Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
2e75f5add89464a1bc37306a64c5834b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e75f5add89464a1bc37306a64c5834b_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e75f5add89464a1bc37306a64c5834b_JaffaCakes118.html
-
Size
77KB
-
MD5
2e75f5add89464a1bc37306a64c5834b
-
SHA1
d17051df4a13489bfe7cc0f843db5a456844381e
-
SHA256
2e006f957159d211ad1799f0e26c3da77d27aaafdd564fff323fc5599337531c
-
SHA512
d506f9f46c132df3176c4e82563191d79e7c6890fa5f14fff247854d0f74c9e60ab52677526e8542eeb6029db5d85b8d67228793a62c0ec74227bd40bc29e1a9
-
SSDEEP
768:Zcd9QZBC7mOdM8NpC5I9nC4QaHdCcq3oPd:gQZBCCOd50IxC8K3oPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009607aec6a533cdec77a09028038491c28e5d3375566d4b3af86ce5951e7f0ee1000000000e800000000200002000000032d45fa9f8cab905935ce955d185fb0c36cace9f6d22196089f539ca3c6f2f6b20000000b23798cbc01b3ce76fec21913fb01e90cca522eac975ea4732aa6a0323772755400000006c4ec4f12904c7167cf336d28f7ee676cfdfa95f3f5b72e4744760bafb3893b2b9bc32c60611884db5b8db2f8f3cbc6ec528aa99ab69f1c0473029bd767314f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d073e20cc9d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36BB9601-3DBC-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426668275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2800 2732 iexplore.exe 30 PID 2732 wrote to memory of 2800 2732 iexplore.exe 30 PID 2732 wrote to memory of 2800 2732 iexplore.exe 30 PID 2732 wrote to memory of 2800 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e75f5add89464a1bc37306a64c5834b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54289c5bb5ac0632203976fffc2aad57f
SHA1dcd8ccf3c54c4612ac4b959ff36dfe0083bb3a44
SHA25656ee7bf27376439d8d343ee724a1822b4ba1d070b5de41015879384ea388b336
SHA5120fdbfa4b8847bfdc3bd405e87b2ff85dc6f75a202541de0708b8cfbdb9a1423241cd70ff865b53249fd7e510877b9c7c81ffbeb4ea279463cf782a5b1e041ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fff8e3c5dd5e2cbc076e9ba77e86c1b
SHA12cd38521f86d866ea02238ab8ef85f3aeed6953d
SHA256644af2eac8f24b15156a55e364bb45b5422c3fad0522793db7a1e7da0ddacd6e
SHA512c6bd15754d7a86695e640fc31243324ffc44a232fb129309afaa6e6ff639aac0a3ffa4f2d2baa8e6621f4bcb8849fb881c6e511344a38693acab7413386f4419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7889c9df631de4fe4e8e1ad87fec14
SHA1fea13b4b14053c5c552714c0043673529a905b71
SHA2565db5ba8e45ddba2cbf699cc81b387fde633216c0d2d077c57090824252dbb95a
SHA5128bc2d91c54cb9c72ca8d4eed30f966fb2d33317787bafe29d5f9fd1c4875b0c14947e79ec12896bdc1edf38aa9a9e07c1bfb2a5a09ffcffc18bd4ebb6264d5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab897b6b3fd84ada8b11a7710ae66a9e
SHA1f75647a82ade4776118872c062834d7c03249bde
SHA2564194bf6664e57c0e31a5c5a8f07f31962156cc3a9a5fd2a52ea962ecbbfabc58
SHA51214d81eb27304fd201c61092228d7e8b7913d309e4fb9e1de6bd8538c137a580f9df28ea0fce741f44697d8bc43d762b274a187463fd5c7343e8caf612af0a22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d6b2854db88c391fc92354f297a8f1
SHA16708d188097c254a72ab1ebef20878b9cd0309cc
SHA256dabf97ccdd34286eb7c7252f300cc4247db600921d87a7bb8dee3925f0be3dd9
SHA512f5f2e0e55142e711dbadaf5b86ee879b2fa40869e7c5977fb322e3055a565adaa6c3ab83f51013c60d72d5ae77340d897989665768f4ca0772c895c51e2ca860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fac2bf91ba6eb47d449a9946332a7b
SHA11df21624f934c82a67b23da26bd73958a67ecfac
SHA256c938ac74ce525d59c343a5c652be3bdb635b66bb7e84efb3900c487987850846
SHA512e76b8f24bdb86de0a15e856b05ece54f7dc2499166f90c95917f664d8c269e243ff213e5198b9e8891af59170dac9128edba060d86200ea9f9920645ad0850a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55214d2cd2b710a773bac3d78ed790a35
SHA12d22931c6a8299297840412d2be7a97ffc0cdd1e
SHA256a20c2dad25487d2c391aacc9fc971d1e87271f1d68a77d5a85aaf88b1fd2e8af
SHA51204cafe92f9ac0d20e6dc16a1e22c2184cd4c16882057caaa2a0b31a93eecd8ac374560c680fe561045be85a03dc75d1356a8409a94b0aca0f11978302215dbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c518e79dfd49b2cb839cb5bf6aeed3f
SHA19a6e102dff21fcba3534c361ff641b044b1ff3bb
SHA256c695d20833be7c1b4fb8815a1dfc10dd192ea79daf39de4ba360c17cbe1cea21
