Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
2c0a0f8236a9d88c3aae243649abd2b5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2c0a0f8236a9d88c3aae243649abd2b5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2c0a0f8236a9d88c3aae243649abd2b5_JaffaCakes118.html
-
Size
53KB
-
MD5
2c0a0f8236a9d88c3aae243649abd2b5
-
SHA1
721fbaf50f88ce707ad30ba7f03a812526e79204
-
SHA256
cc9a2b93ff3264268f9dc764b4f0faca2ff372965b39ecb624525247f0791487
-
SHA512
a20b69ed2adc5b9f7ec4973e0d27a280195c24a3ac302f5f0741cecf071804f656f737a9f289c9b6664eeb34accc3bf97c53ea02526507ed9fde100785b0ed32
-
SSDEEP
1536:CkgUiIakTqGivi+PyUI5runlYr63Nj+q5Vy0R0w2AzTICbbOo4/t9M/dNwIUTDmR:CkgUiIakTqGivi+PyUOrunlYr63Nj+qB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e939225fd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000002c70dc57c2c88f8aa82e8c4df8cad4c2517383e1c7d430d90ba2fa74ec9dcc0b000000000e80000000020000200000005a02e324968db0bfcfb8dd864ee1229d03484b14e0c9d4ecd93c904ced251b2c20000000db7812c7b505201df315a70237dbdb719070cf7fc8a357482aaa342bd9cab4684000000009968c9ddd60997cf0a92b14b6441724c7783381ec95cac83755ce6e99f64dbc627cb3434d35f46b55f56429009407186a7b03614c82cd3fa1557987a056760c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426622783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4CAC9C81-3D52-11EF-B4E9-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2568 2816 iexplore.exe 31 PID 2816 wrote to memory of 2568 2816 iexplore.exe 31 PID 2816 wrote to memory of 2568 2816 iexplore.exe 31 PID 2816 wrote to memory of 2568 2816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c0a0f8236a9d88c3aae243649abd2b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af88e92713b3d50cce3223dfee1e81ec
SHA15fda7a69670494587de814e46a1f1632f5440f86
SHA256a49e7552c3cbbd66ecc9adbe4aac06d7028f90efc4f8abb5263ddc301c143e16
SHA512f063bcd0b4db2559acb2227893b0b25a4ca324f577de5ba3b2777301c5557f1367b6df53b2d24714907df972e0b54364aa7f3505991d16458369f6b27171cbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55838c0f02778da25f6add141b816d664
SHA16d5c9519c0f0910fe8996e82b0aa3eb05ad31375
SHA25630d6534b91e6121f9d65451dff645434787f0c59a9f2c0941bf759aa2a5c9cf4
SHA5127dfe2734e2fe2bac8b3170405ee792b081354f13ebbda7e0d53506a28e77275c3c1368031c1afccf45dc6cd24382e45248ccb86ee07fb9d905af321ab18de503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff9641d732ae7825346051310dfbafb
SHA136ff6d2bf3fd5b297f48de7a581e3a8d6813dd76
SHA25693afa53a849adf5d1c71e25dd00359304d8bb31d15fe5aa99db402f7b32775f4
SHA51238ff979e30e5d6c859cf1ed7eddeebad5bc4a9679ddc0ae8ae71663ab1b37cc788337c9eb37217f52cf1ce2e5e90e7071db4e77ec8f17c0c31066114e4af0016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d88ed27c4324750b1abd2c5be79bc4
SHA187fd11b8e28c72313634aaf29ff8cc950303c0e9
SHA256bc2f1c42934dc9211877b158d99d0056ab643a9daec50c3468f8d3d16db1cfec
SHA512b3801cabbc50ddae78ebfc953e5c0bce298187f600fa48cb64ca9405368ef08553187c87d5af42aa8017440fd6f769282ed9fc96b6f4c9bac88cf2a450d45409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decc83f8949dc5ecf899dedb8ed0ed8c
SHA1fdade1997754ce81daf1682e5846ae77261abcff
SHA2563b1b878fe4f50addfbfb0e47384caf62050fab7d0149d674b952f1a1ef02a0dc
SHA5129c3d2b6fa7edb55d26a8d975520a4053ffc331ccd116e874763475cea5895718cbcf4cf4f3191154a3aed2c071f8249245e4da3f2366be6b967b4e44de905c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91d4930def30c899ffadc1cc463628a
SHA126e0ea3bc6ffe5441b249abad33070e8c95de546
SHA2568f4fe2c7ef228564d66f02a7a0692f8bee663adbcd365e7513cd13464c8fa9ca
SHA512eb789a08739a221fece0e606dcab46d2589ebf2a150941a4f7945b60fc9963e72f2d78601d16831ff727bd52836ba4e973f0f4bb62f2bcfb52c07c083636af58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb217fb1d6c8d102229665c556e3691
SHA16f810b600bdf545da7eead38142be901df8773ba
SHA256252efaee384d14c89dbe7361790dce4932ce210dc6a92195399934d0d3b7bdb3
