Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
40067ea50e5953bdecaf4312aca4d54b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40067ea50e5953bdecaf4312aca4d54b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40067ea50e5953bdecaf4312aca4d54b_JaffaCakes118.html
-
Size
14KB
-
MD5
40067ea50e5953bdecaf4312aca4d54b
-
SHA1
be9a266636f6a7d56af62b4ab2126c5613862b86
-
SHA256
2452fc65e907e02202f9efc1124916a663102d8ed894a8aef46b3b6208849630
-
SHA512
b916b0af9a2ee325d5220c1df2cf955db8cfeab1f79c95fd306e40b733da6061a5730b0c567119ea829c81a19fa9a90511c8758c3e44127600926ab363e6ca9e
-
SSDEEP
384:Cyi9nD0IQEdsF/RVYaVuQFAi79y1wDduMNg2A9aLyX4BZtpPiyFLV:Cyi9CEqdqQFAi79Io0MkX6P5V
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421773822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E95E221-1138-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000b7efcbc3b3400c1c2a94180fc9cd2936af5c67b43ed0801bb9c3b4e4dc38bfaf000000000e8000000002000020000000e8adf5e596a42d5677ae257b4f58742abf23aea2b1abbd90b983d0840c08d6d4200000002da4e3010627a986339e3d515a4989261da8bc826686de8b844f99ef197b8d0a40000000915daf70e1fb82d68afc6f1d4fb4b5874f300a5245d72f87ecad2c6e80c01a62b098d488bb324e9f887c2e7cf48314049d22c9c88f4b7e3a62b60bac2fd70308 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b037954345a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2956 2988 iexplore.exe 28 PID 2988 wrote to memory of 2956 2988 iexplore.exe 28 PID 2988 wrote to memory of 2956 2988 iexplore.exe 28 PID 2988 wrote to memory of 2956 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40067ea50e5953bdecaf4312aca4d54b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5050d5020442033ad933f7fb4cf2dce5b
SHA1a817446d888133de6768fa8ffb5bfaf90b1a410f
SHA256b7c85737e7dd0c2237f06810628493ab576d51398975dcc22346d73e4b8c6c05
SHA512cc24c09912e97eec9a3ebb66560cf191503b8b94f7d64982a48d88b9e068fbb94834c23b9594ec405fd23152b0b67610e7d9f2e5e2d9f71dc5b2d279b50ef9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1570a7deb453dc52584f2b1dd11256
SHA19a11553d5195386314f26a25b561e73cccf23298
SHA256a8efcf53b2adeba672b7befcd043b185bc1ed13108c19450b599edcac895233a
SHA51262aa2464e0d3d5e87a07cecf689bce7785e517b5ed9402849efcf595df7f0c2bb1417341c7b47baca3a8dd3d31477ebee9cb3ecce0e2ff7000079ef827386826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfac5c52c7a0ccc2f4d1be445fbfb84c
SHA137021c07acc9a2f4158f92e5040f80181c9c17e5
SHA256bb12b241d57d2b2619c9f552a9b49fd1c54c12a5dfee47c96427570a2e210bc8
SHA5120d3dad8e2690295d35c55cd5e90a233cd0a9c0580ab5de9aa38ea4223ab00e4813ff384aafc876966b425c261fd3ff8c4fabab3e8bcb56051d94a02349418c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b196b1e3c1ba5904598f360a63df07bf
SHA1894d42a68e25052bd457acc4821fee234cfcff2c
SHA2561bc515662793cc7fb3ee4b40ec77dbd832b765a921d00b55475b9528db264bd6
SHA512ad16c6461177b3e58856a1f78c2668f90d993fdc8eb92a43e507a1f293d6006314a0143a3f6a9de6004eadc11ebf4c225a7b0f013bd3fb0556128223a3925dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ae4bf1a83e09e78f81f2d8053ffdc06
SHA1aaf38cf30ffdaafc079c6a9dadb091f5794735c4
SHA2564cbfeb5bc925594fc1b82e469b72dbc55912127bf97240ad38799dd008883c1a
SHA512bee4dd577fbcb1eb1bc030cd6e72bf477736247853a5c32e9b5615554bce2b41253b08fb24dae99ca34576eca93fb9a0e576baff83b1d9ef3a146316d703dbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55009dcbaf4c3011805d0bbcb752dbd7a
SHA16d08f4b6c7b1e1d3d93bd832db0d61fdec5559e9
SHA256dd453eacad25bd9a55d5c2d6f492f072fb5ed57cf62e0da208ab09f5f6d2b552
SHA51275a2c0cdd45010f81d64ae6587e2fd219f645acf1bd34530038e28442b7d57f9a0d6250fe179a6c197358d44bf5b2354e4a93bcd5641ba098ef395ada7aa7aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5becad46951b8eb75ef0ae1091747ff68
SHA1c911075696e53c9ee874d29467a505d7b982507a
SHA256400974b18aba2d124e3a22110d7c85a910029a42246f5f6a40779b38024b8679
