Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
f69cba5e9dd2d79f139cc0df0209ac62_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f69cba5e9dd2d79f139cc0df0209ac62_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
f69cba5e9dd2d79f139cc0df0209ac62_JaffaCakes118.html
-
Size
25KB
-
MD5
f69cba5e9dd2d79f139cc0df0209ac62
-
SHA1
45d1b1395054d660dade8a2dc226b176eb0fbe64
-
SHA256
d60fcd9bcdbbdcaa5b3a4643fbbfd93af6032981f75b9c90e144a48c8dfbb33e
-
SHA512
04299cdd9ac30a4d985dcb623a95d2e2aa853c5f3876c7e6fe0c9de4e087d7a9067db0d9cf1fc78c52d9a3f29c07994b543a2a18df593c1c364a6b734e39a086
-
SSDEEP
384:snA4yw7ApA4qMztvukeKXXTuDwB6jJ2/vLIWQQ/U4cR1LeeIYECdG55LkuxOk7gO:01N4tWkekgq0a1k90t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8022c8550e91da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000056266937cf8f63c5b84c2c9d0b4222783bb31e24e9c567c624c8c46d582bb5000000000e80000000020000200000008d0a7983a5fdb487be9da286424b1b781d0c65ae40884e198fe5eeecf4110c3b20000000e6304b9948e1b84783dbd2c8b9d0877d57e904a650cd976d238a1741064ddad1400000004b0116f98fd7c3ec03a5b19d50fe361bab109eeb54c208ed8fcb199041fa11195dec7705da5c58a7a8d29f52ab2542e71b52d9ef17df0677fa22b2dc276f756b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419551209" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81669391-FD01-11EE-A3B3-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2012 2276 iexplore.exe 28 PID 2276 wrote to memory of 2012 2276 iexplore.exe 28 PID 2276 wrote to memory of 2012 2276 iexplore.exe 28 PID 2276 wrote to memory of 2012 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f69cba5e9dd2d79f139cc0df0209ac62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263256efa06aa205706faaa5cf4eea1a
SHA1063d7f7acc80a295a37edaf891549b9cd3969313
SHA256959cb7a08922e75a792a17f137c66b2d76d45318d4579f68e97f53f502b09d11
SHA512f41656f9d7d73a473fda5115e0fc9d6cab4b05c3f708e75b0cec2efb73195815744f1f10476772fcfc65496b8d0161e5a5a6b7e6c2cf590dcb521625bbd51706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd835a12fd111c05c54b42793453437
SHA1b13e7f36298be0a56f96758a5ab1a6da15ab6ba8
SHA2565baeb803b4dc392ac2f63404bfaf41db8049604732d4a72b028ffc00681d5688
SHA51283cba523914cf18432ae0bb7f32c8e8d283b33b3abf9637bb07a377c71de05ff96579ed515480f6f1c690fd75f2fb56610ae40d7533c1ac42d07e50813511136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425e26b040e25285eaa674f02f36f139
SHA1cd62eb38113554eec180c32d6b8b8e8444d42a91
SHA256d17c9bf837f1df060644266df60d89c2c82d7cf646b06d0d0749a73c1152fb37
SHA51253887e75be45bda6d3acdaaa910da09bd0384a436b625c0903435fe3b036af97177c38f6126dc3b4b71f697f28c9dadfc2a862ccac928e2ff947e81e6a524cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c35c95c30a30cf04ac4e402d5cdf69
SHA15fdae0b5b38fbd03f5646ab192180654012d0764
SHA25662d3354304a32e07f66aec30f87575618a2a16e7b95f72934ce1c1c33e7ba16c
SHA512047af2769f10e46c04324ebde05dabf0a1e88a52d14041c33e554c7bdcffdb118b7f1f49887f94bf11b3bf26f8361d7e0dc34cb282931fbc94bc0867d2bcebea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df66d3a170b3a5392bd4f6e234d20c1
SHA1fadec854c3f3cbb3c3173aebe2c489b87636ee95
SHA2568fa4977b34c49b35becac89e9e99341eb90e4b38d10fd352d24d3af8c60e6dfd
SHA51228107afcc0c6c1f687aeb78bd4dce92b2629f33a2781d4c5607a081d3344e53713cd84f54f722b4f231a389e0a21268d60bf63b79b80afd28b1ee6ab9fd611b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5123eab9f3700c7a981c4127268147910
SHA1986afc844edb6fa7db5628bad00cbabf0524b6e4
SHA2568884682b6ae5c368d9ba1fd983093b91f822aa598e14267ebc7d190409e40fc8
SHA5127cf90cbfb5e2ce558df48137164988dff2c2ca02effd671ba584dc30c14859170c3379bba68de94d17d6127df897b49bfaabbb88508c1d743f47c955da839e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfeb9809dc1be577dd86b5dc8413a2dc
SHA10f77997c610250b8cda4b5c5c0c14736cccbe686
SHA2563890df4690f9de17d952fa01f8a5f9e5003fb152dd20e69a08403e151aca41ad
SHA5122173cdefc82f099f321817699c12a4b44057eb207e20c8d0777e443b74f0d216074ce66df902af39594a8e38b2cab1ca709a955956129e2c6c0c5b75144e9baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81301bd80f61c9cde11ade9526c8790