SHA512a49f8de08107cb0517de10ca6aa35d1359999f4a91c5beaf6c77bce75e45e9fdb523a5ff2f57347de95fdf1d34796d2084f2fbb4ff4eec0f44a71d3ea28efb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf40724e9f83ab2cfc0895753fc88090
SHA1cf5ef4e5a3123a581ea3714b15053b155bfaf5a4
SHA256fc1451319b90b8ac1d429936a75441c3b810f1b40488c5505c52f837aff7551f
SHA51240765acc47589f786e6065b43c8e5e54f0954379f40dc60bdadf5e69da63eca046baa4dc952ab23f0135b5f8c237f06b0dd57fa639473bcb08cb25f1a2b8478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f07ccf330089b97eee08d61a196a78
SHA14a3bee2d398a3357a73241ca6f7d109b7b6ac85a
SHA25691836f10b73fa79998b0d9be6fa45e15f5087d15fd6503dbfc7b5cc8b6b40a19
SHA512aa2bd50cf245ea8c70c6dc91d6f5ab37cea171f0c7d8a0fff7ce432cf61e19ca13d8affa36353646174aea74dff11eab88ff8b6ffc53fd7f083a0f683b0c8034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a608d8622bbe4548cf5877fcc82dbe15
SHA1592a86027f78a86d4171b3edf8427f329f66913d
SHA25653cdc9223fa75fd87179de84a5f18c69abdcbb6eba22cf2c91233c0198c2c678
SHA51298a32afdd4646a622bfaa1f5512977f16ad388e3ccce8f8aed4ba193693f49b093304aec763c892a346726965136753d76ec82ada880b84c46fbf0a2b97b4c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57859a74afcdeef16d72d7e33568c5049
SHA1573bc30c81acd60b5bb0cf928157df942c3f643b
SHA25670cd501b8f99fe9619dc27bdfad6835ed86ab4123f5fa665631552454b5cbc6a
SHA512f44d396a381ac1decd16ab83bf8364f7d3e49510c84d5fa6ec03dcdf8d7917f3f4e03d6adcfc7ba112b2209cd9dc643f952cc3fb83561ab8c6633dda4e5566f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a67e78d4796495281a9fb6e3496152
SHA12d8701f2d74eee0e78a78724b9def76152812ca2
SHA2568919eb40ab248d1d20234575081855b6f42e0330e180323541c74979ac13736e
SHA512858c1661ebe1296944800201b420fe88d72e1dbfd435016a559a0175b73ce3af786e27276e3eb19b6628f12c1982b862cb8da00b338ab9e9f1c56f5570a1667b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649ab2084f7606f6df33110ea57b85e4
SHA10baf1ce183d489c7463fb57b2190de50c4269e16
SHA256c48adc885e72fa536be7886ed0be470458d36f507729ee3fdab370fd70e6c468
SHA512b641b52abfa18742448e6b97b23604d6e2a0d7c7c73a8c225ef3aea796e4143ca661ea5e44d68204f9bd08c94297014126bf29fba86988dffe8164e5345ac26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703209708cc38a9a95abbbd81cbbb7ed
SHA1b7414a7ef373722454a1c38bad2c60b325e3fcc6
SHA256f85c4fd75da6d080a7c3b1bdde4a51e749bf68e18b85dd691f2447f924ecaef1
SHA512e38adf3bc34a3b80ee69c5a2b5afe06d3b550e7fb8f619dac469a6314cdb3bb0bfc9ecf144d6c8dd46c9b0719fa8a0cd258628222d6a7e5705f085ea680d8f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537eecd80442dea6def3c854c7e32ae80
SHA13e73aae546e89b90112d8383e7a87f30e501ce5c
SHA256300042bba2bb2d3fb452a3fc0595a42c2f1652c31bd5fd535359984a0d3be369
SHA5124c52e36a35a5570944b2f82d45cf5dd92dd168d632a18e963a91350c046e11b9693093009bd08f3cd652c4bb4887805ca8beaa34e290dbfdb112ea1d2f5bc592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263d680cf4117143271612203b5bac10
SHA1309b556ffed7eb79c2adf8b8a42968031daede4e
SHA2569cfa27c42ba5595809438f74a79531d49bd1b4cc70dbf08d0e68b5086ed13a41
SHA512fd4258d328dfb42ae7eeeb612738939ae059c6e7091ea76f6946f771a93455dc4014fab64765a395094d294ba153969d35e10df4d494a687c9f8ca91dccc679b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f284f5fefc6841c01b424773230759
SHA1530a44fd74cc30edb273ea2f5b0598e8362f5c63
SHA2569592fce2fb5a09d33a255f48fbf41ee7bcd39c0e48982749b3046cbd31a30502
SHA51266876cd36fd439966ee30bc8e5f0bcc9c23e36a1b9cc03db845a72b8bceda13b3b9c8074850c0e049ec75816926a2578f1a6167fe0e3d77889f364b14fbb4ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872d6db960df31092aa263a3d8c3c8d6
SHA108410d028bfd8066aee61d6cf4136b9488e48814
SHA256885e46ac042a53ef171d76b34306dbf897ee44a51b47d56e0720eb27f8ff5e4f
SHA51255c97f84905ae3bd81ceee4c84c1783bbcf281540f58b1bdc8316b0a7dfec828e10ecf32bcfa00a2ef429608a8855c160b7baf7c38bb5c2cd1f7ffc10fbd49c4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b