Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
2da19ddc1952db8a412b9f443df5b77f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2da19ddc1952db8a412b9f443df5b77f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2da19ddc1952db8a412b9f443df5b77f_JaffaCakes118.html
-
Size
14KB
-
MD5
2da19ddc1952db8a412b9f443df5b77f
-
SHA1
2039a521a0f32ba9985142fa391ba2fcfb7b5bc3
-
SHA256
73a5eea492c6cafe6bb74960a1808be1c213c7250c57fd20af029f98e1e114b1
-
SHA512
503a3e38b31749837d46eab1473bbefb074195c963c854017d7e86dc48dcb6a72343e7e7d37a28ff2109e4634b1cecdec819c887fb318b186b349cf20f52d2de
-
SSDEEP
384:C9x0SGiCeMTqam1Sitc9gi6n1KTl3wzD8/GrwaTDpu:4x0SKeMo1SRZe63wnIG8uDpu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000f6ea7366dd2e4c0eeeb89db50a2187ff248f16ae85850f468669577d53e33741000000000e800000000200002000000033c6ef1a4771a5c9e4dd94a530c13053f3a763532412192993e4049ebded95da2000000080b170beaa8aed110f35c8925aba9d5f8766a3c2063f632d2a6fc6fdf4567cc040000000745cbcfa02546419bd0870a1604051321f9c56eb82dd0ed472e5f3475f5ed11f408ed5993470655c3247a2c777600b033c662a6a62ad68f33f83bea3a8ccd1b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AA86691-3DA1-11EF-A39A-6AF53BBB81F8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426656709" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1024281faed1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1440 2176 iexplore.exe 30 PID 2176 wrote to memory of 1440 2176 iexplore.exe 30 PID 2176 wrote to memory of 1440 2176 iexplore.exe 30 PID 2176 wrote to memory of 1440 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2da19ddc1952db8a412b9f443df5b77f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc6c3977a0ec6408655e35a990ef22a
SHA1542111a9bdf55bb9a8b6a023159ce373a0ef16ae
SHA2562461db701bed5b1f9ae64bf18a90810d6944698971f68d7cb0a58c633fca7a26
SHA512cdcd1d2a00f9255f661dbdec8ad8b22f1a213271ca52ede55cb7f3537051601b5242cfca51701857360618d88f346aa97578c90f0b4f04560217d8922a7237e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555368d6fb2034cf1d52263d9bef56290
SHA1ca63923b6793f3b315388d3e8c4f0cb92fc339d4
SHA256f5ff7a3d0808aff1255e82101ea2051942c2a4e65e1cec0da1b8d837fe153356
SHA51203263eb7aa84ba8e897c915a555ba423099fb598d49184e043b84485e99ca5efc462f6c43e33daba9b158013c9c516f8884360a932a5231b40a4b778220cb909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54709c0160089f2578d73768d8b92b802
SHA186466f1632ab95c7321fe78ed8011344685e2530
SHA2566a5bb4019849a0222df603f0ad398439cf3e288eb6ea1ffeae4fda4509f98200
SHA512f19db83a477cef8ef2ce5fa493e10e1f05d2fca1939d813bb2402a7e7de05badcf36f95c259117e180c78774c1b9c574ec53342418ed4d4e35f4fa2d41800153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9a5af20595c7727da4da10668bf1ec
SHA161cc78949e38c1fe8fd6ff343785ca5a3fa4b132
SHA25615545570bfacf4eab7a137374ca5144630f01dcf14f7ec56ed9f9dbd71e99177
SHA5128884800b5ad6ca5b09e2e26a127ece79314dc136fb5f112c09d39a231d290bf48b646b9fa080280d60aadfc5f10963d565413d9bbc97ff65948bbece0c75feb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281bb1cbf995e4028e333ced3c2c8851
SHA1ef422333fa28a80bead82bdca5e8de093d35deaf
SHA2569e8c36962bf9c336d3128487879595d7d41d11952ac79eb4bd1137b878bb57ba
SHA51209b8acd95f84d3e5d38b41911be538165bd5f652930f1c13dbf88075219f6fcf10d3006d4201ff2e61b005457be609f2ceceebcf8c167978a9723bad59b69169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fce5316fb4653b456066baa57e28539
SHA140b08d8f377da8fbda0af1aa9f9eb921a3079e2a
SHA256343e31f81a8eb69a0a6b8af0c50097c9ed20d06700e16d0ad863552653ab3294
SHA5124d9c5e3c563e9243f897238ecde5f2da4cb4b9a2e82c1ad39d46d083dfaf99a7571e1e41275509ad8703f34ea7ca9451db241977204543ede6a87e9e64d3c926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c4caeeea436e9f07ab68d6dd404edb
SHA1e53d753d94132e02b70f06f663ae88d515be6625
SHA25690cfe88739e6d373db19aae62ecf64a44b9782edf88610959fbf6fec8f99d583
SHA512171a789a9a4851d488539652ed814d6a2541de81b984b06e693905a2c5600a7c7e1dba53cbb2970be194fc96a35ab3edbb378914d300cf403d16337c7a6e2f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e82b1864a7e5bbe4fe3530b80c6b042
