Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
f65e61fef44baf841d7a7ec37012c0be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f65e61fef44baf841d7a7ec37012c0be_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f65e61fef44baf841d7a7ec37012c0be_JaffaCakes118.html
-
Size
13KB
-
MD5
f65e61fef44baf841d7a7ec37012c0be
-
SHA1
e9797c3ad75bcffb26b491f277c3d86c0e78ae71
-
SHA256
54c92fff0e84a3631f3c254c91a97dd9c8ed9f3c6529e2528a223b4051db8d54
-
SHA512
f35f3f752d673cd51f2d495689854c1edc18765c812413cb0fe0c9c03502d0dc9968b4abf5db52d7774072ee7425451e054a91b9bc9aa133e5251726abf628dc
-
SSDEEP
384:vfbTSDDTXGerWtNsQdEsFj6XjK7MpT2W+W:vfXSDDKeeNVajK72TN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000005da828d57fb1ca7b93b4accb28abda4f0d828bde8fee6bd53fe7da373b063cd5000000000e800000000200002000000027928936222dc24a307da3f9217a776d3c55a84b026e9066d34336b0e3eaf6fe20000000f7f144d4588da7fe951ee04926f455526140727ed223ccb92f20107d0f0ba36840000000c540aceb12d96f448c257c435bd38a6ad2ccf893eb80a5d37f78054714c801440fe3bb4e9ecd332d0b3b7b58578eca68b59a712dc1c896c12a9ec08798cbc6fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{838BDDE1-FCE5-11EE-84A0-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80095797f290da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419539188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2524 2212 iexplore.exe 28 PID 2212 wrote to memory of 2524 2212 iexplore.exe 28 PID 2212 wrote to memory of 2524 2212 iexplore.exe 28 PID 2212 wrote to memory of 2524 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f65e61fef44baf841d7a7ec37012c0be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5008a3394961dbb6f2cde1c53c62baba2
SHA19fde186282a46def6ece392c361029fe5889c663
SHA25636a14a1fd9a3cb36ebafeb841e38530cc2ddddd123d14d3a50079841422e8f5f
SHA5121fc2c8e9717d8976eaaf015d348e273eae725b00a491dc27d0e5e244e5164d6be424062ba1d11acce95c9d313b1df064e624838f1a00a8a370cee665f4c1fd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5214f55ec0923cd0eefc1be7dd2546a7e
SHA1d395614d8028875a243ebea38472f77c72d1a33a
SHA2569107dd8090c2cb81d161a3d6fc18d89e97d8a7c02394272d58065c039b97eab5
SHA51214429368eeb8c6cb5894e40246a820b23a2dda536a732ee020832f67658108aac18a79c57cc835f679379d7f4e496e51b2da056c8cd091300d7a99a6cdba9490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51836a9d7b581d20bb854653bfaee9ceb
SHA1498649615522cc2d69a9ee776df8bfbd6bae3e6c
SHA256045b8cff4d35c4a3e40d708c4cfa55db3a381e941eabae6e481f165f71905f72
SHA51262b1e25c224abc89e56b438256c80f49b152e05aa25714f88b2a2a4d619fa4b66e0f6a5d059d198ff28afab34362f871f50873180a7724468e29fb91491f6f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d317d667f6c1e825da5eff3ab4f59cf0
SHA1981373e31ba5a8de8c3e8e1bfe75dfdecb09d497
SHA256a9a1f407f7de2e65dd592c4102b8525969cb4b1d416adbf85dc9b1adac70b03d
SHA512bc3018b4787faff28ea32626ab7d52ab6df1f1503958821f8d09692bd942eb6541cb786bab7a78a1510d1b0883c2604400909881b02ba7f9d2b35e34765fe4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97859b0d76360baf8d982257d980de4
SHA1f04351e5760515480a57c2f001e06ff81b29dea2
SHA2568c9ef2d0b1b589b5fb2522440caa627d8aa3952b56a39c0bf05e0d9d0425634a
SHA512413e366b3f8e22938eb5263264637674aad8502745dcd83cb4940cf5bc00065ee3b286a0f7a532b0a28cc3b7387193afddbb2c8d9dcaba0d1f038b18d1458b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570c00fa9bd49476701a47fdcdbb993de
SHA192a749245ee05a464fa5e1ad1215053059b9193a
SHA25664d4dffc2aaf9df1f4a819394218ac6d8f48de899a32a0720980f5e1f7e02e75
SHA51261ac2f12667c831c9b546ce21cf19296a4916d924117af19de767cdceb460728875ac368ac0828361c40f9cfb5f8e475956dfeb61315f52de42d2768f7284262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83ce94f8c2d890ebfde4485e246f612
SHA122f5ab82b222c4ba48d646085a03503592b84ada
SHA25654d23c7dee099f744d0da254929df6842b19c203d503b93b4eee011af6323071
SHA512f5f4f9e074c05f981649ec3050cbfe61383fbc18ffbd6e5f50dbd9f5f254cf55bfa5d263dd66b54cd121e17901a3c086832f9617b211ddd22a143f617ef02243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589be4f85b0e546aa0521ebae8e620e33
