Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
27d3266bf7ca97ce2726d3bff5427416_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27d3266bf7ca97ce2726d3bff5427416_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
27d3266bf7ca97ce2726d3bff5427416_JaffaCakes118.html
-
Size
57KB
-
MD5
27d3266bf7ca97ce2726d3bff5427416
-
SHA1
fe4eaa960add0097cc90419665d48570dc2dee9a
-
SHA256
485cc4ec432cea495c97923120e7d6d7c4f078648fc6221bc1dd32f0c036be9a
-
SHA512
0f1d58e7a072045bbb591e7d434c3f6e9ddeda1627a150a58e506d45993a3e77f4050b6067b0990e4f6dca4d9a7cc2480c25aa1dd87dc39472e243bb8ed6aa9f
-
SSDEEP
1536:gQZBCCOdK0IxCgR9bf5fYfGfKf2fLfqfCfmfwfgfhfufUfxf1fGfUfZfXfHfafOk:gk2o0IxzRQey+DyauoopWcJtuMBPvCmk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426414732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E48B7711-3B6D-11EF-8CEC-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005c57bfcd1e7e440a7c87d402416af04fcaef5f24d1cf9107564a4797d3eabd06000000000e8000000002000020000000054216020073305d3a70f9b2ca9d55545935d8fdf52ca972c5eac2a964b8c02d2000000018b4a60b4512c9615baef27e1fd44bde6bbf7d214ba82654315eca2fb4107732400000001eaf036de3816fa57fcc53303f45488f9221123718306accc190378bbd84991d7c443eadfd57e70e83e48a64fd539b3cb38b64de2568a778c9f887c8be8fb267 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307e25ba7acfda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2976 2772 iexplore.exe 30 PID 2772 wrote to memory of 2976 2772 iexplore.exe 30 PID 2772 wrote to memory of 2976 2772 iexplore.exe 30 PID 2772 wrote to memory of 2976 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27d3266bf7ca97ce2726d3bff5427416_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa6c3063162c9a8d53aac8489fed932
SHA10c9776e62f87dbca84da0ccb7bf9ed0aa0aac338
SHA2568a4e1a7118fc5c5ff0eab48086052e37e058d0cffaa3bb91622a37c137ac819f
SHA512c28989ab2e743cb26b78696e0d5cc01162a0e1ad277c32a637a43b6f762f9cffce7116e9020299f55779ce4a3a1ec41d428dde7d3838563bd7db6fb9c35a782c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0a0157b07f07b4eed007d862aca74c
SHA165bbf8ac4f7417ff7014e22a7cc9c430d5430b66
SHA25697ae8725b1ddfe7327e5c90460dc741c92ea2b9cba736e1d19e1f19976d668a0
SHA51229ec53ef89ad532572106b29babe84cab3f6e6a350479367215ad5e922dfa837e172c3ffcdb852da9dca0bdc6cc0e0e7bce5633cb6ebae200d340d4758694883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350be0821ee7ae6506428362145240b3
SHA158aa6ca554ef0c8cdba1f1ab4e4ce45472ce5853
SHA256690417eac835c74919aae30430009472b949af7f62aed7e95cc626921e591abe
SHA5122cd4be4490525662cc0ac598e77f549c9d1e17e466249c6bfc8bfe8e409c5a2c96f2cc6932f645cdb02997a5781e2dbbd77a6dd828d6cb0a260700b832b7b2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae951c42a25e37cecbd02c27050444f
SHA1b467d1b94ff0ce45291202a8e686d0cba4608547
SHA256d17e849c0fe2208052c2a6e638366c36332a816a5e55107dafe8eea70d1f6860
SHA51272bb06998314d67079bf64c7db473b24a563feaff782cf8c5e941a409a4d92cc6ed68b96a80824aafdb2ffec347ae89add259a5c2c038f2cef4ade894c689ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3f8e64784799e9ca5a3f7c76630f47
SHA194d26da9f45b337311a00c3381b750be359115f6
SHA256b0939e5f4ec28c546cd82b13e44d31a3a162ba1443be3b640d948cc0b8b18559
SHA512ba49c44530e7e1f7e00252b37db1c51f5b773949fbbd2ba334435ba2ee73506473e15eba711c5c5c5f38dbea48c99310bf6e92136c51d04f46a7a4c7c23f93f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfde4c26069241ae046e4987fae797d6
SHA10bd12e535ed707a0d707924dd5bf9c937170e668
SHA25649f122235a09f0d59e4a287c908edacf7ba205ab9d78e24052018229ba5512d4
SHA512c39160c50a950dbe573caf887f5e809d64fbbfecc3f1011a144cc25bea2016f0348e25fe42e00f7352754f198c9863d1ae23a4088a2c93754931dff474e4c7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311ff85543317105fc53678e4b147c39
SHA199db000b8be87cd7bbb63ce2e10104df90013232
SHA256ecce7b10fcc877b35a41173f17da2b87e90c528cc1a1e9ba10fc38513cf85e7d
SHA512f8b6de4ae657f6ee8e11588cdf357a616c7b2710b7b36ce5c0648fff027f8f0fdb240584f618d7c0dd535ab714603da6f719a3be788798028c5015bdc32e6f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c025ecdc67e6387dc7fe56c1adf6bc
SHA10864b9e6e15894a1bcc42cca51129f31454736cd
SHA25663b185f94b533bc131e2f5003c47465d45675433524b3cdc79630e3c70a2bac5
