Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
0e2f9f682fa7f0c9cb3050f6c913994c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e2f9f682fa7f0c9cb3050f6c913994c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0e2f9f682fa7f0c9cb3050f6c913994c_JaffaCakes118.html
-
Size
21KB
-
MD5
0e2f9f682fa7f0c9cb3050f6c913994c
-
SHA1
67335e38364cd66f67e655fb64e70a757909ce1b
-
SHA256
68a95ed0cfcc04946d6016fe080e78552f4556ff952a9bdd96cd0dcbc3b0ac1b
-
SHA512
a827bfd1c8ca9fe696b57a0c066891a1511dd49311a1e73815afcbfc5b54273b35047302a8bc753962e0560fb4fc5045625324f3e04990d69acc5b6c0e865232
-
SSDEEP
384:SI0oJc3iYoPpcwuSNSO/qgZ0g4jpuHiEJIKOvtT:SsyybPpcMDyFjpuHNUJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420805909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D57B64A1-086A-11EF-9387-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c1f75b3e5be52538614f5491d126bfc65cfbdc610e52ed1e4b83ed665749cdde000000000e8000000002000020000000fefab64a68099bc83f3d7bcf6186463471b2cf78f5d4190799272bb388446b4d2000000001474cac553f39444b07e6b85c1bc0549de0fb0fef928de448afa2acdadb1cbf40000000046ee46842f1fcad6ca2d77ba936b3122cb6dddb206435eec1fe53273250d04a8b40aac7c8466a1dc061d3762771d2f54ae7b9e7dbdfffd1202db4f3a5c3680f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b5d6aa779cda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1296 iexplore.exe 1296 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2520 1296 iexplore.exe 28 PID 1296 wrote to memory of 2520 1296 iexplore.exe 28 PID 1296 wrote to memory of 2520 1296 iexplore.exe 28 PID 1296 wrote to memory of 2520 1296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e2f9f682fa7f0c9cb3050f6c913994c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04738c1578c87d4e46a927f16bbdb52
SHA16f9c77ef66a634540dfaea5a75f5a1504496d6e5
SHA256bbcb105d978fd8c15942039e51f7fde2fdb6bc77f576fed63d0f690120f97a4c
SHA512453d49e763edf34500b328dd982f24e960de8b353dd2e2aa46f13aa4b97044690e6cfb064e491fe02da2d57571e753e57fb5be114d592cbfacd24d5e8bf6031d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fff754c8246d4e7d4954ff9663525bf
SHA1713f86ed68f1f00884185215e6a750ed7dae81aa
SHA2561cf703806a2de239de2f50dbbcf9d2798b9bbc949a9fbae95da784a174c43027
SHA5122d77f0b8ea7eac870d54f2480c1647721beb50a3d2271ec638ddf61eda608061a82af9ff9aaa1b9a08c83f5a305e5d43e45178760cde93bfb200f2a389257ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560960f2ff037c8b8c544cf74f27a8369
SHA1bf07f1f9c17d47b0f32ebc1f4f36a74c315016dc
SHA256a0da540e6edfe8fcfc2b41da5920ec6fb9c9b86f6a95fc04568a376dda6eff8a
SHA5120d20501e8ad6a29d10456c0d7b69019ff2d5f21f74d263f5af3543811a2faa02040be4d0d3e758a634bc6a95d152283816bac8c191ec4ddbb3d6fbc518c0f940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd91a5267998326428dd5c04c2bc805
SHA14b27d4b0899f7c721e97a8db50345c9a54591a9b
SHA256087b1fdf41ed62ef148a59fcf7d425de3e5d4ad89ef64f28316e6b775a995ffc
SHA512e3ae62a6f5f1e9c1af58aa0a41c022ecd8b17d2b0dce5d36cd1d1396e6161513f7245e1ef8ea966440506dfaf3055157f744c2cd99348e89a0e11471a650c269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50878b40966fa320c57e084da274bed1e
SHA158273c128f98578309ad9cce73057802619a2cf4
SHA256978c7f7729530157e10346a3932f021f4364f5d408c6a09a035ed8f4602a72f4
SHA512ed9fbb42d03ec2d43b9e12419bc15bbfe59e922102f1a42f182ee29646bcdb6e6b0a19f1777a8b4c9d2b93ae39f5db3558ac80af60c16ef1bb2412aeb559f289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b072f724bb4b4d813575552f217345d6
SHA139a19f66d297e3d5792bca4bb1b0ec2895450560
SHA256c250da5325e6929d816a0ac017764ae80697a6af7d6a7f64c880cb99ee373d15
SHA512f967335a1f63cc39a2988e539e1bfe6c5ad60cec7122121b539f784c3a71c96c602756521fee274351d633e7517ad8f0cbac992f2eacb07386ebe4a728d59099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c7bd05777e92ba110a1080a6d3c85f
SHA1a4f90931c9531846cc641a342b8bae8e7d2da63f
SHA256b7f411e0b09917259025e154de50d0b794a65a4e1977649fb0ecde62c41d9621
