Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
0db0c8744d32fdcbe5d561644853a5f6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0db0c8744d32fdcbe5d561644853a5f6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0db0c8744d32fdcbe5d561644853a5f6_JaffaCakes118.html
-
Size
461KB
-
MD5
0db0c8744d32fdcbe5d561644853a5f6
-
SHA1
cb26861409c1c8d168837ff261409339431289ea
-
SHA256
fde6bedb1cb53137531bc9baf623b0acec277a31a78317baa9cf0b7954503e77
-
SHA512
34a10789df87ce347ef44013e1ba0d8a00fc1c763bae3221d3290ae98598ccf819306cbda89d51bf15e175b0199bc01ddcaaff1c6c596ff0b958a69472412654
-
SSDEEP
6144:SxsMYod+X3oI+YUsMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X3I5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00F72371-0849-11EF-BC3A-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000fe93ddfc97e5a242e0d1433aef7fb1e1b33825db6e1ba436a9ae13446204df4d000000000e80000000020000200000003ea2aa14df818c62d190c5543e9e8e1b6d19b3088c48d9b4773650c3e54240d420000000a68fa45dff096bee6aa5afd1b9452d197ffc92f9cc83060c58bc38e46044831740000000969afd3a5f1bea4f637dea270eb2faf5c64d0c75e7ad1e306fa7f52dd21ee87e0c697325888a0164c785a61170c48e3a9ff731ff82a3341595ada10eb4a46c9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420791379" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600e85d9559cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2968 2004 iexplore.exe 28 PID 2004 wrote to memory of 2968 2004 iexplore.exe 28 PID 2004 wrote to memory of 2968 2004 iexplore.exe 28 PID 2004 wrote to memory of 2968 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0db0c8744d32fdcbe5d561644853a5f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d39cadf09f1a5b5fe65f1fbc5250952
SHA1c5125d4d8664020dace033f036701566dea98bd1
SHA256926af27fa0b175af07d5acb63471f2322f14e513cf14423ab8ba12179b71b51c
SHA512db58882474acfec010e8d611ce3cd43c4b2ef0ddc1514ee6f230db9ae828051ec4c9f7d93908bc42185c20a2edcc6425ae512c5679880ee87c47725a985200ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c1e3da63d18ed99336e1ebe468bd27
SHA1436063cc2e8674a05e9a14339a47d65c68e60a4a
SHA2565e2651f40a23e071c9f56231055ff690985867d0064a2c1bf34bbd84601eb028
SHA512a5fa6b6b304b8225adbd6d4d999404962540739ea33c13fcdc43bb8bc7c57c6b947ee9963f986f64f2cee833f35b5c22fe6c6b2aa4bdbde6650db3d753432d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509de379ebefcf0000a7d8051b66bf62e
SHA137e349e108b6d5f28d0e2ca0e96b22872201db01
SHA256ea733cf8bc40e54ef08df77ddf9ddb433740f8acecbe5f02854891454ea3cc5c
SHA5128f48c2a4936087e8d9f85eafc017341f6f55b91cc31ebd227b851875e2aa88c9de64b6a5bedf7dbf64d53c1ef4f5e9ab053333a015ba7a51825038b2d4c99b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc80bfc288b76c85aaca4dd6052a852d
SHA19a4e933c62baa308bba44aedebfb9534e2ee287f
SHA256cec1f9afb9237e4550d685a0b7a88ae58f0fa698152fe1ceeab2801ccd5f2b27
SHA512596fe667b38d8383682f70e355c5cae12efd4533170ef2a70f49207b352c5087a1adf36a1daef420778492e4dc4061f60d0c7634ab56a2eae3b975691ff24b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b403e8ed02e426eca0682e5fc4bbd9e9
SHA171f7ee3ba060930a20767009361dd52460c23e0a
SHA2564d373a29ade3c9e48d224a2fa8c1eab752143a3df8bab55bb6fce7d8ebdfb48a
SHA512f9411ab933ed05c897add2d77e8ebf7c19041915b17f7713ab4faaff6f2776dbc9c79070025a4ab7f77fce1ea145857745fc9e63ea77c886095fd7b87b89ae7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59206425096ab3eb931d54091fdc1abae
SHA1fbb990fefe303640cd0ab1e180dcbb7584bf0986
SHA2569b61e43c4beb96cd0e857d142d5873c71d29a18e5e4ec806523b2d8838f18a9c
SHA5129072ae12c709a71beacd6a4ec934d39b08524f946bea72024700c00c1f13da1db3ed4cc8cc4107d7cd23c03450c9a5745903c7d5e0619ad1d0ae3600c76c9ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eed961ed64065cf12a86e4d8dc9ab2f7
SHA1a3c6d8f7cab0a8d317647c2501eb87fc5a9806f7
SHA256a54487c231d4e3d7ef4ea6aaf4163279a51f34bd267da1a85d45b186d778ba49
SHA512258cdbf644f02325f92df48cd4e5ac5c125f6db4aa38d3b6738ab605c46277cd4f4e54761d6e92841db813385ae261668edbcec2ab6b96282353886c8cdf278c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519843b1dee80a703937e829923860463
