Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
140dfae183f68f4804edf85cd71b8991_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
140dfae183f68f4804edf85cd71b8991_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
140dfae183f68f4804edf85cd71b8991_JaffaCakes118.html
-
Size
67KB
-
MD5
140dfae183f68f4804edf85cd71b8991
-
SHA1
8b1eddc90bf35ede5f3848c65eead621689d7fee
-
SHA256
1a5cdd0e0f545693f857f5c19a1e79bea3155df670da4e90ea4fb613cee05236
-
SHA512
8de7070f8030b21d2039c348a24fcdb94dae53cc8f4b1756170faf9618d45567ddc0601c5852f4b37f5c044b49d92ce3c4f47ce761e43cb74078bf5e609617b3
-
SSDEEP
768:JiogcMiR3sI2PDDnX0g6u8deVV8OoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JgasT8/TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E6EE9D1-0A48-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421010955" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000036debd823bf85d5f596267ca8eae966f37a13afee519795b5249ce0f9fa8c80a000000000e80000000020000200000002167d07070915429207eac2b9c07f225a4daedc65f48808883211ad70174a4922000000046d7d82875158d5c28c80f5383946c70fcd3361ad1384e11131b40c4f4fd494a40000000e2733260327394aeb62181628fa651e3f4dace851950cc4153b5ebbb653e02094fa3627da372b15892cbedc376eb4863ea457eccb7e58936ca41e9f014609b50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00292113559eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28 PID 1728 wrote to memory of 2552 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\140dfae183f68f4804edf85cd71b8991_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514673995933d6f57582da4aa97004143
SHA1a953373ba9a943b089b814e429010bb23fcfbe4f
SHA256a23dbac6952c2424948de25404bce788ad000ee9fc813a2b3799a4eeeb96385d
SHA512d122683c8b5cb52be6a99f3fdfd09e3384c85c620c6e8bf9657c366bf71b8f82f8675025807cb842c903eb9056c3dcb0168b76cd6f25aa457836059fc4c95586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525ed126a1bb8b096440ff468b9c8a7a9
SHA11741232c5cdf29350b57d7d6ea63bb3560113578
SHA256563f002eceed0694253cd0f4673deb0d586f2d81e8279b967f0b3bde285ca54e
SHA512fca82aa1ad7feaa57a41a498b637ad7288e633935e4e764962c9767e9b1fd294264500c9c33b635460356dc9c60dc43970d3570894944b7daff800b5a9b31218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bfac4af8bc76c71ec392ede9a02ab02
SHA180732373bf9429df9592542638d008e295d5d77b
SHA256ea86048f53ee12e9cd2b3e68e79c3b39d1dacc000ba22470adcea27d928dec1e
SHA51276fe20529de9cded94b3c4c77fb037b3ec8b780c5f37fd9593ad8f95115c476fbcab1bde3d2c832336993b050e83f31ea6e2f6f9fda53e9916bf0a1c580aaf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b56c120348e256d37b2b2ea621afd50
SHA1949a4ca93a7eb099b4ca8a06740bea3b264a8370
SHA256fd2fc414f2eb25036df6ecfd52d552305e4c88ee5dd9216077e07b50ea183bd6
SHA512777b189b759d9b9a04330988a01b906c7f7e060f6a4dbaf33c34792cf777a6d17413da13ff7777acfecb04efc08a47bbde176de687b5a9324216b48cfb3cd77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052f57d27cfdfe74c5b26518d6c1d809
SHA16bc57446979d2f0be8b646a0627d037b4fc9667b
SHA256642780ba34c1f3c49f8c29a30876a5c5a9e3ca19aa836bf7c080709418b810ec
SHA51232c37bd4c6c3bc8b440ccee3b001b9c11bec620139adda8d39a141038355a3138de5c3842ac3a4ea6ef6fbd5cf0fd07206a5f60ce707932230e2ba0c748ec609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665f96e6ccdd5a78e33efed6f1120ccc
SHA1e806ea0275be8f4d3f53a1e162127cff064fd9ff
SHA2563ec2f468598742be0b3b9a2165ea76b698245c04b8b2231d40f964e294ba4b78
SHA512cc25312f7ee075b1920f09d64ac25caf47f5ec492df5076496d084eaecf313850650b13d2141b875ee612106298bb240e13c9c69973133dab7b7ed14d9972745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21c74a7e6d76f41e834b7b1a7ead7aa
SHA174610ff28db99ac72839d840eab091b77f60a58c
SHA2568c0e8c33569c1f7955519a3a90c7aabc550905a48c86bc9b72dfb889d5c8be31
