Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2ae9b05b8feea9d30c1b1ef57f08cc4c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2ae9b05b8feea9d30c1b1ef57f08cc4c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2ae9b05b8feea9d30c1b1ef57f08cc4c_JaffaCakes118.html
-
Size
460KB
-
MD5
2ae9b05b8feea9d30c1b1ef57f08cc4c
-
SHA1
4c5810d24957e17e3c9918a96df75d57d358a96d
-
SHA256
4a64a7fe59db818dd74ef3a88243f7122065e8ddaa7c64658454d3286f75e0ca
-
SHA512
83e51e1f7c56f7e5eeef7910c16108f012c629ac33d7b65a78f5a5fe688ad42d119d1235b9a60ab5ae957bf28ee42ac9b4ff0e93af3ca660be27b8cfa6e4175f
-
SSDEEP
6144:S8sMYod+X3oI+YPsMYod+X3oI+Y5sMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3N5d+X3b5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c008e52f30a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009a30c1fc6a18c8b749b971d3dfdd42a505e56c0b6ddc8c8e6542031db4af52dc000000000e8000000002000020000000162f3f8e4d96480002024580ef6624e1deab8941543cbc4ea83cb3ed5c94d0d32000000087749ef9622a203cfa7c77c7596b893ac0443d1d992c4ad94507eb82ed5fb3a64000000089736d619b990a0f580c2cd12c71043277ba9da4c34bc7f1fd4556573d673067f577fba646261901679afcb246bec7ae3533ba25aab30b4643c515475ca45443 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57513A01-0E23-11EF-84D8-C2F93164A635} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421434909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2256 1760 iexplore.exe 28 PID 1760 wrote to memory of 2256 1760 iexplore.exe 28 PID 1760 wrote to memory of 2256 1760 iexplore.exe 28 PID 1760 wrote to memory of 2256 1760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ae9b05b8feea9d30c1b1ef57f08cc4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a2a52988ed2b1935720bd6b6d60956
SHA1ee99deb06272fcd58f488cc89fb5261ed176009d
SHA256862fcab1e7c1061f33f49c87ed0773d99176da18bc663c63618477e34637a5f1
SHA5126d8f7a60d712990e33da5d24c73fcb1b7c9ed511398de24c98aaff853226044bc6ed2cc6fc1cf2dc2791e809f5758ff5eff3fd29f19fda43d8d5d5eeafc3cc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4bcdcf5a1d7857857156915a7d04e7
SHA1c6946e10461275e4b9bd9cb81f55245942773df1
SHA2568374256e385a9b11e7428765388c1c6567aab0969b3a4394b99a6d84b54f0a9c
SHA512b07630128a9ed2a0d737502f813ab010bb95bed6c0db01d67d76c9a5abb9651dcfdcbb96fe1cdbfec9413daa90f8095ad5ae4f93e85c79142e29c5219dd6e96f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574bd880551b03fdb46ba4f4beac8464a
SHA1fb6baa7c925c10e2b85988df8aa2ebc2d56162db
SHA25679964d0f6d2487c83da92054486ce82950aa859cec5821d16fe7bf752ce8fad6
SHA5128a22bd2d4a7fddb4f015e1d3cabad8d10fab6da6f717366c61c734fcab5a7575d2c97586c8aa43fc4c54f845369a5f7ac4d31bcc74fc6a507827e239664e3077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aae3fe534582cfdd24cdef57b188c41
SHA1815a9427ab816e877c95c71457b8f425fab5d53b
SHA2563b690b088da5094bc922ddc80c60ccbf4b39fddf06b25ea835ffc865b7f57298
SHA512ef4768b39c024cb935808fe7726f683b3d29a6141efb43bb3d0d78025ea8f60aaf7a79096dade4c42b822da5fd7d05d94841c8361df4f6c50d2c01a84e334517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58026149aa4db92a0a1549f94ecebcf3b
SHA13c0903cb016ac9ac5a3bc9de971fc559d9e473d6
SHA2568695a3bc448052f32b41896deb691af63dd7a7be7900a81e4e9539cfbee2f31c
SHA512f8b396ea0a5251e99144553cebfdd668670bcc698c023f784b272fe47b825e9fc096fc64df2a03efece7c9da0612e049bab25f6a6362da072447634e6330a73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52655bd06cec5618b6e6a3b2eb279efd2
SHA1b9586301422ab6639e9246d23b904be7cc0bffba
SHA256ec1c82e39e2a071cca0c7b767c871dd6adfd3b2cae7f6974364171f613d5dc8f
SHA51241f7c489cf47ecf769c1e780ba0bcd092789f6679ef75af418970ee71379bd1b41a676e071fadb628a4c65fce59349674d098ee71364485a0379d8d0671ed0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2a4ff351ebc68e7c300425b4df92c3
SHA1c797df55ebc0d85973473d8893cd5120165dd380
SHA2565c92c74d8f4fe227795feafcee217c34e161e36f444a3b80738c345e42804baa
SHA5126d445baab92fe6f399ac336d4bccbcf9ebf956697d4aea3883ec24489389a7cc02b2b610b9c63e296be328667728aa365112a95d02e0990f07121623eb53abef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51220630340c211147b0cfa0e4b6c5ffa
SHA1ea91e548188face9a59a89c376dcff4a78e35286
SHA2569a8b9fc0d93c697278975ded616ccaaa362c2c949e4a8e298fec895cf5dfc8cd
