Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
08660682fbc0943ecb72d4ec2b26b5e4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08660682fbc0943ecb72d4ec2b26b5e4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08660682fbc0943ecb72d4ec2b26b5e4_JaffaCakes118.html
-
Size
24KB
-
MD5
08660682fbc0943ecb72d4ec2b26b5e4
-
SHA1
5da2b27f73af7e2c8028eac7e7d2281e1844d405
-
SHA256
b6d4c2f6724863a335b16a0c7211d1a6245380eb89d8ed7309ab74baea296725
-
SHA512
021880fdc99eed85cb6e4a71d07a58d8857b35d19673723818bae53977f99635b9608055c5d45fab5408ff47a81aa28bcd2709327e3dab46e6ffe25d00907819
-
SSDEEP
192:WLZLwKQIUOCUdQ/uQe/lCpqBlTiB+pIuPi6brY5WafW8OhaEZ9LgV4MW1ThlCp+r:frU2/INE9u7Zek1TXEuFD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ac9df9679ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009fb98b3d565db287c57439a7b9b223f2cd2b667f9f15d8814d93795addf29857000000000e8000000002000020000000f43482843f4827bc90b84a545d75157301e6a111819ea4092e90b075c6a8f6f420000000abc2ecb4cf075f17ea8fba474f1c40f121232502e9e2901c43c4462c717c8100400000008fc95e79a6ece3b5eb88db84a7bd11d68cd939ece6ddacff9f1e3eb3ee8a1330384881c705549d52a1b0679a99c730d6a8e1d3ca31b876d3de51680bd8d0af22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420579268" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24EA9271-065B-11EF-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1984 2236 iexplore.exe 28 PID 2236 wrote to memory of 1984 2236 iexplore.exe 28 PID 2236 wrote to memory of 1984 2236 iexplore.exe 28 PID 2236 wrote to memory of 1984 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08660682fbc0943ecb72d4ec2b26b5e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5727a82a341bcb8aec0b89270c6af65e8
SHA18d156b349f51125dc6a5b2734a4cfbad45a749f4
SHA25663a75c6a9022ac62cbc8b9c370f3189b7aac076d7ea559dd86c57f600b6c9f87
SHA512a3198a855308e52b5126bfdf757afc5f1c3aef3bdc13349ba4b4f9e47c43b8db20a5f3dbc8b8374a7c6cd39f5eed5549817f0e2b726ba4c537a1e380e412c39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7845ce799bdf1d8c960641f12fa36a0
SHA1d5795042bcb0e90301d8c5f16611ba22bfc0ed5e
SHA2563c86b2910ffa3aafbe805002fd6df15d3b358342b9f4e8a0c4cbeefdf9bc8cbf
SHA5127beabdb4af65db7ae63fffe3d3f2ebfc271b599ad5dfcfb98aa047059cfa42c4e998d291fbe97a35e2e487b46e6579fecdaff1e5806b9a0d1004aa93a015948b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57009d0f0883885f78cb8563cbd1c90d2
SHA1af8c0c14a95e9e33b8f89f6a9a561edac429f051
SHA256720c7d6ee1e26d98bb1b3723e11a9423a3e165173465c0e2a0ab26b774d818ab
SHA5124023c3873b3a11719e57deef4e55e09ba1d95db9ae7843b99b7284f70094262058b593496bcac57d141bf6974faacb898fed532024a8116c153238045a016d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c68229c74bee0d8eeedb5a9aa5d2dcab
SHA1ff19ab59562958c799cf36871c0c5f1524bba645
SHA2568cc98450564e3a04c5ffd8537ea441b251086c5382c7f97c10068944b4f018cb
SHA51275be6d5923cb48775f93d75731aec81d521b530eb11a47a50b79d702bafd8a1fe5c637801fdcccb3570e1f44f2887e846aa7099ff648572bb15b0bd732530640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585e173391642c20b2d676011c30bc198
SHA1bf0dd9b73c4d98f4cdfa352938406fb2e0c3d09e
SHA25668dbf37591ebb28dd7e9e383ec8be76b00d67349e032fb68955b3dea21780d04
SHA5125484dc9db21d3d3e6b7b8ce56d2dc9c4f8669961b35976b101bb2c3fb83fbe64d5f6d24dab44d29b1ca813bbbb43ee413099eaf9cbcd8478a480e7ceab3c948b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb124676c373d50eaaea889fe64f5bc4
SHA176ce28d67c071fbe8b19b156a1c21088bdbf47d3
SHA256e5536f8ad67fdd8ad4c5f05dd62d0516ff5c1cc68e4e9fb2c7ed7271f1063442
SHA5123809199df1d59b49e94904a051390fde860bca20d09e3425c66da7c9dafacebb38891f6efb02261f8a12d0fa6e70437d3db6a9331323f54faa8199ec054277bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022e0de134b4c0fb30efc8ded69f994a
SHA1d2723ba0947632c063df9d9b31646b8125917f50
SHA25675362527ccbcbc1a3aad8b3e331da7fef4a837bab3eef6fd6a364a42eb533a17
SHA5120980c0920b8a1c61622aaf1e83c785faaf87b0d62db43d5f8e5f4d40a1fdc893cf1f9fb06ab2f23f931247109f6c12f118a9e3d766af4e5d8a52ba9a317b580c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f54ed67eb83a915e8f8ffc06c1d548e2