SHA11a1163e7518517b4f174dd4ca09796559912b557
SHA256d7be36aa40dee9367cc60cc7d05167ff7d8df33e26c4787bdae763c161a0c4c7
SHA512badb002f2d605ef342eec1384fa4d492427626e0799980a2e7a56ce2c53a76cb687864fdf2112b7e6207658cdce4416f539fa6166bd4d840535353da2d11e5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014f2459cccedb4225c6817017e6cc90
SHA1ee99f8707481e934001ea3445e1ee2131b44b886
SHA256c39fedef8a1d41fb60c822beb5193a1fbc7d7ee1bca50e3e5326a8dc19a42993
SHA512e28e96e59ffa2526805ae91bf05f2687474d33a5eb7f6c2941824108bbdb5ac04e23b1f7e636bce199ad5b4d4d7ca29e3f04eb02122bcfebf4b1ab91cd88f42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e543441e1081c8bd5e19f3d7177837ff
SHA152d09de9d7e2f5628a7e7eda4fc44a08bcf56e8c
SHA256130364587a4a7c3272c1056f15b3326e12161998032d345a2361d270d8eef69c
SHA5121ebe16e4249da87364233c4e484c0d950f81e971c4e587af8b46e503c19c447344208032912c3c1f350271df39b748a08382b86c8c57c509fe56f522e4d3c81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0ff5cffe69132fd4b522bb446f50ff
SHA1302320bf72050eaf8ae658676302210f2f9c6d5b
SHA2562bbdbeca1f0675352b7ef6c389ac00ec7c9ddb8aa767f4c1fa5995ec8e32143f
SHA5123cb58b7519636509002cd3936b96afef7939119ca9abf9a9daa2a21d32c20297061fcf5ca87a2dc8d3c725fef18d42a9dde4d8d78029b68e30a854281fd91e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7270fbfd924505f4a679ee2cf5a38c1
SHA1d362fe56d0ca29820bcf2639c9d59dd23acc4863
SHA25656df93e84adf9ca4e21f0937c1b85370a24ba32182e6528be6ac96c13369a9c9
SHA5120279643a31900153da804c4eb9ac676d92d672aacdab23f54c5529421d2d0762fa20ef91785d6b3f7ea97749bf2cdd6b8295277307cbbe90b6475b97b766a82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecdd4a6f64be00beee4d4e0628f133ef
SHA10ec64e0fd6312cfdc0f291567f7f3e58f7adc14c
SHA256e897683d530580643375d7adcc7d0542c992cd1800a89649392f18648cdf0d03
SHA51256ea5591a11aff88dc9688b8d10e972095ce60b2721ba751f2701033226fd9b5b52f9729177d0954da052bd1fdab8cb42b8b16e226c2578eb115e95bcd928d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd90bd5d42b254c7e3ef29e52ea3c4eb
SHA1d0559bb17efe27e11ac20f84a27b9b8c73430251
SHA25653710b71491e61fc0f972b23a7b17e88f690372ee4e58070d1ee3f947481b7a5
SHA5126239032749f27534f25877771bc736dc1a84294e0daac154d16ed021aad8dbb2a4f11f44bd90a864667bcbb3f69be1b8d9e35ff7259bec8fcd84336ed7adde37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc636828c3fc5a43c7271ef47b1bb152
SHA1a5cb8204fc4c6b2072555b12c8a77695ccf8a531
SHA2562d21eb38268c351c642f26a1cd93cbfc7061c99fcb6cf22768546267e44d6850
SHA51212b28458df6e27244ea73d0bfafbd54e69ccce73bf4f5b261763a7859962fa1452f6a391af4ef14c6c49e2d067bee0df1e1cf1e4db36f2644c7e02694699e307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b1a5614e3ff201a2469bfb16cbee2c2
SHA14b129b6940fc82645dea33e4886fb0d408e05e8c
SHA256ddff3dc7a1377e9b8388b093a5ae8f78389aaab083a6092ca302ebc5dac49532
SHA512cb6220e0a580908dd85198a937a0fe949142d5ff3649bf4b643fe7be4771e76b4b1539d4818ed0f580d5efd37f18ff20679fbd806818cc0e456401e8063612cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52413e2f4bbaa5b82f785fde976b55267
SHA15d2787abb10a9b603aa53c335c5ab801d5c9e7a3
SHA256b5b51ca3f5aca1de922b668f25a19ca578404f212b89d28ea963937e7bff9750
SHA5126f1a097296fbe64665c498a04bec800d3d8b362c39ffba9742a5e7eb26e5c213fad8856e5bf60e49b71f064febcc912469546bb38927aa244e7d85a19002cdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93f490b3d1398eda0acfc67c82c51b7
SHA155343ac575e0f96cf48f0d4c718396312c42dd12
SHA256702010f96394daa82422b197c31d77085b6afd7a09ad7e39e8e97bb618877be9
SHA5122438d02e166683aea4d56195b4a57c9276b50580d0b2ab9a9169c9cf257e98d86c6b32078efa58515bb90ada34776f5014c47b3fe978b01380b0e1ebe81729db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a26805ac345cd2c6767a21a0ab1b1d
SHA1de15893334841db1884fab397f3a938d105aac38
SHA256a850a558f0b83740d098d2321626474a6d8a35f6887c46accdb3826d8f476739
SHA512b1e686de5dc707a7a87d7d38f5aefc7df5b82d345cf660d9c110d79fdac1ea70a26d207c84a023fd1bcac902e2dd218d59e1c3a10311dd24bcc13c3c186e5f2d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a