Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2d6c0f3cdbc5bde5cc694030f692a80e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d6c0f3cdbc5bde5cc694030f692a80e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d6c0f3cdbc5bde5cc694030f692a80e_JaffaCakes118.html
-
Size
7KB
-
MD5
2d6c0f3cdbc5bde5cc694030f692a80e
-
SHA1
2cf1aa8ea2a817530d1fdf4db906a58624ada768
-
SHA256
305aac41ded0c07d5f35b133be037b5543e2091f4ddee0a752a29aca57715285
-
SHA512
75cc3bf37a6beae93187d687059098dba3f3a0be1a4431c02518182f5816b1f0c833722b1154aa58495ee49b2e240545720172ba20e1943ea97c0d61ad8664f1
-
SSDEEP
96:9hqEL3+Hsm4LhznGQdB5EHGXSZNCqG4WhWJCYyQx:9hx3oS6yoqSZN1G4Wof
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67E431A1-0E88-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d5663c95a2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000326e51bf5de25e2b674a9d03302726a339a9ac1d11b713c5e1870d3e48054625000000000e80000000020000200000008b9ecc723653e29f77cf490bbb906d0c6786326ce2b0afe9be700ce772d1922820000000d6c746784406a209d3c2f197b36cb258d9208f64f4011631b5615853e8b7298940000000c7f374c58c8e0c2c7c513dcecd50d388c7ced6e9290ac5d587e3f9549168c12b40bdc9b99dca52dfd67829e7bbcdaf0cb748510d2e9fb03d6aab45f943a95b9c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421478317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d6c0f3cdbc5bde5cc694030f692a80e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e940cff9183ae88a9615d64da0d6e3
SHA1d4cb8363321df03abab54f871ee2ac4fb57a77cb
SHA256150d9b573a8dd247fba21485c1337647dd1b3a89c91ef2c18301466ee5385075
SHA5120770dbe91a58038bec0b87987ff53bc8b8c74bceea0c76c40833d5d2241ff16796d1409cb36103e4315b2cd21e7b6d7bbdf0d0c29ee3c6289def91d5b6ac1449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b10bec3ca4de55758fcd443f2b1854
SHA1888f4f2138e45e3f898f171808ba913aee39823f
SHA256cf681b7bdc3c24156c624fa6ec29203f5519f14103500002f52fa8e21dd814a9
SHA512a7e18a7efafc6d15cfa79161c145f1d2867325bea4928cbfa9a6fc37993da59888b810a7fb1bc4f73a1ca0e20e9d21a5559e15031e41216002296fb5bb847efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53338119349e1e890ece253d01667b977
SHA13b74b7256d9fc1548663b1fdb2323a0bae6bca35
SHA256971d7cf6da26a9a0199335d1d1833d652ac0673b51db78efc8143dc0094abe56
SHA512e55463c8414bf8b577a21b18d90269a886041a03d6f888250f48c2fdd7320329fbe4c8ae1ab108cd32025266ca14cfe95c040af592fa1aec238aefb387b80b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47dd62ba82f0539a28fb0e6bc8e167f
SHA1b214b0d1ddd07e25514b3c326f0b7075169db769
SHA256958f27c2b15ead0e1e50c7152094e5a9e8fe990f4acbf63ed4c12e3122f42bed
SHA512e4c21516c107a0a17d3d8a8324c02c95c66161556385caed6e342dbacf12f86a8f538b209dc01548f177b7a0bfa54a0289ab4f193fb7928a71e7926f9a5b1ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef01d5616966531c063643adbd60df9
SHA178a4f41f18056bd1f236be99f16f34f987c79ef3
SHA256be70db2133142a0a6f0be8b815449acee81ce0e85f03da21213db8326d02d765
SHA512d6b744da30138832f5a25743f64ff5eb9008eb1d4d5346b2e4c77c70d52da48b06f05a342e8d673521c0b651b4d2e066320c2c20b7eb534ef6ca4c6c8f7ac9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8e8e2fe28fbf7106c3702d72e3ec73
SHA1995f93c6556a2044cdc9a4e2723c9759c2e0d903
SHA256f3386adc266ad6b6c5e50b7e6e200188bb32ee868a804ab2db108bb3fce73b01
SHA512f5a2115d559fc9998e7bb7455296ab8ce40c23eea3b59445ecae49a7d209264bcf8b42629d8b2bf0059067c110f7127376302a17d2e8323561d967e7e4b66a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528baed221005d3cc35136be9b1a5ab85
SHA1b01c9d3510fc4a3f62a3b2551436c40fd49ce7a7
SHA256047dd6e9ed9b10df82c5499d4f34442996f51dccc93bcf5b976a22b9ef4de3cd
SHA51203a07ea417af780dff628d73017187bab5c28c384949e2217cd5731e0ed434c6aeecb474bd119a15942476ed26b341a97b3ffe0bcdafaeb1d9116d7fefeb1729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c3aaa0ea2a4eddbaac13174d59b613
SHA1599bf72655132b018b9e6b08562ffbdea33a5878
SHA256ebf0eedef6e1382bc3c21a290e5368f0285e0748aeeb31cb7178080524d02af3