SHA15a05ce43c532477b00b3113fc9f93167c9331d4e
SHA256865c68179b1108c5574ea24d47c5bfad965ba226f0ce0360094c2b6df94c4963
SHA51241af0a8240c5a05d49a26826ae7a1684092eb6f6c1652042d9331186b77d407004fd4a32aa365923275187bda9e4ebb974df8694b333931094b627b561ba0ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a205e59b4e18fd42978c2f6132d9cde
SHA14164bb092139adfe827fea49b1a06e1d91950403
SHA256cd5e3584c5c382c163bc79133939a6742d57a187c065d19d7672759808ecaba8
SHA51260881c5392913b6b794be65557bc470f0821d4912c9045fcace43852cbe80511d45d81145e0138bc7caff7342377f52806b441c61212a8af122cff72e7c9ccce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6b71d60e0d2728e8b399589868267e7
SHA1884592b75f22256ea1e0d7d2c033548ecca786c5
SHA25644ca4d2536911c6348076ee5e8f57a7814d34a342453d170515b61ac94e61c84
SHA5127ca2f081ab2e4c41e5c9d370287427a3c7cc08fdb3b346745fec1559c58d00b5f23c642dee69be8c52def469d8619548d73838cff6d201da4478264e95d6b38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51824783b094c00fd3a91b79ed51135d5
SHA155e01680166a1bc95521e0bf5be6a632826dfed9
SHA256d864b987830411a876c69235086fdcfdd87a05eacb120b931dc85d529ae831a3
SHA512b8ee2246985cb9a62337118282184d00f8402c4052999cc15ba8db0738b994c0120bf632e5685b1db18e1cf247b571d4e0a3d1cbeb4c1cf8644431f780b7b410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b04b998595caaec580d2d81a6cb7ad
SHA19b87c9b93908bbd8c661844864c9cdcc6e02d8cc
SHA256ad28a2d1ad39d9b977f975f9a5f37d4023486f3c8944b552fcad5c207fb62684
SHA5121d7b570aadb7a6e18db922abdc1f89659731658f399aa1ef60761cae4d008caa742b8b1d9ede4b4432890fa81db71f402a1fe28f6d97015f178bf3697dea27be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e05317f100be441c9c884de8c7ba2c4d
SHA14ac91bd59f11eef80dce94f1f68b612c8a2f0511
SHA25621d328d0f286d7d415dce29b44423ab4689258e21c9efde37c6d5dfcbdace70e
SHA5128a489d090a26d350fc9a133fa396c8665952fa16424f5f8b84f24f8b3019ba4de1e58978ad7f9b3ca7aeb24acaf06fddc226d57660de02ed890b5cb629be407f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046243409b617674b91ec96ed28e4270
SHA1d82273a6ddbef5eebf9ee1836ae3fd0b7599ac51
SHA256369da2df3a732a8c4ac7507e1aa093882ab3c92d333fd9f541880c09361ba0b0
SHA512182046e5fbd80e5f4dd3bc30eb413c2ca7ace56f0caffd66dbc8c78a75ab985cdbde818d05df2d50438b887f1e4e7e2adcf2c00e01d247c131778e4b9e9b921d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b781186fa179b92668b13ea234af5e
SHA11b2eee80f421910241b75419d6ef9d1b600d5204
SHA25661282091670bf07d3f2684ed9575ef8ca0c0f0b6bad60a6dad9f66416b1d1d7d
SHA5122a7cbc135f7e96949b85d68dff0e9a10df046fd66c8f57ebffef72ad771c10dd5ea7e7febbc71dcce12f5573d60b2da660a3c9ade5a01f016d89898eab45d8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583006369979f593d9a20e103180ab1cf
SHA1907502df75c8a85c6b53b917f2abe9a04fa393d1
SHA2562e239c860f375ae3cddd487a9093e1482bf14794a30c2f6eb2250c9c4c987a0c
SHA512a1240ed533c166c3db899260a35ea88e3c86e9570b12d3e690a8d5c127452537c54dd7556e7f4f130c040fccb61dd0a82572b411a855457d5fe7469cd629d2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56650e60ab7bb1d4d3a1727ad13692caf
SHA161f85d094749a0b2f03a6b36b12afea84110c9d2
SHA256f3aabc2dd9ccedb03468cd2b6ac29052813c1a50bc44530d6a474851ebf4f23b
SHA5124818c715a9a327452e9711220ffaf1b0e3c8b8c5c7a6e7a327956df7b4eb2d8f0b348b1bf77467022378bc7e3cbc576073655a2308ae387931c820ba926c7d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db21ebc69e79b22f38a1e1125135ca5c
SHA14afb25dc39b3cd6c19f25bae03d905ff34925bac
SHA256806a1e21de45522791f74718646895ee76745beadcb1043b9e8a228054b20620
SHA512409e31390ebe062c071efb660b9e54ce2a0b4612fbd42e39b827d5ee6b03d30697c6bcbfb65136f5b0af8da6424b9805e3906138e41e64cb3bcd12e259b7235f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074ca82b9099d33f541a92388e63af0e
SHA1cf5fc2628a62490b715e2ed2335fdf9a5701b624
SHA25661c984c745ff3e15da4b0150fd6035788d93fb39f1d791f1636817a0034a3f25
SHA512802f859fdb1508a07eb80f45271b586aa51252fa232be15eda41ddb2040e94b9993132bd2507d1a91a2e443872d59d959cb000e30b31afa16a1af3ab54a785f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a