Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
20f7ab9652f9c95b01ff7851f5e1cfd1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20f7ab9652f9c95b01ff7851f5e1cfd1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20f7ab9652f9c95b01ff7851f5e1cfd1_JaffaCakes118.html
-
Size
7KB
-
MD5
20f7ab9652f9c95b01ff7851f5e1cfd1
-
SHA1
3422f60dd30dabca48e3bb5331516cb1935a39b0
-
SHA256
7b719d6f1a44bb65e2a3ea554ab5c3fa4660050bbdce7f283e6bdbbade57a68a
-
SHA512
f684a338eb0e601d43693b49b5819bbb803bd0ecdbc571eb2d698e19e3ccc431b1899d86598cc2f25bcf1e751e95bae1b54d33159ed5614a5496a33acb83df09
-
SSDEEP
192:hhakYmi6wil48ayp8nVxnM6MjOzY4KKCi9iO/gjy/gMf5dH:hvYhFymnVxMRj8e4/gjy/gMfbH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421258656" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c331b27b3ca405e7e678616a33eff5a2e14348b930271ad94a3559623c9582e8000000000e800000000200002000000061c0fd3d5584b6e4a10d6f65e86843145986a3e3f9f099ef971dec7492cb764c20000000310cf357c22c8b0061e0193047563a9ea0209666a39780564e690c514a9ee382400000002e770121d89b2dd6b36b0bbfe76f50d165da8cec4e66405f3c09b00c22fac8f08211f3279fce690ffd39421f77d02cdc9dfd7440672dda56d4fc1af17e6bc416 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00eb71cc95a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7B89F21-0C88-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28 PID 2964 wrote to memory of 3016 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20f7ab9652f9c95b01ff7851f5e1cfd1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bda2f896fef9e7726361782c463c994
SHA1c025fca8ff0755ddeec6bd11665f05cea23b7e26
SHA25653297ad172d9e8655ada330c61276d151701b8927a592d723d5d1e16f595dbb1
SHA51210d25018cf1cf17dbc15c093075879ca365293855e163a458b35baaefafa2e31b9d0ceb4d81545a1864f128d00a126685092e13cf427327851a419011220d834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c293dff6f4d79b5e2015f5a830724e
SHA1d8e3b1b99139e9a2305eadbcded45678db5b4f72
SHA2566368b9baf06d5ed0071142fe2a5db6a2e7a8dc3438113fe7ba3117ca038fffa0
SHA5127186099d49fd6daf19b105450c9b755afee5370403ffead5ac22af26ca0d2cf8787f15d47b5fff17b4882772235031f51fd7e78e27ba9f27f6be2966bbe90676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536effec16d86c9f69ae7e58c1240cc62
SHA1c59cfca7514619dbb3f977fc71c684f21b4a7fe2
SHA2561189c625cd4e5a811bf4e250e5c02f7200f15dc0ef4380a04a3a454d5444e531
SHA512134ea2092ff2e4ec318a49cd4992040f1d80957225ce5b51260ecb6d734d1182ed50204a6ecfebd89fbd423e7985960e4eaeac7db063b6dcfe12c9b5af1bbc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eec5df63becb524d0eae23e72d715e0
SHA16c6969b44883b99a70ec07f61c170889fdb163e2
SHA2567242737509d20a0ecc7f5374dc913478f75ba2c5cde0603fb0f1f91a7924ed7d
SHA5125adc0c5579e8643d0966a020980e423ce96f5cca8e353f0880bd53b63639d20d39d521839960d50011bd453cbe1106f66314ce091d1b2a98c41403b6cca69e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b9b163b5602d536e5a2ba37dc0b66b
SHA107719c34dd56ad74d445d5c482cf4c9533351d55
SHA25631385c3a2931eb311053f5cd61a4bfd50a373b100a9a51cea0d67db6fb2e7bc5
SHA512aa286b2810e3e289a8f0a8b9a5649c1e8bac3af4ddf02de8f80ec4e3e0beda8f27f1b0cff3d3f085b6a9406ed65a476c7085fcd3de4781deab0a6d6a4483bdf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d86589d20e403930d2a33975f1b2cb
SHA197c946fbafe080fa5ac54ea911dc5e02c2dd172b
SHA256bf85f8deeff5b06c91c7a0cb81729f949587deef20daa7cada1ee2eaea2b011e
SHA512dee0ed83b455a5cda8fbea03971295ad674c051fbff7c6352dde0203542719c5239450c3a5f5925614a39a4b7f8f3837d746b8a298195820109efd95e23496ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ce0e48d09b382e27e396fa33e4437a
SHA1e5585ff09c4b957f7e1554d573baa84037d32900
SHA256ae794eb89679fdde51c3e76afa28020f449552dad6b08711ccab3c0097949884
