Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2bc6c4d2352235cfe6e68b28a6d5385b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2bc6c4d2352235cfe6e68b28a6d5385b_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2bc6c4d2352235cfe6e68b28a6d5385b_JaffaCakes118.html
-
Size
53KB
-
MD5
2bc6c4d2352235cfe6e68b28a6d5385b
-
SHA1
d384b7779d1076785cbeb29f81f171c5bb405b5e
-
SHA256
cf57936f76a9c741f26ca9786c6a4a5be8c5897966855d863bf32d614f266def
-
SHA512
0c82f0b843e7cd7e36e0b78d55de6c380fb6b145eb6f83539235f4d5ab33087c48a1a24a1946e64008ec7e603a5f4cdf9bd01ddc8f2aa22f135af161f274f72d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUprunlY963Nj+q5Vy0R0w2AzTICbbCoe/t9M/dNwIUTDmDl:CkgUiIakTqGivi+PyUprunlY963Nj+q7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000021ff5946601ce3e0cfddc3cd9356c694d835ac522fef313cd1daabce4cf91554000000000e8000000002000020000000301581a16f10378d4dc59fabd57244b17672f86b638a07bce691c94878675d6c200000005b14f63ab6f03dd2c15a92a79d053bc82d266acc00e8bd50838864d29adc128c400000001da34f131a4134a5e617f89a25ff1182d71abbfe64343a1722ef56e58c4c8d56bfe8bc605182313fa1bb0fc3084de3a652e3244cbe14b9a50e1813b36066f679 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06554fe4ad1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426614128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25D5D4A1-3D3E-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2180 800 iexplore.exe 30 PID 800 wrote to memory of 2180 800 iexplore.exe 30 PID 800 wrote to memory of 2180 800 iexplore.exe 30 PID 800 wrote to memory of 2180 800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bc6c4d2352235cfe6e68b28a6d5385b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e03b40bd09c25da9fa5a70dc6a677b3
SHA100778650f1da00b0a41f321aea520376f534e07a
SHA256685b6739114caeffff4c42dc7cfba34e9d88fdd2faca7d06b7fc7d3473750bb4
SHA5126436bf3f80ff1d553cd09d21df02729f0d7367355125c5ece68ab7b48f00ef9c8acc18ac93630af9fec308d60c51e2fdd389cc3885d6724cbc64b3c0efe442da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fce23fc2c7e81ef02739251173ef76
SHA1e62f124baf2845323c7b190d8bcaaa21e5db53dd
SHA2563410a0bcad0f5a0f93b5ef36271379a9e5fb000e13c29c9f47b007b4b604eb4f
SHA51241a337625f33dbbd9bb8801b5e702d5ca75585230b899f8cdae924a56bedf357b6c8377612bac3ed1301511c7e1ac50944c3f17d69be26eacf721e130819938d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd01bb2ed5f2bc37663734e5a9f474d
SHA199d5c03f72193364ed1f90f5b65f7e6460a957f8
SHA2562728135abcb3e17c0fddd323dd3b9f01169eacd1e872d8ba6e8445af7c500c02
SHA512363a9e48b8fe7e80252197b456f7fae4e97858e7031fad4ac62f33105feed026e891bd4145c3926d3ae3509cd7b60879faafc54b4cb50d05b4b97da5ec42adf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d785e23f1e54eab79c72bede1e219eeb
SHA1ecd596f9f48f2debf9520faadacfc47d523b684d
SHA256492fdf066da94b3c8e7cad9d4582fa24e9c0ff2864669cc8f48c2da4d13d8d2d
SHA51218424b0cf88f7e99e3471f6dab04e313028abfeb8c63d37709afdc75f295102c280971cb46282e884aecbfd66182b0c02db2d84593c37512b14ceaf3a0584d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801af6f800478fdf77997dafbc812708
SHA13fd11fbb2766cc048430fd1ba70fd9bf867dd833
SHA256241be65f966070641ce4e1719ed0b73854be7ce9a9daff057913b9ccec971d7c
SHA512b58a3ad0b0ac98361e5f3b02ecfa6bbce78414366702ee472ca20dbee101cdcdf76ab2d839657d5b09a028cb02b69ab55d92fdeeca2973fe064c2022e2a22ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4f83fca4c1d40aeb4dd873ac88072c
SHA14358c2a4e729a6b5cda2197b946fcf679594e229
SHA256e006e9af9d7be1367321427ddea2df187117c314482d32b7b8b590c28252bd2f
SHA512771e7e46438de7f9a5d2425fda325136ed721463209dc8cecca6c837873281a7eca941cf8dcdd9cecebcba1bd8730cf3cf3ab06441f164c32055553b7aee8780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532061218a9fa648aa395113923816f99
SHA1bb3bcd5f3f358127a3b887eb1092fbcc7a15a1bb
SHA2568afa6a1b8aa224d97dbaaac51df1c4ae6d8ad563bf5c6bb036930564179dbe97
SHA512746d90cb47c4f4cbb25718135e039303b73520c349e1a58981597259fca108bf5615985ecf16b7b9c4c6ff1bd66794628c97f6081a2d593aaf996a0300866ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79339cc08b4a1d684c9fb5472191a51
