Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
17e18e1d4c45c92bf82be87f40ffb16e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17e18e1d4c45c92bf82be87f40ffb16e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17e18e1d4c45c92bf82be87f40ffb16e_JaffaCakes118.html
-
Size
2KB
-
MD5
17e18e1d4c45c92bf82be87f40ffb16e
-
SHA1
3915750758c29a855a5098ba69f96dd9c3d954a1
-
SHA256
285f3907301b405fdb4b41659c3a4476f4293a07dd3a5fe62db3df34032f22c0
-
SHA512
62cce6c004b4bc5ad7f820060dbe63ef256da39e7243181f0edcc6f30fa971ef71d93c6583b84a70fb6f06df2b9d93046c212553c054488fc7ab90bef39bc530
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFC08911-0AE2-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421077395" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a288fd3095ddc09ee5cdd802420362d7fcbf7b1837acedbbdd1542b1cf9d5a23000000000e80000000020000200000001cf38bb0642f75c6d21d36a3f03e82102dbe160026b1d27e5ff1d9308090de0720000000a4ebe1e305e3941b3569bc4664e22b7b47450923556f38935ad329041abefdad40000000f18d76d1d2d361d77566babd76e169eae826bbdf2235c2875514a80f7708e0927b3359287c757a6ad0a3dbeb7413bd58e75bd81b44f21506d673c5f2baafba2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708053c4ef9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2620 1916 iexplore.exe 28 PID 1916 wrote to memory of 2620 1916 iexplore.exe 28 PID 1916 wrote to memory of 2620 1916 iexplore.exe 28 PID 1916 wrote to memory of 2620 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17e18e1d4c45c92bf82be87f40ffb16e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aea3b62a5d565b5d0635cb08ca9dd6
SHA1488388922ce9800aa99ce06f2e86b7afde5bd26b
SHA25670bbefe6f5f38c339ebb9c408daf6e19965c4b82f3a39baacf645216b3902174
SHA5125e4d3efc783fbcc97c2d168eee4d7e6d104ed83e974ba9a7cf43384a20f8fc98673cef47b9754124055e0174205d39ebbeaf8996a7a8d7a308e626c8abec9470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6df06634602eefc96f7701cf42fac5
SHA1dea3e3d80adb82d1f1c0b39cdd8e43baa554625c
SHA256fe61c8e2b8ef61fed1c52dc6f9c4dcef4636be64a4bdafe177330302e559211c
SHA5123c3e502721b9a54ec901709e7314fdfc3161b9de4c54faa65d565842006e89ab6d5eae70d79aed533b7561e804aefe9ab7f5f523ad9a49f4c6538fcf15b7ed80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee5f7cf51cc535ba77e13d34195c7fbd
SHA1a51691d28696679327bbec5d58c513812efc68fa
SHA25672e2bdbfc4042a2e381fb10a1d4c46eea3d35aa379bb96d3a626359cf5b949f1
SHA51292611e21b89172769278c7b350474133902dd4c2e1923b06394196a5309764a546e0e4636c91d7a814b10721efdc272ffd51ef572dc9f48393df619464134352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d28dcc4742bca57c5d3672ff9d2357e
SHA1e4e4f2abdb3db489be8d43863f31871fef7d8a75
SHA256aeb529d7568fbf1ec7ce4b02407df30499dd831d6eb5696710cc135d64451d03
SHA512fbb261fe7e6eb6e1be9e01a37dc3318c19cccef3228e20f3d3e415673bf710fb4d9b6ad37683898724bdfe4a84ebcf8d90cfe11b3f97bfa27d6a8a7ddb5a68b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512e7245895ca8baa7353931cc0f4df51
SHA1870c2a7c2c65ff191fc8eca736eb93eae5be93b7
SHA256083822b11ebf0a609735cf6957ee041e318d9054dad7bdcb689435d0aacb7158
SHA512d92c3cf7120cef2cd22269a6b583cbfb7bf3b1c6bf59b02db39e83d08110a55e0dc3cbaf3119eba0d9cb3a98b78d2e45d3442cd9a337d81dd059360ea7a7caff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53668d38747026466bc1e75f907680d3e
SHA11ce392714fd4ea2d4b0d7062a3f2548cc9f689fb
SHA256b3374404ba2ce4a70fab3699ea5a1b9091c6588df5e07305f80ace041aac6c28
SHA512668ead05732b5b7f3c33ee93307ca613487cdea16d01e1bc43eb2b5afbeb0bf2db77ed069140dd314fa8cce3a9d31b9a905f63d5372ffb973cb79487e81df097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593f75c5710da7708054a76ec32d2df3a
SHA1959bcf7072dcfbdd74dcca9643fb912f98f67e2a
SHA256137de8ef44b73a71c4d9c37dfc923249d7ebd2f77b1380a6195e883e2e2006a0
SHA5123787dd20e512f3bd32d89177b389ebba3eed5ab2550355337692e18542ce5ff2ebc93bd89e148e9b9bb35b0dd2a48270fb8a227ced157344e9152d62f3e3c933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c164bd9853cb41a0dd9f3a547de74b0e
SHA1f363084c7f4cdf0e8262ff1e4cb365708d0ccb94