SHA512a6efb2a9d96961c84a22001435a0cce8730a5976e403f000b11a91baa37dc9261908dfa0544ddcd720b58187f8357fa8c93006f81c0ef1c6a83b8a2436714643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae2d4a52d43e3c1ccf6b0c992a5e0039
SHA1b67918964a5db36cb212aa82d6b3f9db5ca5b2bc
SHA2561e5196cd3b3c6f623715cae2191ebc73caff4be1e6ee34c77daf350bcd6da524
SHA512a2aa1978dd365368168e0b36eef3d4925845fd8904c8e534c4445141c1523a4cf7aa59872b1074f8c69f3ceb1c2ff46e5f40d330c334708a5f6bed90b026b7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415a9e3767827d652b98b18add8147b5
SHA104956abbc358bb8c44d879eb62d03236b8e517d1
SHA2568c6d436ae791c95ef6e3d1003dd41c8678b163943ba31595359864503ac3382c
SHA512d1a2a14a55ae01dbdaa2c80885ffc22196c53a15ecc52c93165aedab10561071ba94c7778db359ad1faa265f6865b0e1c12ab4b345e95294ff45816f5ac45649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d28b5070bf3211e37dc74578f8cb72
SHA1e47926ecb3d2befdb718fe20e9e5f9e8d1c8ea2f
SHA256d7e05eed52a5a2ca27d7e3b5e255dc7d9bce73da1f0b3e89019cf40edc79d4db
SHA51231cf629e8395912a97743e785d8a50c5adbdde750479e714a92fd5b168cab7f0606a7df4447e9b3cf302f0c8107f1488212508ce06afcf4f7710accaf7abaf68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af63ab86d904c99ced2d41b92f61dc37
SHA16d1269ca1a8c259d91c5829c0c22da19ce6d6a09
SHA2561405bd82f3c59afb841cd5ec4ccde3609e2a72139ad62989bbc055e22c9c413e
SHA5121cc30ebc83dc9415d014cbd41764aa4e6f1a7d421743ae458943110ac48e62b7e035f2ec691deb39d9035e51ff7b93d1652e9aa5f8d6d73ce8eb348b3f6eec52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27ec552ed9263d9974b958f6be2a439
SHA1fcee2f7fdf24cd45f5a6fc0b33a1707588ab4bd9
SHA256e5ef037ab89b16b8f1b9f8fe64a631cf7c83f8dde6d3a8b8e641a13f68f6f435
SHA51250c0175a8be96d62655fb3858bcf927adfb005d66d668a44c0f326c7a7011ddd354ac9d48f9c8c8f9fa52e9cd3c40175c500feb8c51e95d47ab0a8f0e4ebd911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe63f416859c3e7b23e9b6c97516b5d
SHA1b24be53ab92ef7b6860818eba09d68a8eb612334
SHA256a9e26ac15d36ede8fe892ebd2f6ddc16cf42eac904df3374cdd6baeeeda859be
SHA512e152b1a4eccced853e04ee1a5159f2da61cd9b9d20d37a3e2d3c5b50a0ca5aab1666fab6a657d7e2bcdbc0cfe7e7c976dc8815e374c0ac3c4bf903a442e46308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d0aadbba4a0f009d92e42a4c9ac853
SHA1abc2a3348681fd53e72b62429945571ad15f00ed
SHA256789001ddb48b5f334aaad9a8894ba44462c558094d3aa51ec292c2d2a31596b0
SHA512ff260ec2abed075fece309a8bff2b9b189c51a5609ae5d1ff215c38e27ab6b043232235ceb5b1a3d5450834b4f4176761e8f07d82da7f89c95cf54b4d65cf9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1ea54ce4d15543afe869978fac0458f
SHA184ba0f91a20e0d545bbd1bb548ac875b6bb1d142
SHA256a592be8d00c44389eb4c5f322b6096ee3ee1cca162b98d665b4e06294a1830b9
SHA5128a91e4516b5ba955c93fdf9176128097ef8da2277eb1a4d3c7de59819b40756a1fb29805a52fdaa1328b5a9313faa5acc9f896a71af86045c04c2f8d480a492a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec09d57b0763a3b3d428997bbe77c98
SHA1dc7d26273d188a72a25ccd9b6aa8cf1e4782ed1e
SHA2567799fc0ea3ccc0dd4c9ffa2afcf19cd6b269de38fd5b27587c3126b8847409d6
SHA512195bef8892ff23a07a3ff537333732804f3f2ae3921e8bcee3381c8db4d15240281d6bfb52476c788389a7f1fb56a9d98264350f518b414089a2dced379f9dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec6a795b0fbcfc4a6e0e1a288373deee
SHA1efe39ed79decc75b22943d4690b422c017a372cf
SHA2560a3f7a7e2174f701a754af3c03c3b4e1d60f129c7533331700706b68db53ff54
SHA51266bfe78d1cf3b350a46abef2b9b58206a3cc6795ae1d73e2e1baf7b8280aece6e5ecd457f010e15339ad5544c6a0782877b2db04dc68f3f31982469fdf0bf453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778e2149de7d50175f3eee646f07367e
SHA1eaafe96a10164bce1d80d3881eb79df89c33913c
SHA2564f714057137522ed9bf36140e32cc382668ef5f4b0e56ca6f01a97ec149cd292
SHA512d019774f281035abeea26bdd67aa10988d3a76dcb8147e3fc322f17b0b5af86f90b057759fbe0c087550fbc4b14011f1ac977860a304ea8cf9b297256a2e261b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5b8a4b71636d6dc8e8819033e9a8ef
SHA1a7e584043a15d0921fe70ee1922dc5653d5d91d8
SHA2564dff108c4723c09dcb6c2540db0fad8ac6c1135cd8ce61614394bf7dfbcaec4d
SHA512b3b7abbcaccefbdf9a5bbf7960d129a881af4e7e90db180f45611b4cb23f22ead6b3ac0f75101161f6d4d252c66d76a2b382a375d90cf4d970bbe63c0cd671de
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a