SHA15aa3aeff471cba7cd6efd777f39488b24cda7f82
SHA256986aacd95b5aa43468a8e193885462558837cf7313799b199e43ac3ff7d354aa
SHA512d5715ccd6f1c35e01d8a21cab7f60967cbcc14e5b42981e47631be26119ff6026018e4d79a826a03667f2bf8f04ce6074af9a88e0249d19541950231b58c29fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58093cb40c9d06a870ea52b75cdf0a426
SHA1433872110447b9fc67e2fc7065549d9111115823
SHA2560f3be4b85e863934c122df8ca6d7d96a9856c93cf0861ce68905895f316c05e0
SHA512249d2e004f0dd484f75a0484e219fff3ae224c3202724c750263b8235d7c302ead963e42c3b1debb3a5f462e62c6e6f8d0ce1ea497effd6e9492792297863684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e034d4f97d2d4db886f9c2ff9a3407
SHA1ba473d187cbaf5e5df9466b2dd2c4b9d7f233df4
SHA256ea1a1723d8f52428dff5c7f918d29537bb0e6301bccda8247aa23c5174e91e32
SHA51212f62efa1ee38f5fdfe4c3a55d0317d538dcbcc1dbbbd11dc717a98225560a2ca10b096d0d5f2fbfd6e28cae962cb73ce02b76823a7bd56cb56053531f7e02df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e86a0eca28134c375e223830d2fb966
SHA1c1c42409895c862d0c1ac33c47cd21dd13404b43
SHA256bbd085086748220167c1dadb7105d002f5b157eed5297caf983cd776a47b3004
SHA512d31b887482ec63f218296c1e508a93ebb28a6b74561365ac55ad2fcf219e8423d75e9093965e9c4829c5a0a01595232d17301642e32c421179f7224fe592a7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc23b8b8938f3a65eec977e5618475d
SHA1fd54febbd97dc2910e69cbe227ca87f979e970b1
SHA25690410c0cc36498129afa95c4c044bff38c788b71bf0c7df57dd2dc15797d7d16
SHA51286552a905407cff8a996bbbb4765d38461b2e57a47092741dd37f2ae4e3b5d5558232e8f452768ce8772d8968b7a6e144fe5c61ba25b354f2418886618fd0ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c897cb30c52e06a7983a7309621beaa6
SHA1c9936c3d3e9525ede68e3ffb51b1dec2a4caf180
SHA2563386cdd12fe95061b0779d7ff7f984dcf6deb2f11cf136160865496e0c04de7e
SHA512b3787f3a3dcd55c9f44b962be8488e336249429bd824a517cfba5d49ed069e3f5fc59ba2d3211909aad75ccb3cc38ef67bae74c14974a20ff31b473859fd28de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a0c041685be7b586af7512b00b0dc1
SHA1744fd3f0820bf80bd55f0f1dd55e00b594986231
SHA2568b910acc1a767fb5f2848cc2bfa28b486bd3888117df78a7386c096ab6eb3f46
SHA512778c768d987329e1c68a838bb118aacc4f1302aada7c744b67bda700e05ea1d08c93164fcb56d957c41a9ddacc82cbbe7989d848c5b3fdc7f22a6f74be6c934f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de60aea9c104ccdcf109c3568cd177d
SHA1fe9ba0e18bbe82bf49aa4dcbb7201b7066e76237
SHA256e6666f07fca6a37a1c0d24df5217357bd35ac20a4e1b4e54885e041c982e2eb1
SHA51283b786f13567c8f5905075012f17baaaea0c54d011a58d6e61fee41bb16526bff7c175060ad6faa2942931fa170f38dfeeb4f3e4aef5ead078af3f6e2ca83a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180fa6de077b56e87e8c670000a810cc
SHA1a0379efe94e86ec525490f78250de78dfb547fbd
SHA25639e022c40bd7ac62896ec69c0309ff9c7e5e28b9c92314c5cf1f8e0cec166ca2
SHA512b3c14e35630673af8c7e3172dd772181175022807f30d85f4d4b290b7fbb09900ebb7f32afe2fd3f97aa7e1425a00825f6654b216592cf728558dfd30e785897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efac9c3c3c320579832406cf12f14a9c
SHA1f827228e13c14e1b0921bfc38d6b0975a4870e76
SHA25654d3656e2d40c934c589355a5a5dbc8729568e5ed2bde57cac239a1b2161db0a
SHA512d31bde85fa331d6856a14d64d2f80623cf4d2e90c3a803ad3946b67bcf92759ca1ac7d1d742ec984186abb42e4706b9a75f38e7ba3e8c7c1448ce251c2b46846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bdce0e061c41f75d60d796fb56e052
SHA1ae8738b501c34704034a6fa84495273f3b608965
SHA256e6739bf4c78775fb5a146b6feaf900eac3a025c834e10e10d9878dc939be88b6
SHA51207b274b7d7a34251c786c4871841bbc0b27a312b8c15dca5946d40003668a6762d397cb4afefb3d8bc1e4a07a2a5121126bdc6f22d8e40d0fdcc3b90f9653f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9e1885d8c4273dbdf02d9389ad7e49
SHA1cd4303c5d608212567513b3a97fd18c0f9cd76d6
SHA256b01d8882e275569ce279004dd58fa6aea26d72a6131c84f0adaae8fd6a842ec7
SHA5129b4fa31c7674b7e15b974ab7cdfc124ae546c8b77df5660e52dbdb9b2f4ffa6c0aca4b483f7fd4e8d6612e70a75bd4d2ccc36211564d1a1e8fa5b951d145e147
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b