SHA512c67ff22bd8ea542f03dd9864240748becb3db739a5aba458a65e300411d7d2a37c1b088a247ecf7ca362b0a8b315238ba72505918f35088649fd066140c6c405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50373986ea721c10b08f55c2989b6db1d
SHA1856e38414d18041cae1f89b4d780a482d52acecc
SHA2564cf399eb2a068db4cedb2af5d2466aff94604b679e6552fc4348c9e1612b0d03
SHA5127ff341c3304073149c9f07e7534c3277e8bdf26c1c748610635d9443a51c5faa8c5b09d516a6656b866f45c858da75ed35d725ad7352523ceefc726efab69d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827b0ada0925f9c38679c51754292b66
SHA13523bdd4a7e3eb299a8b483902fd662660e21299
SHA25663f1f417413a83f23ed26ee05c523620abf789dc28e7d40cb54726461d8b74d2
SHA512ac5e9d9bae26d9d1537087e508979ed65fdcbc19271c51cc6d00f397de02ba95df1d6a98f95e0162641fd0bac3af5f8bcff0db157b9461545951cc624fe0366d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540092d2c0dba6ba10a714cbfa7f504b4
SHA1440a31f0a75e2bd265f87f6198b217a3e815fd5d
SHA256489d8dee72fb466518d759f1e890ddf79f65c42dd8eb842954c6334dcb01f593
SHA512103cce3bfe1d23f47970964047a28a1d5c09f8cbeda38498d6777b344022e29def548e420e7d48fc9d7d63d10005156c289cf0a6f39f8715dff4a4f79a34e433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049d0eed33f8492074d66c9d8cb46a7a
SHA1be8d2c2a5d9c12fca6966950c0bd7aaae1b19f1f
SHA2569fe1fcc5d5c2d493ab44bb703cb34437f826ea8412e8f3830ae6dc988d922928
SHA5122a69ba5f6ced0ac65e729971706522ed26d2ebf991e24c780bcf002cb5b1a36d15a6d6a968f1b4a1cb7f300e14b84e96d98f96ebe8ab383cd5b25f7d7ae6a97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e40d75b7db477749759b257a4e3357d
SHA145196f64e44168f9add91ed5c79f95ef970e99d1
SHA256d76bea81837797245de962482fb0a0af9e733229f1d57dcd76ca94f04e59d58f
SHA512577828487431fb1190bf411115d3bf632884c0281657cee61402edb085db1c4941ec3286071643df2f9338ae448c022c2d2300977882cc7f2595f140ba821695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da6e9967b340bbc352fae4cc779e1d7
SHA12233e88580c15b92eba31eaaaa358fde0b7a099e
SHA256bb9e236c3603a2645cf86afaeafa42318a16057415500f00fa5fa7c470ee6163
SHA51252cb8e32ea4f0834c814c08a8d33f32482907e01bf98182d090bf8211242882191f802ab19a4aba4cd5b393be78c50e24881a2c2e1ae6b48c5f6987cea2d220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c0a94178366ebf2fd7e33b53acd94e
SHA1ffd5f57fded5cbe84c968f48865af45490a39d0c
SHA2562da4b4545b69119ebed0d5bc539db6d2bfabc75804e04b2c75dd155d03cb63cf
SHA512e1b271e91f78c52e6541aef2b7cb204a678426e705046290c5de26c2686ac9d4327abb5c44cd2b7b7e7a13bec3c1d504ec4cdd0fe8e48db80dfe2ecc783256ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557993490715f32004c4c0cb10f60e8a9
SHA1df1c127058597ff4a436b4b77e5a76074818cab3
SHA25665dddd280a34cbd916658e956a5f45e0bf4a727f47762d2f8709afeff9bf9153
SHA512708a00a639849ee7ae8b9f09dc594fbfbf7cf5cdd594e061964d56d2d4dafb2bbafa849db0a1cb2f69761387b580972bb69ffda4dfd81c31423b4ee63cd56dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595983f2274e3c052617027ec3ac690d2
SHA1622209919d08ee3dc41e8361084d98fae2e42d08
SHA25695ff06594562af9d128c752b87b647aa6ec55138ec3dfe4d1e0411ac36dd2d21
SHA512596ff08b88949e2f9ee5405064937543ae60fb5dc05588d84f4d5647d4d773007ccaf95df391d2afa0b4311ad2665e58162f1f604e8589686b83b720364f23a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96e8522dca31dbc893c59507631e90d
SHA1e2c93ac7f5e883bbb959acbf2e9ccbffe66f8da5
SHA2562458046cba145c4a423788d33648667f7432a01a6482185aac0a9985350cd197
SHA512f420269a49aeef693a88cd966793b8626e8a9523be18d51181cb59d729d80b2ac6bf655ebd12fec9bff6bc7817826ccb1d702a8574b558d5dc6bcdfe534e6afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa39e1b920c539b7f2c05ba49b41f56
SHA14e0d9d2dfbd5ff625123a1ba0a0593137bf3cb8f
SHA256d302e72db0e4004acb22a8eb7511b9ee8da85d30d045a64979779b6b87c4729e
SHA512823a5af7d31ffcba443200d823992e88e7382b29e7e9a84c6ec556483db7a5ca6a7b6323d8cf3fd8b092d778911b24b8075e5f3a52057d5145e4a158ede7acb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51399a22a27d9079f3d3aac13850be4f3
SHA1a696ae48420de6602a8f125aca70f2fd7826a3f0
SHA2565d1228b7c81ee62a3b55464cd035995f6659f57c81be437e78d77eaa3bc14ea6
SHA5124e8c9cb7c4f380f8ff8af0fde9a87e773df2cb21e14022138e56f5377723f1bde40169a5f9405b366957ba72e813c1e6a4fec8a59c273bfcafb63d32f5e989ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b