SHA25666bb695e3e03e2b285f3ee889b92bad726d1bd3588330b2c98f48b44bc0842c6
SHA512f5c93e332dd66843812783783482bf27a5032ff942815e828bb10930acf558a2af5730917a0393bed60c1b96780481695b4d0d1f152f970a2aa26f16b595a285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5660e206bae6f39588540dcdcdef8822d
SHA1aaa937e42a3391fb9636471971dbed74cfa46da5
SHA256301b797d2988a1384bb4562d7c7a0764162d387aedfc1dddb2e46ab34ab12bc9
SHA5121f0302df005a5b7a9e72cb7cb3e4b30e7c3254a86570dcbb3da778a4a2150ff2585666da56ac3a01a8d6db7b3f9ba76b3e2e7feee05c84f06bbd1c1f00cde772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2e983469d2320dbcc3121d92ec32ec
SHA1aa65b2baa2d8468fb27718bb9b55ac92e21d7183
SHA256fc199f679a7ef84404e1a251cefc3643a62d99274261dad7611ba4dd352bee86
SHA5120fb04a48f7874c93f2e785ed7fc88e2bfe5ba796f1677aacd6152901e92a32e5345e13985828ef4df545d04ee7da86ce17c5a65097867f0bbc9f6e9b2209f71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc12df7c29af3edacadbf83f2083f601
SHA140e70ca3b3c7eec606ee753b80017d5ca239fa99
SHA256e29890864a985b86f1a777ba890464fc26eebab778f7b09257b3d1320c452a48
SHA51212982589fa2eca75fed3c8d5b4fe1e0f3aade65ea01f167bbe3ae9dc89c4dee4f085a1c94a3089f64606c20fff3c4d271a82e5b0dbaef2803e5f401ac89c3bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5925dd7ccd34b42cdce963e9f50f543e6
SHA138888e33e61fdb917e2b674224cd941d0ad83714
SHA25668f1fc36cb39bee33c851cb303589f1c32601986d3189f5d7b52b1c2c5319cf7
SHA5120f1050e85b41c71ed5a9630065f0ceca0c36b21bb7ced1848b34f9845961d8c0d280876ce4f0f8ae20e22b814a20c15585ba15ffb1f75ebd6214b8a92000c16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c233f97ae4971cb80afcb21192e20973
SHA160fdf2af13143543f6e5b37b1cdbaca5956fbbd9
SHA2563cd4320993385fe05039dcd5760d2cee018409349527bd706d803e98853799b0
SHA5123760d585148c35b0f8d206988c7aca302df6e51f788e2a1e73a6ec66a250255fdb4dc4d91ac3b3e77c07afc4d410fa3a9055fd17bfcc7de9f4cbc111a1063b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb7a814c1b5762a800f2d896f3404f6a
SHA191b00f2249ff370b47e66efeee1b3833875489f9
SHA25647e1c168c08a57f6be10c70fa5490c2716afa2b83ae1424010c3a949ae39552f
SHA512e692a548da2ed10593e77c5052313dfcb35a114dc1895bd0a3514d70b490ee367e9edf40986c413a50cbd71e884a9b04c549060412e9843d83ae7ceefd2c190c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba4ee8feb9edb79acf86d76cf2fe64d
SHA173c1dc3d9600ec5d4cbf7877f0cc35cb4e6c59a0
SHA256c1a57df55d1265bf5b392b0d5efb789309b08415c9c80f52ab9b072ec2b5d42f
SHA512188bd81964b387f2717a84c7cdff8a494a2e108c0e7f0069f3e0419d1868eed068e91ebd92637f29451968a03bd9eb223466fb5f2781baf960a929945be5f906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5001c1cc03793c2408a995786ce652225
SHA146d4f9a549fa24aa8e28afa40d4f4156293b4aac
SHA256f7569cd6a3a22e133786a0557b8ff85c4656b862ed32ef0bbfa2fc8455b86ab4
SHA5129172f3e5e3a74f88339632eaeba15e933674060610699be4633ef49461343531a8e1f249a2e98027e4a9601a7d96c0e88294385b79a3c0ae377d781ba3bba258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537da6af87f7f7da78aaae67fecf44ef7
SHA141d17477900e38b035668e7778e62176bccdb439
SHA2569c734d95f1338b6a020766c804c43bd5dc1d00cb58e80913e58106e4ac1bcc91
SHA512bbe58b11653b9eea54cf521d433ba92d472e4823fa2f7225ff25ac1b38483b9f3248197c1e498414581ef100de7701b164083935eb1d2f2be7dbba5866e83991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6ab9a15804656807a6bc893d8bb161
SHA1b9e116c8c410f7572fe0091425987af2b2119fb6
SHA2563a6c3026a5aa1162c48e53209926fde3aa2cd0e719fab62a9a13600e231f216f
SHA51210d6f499a8b04da384987088979509e816d4958d34fc0ca9f474a7a80758ec48dcd87606c3486b1b4ebcf2e9590388877035e5cd13bcf5c723540d1b6bcc0b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522eff1de32db53b3a10a441058e22fc5
SHA19b31ff15db1ed60b60b96155aedb5fb7c7473308
SHA256059d4725fbe312d58982b70dfaf5f24e69fab4dbf24fb50a8735748aff34dae3
SHA51202b64a073d1bd4dfc00fc21ade0982ff71cf18e9e5221331034a03085da3fcb2fc02d758f3479e98be86453621482e8f3d8dda99aa113a038ee6031b39cf8211
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a