SHA1ed8240ed5f83ba6c05e38addc888e30246688721
SHA2562b73e4c63a199b0659e43e61ebea70b3ab6b04a82f33e1752b5bb0adb32f9279
SHA51243ff9fd6566a5219740cfe13de05966e45164a9fc378568cee98f6d5cdeb79a5818da05eb9c1592387d456655f749a57987f3de5bd6d2d52b7eb1b62164f96b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afeede575f79d4adfb74440240c8e726
SHA10cfe5936fd18f93669b93b50ea80644027805c1d
SHA256c7b20df953f8e43c6f5dcfe083ebcdd16eb71347988290d2226e33ffd764799a
SHA512ed47fc7ed17e0ecd73cd02de7e93be3cd928fbf546d817b3779bc402086cacb901737d0b9e43c2b9d4fa23352b2fedbffabb00acb800aea4d91e4748317193e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f1b38adbd7ffeffee5b4089edf810e
SHA14c7beb7baa05b53bd51d3905df2a0cad630ffcb1
SHA2561138c5fde7714cfbda8bc4fc16b4bf2b7a7bb4fe8cccf16d3e565881cc1562d5
SHA512a2990ae3d8df7aeba976b435b05a00a810f43c4c93851c5cdd1b38364eacca984e65a5b453595de766ae4ea5dc6805dd1fef350841cd352ea90baa439206d796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda650a5d9d42fba8ac20be4544b0283
SHA1600f3caf30a30e4902212abe1b8e04cad4930b40
SHA25682f7bc7ac1414d244b102ea97ead56c7c77325e3e7b40621ed8fda4b5d49e4ed
SHA512d1bd452d18d09fe19fc4a90396b429aca7da375422ebdd7d5ee7a6493d9fa231d55faf60902a5d34658280fcd6ffee5f1623bbe6ebda8175002e36138bec1b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01313d5dc1bf206effe3132d3c14cc3
SHA155e5e96f41fd1b1c5a32b5e336573b9da1d17e55
SHA256de51b7aef1af1583fa1798235d0dda4ab955deb39ac3abf55e61bb584b7dc53f
SHA5124e5c043f02e0c21fd6eb519e710fcb55ae50397a1c921b1730deea9ecb00a43a8fb1882429c610f0f4e2746a486df75a71ff412d567cdb927bc6487339de4a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521fe7d40ee20ab696b0ac3a6b9226b38
SHA1c897c1a31dcbbfe7afc116b2406b46b880ea9daf
SHA256efc124d378c35b1287bb18401e70b05acaed6fc594e7929d71d840929ba6144a
SHA5127936c3b3f4fafd046297db528f4e63ebf3477fa1041a247f10822d0c9f7b5793415afca07b281b2306cad115a80c70370ffbf031eacf6c588369d50b2e862e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575a8293a6671e238409f46d0bbbe531c
SHA16b2ab54a314fbb598b8459c611c1ff7d580c099c
SHA256ffa82e77cda7ce96e6b738282794067f0f6f34bd753dbf58aad8dd77bdd720cd
SHA512e377deddca36a17832cfe0fbb91d1e837a5501be25b279569448374f6eaceacb2be32fa38f597d6a6fbfebfc3c05badd9e404f78d3c6bdafd8ef07bf7c2aa983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eedb33df112e3d2af611414c51e969a7
SHA18c0db10cb201037602538abbc3e63ff81bfcf698
SHA25616219dea46a2ddcc79ea6cad6b9fd031502ff3b1b9f490b9a62d5d79eb7e84e7
SHA51262f3f580faad6f2b8c721205c300f26d6761913e7037d5f9750427b741c4bd2cc84b66b40e798d75c7b07a89f201abb428e0d4f06476cfe1a572a8212698a8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be3d50d009337d5ff8bf89bffa006be3
SHA1d2eb0e79f6c5196611e0669d4d87b1e987cef79b
SHA25638bab9caa82f3541456951f873328cf4159bf953a8027a0a4ae33fb1d2d271a9
SHA512034355ef976351b9b8a2f30ddcad77647557355804a50c5673a38d43f5a00915df592e6e152ac20e6e9883fffb596ed3e29f88b1b88f992894f9b7c7f095cf6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c4740d6e85221cdd8ec66eeb2b16a4
SHA194e1030d79eadc3af114eba5dcf7dd8d1579f04a
SHA256242a1468fc760a0c663077f2a8f5ac07946cab35fe9d287e5cf1728f587a87dd
SHA512124c2756c939922730ed1fb998c538a019953a403d35547e36da251d126cdb98206ee105aa32c3b8e00745aeacacf7be561b23fdfd1aa8ff8075a48855ec5e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea423d56b710976fd7b726a3a6f315f7
SHA1b27edff6aed1ca31ba41d4b434c64d2e74ebcff9
SHA25612b59286378d042417eec62d91eab5cc951363d33f7385d83faaa2b165c00a36
SHA512118894faa5592dda94a0b8fdde548916d756b04f156719c08cf89a5e8c08b01cc146c71a321d3f6574103569f082bc871d02b1a1a524f3d4b8517d7e3b889ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a1518738486be48f78dfae9bde2532e
SHA1b7ed1d25f71ab3f293ec07276f58209f171cd587
SHA256051438040237dab99e643868213ee00fc3c33c10243fecbb46baa862608733a4
SHA512606cbc29faf27d9bf73be69ff8adb289b00dba839fb8122ff3b9da47dd9670ea0608701ac836a632624caa3dd93ed062c5929fb432534dbe086e08269e2c818b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a