Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
12c8bf79ec7983d9a0b361afc6239bfe_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12c8bf79ec7983d9a0b361afc6239bfe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
12c8bf79ec7983d9a0b361afc6239bfe_JaffaCakes118.html
-
Size
35KB
-
MD5
12c8bf79ec7983d9a0b361afc6239bfe
-
SHA1
2e5585367f4106e23bf4b7fba922d98d372f4c59
-
SHA256
2687cb6e39a8630ef5f43621a196727c63832084afcf01459530425a85257aa0
-
SHA512
a93a16f83967f4bc0b7e06af01f548482fb222d2992aa883aab2002bb8d7966f4c8a15f777bc2ea9534fdc279cac495ed11664649a73ad693fa28c35839bb7f3
-
SSDEEP
768:bn7L5qQquEqAl/5H5o5iWkJ5zXvV589h2x2mj6bP:D7L5qQqFvBWOX95Y2x246r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB455E01-0A13-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00e80a0209eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000008f040e61cf0fd042fe5f7f02f38b3a054468e8ef1a39c5544b267af9fb5aa0c000000000e80000000020000200000001548d6ae9f121e02166bb3f88268576a38e46f7813552df19a4ead63a18f973a20000000aec4c71224a7679efa9795a1836ddd0ba3a64f96ed847304bbdc14a3de76575a400000005391395f87e5bf7c6eea5953e997c0c54eec1576494dd3d624f50650d6c5a009c3755dc7678b2ebca15d79277c7bca0eb59a18b1bcc2d9897a7618f830e2f741 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420988427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2636 2348 iexplore.exe 28 PID 2348 wrote to memory of 2636 2348 iexplore.exe 28 PID 2348 wrote to memory of 2636 2348 iexplore.exe 28 PID 2348 wrote to memory of 2636 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12c8bf79ec7983d9a0b361afc6239bfe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77b3537b71634396fe1311e82925e4e
SHA16204dec373360d800ad65a693b781e00a74d908d
SHA256d83e81b94e2f70a67c16408f88bad7a764490f1ebd521c982b8128f92e1b27e9
SHA5124389c40783093843f3e3fa5a0dc9823d1b6a40913cbfee55b289f450de1cbccb6a45921702c68665bdba9668ba04623ccb8fa0f88fe0e6cfdadb13163391fa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a02ed91eaae20bc9746bb4103b80b435
SHA1ded2c280db5679cbb81e0999fb20d888260f500f
SHA25650a584ca05e6ad020b25a501f5b38778d6b1086fee72a4e8eb990e3acaa07c6b
SHA512e983b2c65a0ac05e2eed3e1f99f7101891b535912fa03e164671166063a3b3e79898e69ec0646d6763109623ff04720b7bc648d523e03f1551bda3f79566c6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8a243f59a813737b9288b8af84966b
SHA14391e9e22dc2132ee34a0e10f2faa923ce3a5919
SHA256ba0c458e4213f85ae54fff805b953701283f472e4e0a983e77024cf3bc9c5792
SHA5120b206e4b65a2ba19853d31be0198bbef536581d989e24cbc99972aa9f8b2017ff159a860996c01e4c461f7edca86451edb30ec7ca86d08cbb6f2cd0fc74d72ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fca09c63228437231c5913a17f5178e
SHA1ffa49cb60e1a8bdfe86f94b07e387d5be93b3c70
SHA256df07a8be7f5c67aaf94466691520faeba1003af79a7e42883b75c81aec7c406c
SHA51254746754132e642c27c841b15a8c7816937ea14d97e491cf56ec65461ef0f60b56e591e00b6f9d95bb9e8476d1f96809f6b167eab10c0ac7a6340ff2b5f707dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c71838f6b7302c1c4158659aea7126
SHA16388d1ea97611c5c7c3f52526433fade3098fec4
SHA2567da4ff78c5bad5b3a08d44e3c1c52124e75d78d7d7bc136e97a2fe327501deb0
SHA5124d95dc50e6a6fc0f9be2b68acd2e0cb6ae2658b2e672356a00345b6059ce7846196fa564664ec5ec0086f2c468007a1dcbc27cf2be43a6253ae262e89c960fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695055f8d27d58bb6062f0d016075521
SHA1c80899a2594f40d58ed7fdf7d49fea3e2ccae158
SHA256fdc646dd0e8f0baa6352d7a6e840119280bc811c79a313fa836a6f854ff7744e
SHA512d248bcf617d277e3bcc67aa94ec3f7e05c74a28ff14738592d7393495a5e951db384199fc9628945bca1655e3e6c6fed93fff2490cc67762491ad0c2894ab470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b8d37fbb20c30458d299dc259e4968
SHA1f191fa347fc1dc886ce82ebcb3be5b2dc142cd31
SHA2566eaff0d9e385f07067261d43a9b79601ce27d8661f5b1e2d8776dce8e26ae4f8
SHA51267789a8e541d17494777cc969283590e44c5e9e1dc7f456f7ecd643c4531d40ddf900733ef2df493932f0a94d317d321632f93ade207ef6fdd0a6712079e8ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5163c491660b70197b81ce6a2719253b6
