Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
2b5d55da5644ec9c2f1ebbce876ee98e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b5d55da5644ec9c2f1ebbce876ee98e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b5d55da5644ec9c2f1ebbce876ee98e_JaffaCakes118.html
-
Size
460KB
-
MD5
2b5d55da5644ec9c2f1ebbce876ee98e
-
SHA1
00f2bfce99530deab7dd7df8f6adbb3c58524155
-
SHA256
827c139a90e7ab18a56bcb133bb0c0cb3b8d6e6f70fd44ddbfe8354887b95582
-
SHA512
4ea8b69123ff46f6fc14478e4b9f1b266147a8b88aa62dab090d3ca3f7b59bf83f2aa19d642b06f516d36549d01b5e4fc6ef94fa5c0e0bdc7dff53d3d46bfec6
-
SSDEEP
6144:SVsMYod+X3oI+YeJYsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3QJm5d+X3g5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{259B8C71-0E34-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000006e9cd4b8f7c24b45d9845b710afed725b7fe629b91070654329b4335851459bd000000000e800000000200002000000021b941e20938d5bf2762841192c656bf077e3934433ddc62d8b6e8cfd101face20000000b531e21b1afaadb2b35f100e463baa9e1b9252f9fd7071f1fe990a17c7b164e64000000015e0d9d842576c0684960f8cb48543cf52cecb71cd5611168edd155b9baf0922804203d903cf287df6fb5ff9b9519613f1d7af9934a8fc35df674b115276d781 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421442128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03d23fe40a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2600 2584 iexplore.exe 28 PID 2584 wrote to memory of 2600 2584 iexplore.exe 28 PID 2584 wrote to memory of 2600 2584 iexplore.exe 28 PID 2584 wrote to memory of 2600 2584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b5d55da5644ec9c2f1ebbce876ee98e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a43e69d182dfad3e97085217e81da4
SHA1483d9c195330657a12bf6b0c984befbe68272890
SHA256632795cb36b1ef02e0348d0fdb5138cf7fafc80142a40f3e4513c5e680c7cb2d
SHA512d60ec2c5707c38365d361f86505b915441d29b490ec5aa77bba3c68695851056fdfca43aa8bdbf13095ea6fc4ae88bb9a0e001451babb93516273efa75e1b4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a60d89dcdb0bd68bd13b9cf00f967193
SHA11d54ea9cc170931d616102721b01c3a9b9bf93d7
SHA2566e678452879cd8922b08e2ac96bedd759095e33c66c1335c55e1da8b296313eb
SHA5128da8469711687c072c2eb8b29adb50b8d5881fd6d08443edced2a620904609b3318c01dac20ef19e0787a2e2048815dd66be02eb08f8787843452f4c18773e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc8ba2740754d30e25e687f26af12ab
SHA11b36efa0d33ec2db605d549ae3570c6f6a29b043
SHA2561e28e62ba1fc5aa98b31165be62ea9b871533d8ba0ac850aac9ae90e2e12fcc1
SHA5125584eac59aaf9ed7fb4040850ba4dec53e2ff1fe6e6c30b5721f9d31b8539926ed7ae830105204e7f03f3ea6cbc8e6496acbe8014c2ea267dca6b81a85e798fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6a0de1e2a6ab5186cacab88ede98db1
SHA1a857fbe875d0ec05a4f739b49ff1ca0d6aee804b
SHA25699757b35d5520fe5cd6f9f805a278d8d5a8c712e2bc57d3026699258f9a8ec29
SHA5129f5578067d86eb626633c0f27b35aebb0d63fc9aad3c0e5ac383c19bff9e0952380bcb0edf5e55dd1850974149761b50532e76a7f18f577ff120d740279c76a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5835edd40d779b83073cdbe3d077f0338
SHA1df09b05fb4de7d1419a1fcb05071e32cc97dce3f
SHA2566abe0c081f2a33aa5e937c178d7be91ec4a75324c7bce97f09f40b74497ce8b5
SHA51276972bb90ccf6c1818ec53af117641101bb9039917b4c0155ae315beb943adb7d180dc653195eb17506b5e60fdbff408ea1e09dbe8b908eec87f35482c3c298d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967349dc9b35e43c4aa67cfc6a7d03d3
SHA1377b4d40798f0a6d1bf239fa7095d99608e094c6
SHA256c09603b8bdd9407c9a4fdde9eeddbe50f5113b1cc0bac07eb9ed75750660244b
SHA512ce2841205cd94fc0ab56b1068675f6edf9f0bdf253f3bdbc8fabe4104a72c95e2e55b6b10821d0da18482316f6d223023ae10ff5652cac6c17e2541772b1b698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a612ec8812a50e2552faaa5fdbb9e8
SHA1e3bff9d47083ffdc67778884908b11765d2e1d35
SHA256f8a435d4c43ab805d5e788accbb5433cca39453f06f42e3a9f509e7998aede02
SHA512a62e500c6805b7fbe1235040bf80a0569de1b40d45c0d0e632c69b4426c019e6a59ffd01b9fce655b349dfcb56333c3db01b5f1e8208d5b226fb69089df03761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519334b86e58c8524459fcfcecbcd901e