SHA512ccf51feb8887d70136a17cad394a2cd48b27389ad5170fcdfff193e5842cbc9c8ae686375bf8aca666feb73e06e0198fc47377626a8426785c6aeed1cd0a1573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2e18c6f168afce4dacdbede25170737
SHA173dd6a3d57a62c6e527723d10d9ee9f1783514ff
SHA2562cd8206dbc3a9554ff0af8770ba5db286bf4dd71aa999c1c4693d8c0c600af5a
SHA512ba5477d2013cec4de36fe2ead98fc532e027868937f0df20e1d306d438a1d60632deccf3f1191937a210f307c3b0f44bd292e8c15a272737ea82c0595f87ffdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682564d07ecfa82260320d9a4b5b0647
SHA1ad18c68c40556a7bb0a408cc44fb8a24e48ec3e8
SHA256a62e6d33e5dc7e919e771e3d762b244637b6151ceb28b5bb1fa64938175e63fb
SHA5125f475049364e0a73db3e8bdd1124ab601d0d65bf676466d268bd4b44ce4a51f9659d67b03b4d1ad1a200762209f22e1e3e39b6159d473cd6dce05668a81ff6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9cdca5c4d799cf5efc4dc6407159ee4
SHA1842c12046346c0b687c090f5f77594cb613a3f7c
SHA25622164ae71483f0dd26c6e0eae19c47d055ad1cba4f1a6d8a0eb7a13c433ccba1
SHA512610e70aabf2914d0d3049b54106004524820e77e520ee4ac5275272cf9dbc3b3b56d45ade80b26835b708d80baaf7a3f09b4cc5598a7c50cf017a22948ef3c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d783b1132a3e03a717c0ca4ce73e4d1
SHA14b06ee31868a2610c9289596ba22420181edf62d
SHA2565dfd9be2bd699c8b17965558203d45962b9d0416655decfd65b23ea02a1d595c
SHA51266cd996d08e6a4c7a74281395e23e108f40e592d0762b91485005d8b9a830940dc0e65943b50e5ffc0e5a10831031dd7fa091f51f8d7306d0fed5d21c45f84a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab63c61a0891c7a4a47deaa73e6dfb2
SHA17c72098207a1bfbb4c95b371f566af1096a01dea
SHA256ee8fbe03278286b2ce28145c8293242c56ccb72c663b382e4dcb5c795bb16446
SHA512d65b44f27c6ee4e4cfc48e5e2a1f34673cc12b0c254964311b688e4b4c93fb94170f5dff4f208f8abb36429ebfeffbf9ab3cf2a0b142df628dbdc28745bfa098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1714e98ba430702a609102008dcc35c
SHA12b0705f0c0e36e4c9f06ffbedf74ce3614e3b971
SHA256e50bca9f8edb8ec2e6cc260a424623fc6de45051ffb4029c83b4b45560d7d9e2
SHA5120f3a65cea8b14bb80be27d86258cc86372ff433e87ad6f53a01c123b026fab2b61912aa481b262b2f89379016782c16380a3227f14c856c54dd7473a24981312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bcc5f5f3a2512d3b8e5375113b3f20
SHA1eb8f17d34d51218a1363e84c6ea0daa44d9256be
SHA256bc3a7da791a7a544dbd4b6b61bdd44def81f46925b081976de4f2cd40371c76a
SHA5129178956e132ac6d64a1a75c3ebcdcaf6560d009d4c8687d86a7ee3d66a4d4403e0e4e4033700c98c17388f4d61efbf3cc64b6330a709e42296092987c000ed52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9a00a97fa768a1824eb79dd63b8c2b
SHA17d04f6044359a6fdd935426fa3b6922230adcd85
SHA256d87f69d0dcb078a2e26f61528a6d8832e76976643998c08664ef7993f57e488f
SHA512153c18f5e38bac6d95924450dfae0da59d0be36a29f42f2f9f20816df8dd1a35baa4337d7d71b56989f13b35b9b78174bf9c81092c5d68dc5f3d902b7f6f4aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef3a6d94c32e87ddd5db197d83c066a
SHA19a8783774008a434c15a3c6f88188d0f5872e44d
SHA256b5fab6d3cf19dd3542344d100d6dab72bdb6b552f34959c6faa71450a5c36f35
SHA512f76abac3b1d346b898d3a27b4879073f684623076c0d86e05cddbfb6003f685dfa10a7a946f4dfc6f268f95c05956e41d5636d83890867c586ae4cca73c33956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f7f530c9a5252dfe1b43ff40047d10c
SHA1eb66a18d83ba9024ab91b9417b263367e941b7ef
SHA25671140547e1ed84665c3a5620fa413beaa9b2b4dbaeb10dab298344766c8ddf2c
SHA512c01eeddb2c5091075723ccc07653bc42f1ee1851cbeceb94365cb2c3b94e2bf29736dc9f923d6529d809849c845b84cefbc2f0e6dce9e32c3a76c0dff68b866f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c61a21d98346e42c8c0487867b2cb1
SHA132083c768a507dbac6f7909426932515c8ae3558
SHA2568c4eb0f296ee2302675529bea0163770f9924fd0b955ddc0b0900f8bd89b4cb6
SHA512cff4ffd1aa055f7aa98e5105a1e9e6c4f543ab4be97f2f839d3ba75ed7ff6c332ea36fe0b0aefb4de9cc2880f140a4858e610c88720f41b96934aae8ef5c6406
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a