SHA5129018b84b181d4bfe29aff40df1492338eb4e8db2c0d1cd454b4870fddf0980861fe8bdc80429516943854304538f798f380d267dc9647ab71878363d357ffaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e6d0aec94ab2ce250f775381af580e
SHA1c0642f187c868439a64b4b228bb079d297c030db
SHA256bcc8e773853052e66096dbd8fd0bd771420915995cf1f2166e114708ffa10214
SHA5120ce5b24519966c00ff0493283e0133657440644cc56b65c071d7f8c50e812768f1a1f976c8a6db32d831a04e450ad94e3194db5b15ca3daabd6d39edaf95ab8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53901e1b6222cf7b5421185f09f71c548
SHA11cba1d0a98ba9c32291637945dfa4baa56986f8d
SHA2564cd25ce57e3c3f5437288f7892a0092d901714b0e07daad034c8bee68dcae7e9
SHA5124e7320de81b7e600c7166d8ed7c68f26f4c6977be8073a3292bba10d6bf236640d19f78408e2befda70cebd5fe83c3f2f760ab847f504d05f6e85fc18f2ab9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd6ea35ebac0593c37f1cb7d2c40eb9
SHA187e1ea5d35c4855bfb5dc0ed69a405b4749dd4d9
SHA256c816b665c6e531e69c29b442dbc0997d499ffd6be186845cca6d6bfc8f2757b2
SHA51228554d823dbe96d219b62e42a6f02010c28d1667778babf377bd3d110764e594088ad4921a709cc8c0b3713032cd734b4a6eb49f3fcec12bb07bbefeccfd8081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526ed4bfbf01ee9fc06f4ff8131850462
SHA14ea033fcdcdf4f28416011fbb3b3411e26a03208
SHA2560833e49efae9617fcb1d3747b58435bc79ab7d16e8b849cb9344968b428e194b
SHA51248a04b0fe2b7aacae784b00864455a8e362025056c4236b61bb2f62897dda2064b8020200d89330860d59bfbc83a934350a34475e1f995eb8342e980f5fc3be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569477f865450591ff6c5a28315257ff1
SHA12f5555301d33b1ea747039616a356ce6c86b16c1
SHA25685e53961cff27383b3cd204f6eb6c735d90be1bdfb58dbc89e3b14149b47f0a3
SHA51259e598850c75b9059e51707433895fc5b3448a5a7d41ea705c3280fc3394cf172fc655de04b7ea2d92995038bdd9b9dbba306b5e833bb61f22ed794dbcb9df83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc513363511116d29362e7ef521b341
SHA13dae9fa73a5ff1a9b31a0d9ef71b6cf4a41c667d
SHA25628bc5c469d2fb07449a279d1b93d6245a2dc35e40e42efd375b33ee2de25529f
SHA512a4aebd1d84b47a7d458b563f2b50f552329ae690c275adc1b4f37f10f9b57f44f7d2d8d0916c5369f5e927d7bb13ab732e840c9faf0449209546d91946258d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7925d15fb03b5a39761e17fecd065d
SHA1e3fc51ba2e18bbe6b20bad3da023abe40965b798
SHA25604d5919c0493b225491f858c076304218dba557477b4c8bf2f12107f49ecc07a
SHA512a1a949230237d787971ecf6cd6bd93db7dd0fa2d3d491efe3cbcb3d916f131c16cafb3d46501b7cc9af3288344577e609880ab8d8b57628ac5799440cd2538fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd19f58c02d524f7f50a09f0feb897e
SHA15e4a63e67caab8847f89070849f9c191cb21c4b7
SHA256c043519bceeac30079e852273ca0a65a529aa55778684e3e270fe6e4a3338ec9
SHA512f5e868c630dadc2f2db0e397b259edf339063cd02ad35b9ee810fe0f0fbf05d4fb526824691636991506bec3bea23dc56e4aeea75f0166f774595eefb9ec42a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58585f0e421c3957585d1850edc021cd6
SHA1a41ff1a7b77af72b22e59ea6352de62807a073fb
SHA2562c76d2a2d1e6b06d5b1960bd8c8da4171f7cda3dadce71470f8a340c3a467ee8
SHA5129ed8b7a80859d74237e962e479774f2bed1d7fe78d68cf3874d86f1712f35a92347bceef016378fc183039472f4d96080d6357abdb7bc1b50dfb9f7885c95cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db02af6057df37d8d863b022facb2e38
SHA185cb94714a119b8355340c5104af28305efa32b4
SHA256b6e868672b7c8c4bfbce4840ae07a7b9ad491be4e341ec9c76cf1a71dffb758f
SHA512425db37b0004bbb9845624c43f9a9e735c02355a56cc9e0a779e376f1de37790c590a4d326ad37cf27589f4ebdd8f0b93dd2f87298f07d127128eb4bcf9837cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9c30bf548b7c2e3ba7bba02d3f4fed
SHA16cdfa18900df7c02b10c6d2a66cebebadf90a661
SHA25655e99cb2e5f887d5c0b09edad15ea17356acc1940e101d711e32e93f01598e4c
SHA5120855d0d8f12aaf682783134329574f6d8f01376ed9e2497e0e0cdf95bfa1e71ee2a0e61b89e040f4c0743ca20e3f9b43734626aad414502baf51d10e76691477
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a