Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
0c412bf478fff6a5ebcddf347532d35e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c412bf478fff6a5ebcddf347532d35e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c412bf478fff6a5ebcddf347532d35e_JaffaCakes118.html
-
Size
4KB
-
MD5
0c412bf478fff6a5ebcddf347532d35e
-
SHA1
58aa2e6506456d3a721fdd4c0f9210865ffa1235
-
SHA256
092d477c759d0906a33c7be67abc3ea2c4a1d206dc2cbb3e20a1efe405dc911b
-
SHA512
6ab921a3956046ca8d9d31cb4090ea346c756add02c83512b0b8a791fec1775a84873cd1b3c5a13c9b518b6e5b62b5347a8a5ba07b00e636dadf1922848c8bb4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oSd78855:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420742227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{900B4461-07D6-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000045beb035f67f7dc1cacaeacf261c84b2714f4ad77cdc4f6e24f44eec2615306d000000000e800000000200002000000047be6334441f19b7e8ff7b30edb09590e6ebb63e7e24d4e068706480932f30822000000058031d8ef9af5fe0586052efb6fe89ffc37370b250c17d6cb4fa045930faf02540000000ae363cc871b966fbd70ea8da27f20f7c3e728d6454d3753874618b718f5e1fe194c73026fb46ba4894130f28bc47a77ef7def6fbebc5e3a64261471b348337fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90560365e39bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1448 iexplore.exe 1448 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2744 1448 iexplore.exe 28 PID 1448 wrote to memory of 2744 1448 iexplore.exe 28 PID 1448 wrote to memory of 2744 1448 iexplore.exe 28 PID 1448 wrote to memory of 2744 1448 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c412bf478fff6a5ebcddf347532d35e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55239ed7eb240496ed8e71bc2bbd87a00
SHA1d82b9ad3e63959ac1c0c038ab37b5f0df971e80a
SHA2568b34480172f0abd3ae2f93b2fd1c805008e0f36b6ce29bc39cf83f3b20547661
SHA51220b9d19b7b4cc1fffc37ae3841256f46177f2dea6a7923b2dab773eb5ebaf04c64dbd97bb40ea07e4b79f4e673b0d229979c990db5d5cfa6951a53c7720c12f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650bb9c0032c52190ca988479abb462d
SHA19ca9302287c302fc568fd50e9d14cc82983e7c4d
SHA25674058d868e0aa541174355e4b2fb9bffc98538aa068b5f01a4c93a9a5da4aecc
SHA512244b84ddcefe46f68fe9f11790a630359aa871619832decdbe7579c3f3203c9090dfe8847a0ecfbdb61d9ceb6fba61d700fee4fae76f69f435d66fa57336ded6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b9af5f62e12061f68775870081909e
SHA1731eefb5c8f3b0b58cf175abec37d2cfd965a873
SHA25674ef5fdb31b263823f3adb9593e3c6023951b02c35808e9cffe2d6a2a32b3f16
SHA51203fbd6d4cb4a2cc9579bed9cb6234ce3fda9bb33d522534c1c546f259436c7c8ec0fad3aba1af80575fa868155c62dbabdb25049f593b41a2690770c2aefe34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88914b75131843b6a141d79ff6dc0aa
SHA1c3b22df60001ea57f45a20ce55a25ce1625dd2fe
SHA25600871c5a9b6389b3f9c96ac4002d0073478b69ab4c5165c207c379b416cc1889
SHA5128d6af1bce864ac897fde2144752774942cfbfaa10c27a1b6d4116dec1b9cb145206f0a62cce914eaa572207a6706b210da504cae7f8d1aab259cc7d497c59dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be6b6b6d3f128ac26f6161c159809ba
SHA1294de87ddc8f758bac228235637466d96ff1a0c9
SHA256d38f88b02ec8c7a2efc0c23d7496163114233decd6716675c034325febffa4be
SHA512b8910ddc251982e73e0ad88958798db2faaf1eba846ff4c444786cdeddef7894399068091d22f5f1b77edeb7b8c3c980b908f4bd25f99a3e488fb21374ea3708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f18718a0cd0856dbdc166a6580ed40
SHA16ea05e4691a1fdcb9d3ef732a2bb785784213755
SHA2560662d077e2220d04f583503e4198f6f0a9f627b546acc8d85820bc1aeab752d0
SHA512b796dbb67749778b2c2cce8976ec9dbd022fd62068e6ab19051a7e1097e5c057a2e16aafbec4f462617501390fb3d76ba2af92efd4c6da6b6984ea064a53293f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ffe39c4df1f67d5c9bbabf1ba6bb427
SHA18d9e94dd353c4fd129c46b61e20c5e1b9825cc44
SHA25648388d7f8e61431174a52e840ae3e8ac13075cc3dbbec53ed9d56e10d1b08269
SHA512d5c012190793dcd2e76b5e7099e90bd8d3bcfd85f5bd6052568066390aa4e56baaed2a052b41446f503acdb0be38e8a949848d1011e16a344e377f16604bfeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fcdeea28f7e2afdb8d5ef2179239726