SHA16a04564dae70dafad7f557bbd2b484f81bd5551e
SHA2564cb968710e197aaf40c4db3c5b805923d3856f7884299233004e5526bfeceabb
SHA512cf571e55c43fe1afd258095362824d0578ee024b313e6fac1e4d8b2b7487633d1fb374512a4e99837a96f47b4d3dd14de4ca069b0588379ac71b2179f7a97945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e25da83cf308e6d2805f36f1ff72fd
SHA1c7bf6503e8408165f5215e4002cd231f2b396ef1
SHA25668044b7141e1aa558ecd5dbede30a4ebd614f3f30be1e168aee785e2a5335e26
SHA512b281ad1aac889609adb2861f84be09c48c2d849f93c87fc037dcdd599429640a69744b0714e4397a5791b08cf4a174dd112997ddf0fd1bb4bdcd74896e005ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5c55f465ac7a04af6a7954af968c58
SHA1d61ba4134844889a1b3616bdb1cb371643f7cea5
SHA2560ad164eb5d90f7bc76c949898a1941b87053d8be53deb2a26ebd32b6c3b10d46
SHA5129f35c22938b8a8df9a4a800f17e7e1e99c1b8e05942c3407be78ea44bbaf434f371976a4ec960eb6d2bb45b34114a207ce4089d263093f4e7d3a6442ef21ccb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c27004b5c5c67ff5db80321bcb7cc7
SHA11862aaeaacae7d0f9bf97c90b8b8416bf03efc7c
SHA25656230b63540164d671f487991a485d9d68af2648a1065c83ad66c5037fd044f9
SHA5129b469f13099e560317e4dabdd51e4b045567b74d88140d7a787024719e30e42576d3be07417e86e8a559adf1d03347fa82003b2630e2e061888fd2a2b254b82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a64003cd346213372d9da79426ce3d
SHA16ae05b5660c457c5877628e07a7e7d978c5ea4d8
SHA256d8ba42bf8b8f61c4f404e313e8696a9fa143d1078d89949f17ae312fc7871aa6
SHA512e6fc903bf1947dd8023da77044f37880fb90c6798e930e3a5d0de9bdb930a1384f440839ae960cd444a700ec7a43f85f6fbf87d6b73b5925b0f54d1387a2eb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5984e7f1f38e7569981f897b18cc3ede7
SHA180191d0a7da210f22846f0a9ec647eda819b147c
SHA2567ad6e5955542eb6460416b31b3cc106b63ac8a09c6915ba0b27dcdd5ca720ed5
SHA512f65bc72c70b8cd43305f8f8c579ecdbf591b9b0bca474b9d4a89a9a0732b09f5b692d7b202488a69cdbdfd9ca9419233a837b3f28e6f7dd50eca8e3eef70fcf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eeb7bcf1f89ca6342540e233f0dd85a
SHA196e0cdef3abffbb6c7a40f57b8103fa2c0e22c80
SHA2568efea1424af660a71a2bd2c790f1e1c4a8e576c3a9c0ff1aa89455d7c57e46fb
SHA512253ab65724b347921ce2106fd06f9858e0729dfcb0ab5aa06f1f2e908fa8f3ca0ca362a020a1349c503cdcd7c7dfb320571919166e77e85fcbe3acaea9c8c076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a95acb8c3c9df75f40cbe7de3e4be79
SHA16b16104df963b4ff63bc33efca0ed48db362391a
SHA2565af5ed939cfca3ef44a8259ef863db2a9ff75264dd0052eda664521fc5f8873a
SHA512dbdf1f47e875d40e36832250483fe7aa6127c72ca40df9b7654b626439082ce8173ed450515dda146ebb62b0866552f39a30afd971855c5d6a275561309144fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c32d59292e1dd854e6fd8497f3106f72
SHA144fdc2bf9dae90621b4f78638271c8d82243cb39
SHA2565561a04ed82c18c643ec5a1e0101d40613e78b833e90de99cd2179d30e9ceb7e
SHA512ef92548f6ea44b51ab5de52de37297f9362cf382ff12c1e94f5276a54834b7a67ccc3de387a44c09934d010c5a0d810f80f519525798ff3a1d04c7b9ad799cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65aa2f0b702be14cb408bab8cd2f0c0
SHA16e36e3e6c72dd027693ff0b0ea2f0ecedf8809be
SHA256bfef9411735f7af6630248885a01df298a6485263bddfeb5454925564daa59d2
SHA512b5b95b71d37280262e24eeb94198cdf5a1fbcd0cee6e3508cbe095d7063492084672b1051412f0473667039431f3daf899a6ef658067be4cf578281d3df95eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ebf79bf34621e87f4dd7b3ac28ed48d
SHA1b4acb743e9155ce525017d8f30bc3ba9b84fccd8
SHA256b6694f0002b50d6e481b0e408a24e143a17bf6f14c677029634f2f41e297cfed
SHA512302bd681c769af858cf27b89412925432cf2b4278b7e5d72d9ab5e0a6145e4e39355b55b96dbb7412f9c434bdc6b6a329b2a2729a3f558141457941559158af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7c8b9806409be0f46b0d52b4e34352
SHA12190246ac11b08e127db89cd33c200689ad5c875
SHA256d2a0f568f9eef71cbc175ffba3ef85107eea00d4acd7088247fabf0269760dcc
SHA5129c94fb4d451c92136f6766a210dd15ab89aa8b4b25bf60f23a8e8b6ceace1e0a24dd72a26f7b2dbe2f0566dc52c9eaed8c328d4071819312bd58180aabe139b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a