd0ffc1b72565ac87f80b5166c839f61b0acb32dd9d8c911400000009d700f120542bd8912bc06cf5b76ecb26a7b0b472195e30bda279e36ed2323e5b3aa98d58370af1f02fc14e83a08b12e5e73d36757f041b5f741f5bad86993ec iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208e6fd3efceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA966961-3AE2-11EF-9143-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426355068" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2352 2084 iexplore.exe 30 PID 2084 wrote to memory of 2352 2084 iexplore.exe 30 PID 2084 wrote to memory of 2352 2084 iexplore.exe 30 PID 2084 wrote to memory of 2352 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26fdfd29b483e9ac1fbe282e101a09ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561198a1582fbd29a4a631543c06a01df
SHA11c12e69b4289016efff0abbffbb079a858e35353
SHA25653f325b52923231f3cb3aab92b8a439bc8bab4091afc8600e855f62c367abd4e
SHA512a4129e88713c18d8ea59a31b96b8dcee9baf295269180261cb6a11baa366eb42ad7f37b59fc29bd0022a47db4c22f40ec2e7800cf4c7470c27c5636335644e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d7b00b7cc21dfc02ac5adc5eb49ce8
SHA179009f29baf6e6d519bd2ad3f7753efd59389297
SHA2567c7acc13ec2d48930790af171c68d25fbd6c7dbde69b9ceb35f061c37e875aa7
SHA51263acc5000ac6221969f4a6ec323fc337543a99d94e6c230139b134e5296c4d3c9417a865c4186013177666c3d9c5a689cd0892c4d997f13eef26abb98f77edd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11bb07470754d6388fa8bb519be4a2d
SHA1057f918b070c38fbe37a62fcc3a2a5fb29a72423
SHA2566496484848a13f3b154c5c998807ac66b57ef3d0ddda216e421928e579b61477
SHA5129984a7085cc92fc7eee9d462223153f4ad270880f941092e10b87fc73845b45ffb2e1fb5e39c3ca23e1722b2fc3b6a5d045b5a925311385ab424b939b57420c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e71b1f2659997e25b998f4225574fe0
SHA11a574cdfa242b4b9ea1697c954c001bb8ea3d717
SHA2566ac6414ec44e8bd83287aef4c80a1c225c3175a225885e98dcb90a5450b228b1
SHA512519e74b65f31e8c9118ffce151ac00f091f53a0dfc70d07d935b1a4307c75174dfb3f6ac48f710f87d5f7ae28a104f86a675a94226a5eefdb3a48fff3c6350c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eba3f95809553c53ff4e7df667256f2
SHA1dfb7e25bdd722ead0e21d6d1e34009fed28d81f9
SHA2561ea39281132bdbf1ee8ecd7423cf0e8f1d3be4d4dd5135061b35593e62ef0f2e
SHA512e5b6e649706526e87eafc65cf8004a0c27231a36b8061bdefd085e63ae26065e991e59af8daf88ab3212e75e3e075003f25fda7dec3314102227aff574c429af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296f35441fd57d551f0e4418581c6e9f
SHA182ece3c3ad508479f63db6afa7df2a91cd96df13
SHA256ac900447adb2444dbe1131cefb9a42493d3dadab3b39c0c1c5881675f13222c1
SHA5124077f1203622bcfb3a5144ecd27758efe4c7861f375879207bbf0b9ae47eff968ff75aa7d687361045c584e7b0052cac31591e5c56f30e4e9320ca3a3d93e6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965b1f561f19a7db4f80c06738498ab8
SHA183594abca7dcc7490174128a756d9c14832a6bc5
SHA2562edd2c5e0974828759b8b3141a14ec9005c052ff1805e9fb5cdb3adcad42e1bb
SHA51291365d2d50f7db5bee57045ef0dca79165a879db2864e64b96c3ec43fa1e007b57d531470a0e1d1089ebfc3ff258b807e21c8f3f9c6a3ae953751dd8fdec75b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0a52e32781492f50ccc99e7f84920c
SHA127484d9f2fc2df555ba733916bb167cd95cbb6a0
SHA25699a7222ec4bff055b895563f0cd3f8c4941ff646b6bc76d6e1e64ecacbe31882
SHA512f2f6f1147874d92a2dd174c9919112b94589a442b60905155c87dabbd1d5dee79617f0469364140b645161347246fd3abcd919a03efa07b70621bdb53f001cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d39c109148f48144627f9c4cbcbb60
SHA1193be2d73c7c56c78292f81532e690785536909e
SHA2562efa5af4cc40e1091fd9116d826863f7962f9136d7976be31c8287e87799c604