SHA512e9338c2217fe644b38201691e3e16d9a1fc17cd3439b60a74a740161aa8bd5b4471db678425eaf21ba0f08c8cc5c4b96fe222c4c6b06738ce2b26c4b8318b2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7920f6e273de495bf0439b17f214439
SHA15551af8a3bc432c76cf3e539df4df7220700164b
SHA256c2a8634ef82b8c35b198de4180acaa5df13d2637fd90b18082c38405eba366b6
SHA512ed645a4fc4deaccce0652dcb9db6919fd4ad81d27a858d204fa62d2e6cc8a3e8b0609fffb35552d961f58d6f0c205e8bf6aed1d033323ef1ae80504326023637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c97c6d3b4f0ddaf528838de09e527f
SHA15928b9fcb0f424ea59c3b4038795d8405891ae23
SHA25605ad75a53120a1911a1caf80d15c8270f872960eb73c217ba54af8c7736ce173
SHA51230d89b255bdbb44d05024ccc9ffa28d07aba8502f91c030f6869e37ee0db0ca657726597570dfe9ecfe8a7ee2b8c7c002c72534b49283beae0a20fdb44161166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c0946264f71f0d4a62f591f383125a
SHA16f2cb959c34291f8f7f191c0f20382097f5200e2
SHA2567c4a0d68d5e45ee3153dc3056eb7aae60b883f703cb8f149eb5c9184ef06113e
SHA512650c0e056e71fb4b4666d941503f38b84eb4514e633e5899ad41bf3fe26bb98903cfd7e0e4d536db88978f2304596729f7797f85a39dc8670ee592e4f9b39fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c32ff35f9187289f83ca5a2a1841b4f
SHA1e818e7e76f2a6e1890269abc15c3053a0f27a318
SHA25686b2ab630b5d3c16a7ca3d3baeeec7655405156e99dae87b303c974e8b1a53c7
SHA5128ee09d0594620727b2f51491092ad5178b4c70e6f7057305e38b670421e46c774a10c9dd0274bc68b7b756b76064c4f302eef545d1bd2290422752770b65dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc794ece6e22005a69ee374fc0e7773
SHA1555d92cdcf016907238b492d60fbc720eee0aec3
SHA2568648f94d0cdd6c75d5c7a407edf613c57175c3ffdcd3f749d7e0bd30e61e4cb0
SHA5126663d9f4e105028e031835572281ef0a6923fc7cf861258499f1fad3c80154c7eb8f1cf6b9c9726886dfca0e0ee9b368de788d55d0623910760cc478e4702332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbd1a0dcf72899b21a96f923e0bd2463
SHA1c51e57ac3d85d763f5a9d41b5e0a368e26675312
SHA2565aa7204bb016f6940c86fbc5535f3d7cbc1bb81a6cf0598ef85b3bfb687ba7c9
SHA512b5fc7c2a9f5b6fa6c4edaf9b4dfa191f23a2902bc6897dc58036686c8239cacdd81c101c60579c0cfefe8089725266a97d9a67e4cd4a6c488e6ffd48cef8b88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b4f3340c7f66b072082fef254e46fe
SHA163c9a29985d086a6caaec6ce1811987a12095d56
SHA2564093b753d76fd87be83aceb79c6fcbb4bf9ec7c53e9ce3f99c2a7325b11d6d13
SHA51273ccf05e64135f8ad2401ac92a72103ca86eb89dd481fe19c5147f848fa62d9c537fa85e720ad15db0f217d73bdca03746148053fd91de1832a7be977c0c7eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb898c83129ecb5450364e8d1945474a
SHA1fed6b61105d88fefcbcb38d15ecc4320e1306f2b
SHA25604f8a11ea93be5c51235288a73d0d652393f308651c8b76dd32a61d4df23c979
SHA5125d5febbd805516af80c90ca768b696fe8f380d50f30060729096902e36a6767dd1d7bb4824ee48f9a8a1d12a609c884fdb9ebd3c4211c0e8a236eb2778fbc458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f9bb97985f3c0ac82a9939eb69f974
SHA181f845fcfe852e636b1aa3eb94c08b99a8cc8059
SHA25667d3fd99b63237d48fe92796ff5981440ed89508b98a45fd78d31f50e51df9cf
SHA51234ccc2daed4073c6a3418fc8b22308a91c12cdef9c6f2c16f6701c186461ecb77517fd6cc591c81578f27e6ffb09c6a27c77e6746f1ad94378f98e5d4982bbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534cfa2b7bfdc19fc7eb3b892ace66297
SHA1dd10acb1d9bb7039399b8d53037cd82305ce3230
SHA25625b49f4756153a68a350dff79261d37a225a7569556262f4d7d316408cf509bb
SHA512d374dba42c918b1752364bd33b94f36b6f494de1c690f93a30c915b38becdf2be56e6cc877ccaeeac945376518d805bc01c7aa486885f899ed99d63f3d4279d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593e784bcd3d2c6704785593b0ebb6c02
SHA1684c5fcb797d6c4a2898b9cd90e65cbb2f5876c1
SHA256cbe4a0fc21e61146a11d6dfb2947b3e6c15432bcef7d6300248939af3e537448
SHA512ce2ac0cd2505258ac7372ac5235c269080456d0787950e7c20779e926d1125a29c527a87114e9c0731c8271a2fd58df1e718bc204b45b1fec0c3ba19836fe6d2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a