Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
0ca8d073d5e1908d86be2ba433d6cedd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ca8d073d5e1908d86be2ba433d6cedd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ca8d073d5e1908d86be2ba433d6cedd_JaffaCakes118.html
-
Size
4KB
-
MD5
0ca8d073d5e1908d86be2ba433d6cedd
-
SHA1
03105a81c9f77858571d15926bc0e1d481a3a996
-
SHA256
b0bf0e4e6c1c21d3d5ac7a4345149f6b282f9bab0a8a2ad4fe761d899db0ce9e
-
SHA512
2b99e1a84ba6f9f46c5f8e9f640accbe96831a9066232dd5a0bfe7109cc23cda04345e1cf009805ca4cdb45cd8705ba30375b3eeecc14b882ed2d0e04b1cb0a6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oUPEMd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c32ed1d20ee08be9cce15f4886e36d21a1b45d4ea8138bce8dcc0faa1d9e2f96000000000e80000000020000200000005abefe98996a4e00058eca42a43e66663ad35665fcc762ccbff25838a90138302000000012cb66e33ca863f60ae3f7c1fdd6f5e49f4ab5054de0eb6a8c90aa7aa950979a4000000062a565d042b78a81b8f9d65207a7efb0c08bf8c5f750dd1fa485df000dcc0baffa00223bdc9a39da27ef1cde70421fc5caef8f2c1387262087730d8f56b3dc23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEE57421-07F1-11EF-AB14-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420753902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0707b93fe9bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ca8d073d5e1908d86be2ba433d6cedd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa839f3365f3ba85c7dcd690b18398ca
SHA14a6ddd03b25668e53e6d67ab6d38edf7637f2d08
SHA2563c65720a82cdb283a1adf1bc510ffccffe3199b3c2a8aab39c84782185ed7e0a
SHA5120c9cdbd44de0f32664ca6c3966bb93f81713d7635ac29dbaf651fbece5a1ca662a0801d3dab8329577ef0a7418b1301e9e65d81c02e87eb6f34949982e5963c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fe0d945971fc139626af25f1d8e6c0c
SHA1c7b1bf070f2592902c1f9145a3d5deb56d1f1a1c
SHA2562879d7ff8e157c5538ea1afb688543cd810d0be7f9d4fd8a0cddd9ab1f9150c1
SHA512fd1cd6158de5c9340db50fcb9db817b326e24ad7b8d166318fbc3cd154d222443f07482e671aca6f9b3e339781a41e5203899592411ee1f5db9ca8991e83792a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fdc9c1ae4b254d129176cc05248c39e
SHA109a81666bdca8d83fc5909068bcaf9a094634942
SHA25657e6e93165fd61a8375fb0b70c8d4699da04a8b1a0a65292762f29d15cccd200
SHA512d12ca59d4a778dc294efe0cb122d5a90fe010abfa4283f7291ed2a6a29109595e73f45966e0ffeed3a4bf9418d3e656b05489e69110d70b69fece075f771f90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b842fb400b709ec1c8da61f5db216eff
SHA122b310f33ddba001d1869f615fd78c39fa798a27
SHA256d61bf2e108c61038a214a208680cdc9bec9d1265fb8099c4024bb79584568685
SHA51222da79bc13604f1f9d36c1e69900d3f407d9887e52d79442e6cf6fd469f6c92b3fa593284d33d6e4f3a76ba00589901409288bcf2968544a46a7c3681ed05e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8229f00c0fdb5913b6ef1924823130b
SHA16aa4ba7e7384e541e912bab86e6628c42d4075ac
SHA256f8b109c8c048f7d17ea28b16c446e663bfa39a70c13d9460df8698f991afc12d
SHA5128e0b5c5b1c856f80495ff62affed8ebf423fef0951c3a27feb74d125a01c366f3f728c520a510e63159551f9535e90b3a72f5ae7556a6f89e114fbcf85d09f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5683cc3f91eb35e9a0a2479a65664deb0
SHA1f09178e4391514e3ba153d14b2c3ee599146da3f
SHA2565725d2dcf8640862bd5ff739a907ac9dad9aeb43b998e2bf388bd758b1cbf3b7
SHA51262afb466ff16a434823dc7b924ff704dfc09c912cf25d8296e248cb3fa9a2987793ee05a609ea54933c1b10ff2871be334ce1b7b94de1d0faa58aa27185b39f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffee57e2eb6e2fa46f747b5f0b69838b
SHA13da7dd6de24befb8384af53dbd11c1fe34d8d946
SHA2566de04f1a12392ef6264d5e1a18912a6ed21d4d9d5e23251cc62e46f5e8ca30ea
SHA51228f78433426f86dd9de4be58e62c460a5bf6e96ea633850840e3304c72a91d4e9add04a11c12b53dee002930e0223343f7e9bef3ccb914ff29117b8218d9b41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c719ded45cad6f1df5e1e374b2d5e2
SHA14c99282b5f722f409ef47ecd6880420a3a149207
SHA25689b397734ee4391ab73ea7bf68e8af919b7e0a56e2be9f5fa4b5b84eaeadd95f