SHA512adec4fd5c5fb909615b29fc9970337d5469eb3b9fb5b36f20b0fa9e071a430e984d404997c2cbf79a9bfae2446e21333fd9264f92e9529eee00eb63ffb79b137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a339133389d43a42d07652a69d4c44d5
SHA1b3d1cc779a7afeecc2dd246825312095fbfdd595
SHA2562331ff56c957e6b70c11b0bff521546e11854c8d47e8ab1c2a4a0e1631a65482
SHA512b5418fc1290d3edea17088dff1c6514711b77c2c20df7a18ac3d0de0ccdd7f47312951d32d69c205c1fa3721c12fdc03b9a5a0415c27318d733698d8f52886b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf1cc8c378361ac9cdd3eb9f5a5ada3d
SHA1d4840990f0f0a101fc5e1b90cb31d16512000011
SHA256a88a69c90a6b58ad9f79a6f9983f34a95cd763c336358ca4040fed1482895dfb
SHA5120730895a7f5b5809667284a9d3c2db6ee82b0fb7df32b3fc00fcac666b160471c3ddb297f82cc997d31ac8bec8cb9542088d58d1f226e9b365578227403e6f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fcca7a681ec9170e37eb56048a1edbd
SHA1e457bd8cd7b443b3dfbb2e9def45db744508257e
SHA2562442e5136f3d2a9e24240cbffd56d09336f9aa0693cf4ce63b096cf4b73f18ab
SHA512e6f546b345da18602ca26357c8823aa6f6f79026a974c0b42e1c795bbb519afb71b19b9cd72dc8637a47ec1b8509cd7e24892de35f70d9301616499cddf4e8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521ed0a00e99d8bfe551cdbd01352fff9
SHA196a8ed8a620adae6e1e02f59a0abb99cebdc8151
SHA25688f221fee4e934c1476a2068a27a9ee747ad6c7ac8cc66c3eec4fecf42b0c52c
SHA51241c45aab9233173114c3ceea54129da69007b58a2463a9432cf26b615e02d15c0ab0cff96ed9baef89a48339395a68d43f6beeceea3995624b7610e0bd57d5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2188ee3c272576b9a72e4708483c77b
SHA18691db4cb53da37120c4f37712521b14eff156b2
SHA25692a2cd90da7d170542982d36dc4862d69a09c4651d8a53e030ef35d1853952c1
SHA512b5bbd4674317b86cd543b4cfc816fa22605617c1600ea4ebd826d42399e7fbadd3e57bc5b0e188b26c1fc66b50fb90d0a7c6255655d3827f9077a0233de0794b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15ad4c403b2c54a3e89c06006930aa5
SHA1e1289a11e8724ebf9f153ee966309d4bf77dbba0
SHA256964158d4fe892d7f372a33a4dc4177ea9997f1d6c168ecdcdf3643beea89c81f
SHA512be61da20337189b1abd03ac5ad15588461eab5568d627865b60734bc318fbbc7d397110d7688b8dcb01503684fca011dde9d379cede60b6da8cd3afcaaea3ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519468a4b97f5517fff8f970d004726b0
SHA145808e0a570bac15e4c9dc43aba60e4c8e05380b
SHA256f41edd859affb32041b0e0382e56cf86cc00bca99ba4d0303ea5b17a152fe84c
SHA5127f1d801a5c43febc71c46df7b1ba373ff0bc4a3edb4e539dc099abbcdb89e08fc32c196e6f8b7ac6dc8ff6510d070151954e4554f2c1fc50b5293456fdadbd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5066c453471cc27519dcdb0230d154fe4
SHA166ddfb834a9677d6458217b536d8cf45464733af
SHA256b9e0f4a7bfcfa6cd287e632225c352a3ff9eeb4aab5b39ee14637b176d68c970
SHA512765e16cb30254d18d8517fa79955a38b4a80281df9e919ef9dcf25e583f7867ece534d10f150d4a6e55724dc70a6af7c48265f97836831b2fb8c03425a4ecc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091959b9f736149af316051a22f2dd89
SHA1ea07933209eb877111f7e13aece623bdea14ec86
SHA25615ea74612f0357b1754e813d9571f574b5d12f45ba62e5fb65a459ceb8bf4c78
SHA512c9e054b1c4f93a15f1af61b1887a944ad83d002e0e74ba43211203b6f826e2ba33aa9acd2bdd949133eefb889826e0fe1437e303b847e76d37a24439daf22c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629547d069888fb3068e9ceb8ffa6315
SHA1803156f8685a751bd68336a9fb5e7efd04b86a6a
SHA2560991cefdf172482435fb3349357508318fa4df8b94f9e9bf4485f47e8cbc4c54
SHA51209f44de27ae5e2c04c2449bbc8488c7d7a49add2a8edbddecde99d35cee9c4bdb2cc287181550305c3095f75df2d99f0154455843a566a005be546f8e9e7b517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3435d697cc0794a536e85c41315f0bf
SHA1d7cebf04f5dff56fce3211bbb7f677270aa7e636
SHA2569f92df3aa2710af49349dc5d2d6cb82a9b4afa0dbf16730006577f920a2aead0
SHA512cee036195c37498d44ad4df156f0f3e217007838f1d02ab0534ac3bc32986b5c890e19c08ee66500bc50fd031c8a3dda6c36e660f72de09c925a531ed6955903
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a