SHA512b11ee9ce41837a1fc10d33f41174a4c1234c2557d6e4ada3d02f77ac048d01119c063c49e0e725f5ffe318b0d14c121720769d681938b40ea666d2142636cf17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed3d061ec961c40b77264f80dab16262
SHA1cf5f643984139e33db1292e9414b857505fc4452
SHA2561749994f0ae6aebaf354e3a6d2d289898bc5be373469d39e02fba853c4a30631
SHA512190eb8f4e3c3b3e5022b3fcb2062fc36a3a7343eb8d0df14ca60002b6fafb24933ea6ceeefc00a50191480e981876b8bbce3895fc0441e5fa44d66fdf81e4d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee6845e91318ada8cdcb527c1be59a6
SHA1e31628f68329ae7563be010bd600f618ca96f442
SHA256b7e0ea2c71687cd1aa659dd645fc9ba4dd7b916783b059474d4957ba7befbd1e
SHA51255e124963f67ab79451dbfcc9df749d57ae4c8d364fbed8576e4c7c474e94b2efd2f8cfe7f9d0a527e8c9ab92c9154c86a104635d07a7fe1db666c5b4d921117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0ffbc14632e53940fb312f8c7fe61c9
SHA136aa2e003fb28debcca16d71f6fca66f688ec676
SHA256e11b42b5131cfeb7c73ff9c21206186606c8fd22f204bb88dcdf89560fe4e72f
SHA5129981b6053632f45905311223e0fc5f5396b4006f423229f955abc5b7469a5ca8a94608bdda7149db6411dbbe64395e4b66109aaf16e1ce85121cbe5864fec2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fe536ecd1c06967775be6513b976ef
SHA1db545a4e1c495f4be269ec9a526a58b6da644edd
SHA256a0c6158c40aa082395fee0393c7d5f6605f1dd5e6adcc587ee350dc0d9313dae
SHA5125cd966e7dc63dd02fa2738a9d9fb6f49d4b7eca0fd3ccfca8e1af56beb533049a470c68b76cf0a64df81afb23032e02fcc2d8131d118afd6120a67b13c32bf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555fb6de610a5e2f3a9b2aa1156ade356
SHA19cc0d12107c2f4b3f9002c97b9cff2b07f9b4244
SHA25699bac69a79931e181dd91cff10831dcb7d10f5f9e50bf8ec6f7c8f376983b477
SHA5125cd349ade4c7a9b4d3d55412192f978838891544459fede61e9edce2f3d0c62e1a3e62e4fe7ab203c11b6bce13a884d1949639a6269444892f49a0eea7c14c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b651f3034042af7679861997dc1fcabd
SHA1d5db91bcd73bdb0116867b1f7e28c529f216f772
SHA2567874ac435a2b691a7a9b002aa785f3ded75de6faf84b679219e86820dcb1d18f
SHA5127256afefffad99ef1e6bcf4ce614fd2187e82ef82f5f6a975c1d0982e1dbc54aa505ebd00353209bada44d252d4cfa8d2b2a94f1245eba8b278249ef81095726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f0ceb11fdeefddde96bffceea3ac909
SHA1fd19cc250c63689036566955eb970caefa517dde
SHA256296f440c29af42dcfc3bba88b6d76fdcb272dfc21401d7fd5a4e18f84ac5bff1
SHA512651144c48a7c2f7098c43b8863cab64236b203e7aa881b60a05b69a58ff3b43ff0fc8e78da229367c29a9e2e41eb259e6662ba8a7fcc1f83821d7850766d9ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3ee2a63f5670e7f5cf06f37b73fced
SHA1d6316fdab7975760aafc3417c95f3877a8eea778
SHA256941426a2be7f902cc0dd9a35a727dd758ffcc7a341f675b18f0d299a031f88a3
SHA51278c99161d84eede4e1e378f8d1ab66a2f8a29ae8c5b0672d67aeb90b74060e390733f035ca0c5f8a2cbe715767d39fbc4d7fcd97ff44eeb16c890122a78489c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeaf25b61fa363a0d841a09a33b64770
SHA15dbb82da2b50e48efb2120d6efcc0606115ea487
SHA256744fde06fba0c7f3e245f5c7c885ca4f1af131f67f6a9171ec9443ea8b0adda4
SHA512563b66042b6f96c221aeae3cacd732956876c8a4cdfd32e439b4fc5d1af50a560ab13f50bb7f2edb96d638dec984dc2cd5bb3aecb02de29e628f8edd3cf573c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adfdbc225c7eb6871718566b42fb6259
SHA1762e3bf7cd65307b873030f2e033e2e8a2567dd9
SHA256c1c80ae52c8f8efe3359e42186c5af88342797464b21ec9e2157e69a9d888620
SHA512b5d6c6cd6c4c02653eea49f4bff816a5c402f4cf15c216c70ff4deee44ef0a55b94f3535b1fd34f1238174d25aa4014973b1e511c7efc05dc2e0aee26dc24049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3efcf96e730601c87c5fba4ee3616d
SHA1fddbf36efdfcd4c7f3136427c5d21c7ef0019595
SHA256bda159c457d2b0a32305b28fb483d76f9e1e6ddafe6ee6bacd71b26f14b9da42
SHA5123370c5622e5836d4447dd3093e716994e882f7944feb188409286ffc929f326996cc6d444c1c371ade69888c817a86e3a4160030d34938dd005c6e4cff0f992a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a