SHA5123e0f931e0d6ff5a3ea68b0ade1a8797b7d72a50e5f3ba1f9873c2d27f9526dd919e28420279fe311c8e1ddf03a8cffba255450849b07c7f67f4ccd4309ead7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f3b4f64df52706a9423ea3923f6b58
SHA13024fb7ac6a987b5302eda86c90e5884a6d2f58d
SHA2565959c49040aa481d61d2c60d25e3aeadfc01d05bd95472615e2c6d66d73a7808
SHA512eb7058c93ff0b1a51df9f5a2a68dada6fae635848d82ac1546ee0ce387f3237cbc9ef54e89561e250962caf61a43bcf40507372f7d223c014cc4410675ae5239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fb9b6c5a8c5d3daa01a8d4801d4f19
SHA1815d4112af500edb9fd795dc03917756b6a7f2e1
SHA256ad71a9948bab3c37a048ed59664a062a2d50bdc518c7f7c31731b0ac1c49b857
SHA5125fd53ac8c94a9c89b2256af5df37c9d29b32d150b5fe341e120286cff23a837759b10ce02a8760955274e3eb884909f5b4b773c03c99058469d645f6087f1665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995b44121233b4d83322748f24a1a81c
SHA1afbb2845e84f2d6c2908872f98dfb2f8ef026e0a
SHA256f21e844ed7c3b714b9915b880bfb38cb06e85e97f26b8573f37bb71066fbffd7
SHA5125f8ca2d13008c94f9c995db15cc7a7329c0be1862d930c4577d7ca891bf6339533ec41ddbc54b3fb38ed67aa71f077b13595d24dac0de05725dcefac33e34f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fe8949b96eae24e5cd8f98d24fdd16
SHA16876fbd4037f0806f7acf13db45bada4dd4a2f46
SHA256b952107a5e42c67f91492c1f2e3b17eb3ab21b75bd5ea987ab936003c7ca6af4
SHA5121e146f14158ceae9cd2d4b0af0609ed75a1f20e3a42c3581967c16a47e34c7918e37aae240dc4b2d29bb5f2e063cbb680a868374c71a79ad461e8e35ab92c213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540b4efd7c040096552db9ac3c33641b
SHA17a7c4a8cb88a3c6d7c0d9bbefcea38011d925196
SHA2568f68a7c0d54840356aa4de210e35bc201ebe79e3dca6b016ae532d7d095d2467
SHA5124a282f75045788f7ee57204e890dc94b81570e37ec50f5445d3ed8beed26b7a9aec67f63fe09287bc1b562f697ba3b7b606868dc9e0bf5610e82f03b94ace442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6644dec81d2e77bb0ed1d769e4d82f
SHA12cc6b55381c0abf80db74d4212b89127e8c1a529
SHA256cb5d349cc50eb6b28ab60191f297176bf988e072314f375a9a7270f0de9f2cb4
SHA512b565d22cd584297f4d9034a1e2edc9b89ed22c5e045420e3bf70f785441e05cb15f1404ccdb3f79fea9ace2267802a74ad9d5a4b7186f7a0ce0de118410ee008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4217e5fcf3e1a8a9d57ebcc30d36ca1
SHA133d79673dd2386a45c51e0a236a89b44fd5dcb38
SHA256b6e7130f76f8421d7fd71d7d76adc015a3876c4566c42352a4f7433a9575f6bf
SHA51216f4c27954c6dc91de1afb7d714898fa7f87972f2445d40e82f6dce80d638bf3b508058024380eb58407f239b37ea53a71cf21880fbdac984c732349a8d31d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff4bf0169ac8ec2e08c336f8cc99b6d
SHA1fb054fdc4f2093c2453a426f58da3400a3060718
SHA256ee74f35abf1fbeb941573a86fdf13fac95b33dd71b7b34afce1781975bbd4155
SHA5128464f2eb547a140f89b5def9ca4807445d0d030df49663d8aef920d943828d245dfbe0ab768a5e95247dd766d27a3efdaf2a28b7f3fa0aa450daf35f9f7ada7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa4c57026b06b979e35ac49e38b5abf
SHA1a468921e0bed1bb26989d63ce7d22ac8859ed947
SHA256e0b9911b2913381e895e8790d490f50a381e5aa6e345778c2f85ff68a9d20864
SHA5129c8958216630839b9d06648f5071a95aa139dc0f812afa92b2fdb82417265fbe4d20a9eb81bf3e8305c468f2046abbd899fbeb969199bcd52a912b816fcb7d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7ff84e5d1d1c80cc4c68464cbfa516
SHA10dc35a1cc0f39d8ba9571908873efaad5981ec59
SHA256901619bb21412e7bf7452db6140b1f1e9b2c087bc85eb0269c97990591e00f98
SHA5122445ec3cb01409369966a3c3bbe8ee7b08c37e30d3771caf46b187bf64da9406d63dd7dc3116555b5f90d5f417691f7abe05bdfda276ced02895c17335b64b38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b