SHA1f035cbe0b3bc8fc29db30ddba5ca5319be3a396b
SHA256b4798dadb6333bce30b19ef49d3814e0f5bc00152b908cef125ddf8ed3dab849
SHA5124fbeb60f83b5098ad9e6a405da06744e149f6c9ac05a15d359ef3a1173242575e6774306c06773d1de41918bf65e626932b7c9093704417b10f9e4c6dff79a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5073c23f487a5cb1b8416184f3e7ff0fe
SHA1279b8cc9b36498dfb3d3b1221466d80da7273601
SHA256ec7190530e4fdbbb5032a0cacd61723dafa76c7e270138a829b0de78e5a50903
SHA51248cfc5049650759cffb5bc5a411e38c61febc76a9c6ab8265d0d5d38b366db622a7e6dad05fd29863b5b0d107b05665dd3989430a9190f0af06bc201005a4c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff5771d74f398f4c7d6872d678c8334
SHA157e255849c6d945766c502f843767b32f3279190
SHA256ef4b6109dd72f3106c76520f1f9c0c28a5395533c7117884ecd628d86b65cbca
SHA512744e06e1dac810d606a927193df95554560c133b36a83c88bc97c4b476740bc2c7ae17442cd43865b9cb7399cd6b32f8d4687848a750710c258143e81bded9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520d574bb53997027c7231d73232cecd0
SHA1b4f9d6a32e78e4b56d6fd9415d832fb6f8f89b00
SHA25646bea7e9d90ccf6bbab83338851af4e80a860a1e05ade55471d01d6c2529a04c
SHA5126735c9ef8cd48712ae8a04faac32188efde5c572128215fab00ad3e23c949ab4e5dc16625f22aea2fc92fcd71c0d31149e859c9698963f7467e7f24aa7932888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cbe4d2095f38ccf9d793cf3ab4e03e
SHA147bb3162d10169fe43960fef5855f2432df1fc6c
SHA25690e85bb06b559c5e25d062d0a30e6c631dd49729897f1149fe0ad6b5b64fd040
SHA5129cbe50fdc753b77f12c9a8ec3f7bf90771b544b96b2d525c23b0946452e9d30a6334ba434beda74fad9829022213676478e0f03657a6359c62c291939f5e82d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f5ddfc0f72887ac05ee8151c8c833d
SHA189990b8224f530936dc7b3a034a050b40ed17e46
SHA2565b4ece10e590864c7b4a14ac7fa698e2fee056a56afc7775f8973aa600b50ecc
SHA512fce919c51b1eb4f9a411085d308d1649414a9ef97c8745cc434de9a113be544aaf6a9f48053ece5087284ce4e3f78159c6de63ccbafb9064c6b3c04b0075c217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90c53fece69ac2a97a8f4a61709d12c
SHA135e94f4e3fd6fade7b10a00e91048d6bf096c66c
SHA2562918b74b385e2e893f9395aba6d5c28dfb64692c19e106043273541401d74962
SHA512b348bfee38846835fc2d0e435ffe92e5904560ed36f6f617d0079592a095234acc6d78d97e1edf8b02ffac11dda2673c4dec4a88851f25d3375e2b140674e536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533766a0a7c531c3f248b76473ae68c0e
SHA1072670cef119895b2b539373ace09ae6084041ba
SHA256679816b9eb0175bf61fb4062e63d48e19b9a5c942eccdf4c7c18d6b670c01af7
SHA512b64232676e36b43e977ef16dcb906299d0414c772e180c528ac74be5bd17651835599ab0474f6bfc33b48850ec54076ddbc8e0ec636eec37714ab5d762005610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f03838ea52b1714c196a5f61db266c
SHA13e1fdf7c1a0afe66597bb14aef5d4b52ffbef6e7
SHA256f5294c186b2cf1e5895eabf15346aeb356c701f8991ae7f8c1126db2cef687dd
SHA512afcdaa21a4c031b3a8973c6c8e6cb0134217e64819d497bd92cedd69f3255ae3c296f67c091d095a5f1aa415ce70fa48228b746729fdef8b5abca9e504d76353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d59c461f5542c5abff015a91217948
SHA1d03b1ae7f50f1d421870528b42fd537be96ab56e
SHA2568fe5e48e549d09dff7888c89ae2c69cd3305e0e78052a58df2bb32b1d16a2ddb
SHA5124001aaa31d01bf63b01e432873838b333a15498612be5bcaba9e3e13c388dda0070ac587ca78f26d4bf243a727cc1b4979ac22853d8cd1ae964c90f5529f4fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d093d230cf63ec5c8422eb220aa0d0
SHA15e9bd4c65be5c73ea44a8b8e9a695e41bd8dadd6
SHA256898d86ed0b5a0b9771dd1a393305de1e39185e08c2b9f7cddca87f8b3ba0dadd
SHA512ba8589fe692596d3bf5d14a617cda0f1e8a73f17a3c10499fe62dc559e36c47b6dbc1e3bc169295379d03eb3a68314944e9474f97854ac03bf22ffdd4c9b902e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54652c2730ab59dd3db48585f766a2fdb
SHA1bada8e1cadbf9f955ba2024a644889106241dd2a
SHA256364c19206cc5f4fc00d84e1a891d8543c747ab4769cdb37e9598be1571ec9aed
SHA5123e8251a7faa8d5057cd93ed90c8ba33325005b305d2f00dd66f7e805523a439af1ecec07bd9c04cd0db1f8fa985ba9b34acb7fe4d0564ff4981749b35e8b66c4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a