Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
14f79434da1f724a3c3bcf69951e5230_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14f79434da1f724a3c3bcf69951e5230_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14f79434da1f724a3c3bcf69951e5230_JaffaCakes118.html
-
Size
13KB
-
MD5
14f79434da1f724a3c3bcf69951e5230
-
SHA1
cc37b735e6b8030a88622ca209c1a6d19f22a23a
-
SHA256
2710d84661382b99f47a5cf2499c1b49254420815e56990b84e1c3573aaf3e33
-
SHA512
be988d71840db8fd95cfaa3c7872d49664e6031d0d21e130fb5412ec0fe22d8340d4c71a4e8e66b9ca96d7d15c8156476ddde001acd71ab93735e9a8130f5b89
-
SSDEEP
384:Cyi984/KDR/qrAi7hy1wKMh2nSa7rBHvQl:CyidWuAi7hIZMV89Ha
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e019dd3c7b9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421027346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6835F671-0A6E-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000817d614bda82d96f3a31f8b2c0b43c4de999d81f0652be6f33a0066e6dfaee28000000000e800000000200002000000005d1d030599f16fb4dbf41e40e0f1de7dee7c54caca6a460f6c5d64725606b6c20000000a24b092b8e798fbbe18cf27b49ec8b1d6d9f89606bb9b1838ade7615262b978640000000b38ad8c7699758ee69a7e3b2f36b56794249b6b1e36bead52e988d38015bb976f95c55e97a4ed02e3a63bb9d0e9e310a5eaea9d2fa58aa07a36b43a50eb04f57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28 PID 1952 wrote to memory of 2648 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14f79434da1f724a3c3bcf69951e5230_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d77c8b74544d7fc07f8f6e1174dbdda
SHA1b971661a7bd51080764cdd832571985fba7aee2f
SHA256cdca6dea45de309687802d81bf83d44fef9ef6cf82f84ebadc8167d46847e1f2
SHA51214429b9af622ab79d300c3272b06fa869fefcea6b7c841b401382983f5456bd4237518c4519c0d76d18043b02cbe4ade23f734140ae0ad5d067ad9fae1169b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851b896cc3663e38bc2ae0b10a88fda5
SHA1c06b7bec170b5fca18a0acb483309026464f899d
SHA256ae58eeecc87a0ee191cf5c42e098b6ea18b94e0bb6b48f4739b4a434c40f2ba1
SHA5128dc0230486dea9b2a6ef4b9964f63d3c5b991f0917aabffe38727a4a22a55822b54ad1fb9ab74e30801aa31d6f288fae486e78f1f6c2e5518767e33accb169ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d102f2786f34aaa697cbafeed39a1870
SHA13c063287904cde08f5e53ce07ce678be6c43ef2a
SHA256f0d731548f156a542ce732b13363ab03a36745c031f467f680d74233be5d5e5f
SHA512c83d508dcf84d3f828c3bf901dca73837395de772de3aa180fe26895e910d5d1449f2eabfbed51693df2c8c9dd28fd8416aca8c56fca9585d59f8d6a01fed116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569baad0ecabe321bc83ff42450a5d610
SHA18fcd73c85a2694950a4662e0406d081125a700e1
SHA2564f093ac0b08af95a0a797cb5d7f342f694c4368c403eb414fb7d9063f48ee4d1
SHA512bcd992476da20e32014f7ec87886a297efcf41230d54ae4580ddd7ef1034336f5e46c436076f3f5634fee4c487ffd6767b151411ca0d3b12ca1131dd9644cca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b978288926b8bf7f71660704e40757a5
SHA15f803c401e2f79fbc71bc3400c11081c71501f51
SHA256b88f27dfbb00f0ca6181eec747bcc8360cb76e151af084f30cd3f5db615d0b29
SHA5127ae487f464f6e78736d562c987edb6721900bfa1aeb907ec24508e5ff3c4bfe56c1ee4432bc5e631088f0313a22b007b19d80bbfccf2eb96205355a9966b84cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac1d1aae97c8a3d21fc2cbda1fb253b
SHA11346d61f0c8463231c17769fe7d39d5108ae0375
SHA256f85ac231ed03fa823fa7d31ccd2dbb52443ce9514d61432a2049dbe3c53449b1
SHA51266657bf85bdb23c9bbc8234f7eeed4f0c8d5c9b504dab091bac62204958d4d38ac882f667a6ff63fed62dac4ed1b65d7e123191aa664593bfce9cb10198d3991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931264152ffe82cb399c955635a151df
SHA128a659d604dc806168dbb7ea4ebbdac6b9564c7c
SHA2562d0a8d1f576580dceeb5f932e5b77df118714a23edc7e163c0eb5ddf528ccc30
SHA512f65de2d266029b316c43e748e96457e8034faa4ae837237c55a122ad730dbf485cb7d4666f26b4ec29e76d6a22b785a44a8700ec3573be26a8fae0f596e8657a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b5ea9004c25b6250df1f5a565689e7
SHA158d3c958763776ce4e8277d81a09f214773042f0
