Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
ce813f3fedbb7dc5a78904b73508d6be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce813f3fedbb7dc5a78904b73508d6be_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ce813f3fedbb7dc5a78904b73508d6be_JaffaCakes118.html
-
Size
20KB
-
MD5
ce813f3fedbb7dc5a78904b73508d6be
-
SHA1
8fe24e0220e56862dd675cdcbfd31ddc71e151e0
-
SHA256
f605695e20a77e3ce8361608c3cf9458af6780ea7581cddc227cf2099be8cafa
-
SHA512
505c0282726f6b7c919225a913afb112a144299d53ec7ae66f1f31fade9e2907efd8f1b563ae0e123c75b6d9ebbbf721215bbd91e85b00696339059dcd11d11a
-
SSDEEP
384:ge68y46adXh8Pa2RAIvApCxBeHiTRM6as++o:5TpdRaZIpCwop++o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC9A4421-F325-11EE-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e70e52c74195eacb8f3c9a271bbf41d95ce36ed78a37505030eae1dc95fa7ec4000000000e8000000002000020000000fb96f03f31027606f6cbe3aaba5ee10c874f90c26fc23f71c69242da0531e619200000009e594c3e864c47047fa0c0a2ff133d07854594452a4d445d00245c7b414d1708400000002924ba7e29b1cd4d90e76e3505a2da657d9ba44039cacccca56b4d21186fab765252ac3fa9a1d188957e2fa594ec2883a634be08758a52d0162d4c8110d3eb5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20768ed13287da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418467367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2568 1936 iexplore.exe 28 PID 1936 wrote to memory of 2568 1936 iexplore.exe 28 PID 1936 wrote to memory of 2568 1936 iexplore.exe 28 PID 1936 wrote to memory of 2568 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce813f3fedbb7dc5a78904b73508d6be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484226c44891550338a765e1e4ce969e
SHA16fffc1fca06ec02ab0888a2f386cc9026df2738b
SHA2563223c1f999603d8f71b1252281ad0a239399c701a3cef2e3bc389214e9f00bef
SHA51236a99bc169cb0f870c89479a9628e590bf16228fcfeb1d0780ccf27a9dd75297fe9ef4d9ddfb619f57b9014a13cea7a3f87fc83170d5d22f1a4cef5f4886aa18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572be62f4026b6c9da934dc9d6a01ddda
SHA1a5b650a3ff185c54da659cb817687c877e7e34d7
SHA256567d77997535bbeaea9be5e91229a0dc39937853d8f14483fac55b3d822b0fd9
SHA512252a78f6aa55455187859822e3faefb2b67a84f3a36d8079e19aa624e4237097c2efed3e36482706d8e77cc8ea9330f6b3a5c08344e01bf44be91c33a04055f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536976e1f29baa3b2cf10a46f04143188
SHA1848a70c2896a8d21cfb29d9b391d519745abb9ca
SHA256aff12ae4680ac5682a660968ab6f318bf36d8605f3bf76e5ceb55e1d914d0fa5
SHA5127016be0723faba5ad95a0a06eaf855cba9df12bb3f85f024cdf5c4a0b8aa1251a05de9dea4a0cfa71a62b55f03e0ddbce4547a2115bbf00d07b69c99705349d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573078b11db64ca25dc11677b6087ace4
SHA194f068d047d9b60f90f4ed6fd00c5b60cb95a4fa
SHA2564166e88967cccb6bab049d996d53bda71cebf4adfdec676499f690535561b8b5
SHA51215f4c8f851ea0bc86cb7b9eff24d542e7bd7d6eaa5bf8882d2ba10023a9d271a911a4f4e15fcb265eb921c930612000b0ec9a632394f0388479b9c555ef2eea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00bf1708358bc478799545881702400
SHA1fe2d7bf32687d43bc859bf37ec0b205899c69ea4
SHA2567526eb8f11130e31a8ef620603157df4c93a973c1b87a3e039051df325c5ed23
SHA51244e0bd638e1b4e9efd898bf2b8515ee1842a0753e167cef76b2238c1e199c5d881e44da5fb583fcdb8edea9982eb591ca6dea4227cdc582a2f5aa683cb020553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d620b36103868dc4fc57c2c1003b645d
SHA14e61a670878829420561296681ddd06fe64f7b94
SHA25668aa4713e66f4878aaf6dd798ed254fdd6b6144d06982cc443b27a25c51e89fb
SHA512b428828c1c9f669b0f5a404dabfebc5853083afc7aaa484f87ecedd7364a87ee1f22111e31a54b9a539150b30e284826c77b92845f58ee15337542bd104f8a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713046859712413bf2251b8af7773d21
SHA12e19ab61221c1591081f07ad93277e4b23970e22
SHA256c719d04c1cf6471e8659c80f15b6e96727c89be6db32b1726356f1e8194e7bdb
SHA512f88399646a83fe7da7b3ddf35510e042484429c797a0490dcbfdf0f5c5b6632793ff049bb117006f9a3f5a7a25fd9b50e3682199e869d6db458d953c00bd03c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4a55a33cee6bb5b38e22dc6c041ad13