SHA512b67a65c2cc0775eac63d4f4544e58003c3e961e8e78ce450baea22fa7c350e33da178c22ee8251e0a754ac38751b4c1008d364fa33ca5278724c67bd38c138b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b5a96236f736daf95deed68f83fdf0
SHA15291e788492ee52d3c4fc3ef234c31693d4503ee
SHA25637e4391cec93714784a3a81fed692cbd4da998ae8a96527ae44318c63b514351
SHA5126404a4856c64f373ebc14ba1040a46338cac34cc470ed17d4a98f78359a5efe9df324186b1bddea6e4cc887ef34d43f5353fb0f5efe9e3ecf969e0cfa2d44a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd2b39623d244cea464dbda50168731b
SHA12c81cc7af58cfcbe544cd8f14628ab4c6b6412ad
SHA256a5fbb37af24ed088ff5879fee871374e85dc5c337e1d4a33c2662333b72fb0eb
SHA5123782b12e221ae5e64b1a3005020bbe0e425ad62a0211b5d937c66e4771d64e3c15335ec6994a8817687a5ad225078e91776e8c38d6b097307189b8bef1f6abba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee9a57e07830bbd1654045e42f33337
SHA1fd17952e29d6557170a39c33424ffcfb5bf33061
SHA256405c68ed84d87e483d47cfe1653c14694d9f5cbe199ce9a4aa64c88e3ab1074b
SHA51222b66bddc778ddd9f89387e7406568e352c1bbbe387381592b7b20a6ca4278035a6c017126b9cfedf16b3e9198d0063354e1e700be0f1e2f1386b3b301f4ef7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abce173cdb7e62c5ed348e5f5db8e1b
SHA1786ea495fef38b35ec8596a631eb2d603de5c9a1
SHA256f0a2ee45c332eb802c962cd3bb233585dc9bd2cc34b1c2c8ffb027079242322e
SHA512785f7bb6a6abf00561b185e813cc68b5379d185eda0efa166ab6ac0fe62441dbd603e73cb00ac28540a64a3df9231c30a3fdf595f3d93b9f458b11153dd69d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58458b6c2dbc375e6c32f611e1410ed72
SHA11391bd45b168ecd88fbec4922dfe33f55c033daa
SHA256bc2afc3543804d99bce4e26f771533f9e8e6b09717e6eeafbb0581919e8dda11
SHA5124c7dd10dd0bf0c3d9a05a8f06e3e71bee8c455fb9fbbeeb5b43054cc9830ef49290a2d0cb498564e2fd9a99bd5ecc0c51bc4e4bf07601ce79091364a1dc8bd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2c84efba6570873f339c93f91af2f93
SHA1f750a80eb1e62328479397a7ddb43331fda80303
SHA25687ed3ed68861c1b5014383b349b044ed0691b56f101de93424fe0494514cdf79
SHA5124db62ba8d756fb8b49ed640bcb09a8eb8a2e5fb7fa6260fadc26de5f214ef73e39cbf3f3dc6e41bf8727f08dc8c54cbf7025e7cdc4e6f1871c3684a750e85dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5d0ef94eaa769e3b31bf81d4ced540
SHA1dfd751a38c31d74333c550bc3f13548d43136e99
SHA256f84af955a89f44d7dcb27ce0172c85001ebf47550effd8f86d55e5f9c8fcf237
SHA512798b31cd9e157ca4ad402e748f1e783d2a6dbbb7bbee17f69bf4d59bb464285778840a5609bef0e7fa86d070a23a4e083a66040b973aa88dda0bd800633bee5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bdb56c9ec408c7ea189419fd08e3596
SHA118c623a0efff72d7aa1a6d434882339f2ee81587
SHA256d72cdbc5fd218d2aba7c9c7ec323561b4054c15a62a10df102fbee3e60f0545e
SHA512a1a6f8b78e2efe4e401bd62e9d4b52b2ab076563c2b2cc493a0ddc600bde95b97e0610ed37056bec8087d0e77745d649012fab469f02b9829645805e975fa07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5772a3952d60485ce5a95f7cb874b1e67
SHA1d674db7e87054a364c0bfcb0f998d294648c1f4c
SHA25699480177535b48d8f0c624b39971cc3ff95d515823d6caf53374ab0f82eb9f4c
SHA512c89e9e0097dc99b1ee3da750d83ec5dd711c9cab4d100155da8bb1d2e5d8fc26eac3c0df8bfc40ca4ef48096adb3f1cab7141908d623aa43c26d423bcf21dbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fbe322018e3247f611fc17dcf91c499
SHA17383bad6327407aafb160676a430f05c2e4a1a0e
SHA2565acf6e92fe0abeb8a0387be459d8ee9417a728188d21c5f752f831097783eb15
SHA512ec5e1e1f9de2103b7f6667831773900f4b00b33432469a0b52d31f2aceaaf0b37e2013f5d298b8ac6eea5d76c79efedbe6697efa35d497dc64352f71bed14b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a450505e071df1ad35601b4405816bb4
SHA16fce94e72494c33baa06ce7ee6c8d21117cfdd47
SHA2567f3072455c6c2f46a9a4472231035fc18ee2386a2c5b0f8f73d6dd30cd47cee9
SHA5123643663a4ceca75258551d0c6fc3d3a9f8a923bff01378797cb35c92735fe589af449fe38f978592d4347fc1161d03d59e3b062f53a69e2342b0f88347e29eba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a