SHA2561e9cf7bcaf814a11a74e31345ab10596f477d1d02a276a35c6d2398d587f172a
SHA512e633015039f2c2c94cf55b159db790c2238bedc310dc17bc11e154c6b0f778e203c1a159c2afa77a4ab717f6acea0a873e3ab68e0963b9d361e4b8c0936cab46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f96d38ddcee81ca7cc98a917ef2dfe
SHA1c8b254293119ac53c554bc8e5a58a191d6b727fd
SHA256b729ecf8693022be8328d0cc6681e40c70f98b299ddeb4bad1b1994aa4629e27
SHA5127326bb750b3c9f5a9079eeaebefadf2ae5867308d5364bdddeb6b061a2092b05f19799d22aaa692b4cca1d3a80873bc7291b6d71cb8da83024dd38cfbfe7288a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3138c47e341fcc3a663c42ed9a83768
SHA17d7e70d4109099592dc2af3f5ade1b43691cf17c
SHA25696653ae61112012ae73972ec07062588d5ff160eefb0f916bcfe9d4d32d5a23f
SHA512b3b5d6e3dac808e3e6cfc2e84dd63c7422ecf6666788dd6cb6f9569e81e13de477775f2adf1adbb4b5fdf83f4b9d2d5a9ee0fa181cbb6030098465639138a07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54780c33a4a43f5318e3f46e260a70f7a
SHA1fd93f218b280c444ed0a80ba7dc01daaabca9f2b
SHA256b6eb0f2c72fed386439ccaac8b0a5a05c9d4fa04834593a76c0f76780966dcb1
SHA51202639fddaa18cb65cf33621069f24ac9471c2a2d2e984b7bdd42f58f4216f2c7f7406638de76b7a33f23992fee2fdd0c1422d77decc4f3683215033ea76c62c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931fe6582d6945017712226767bc5bc1
SHA1c4afd99df71721e1902cdd10fa11893985cdb2a9
SHA2562296734c7d7b685938d747dbeb286c9b02501754d0e9284f881ac3cbdbece247
SHA512d312425d14a0fc1d65a425d0f6a511ad4c5c0da812b40be84e960f37969035d22914b58ed0ad4fc43ddf396d1ca33958c4e2c32dd9c8e782a9aa191d336126d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df383ee1bd2be66d3bc22668b5072b01
SHA1b12cc9d2b77d324e36c0ed30c54210df442d0bbb
SHA25672e93252f027992f1c2b2ee7b769bddf0e14d5c5be75832ee128dd8bb5ae6d51
SHA512fe3c390415bf82c76346ab2134522a995bd675d184dc7f4acf7c52b7beb0e2366c97ee2363e9389267483364547f2cca3fd6749a75a79597c87195c5ca53a0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a532ae71887bee480db709cba4970931
SHA17203cf2ef1140bd2a3a91730504976506e2925e3
SHA2563a7512cd18587927efb2231fe770fdd9ae9b38c74c06a4317525fdc3392d308d
SHA512fd3379dd36796fd7e4326932d2add5e599811110ca446645c44728cb93e286901eb0dec7c651983db658b2efb259baaf049d97984c67c7c0299a0184cfc62d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bc442bb89fe4588b6c341ce84e387a
SHA12a700458ce564d68059626cd565589e24f28efb4
SHA256a36478f436731a1341cc0069934c2f02639b2c88f3606578d4a7c7b65d645bed
SHA51265c3861967429f3b3126a2500e31de2c3c9721731cb404a4043a2424ce88e614cc929a8fa82828b09b4cd6c989321cf126e3857f9fa13adb680a6eba3d7c81a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506eda2bdd20956318fb71f41c207f84e
SHA175189b90cd4e25a32e71b3c5412feb9db4d6893f
SHA2563e01f76fdc70ae27862ce40451ca6f4a199fb38edb88880dba9c323a238a0093
SHA512ec4e766196ceb7991f4db490c092bf570ff196629f78437baa5d96e3fa261fcebcf5d71110ecb6670e7036114db4f79daa4b56f4488f950e7d2ed7619b3718de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcfd69b971c1479c0a599370e69a710f
SHA11e67a4cf983176bdb0a0e2b6fabc6ab4cfcb5f97
SHA256f970692cf3173fe021a33b4342e773677e51071d8a84fc2ae672028b6277c172
SHA5123af29aa26f8c14e8aeefed602a53c1bf90b8125fbde08128b214d0fdd758476597f5e020ce189ef799dcae7d3acc224e4d4485c634e19f0fbb093fa2a6719525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de10586020f38932bf678d62ff2613d0
SHA14bde1e60d9cf1e80945135c2e268efc01db8a9fa
SHA256cf36a76c98947548b8a9811970bb8f831f61ab32e9c6718a1a0da9817d980d5d
SHA51266bf6c410e9126211419da4ade7c9c30d8f5e396da61cfe12913a645187111608aaea21a8103bbfc49bd8aa777bb42bcb07b0678ae198c112bd6a036734d74c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb2af57bd42b0a427da3133a5e9ef955
SHA152735d0656b8d14a339453fe880795ecacd51788
SHA256030e1d97de3972693ebfdbd9d43c4afbfcbc6001555fab0f3f0cb55eb3a02cc3
SHA512ff175be3ad7c93ef41e51242fb92e181f34649eeaf304f92529da39489ddff50950a6712cd648e4100d5351d053cc32a670fef026e82d2a74a5ba2d2d464ded5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a