SHA1e64283fdd03f796c27f31214874bae87019e1322
SHA2565de829259edce60d09eddaaccf758238cd4a8ac1905bda01162ccfd52795ecf9
SHA51277c7c4b0cf7e2224cfd0b8cebfffe15f8c8078de373ff4f649e06e4a47b1a0ffe2c7bde77b70e24800e1af43800bdbc3aea190e240ae0c39c1a35ea66838f608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd86f976548f13e3c1daa775640c8c80
SHA1da9a3e2eeee18b234481ae809d84ebda96af9344
SHA2562f42a2b8d700e1d3898b55a9f3871ed463b053a883d3314698360a699bf757c9
SHA512cf8de63b4d664d99eb7c0d01ecac3a45ba1e70d58ee9e0a1ec4926359669fe54142bc9f1597c4d88c26e060124ba0d2ea8ac605ff5c1df5a04409b0b75ec3d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edadb24db99ec94d5f76a8b35a9dffb3
SHA167f359ecb0df66f36783672972db79f847cbf660
SHA2561524fe9008a6242d954c1941305732a0321626912ee4e360f299f536cb2b36b0
SHA512603712ac0a61aca8580fd562c7c8c553a42f082f6b0452c8ca615af609f34858d6fb4300bd671c8e6da72479bf51ffb52ffb927ae4609802b09ebc9204898316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b71aa901761b463b658662f1ff2ead
SHA1c4e55ee595aca7666ffb074c2113db561509fa67
SHA2568ff8fb325fbbd7fb7d89947fb821804d65a3dcae7a4f54c6fcdb8a808ebb8f6c
SHA512d850d9b7e01293f0098302e6f103e41c62fb33b0c0b6c2243b5a5e2e4a304ad95610920755e7c815bf99c8c7278f6305e7e8c8ffa85379e55c10ab96c784f970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57552b6797900c00f5a20199791fc7585
SHA1306cc9a4bfc48c6f82e3a54bd081ae7798b0d498
SHA2566a0d009196bd03c79afacf25fa86e79d4b71e13f8c81d8c1535646a53c8a0509
SHA5129d8c15bcd3db47a77b0337181b7d5c21c19fd4a20e43bd5b0b366d5b464f48b6932568de2688850cd5e225a105f181345004b6aa7e829380df17acd6b8e1bfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c37334857b7e0216f01a647cfb5da23
SHA11c71101a85b4499e6b63dcd6b8d5ace6654e1ca1
SHA256147710c466999c123d3df1f484f512fbe1da44495bd0efd25fe3bb18c8149e74
SHA512edca5331578419248beb8a59c0042431f24cd34f34a69216a48794102c393cadaa4477d45360ff9c18ea6187922940795576d1ec407392c16c0c64ea685cb268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c6c1d939793dd650bcfb70e09fc31a
SHA18779372ff3438a6766be81708a62148c60c49199
SHA2568bd88482e306e82b6d98e58d5d9205df11dc762583c5c26ee2d74509c9cca1c3
SHA512721926131605483aca54d1f2fcebf251b87bf70205cdedcb9595a07a15de62906d0cb67da71b801a5ece13dd9584fa20ca2db4a5558f98747e6892bd9a9f70f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deae6d719555dcd0a1503c2f04f091d9
SHA1216846a984be762af30645a14af34efea6b44a25
SHA256f8768b4dc20c343a06cfec7572c1de2731a112f1c592ce8d7935a14e400174c6
SHA512f04162dacb85144d0ee16240005b31e36f3fbacb43ff5ce294af883484490ffe1002d7587923a296079fba6650a09a4856447d8fd48f889ec0cc05b0e3f80c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d7c100415c48485da24cd254fddb562
SHA189f91bdb9ced9a172cf50ff3c947b52a451eb26d
SHA25631d217ee8018b8b7aead01b6c4b1853d4ffb3fadc550e1da2cc3779875d8c961
SHA512ebdf5f378d6dd1983fc7a76bfd1bac8e4b57f5bb585684bc05bd1409cf7bd934ffc371bf6cb9b6b9110aec888fc0d9c95357d615795002087b70239e6367b62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38c1dd4614942a45a8f881d16e82755
SHA11c9f416ded37219044de1c5ed18ae621bb08423f
SHA25663007203f94b5a2342f2d131354551e95969648000832ed04fd2a8bc65d24409
SHA512160c0c92d3acacbfc2872a22678867994d60581498fd8201c6947265f5bb8d560aaf8dcce7fbeb489f728f654680e4efb6af4a2a9dca70bee002f562a6340c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507541ab9acf57cdd78c1a3108a0f865a
SHA1ec5763d8a7a59f92c608feff525280a05024fa74
SHA25611c68d7174bf4bf13f74bfdba9f3ba003e496e95a90c48a0c8a04e0477febd16
SHA512f341674f0eccd5b10f352181f9fc70ace2f089f310102a559e3a7674cae47d064485e19427411bdc6e392b99e5c8adaffbdbbc08761506423ad33064d72c594f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339fa54bef4b531cef4f19de98036618
SHA15ecd33bcc8034b060f06564b2f2bedd0fa7f877f
SHA256ffde1a4c8cc87e13f3b26f215016deafa1a43a51dc2b4d26dbaf94c157789971
SHA5122d900132dfc7a2043dce44d9820fb52fc58b9bfb2f7965681b9b3768e5d89688fab3baa6a27b158c35ff9fec485716c1c1a5d89f2714ceaecf1c0e49c93526aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a