SHA51282fc7c95804a7469f47aa30f88a46522d68699563f6a6cb298dfe43e9832be36bf6b838e213819356446d976cc72cb7633273334ab89194c932d324d97472fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d028b3ced7cdee8843d8014c93adbf29
SHA1762364127a694b20e246bc748b1a720a62ba1f28
SHA256f36285197c9eb4bb11bb1e562dfa6b5cb9ce9e6620838e4e048bcb07287b4ded
SHA512c8c14f6455880c9e95339890a053bdc2c8f1d1a47cc9f9a80fd21b1f676624239befdbfa8996bd12ffdef6d4deea031312707960cff775843ec802c0ae33418f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb873309c6b64c5a948a7d6c7305b566
SHA1b89316cfdb43d982f8b10189a3f397d714031b4e
SHA256db1c4f7502f680e3135bc7f499a0b16b3756f4c7d942c49a7499f783ba541e53
SHA5124f72321af9f85435c313599bbc8ea368fba5e903cd8191abe36371fa58e5128b1598191a8b2a1df5fb5648d706bcd82142f0d53f59c9d528dec6416300e49139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad17eee34c5f662ef7303e343b9e6d0f
SHA1efe064181bc0e7c0dbdada34790976675c26e0aa
SHA25650e6e1ef09f737b4c7b6c7f5fef805aa8313eaa820c8109cda28631416829964
SHA5128df163745a37bef82f4ec519dee8c2cf5b8c354f2760f9e9ea2057aad080f5a238a1546926f9797a9476c1e9db26c8e2f7435b58d1760d530a0246c3b391306b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a9e5f678e734a0c10853f981229f5f
SHA1a1ac14a601d2af4f2af0e46f07a00c69915c57ea
SHA256c66dc0ef33256e4ffb4c213e49bee4a9e1845249acb5ce5c0054d36654b94344
SHA512a6774cca2288f0dd2b1dc42ca8197e7cd9006733a66bb04b6acfade3877ce11f485440da0f07121e24fb8faca3dd1a6e856e008156dff062c24a6943da1933a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b86f56da8d80c039ee7200acdf3a65
SHA18dcc7be229f20bac262bbc20fe589f5c1c5d0c65
SHA2566dc8826a1fecbbb90073d0bfb28702d27743ef5be6618b8f0e7b3871484c90a2
SHA5123479298082e7eeaa44e027d8a19839d913c86ab0d106ac055b8654ecb8ba4631b86af0bfaea44a2a210687b21d9f5f2270b8831d91cb58d9f3d53b022af231c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7713409be18d8ff71d991cd8ebb982
SHA1d6acf9f30a3d3637eb4a54d2d73eedd040b8ac98
SHA256e09461f8becca8c94ae08c983e4c6adfd2a817b851b1b46d6002435ace2d4e26
SHA512c0058eb1a612b42958dc5b5f5e361313421cc21d1a72cceed930da7bce7081b47c904b6e689750dc95f3890121daeb14c6dc2de81ec54cc695a9630098e9da5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb65cfb30c7ba33b4a0cc68ec2dd53f
SHA1f206b2f865f607b041785e99e05d1324aec1b40e
SHA256e99b2494d0ca9fc295645568fa57f61092272c6a24855cc754b12bc59ea85cda
SHA5124a16ab70d4f9f9fc4b459f8d1d09a82d9df72ae2c8d64753cf61ee17a4cf4d9ce4c74453cd53119e3215b3494cffab194c6f9d192315fb22ede72a37138b75ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505071c9c32519e1f3886f1cbfdd4c76c
SHA1910c27d802ab933bb4140a08e31f15205df094b5
SHA256c72155f240528297569df31bc16b41d139d04e83319683a07679db413ab50a49
SHA512e756c7e999e0f80581b890a0fd31fa0b404115477a1d05b7c3592dcc43a86397a04d4d4f2856129c23a24e9342ad2fc961287459aa0129641c69556482a23e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e01f75d0c5d91b3de0fd59216e8736
SHA145235abfc2c463fb1e7dcbd8efb3a5e6387452fd
SHA25608c2dc9c526771c797cb6bc980c7abcfa35693ea32684f4c603eae8008f68233
SHA5120e76456ad2c9d2162f6447980e28f3b10c378c3be301fe317925c302712150a8bf6fd79542ffca840710f10ebdf3997ada440b10c4f2811737b3cd498610b4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399f38a8bd5260229103c41b98e5da41
SHA1d5ba69811b6fb1ac23a3211824380e7d265b8765
SHA256f6cf9865514991da7fb32adbee6ef908b58e5947162f061a50aab59d6cf898c6
SHA512e3c7c355b1df354ebb59c1be9df669cbf8fbb700f2a29301668808647b05c75ae2bed08b0ce94baf35314177dce2f953066db6fc47219db25e2e0b39893e21bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f067e16f66dccdd46aa6fe404d6c91f7
SHA13482b2c715c09308524599df0098ef11a6159c20
SHA25698f0d0edce9e8ffb59a502c868b2d71dd15a00eabe5a2924e4cb5f7de23eaf95
SHA512c326020a756de461834c811d77af64b9c10a804b58528a875a9f6f1428662bf6e8b9483c9d70e0c794ea46085a8abb7482575a373cbc6de9887a691249b58177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdcb1d062dab7dd52fc24b4ffcea7e4
SHA16c5a66473ddc06d2090a86ec34ed64b3f6a823b3
SHA256563e77b08a3168a069279c03be234eee778401ef15ee87f13806db7c38cc37dd
SHA5125eea564f868e56c49b60c14b10a823bc291a5ba5f06ea78576dd8df944561eae4e35eb23810e39362e0e7633c1bd44e8c5c909068b79095b3bab06fd36f0d50a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b