SHA1cd5f9c1bd550a974aed665952a952234e59bd640
SHA2560106388edcc2a7d03307ad722a01158f0bbd9c695a2702628ab5e4eb02ced812
SHA5126310661715ebbda3bc2d781e5fa01a04bb4bdd1b58936a1cb609e033ee2c65579914b26a7fdffc6a49c592c11d686e7e41fd6522444717ad65b8b8a7cf6edc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cda44239db8bddb00a5f56bf036d31a
SHA17e4caf5eb804ce8a7159a016265e7b3e625f00e2
SHA256b6a6f313c6908a65732fc5be1917316750dd8bdfd7464041366a9d48236d9277
SHA512cdd53cf76cc0328af00c67d7c3b42e7f9f68e4621f0c700a4745d4c7ddca5863372782c8eac95840fb54a2385b1f3564dbebb26451985d8d761c743f8d2f3ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0b1357c066f90193fbdb4fcdf0f97e1
SHA18ee48969ed844096c41c507e06fde93895a85aa8
SHA256ce686ec1af5458ab8a6889844b1e5a7ca8e8bfe96121aa723f282cc7320c75b8
SHA512bea17e8dec9fa7afeef7d7f9a1ee4314d3882f0b43fd68949c43a5ed5dd1ddf3207b935f9031b4e3a3d4d40ceb079dde8a15fb5b0019153a057b046398c7934c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c7020fca25b75f05750e344c918809f
SHA193e7015f89a04cb63e72269f503e957dba872816
SHA2562802a63350a435cdb2bdf1da202f5037603962307e46b6c542a511fc301617e7
SHA5128f37dca50e4501cc1838ef97e419f0ee61b7fbf9dbf6b593624b44d33ca38a2ad82988f50a6ef7e251568d4728995e06f9d942593251320c44ca3f3e21946bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33a865eb2a51da54bc51807338a92f0
SHA1a41d9ba6edb7b80e27191ece8b132ad9ee26c3c1
SHA2564b2df049ebeef0ae0a7432074519468ea0c383937a486735adf650be5784e297
SHA5127c2a5f8cab7af54fbcc61cf99980449f64668bc94927f5b09aa33636b7d9de555b4a5c37d17d61e2a26ad596f89d4d01fd16181d09ed68bedaffc5f249e08d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ab10e3795bb0f1d123acd8b409b5ec
SHA1579ead0244adf415d3b4809de1da898a16845c5f
SHA2564a091b7abb0f2e2e6c077c442e668e3170cbe7f65cf997be184d7b51ddf2121b
SHA51297cb987441a8f1818862b5cb4cb2628836574a8ccec861164254f9d38d45edb3928dc78d1db41abe71c866de64b2af5477288442a1a4d6405e2c51dded6fd642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588cf0264ebf5ff1ce6533463178bc604
SHA1d3f407880f57030195eff82113ddacbf7b2382d6
SHA256d2391b22f042eb2c984014b192f7f2e4eb4bff0943075453a9e1cd92a116c65f
SHA5125045163d53e4969e1a4480993f0ff37d37ceb8f6bd78772d15bfe728f259e50385ae2dc257f7a0e7c42c39dffdd97d24aa64291643ab857d612e83c1de0d0b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346ce52d7387721371a971c30f5c3bd0
SHA10f31e49119d8700d45d559dd07ffe1a2eaa2ffb0
SHA256b2ed36838569cdee2ee9f6b22300d1fbb91d7fd948b5efde4f18e304e5884212
SHA51279b8ee0c929f282df223f6fa23f1c90a71da07c24eba354b7758d0b8e2cf5828cd08e3de2875b9134bbc2699d9ebbb244d544d684869bd481dcbc84198a7a8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d75f4482cce4861ebe4c9b32f0a494f
SHA1a658e1e6f5b701134c5b1f1bd3ddb1a389977384
SHA2566849324fb0fbf239ed4e4949db3b11a4b7c9ef8e7f296a8ad22399dedb05b887
SHA512373aacc2e2a7bbdc3f2ee70f8e288a955fc149b9ed5d895b8cbdd1e65bd8a745105e84a33d2d596d4b31099e40ed8d54bd5e8874f27e78c62356cab0316fdcfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecdfce2a71fb6bd5e1c6b30e41df25e4
SHA1f70e0bce248e8dec1294d27737506e1b4f0b703d
SHA256d7fafc7f8a9ced112b358696a54003803feb0b507fe6feabaa2747d3054e6cb4
SHA5128e0a332253bcd132248697510bcd6ea057fbfe99cfdbe205e14da44960eed14906a4102a9783900cd26b0acb8cabdab192b757165a92a85b0abd81b31ce213aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b957b323388a55f8fbeaa7b0fb01d2c
SHA17817d4900248ff3b1411884e7e34fed7cc343e42
SHA2561392f0ec32f1d88b9a13265bddb8841141ac1961ac406944f7c6b4b9d56b4a9c
SHA5123de03ab79fab0acc14136227ba97fdfb59af9ccec48d1a347a3aec2218d5fca1090d537b005de8f02b824dd3179c753b4fd4bebe3154a5ce975134870c19bde6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51df12696dbcfe9eaf9b38019f7e497
SHA1e912c128ccfead45d7362206cbcda4065076ce76
SHA2568b1c91ec3714e655ac239596a468876c71b91943d203775cfd86e65a273575eb
SHA51264b4dd6d3c998b5cddf4589be3bfd903489b5732ba30e359fedcbe6fcb70b9c90d1813442f9b197c19708e13b16a2c9effc955df0ef097ced766a895a9cec8e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a