SHA1b80cb4ca9ec4d025f7dc0da61be78d3c6dc02037
SHA2565d8cf28afd7c1565efbdcffd35df9f19e54328ddea3cafb54be8427297d5090d
SHA51294464ab04581c46d06a010141245fb103cd3cfe34bff0333ff701857dba35df47eea2f2f9b4bb9836d9d2b14de1338d6250fe53c0aa45a1723c8bd6427db3b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6140be0222b82ca5cd639e2c50f7944
SHA10e12cd212e28dd54122846dbbf293cbcce2b989e
SHA256aaa5e63a9a702eb32d1f6917fab978ba0788535bad7de2837a22f8a686d7085d
SHA5129faa6c85dfca3f3fb79c39c00e69d046f12b4eb9114e5d09080059f2a493a4a5efa34cc30605b71a73acbb892a0da4036ecaa0a5fec10b15944b569d12acaba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eae38fd0d4069abb547caa724260178
SHA1ce223e3994c86f198ae7a1d3a03feb561b7b60ae
SHA2565e06e3c098d44cbf7cf00d68a3bdf84fd7e0f67f31ac2aa3c4c5749ba03b8a5d
SHA51266330293598fff906b282fcf166a1e7253f4d401668251e1783dbe1f07f5e62b2a76976d68bd2982e369f5319567039bda09b190a08e0f58ae61a667a7a8274b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb9df98c8f4f5afa781a8a695c09e79
SHA1ce64f5d8bea39875b2ce8eb6b33762a2197a7ffc
SHA256bc884f403b8ff1790e0962088d5a4fc13fc9e29652a78ba87fe8279f58be32bf
SHA512626194e7abbc747c0709af52c2d94c4d0f9e647fb2c85fbe0c18d9e2a385cd6267021cc3bba9463238ae79344eaf4610d7d436794662f62003b8f53457d880f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c4f1acb0068d99a855452370163bc
SHA1ecdd9ef3ec15a577dc798999d6685fed53433e2e
SHA2568b83edde08b2e1253bddc0b3899f7222d1350f839f72234aa5f055c16230b1ec
SHA512b3fce8ea07c6bd5d9ba337071bebb94df95a64fb98738c077782d751321df1221b6788d257832a4837cce1abf3f2cd88783d93cf1b0a6e7f33f7d21f91e5fd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91e72c8d181a872eaaab8a41b46f062
SHA163aa339aa646fb3bca7fdb668ae64cca8baeb205
SHA256b134709e06a7edb8ece97f2a103acf83f1aed287c7864949d274a9f6e935a239
SHA5128816c76d22e608387748b910bc4ffdf6dfc4c4dd43eeb843f54b2b5e443b38ca967580c023b0b8646773ae6d38f849cae3f31c5e48a17eb606289ea6eaed458b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0a29eddf30ca3e102fb33b03d2fb61
SHA16ba19df2679e6356480df1e46ff52874adc8eb51
SHA25668b3db3ffdc92e09a432b675b7acf8cb66ab46fb155bb901e5bc65e70de0e56e
SHA51204f5f01e7764a861c6891fdeeaea1a64ed98480964d5815a65a15bb9c9552b1bb78e4e1a8ed3c254f7f986b31bb1f763232f8e3c1fb90c6323aafd9e364951b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b795a4c1772f71d23fdf68ef8b7295b
SHA16907c0cdd71dd1ec15df23dcc7a1a11aa181ab87
SHA256dd2d59de6f7b4f61f1bf3b4bc82bec076323d09e0018bc724f8b22fc7d6dacf7
SHA512f9bfdab44d6f40b0a434947ccf23a3a38add3f1fc5bc836d93549e2386adeca070e16e122c54d9d6f9d7a93d337ed6448d2500ce37c1173d83a493bfaa448f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d5f0e13c020eb9c0f1b199ec68be08
SHA18b3bae597f158b872f844e5a61442bef811923be
SHA2561e633770a10d1507d5f04736ada467c51570cb9c014a38281e6634c510ae2fad
SHA512abef843bdd8f1b2754d1205d40139a827e1f6a932b019426ed796c1664237b67f99c18d3076fc5f318396000963ea7c079708263d3b93384eff56fe0f285dc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525917aefa8c3f649b7e409cd0b9f83f3
SHA149e35f68cb07daace635f3e3a22a2af042890866
SHA256c6a03eb35b602633bbf50d56e8acf61d1d3f261c0f596a4a221db943afa6ca85
SHA51210aa71b494af7703bb3864334bbd7b58b0288daa025373f602607c840736b6d4831abc0473f8e729944324dd5db19e8106f68b2841c2d0df7f33d97aeea6f9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4a5833d20f90adc5c993d901aa4df3
SHA1911a5fc59eadeafb1bbe2514d09334553019a672
SHA25662a5b472474e9e3808aed21d5bcd7d562f1ce1afcccaa504e4678b1cceb912fe
SHA512a44c8d15a40007f8ec596fea259c7280c2b257e1befc6edefb6d3e790b61e3aed9c59080dc4d70ec7ccf90cf77ab5edab23b19bc6e4adfccab8fb42c28e5d3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3df284494a86a810a9f357081bc2fc
SHA1f06c220370d34eb8e90d1928e8dc291c5616358a
SHA2561acde6185a8e12cf62c432a4a404c2ac98b4cd598437f812a3feb3e9c450c71a
SHA512aa542dd3fd63d0664d422c1fb7972b0a8d86d0f4a1ae11be7d0e0b35f867347f971d9bdbfad321077fb808bff41ecf53a67009ea19f046a33b35e592b4d764b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b