SHA1ec02aaf588cc98dc4b29f0389392197ac644e757
SHA2561291a7297fbec865f6a974e8343a991cb3f9ef2c4eaa3e6607cd261672ca1413
SHA51220e849bdb5fc63cc035516ed1ac9d0f270d4eb578db69ffb97e941f3232bfb6e9bd1f3cbdcc29a98cf2c31d17324bb7e1d2bff784ad8ff5414268b905527bae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9e820a3e4466211badebeb15c4f77de
SHA1e6f3661915ae36a06e4b266f70976130b659dc77
SHA25629570f38c97083888eb736a89dc38b6e9fb0bb0ac059d3fea85b901eb0e6b51e
SHA512992f2d2cea88b729de8080a649303e5240d3556bc8648f5a9026212c9b1fc878168257a75b88d2129a405e1476d87b3fd76022a3162125dc46f174485c919816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d04dd1189ca1c8c73b2524f5483b8777
SHA192649d74296d4e650c01c76c18ce9ebb9c71a060
SHA2563882607919335af01a3a98fec056a79d798410256174bfb0fc65e1b4be4c9e5c
SHA512978a8b73e34a5d4ea7b8df94cdb2474cf10f01d9f8d10ad1f8b79036126d0b0b58f965aaa0722ca9465516e2a4cf4a45612a8f65345ac27508faed7efcb0e644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57570a940988e8b6dcc39534e0980a5cd
SHA10c6089a9e0258651b340be592e87a2c387c55a6b
SHA25675b4d1a89b6b3cfb9932b0d3837cda75e559d37b363d2775535bcc0e994937eb
SHA512c0919da952bbbc012d492b87ab4c672d367477575eab43438e658b197d507155e5c5dec49c4b64f0c5d91f7c3f7968120e261423e37f42c4982bfcda7ab1189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566824c135174cd08e806f7d161559a0d
SHA14345308159ba5bf623dd18cd57b1ef88f1758722
SHA256427cb20f38678c4540dee8a1a861fae42255252caff305fe4856f413753e8977
SHA512c086ffa3a100e9433da2fe4f5df94611f97daebce77045d7965dd76e2944155288c15f151d5a5ec830bca583503050fee4dc8f20d6ba62ceab7d78cff2856ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ca6c31d5668745b44855f118fe9220
SHA19a07018f398ce71d2d3fb9042c6c063e2d90edde
SHA256c3a517424d1ef237262c20f1cfa14c8b78a41d0bf02bf9671ab0852516cee453
SHA512d2be972f8d257f03c2dbdb89603faa330f0b3d3970055d896b9909fc07d8929114715aeab65348a31b4cbd1ccaa0224dbc6d57d3c8fc73d7b78525e71ec100ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a25630bae6fb032ffca74f1fafe7640
SHA14d74bf41fe8741828576408f36c64d0c00906050
SHA256e2e138e9212c127f48346efa6a7e6d5ad2d38873747b7be58cefcf2183adb701
SHA512657355ea1614ad8df1fb567ede4f4a205703c9f3106add867c9354c8ed6f710ca1667f30a1dcede3b9236c57c33ab31a6241e3872cc4eaf67e5106d2327ce19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3682f9497ffe38acc614acb679dde7a
SHA17a7e7bf11d84dcd0d9e965b18be1bb7036c7c46a
SHA2567e76181102555bd491605d65f39b6836ab3336318ff8075be62eb4c5b65091aa
SHA512d2332761592844cfa0cd10ee52f922db662520008e6e33171cd73c0eebe04cf065000332fcd37fa24accce1df91b61fd57b7098acaab535c9f106a167238a8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ac1e8d8ad1c2cecf742388177fd603
SHA12d2fd2b73e2f18b63a0e296e883c39a9756dacf7
SHA25681e526f3854807f0f07e9e4725330531122fb2469996043a3b480da7e5b8fccc
SHA512479192920b780a5269badca75dd14421cb664ee2921b36e13ebb64c19ed1fe9ea7f9b2a1228d701d6b4cf57c2bfd2de6fac0cc50774892a2ce21b9ad86fa4b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88ca9d632674f2d92c2cf65b87e5e99
SHA1abff58a57499144e9e04489e1e21a4a5ce5fd432
SHA256fa4b6b78c056fd892813ba0b7b7bd1cc95327442b84fe4881833cea8986880f1
SHA5120f1c8184b6e1e861b6655bfae92dad63c8066b0c98fadce9b50c764e56e18dfdb7453ecabbc91c236c0393474f888834529279788e28ac456229a9f1f860070c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab6c3c76f97d5fbf954aaf08507fcd3
SHA1941a51ef69e3ac544fbb79407d67d4ee8684632c
SHA256f86f5da9642fc5786b37a4ea53ff4039135c005a3116c3357d7b9e1fa5188388
SHA512dc1431c42bc182275461da90d0572bd3887951a703ff498c964b6e0d8318cf98456922d305cbbccb0d80f4be0180d6da012d16a8df81c9b43ad185446983ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589cffb0059e25bf273739b2ae59c5e92
SHA1e036143dbfadf9c549d571a254edac5aa93963b6
SHA256c5d6eb42b9e6c1d5f4c434b0bf2769ce9047749646882ee4227a07562c5bbd66
SHA5120d722077270a7199f5c3d0592e6484797597d4a50c8192b07856604486c563fd3644f9451e702681967f64eacc503a95f88b9c0c79feefb16b45a8383d646662
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a