Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
42346210ccaf8cae0ce91615ab9bba8b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
42346210ccaf8cae0ce91615ab9bba8b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42346210ccaf8cae0ce91615ab9bba8b_JaffaCakes118.html
-
Size
194KB
-
MD5
42346210ccaf8cae0ce91615ab9bba8b
-
SHA1
d617d4011a75c79f541618a5131f285edbc8aa8e
-
SHA256
001c7b0182a70e2f7c7662c47aaa25b57cc972063c75c1ceb371366f698cdfc1
-
SHA512
b07a91fa813d412c29b91d086bdb872796fd42792b3cb320bbf15ba27217892e4b599fa6093aae99c99c8efd17c04b875ed5fd0b60f1e8e01256abef263e25bd
-
SSDEEP
1536:vPAJGZkMdpckRZBZmD/Su8h+/QS19QaNGZMTcmz6RZQ4H+CVx1gD3pZ/3Oyzsy:Q4nHwbbSh1gD3pZ/3Oyzj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D8F1E91-1211-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70830f111ea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421866861" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000c8f3091f6cf4e36df7dedbfea47d26499602481796eededccb6dd956337a8341000000000e800000000200002000000023e85116dc36633f6c3ea3c32028898d287572fa438820f4b944021ae77215292000000054ee99a5b32a575c6b23383309c50eeb7c81debaff6603e8568b0f51763fd9574000000038dc02e5833d469ff25e3d8bed8d3d7c0de8cd0d69c2f7633b84b9994ecd38ba4832490ce05bfaca2c6941be41bb94d41eb5495717447f9d76e87fd552f9930c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28 PID 2108 wrote to memory of 2316 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42346210ccaf8cae0ce91615ab9bba8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58a9cd2187e99d87cf53b8140992e27ba
SHA16ca9ba93be87d0f369e0a47f5223c36b5c64778a
SHA256031a44054741ccd8e95bbd086513e381b479e09208b05fade47a91e0294d03b5
SHA512a6f378aa66cbc9ff55be2e706b697d4f6202279d84cea4f34191a580d8613091125624d536738e992b480cb85ee78bcc06a814be9bf1e1581a8470e4b13bd762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb84c7f0c1e12eeedfda5e71497719d5
SHA1dbf1f93afae082087351c12567d1afaeaec81628
SHA256727715dc6f029ff690ed5c74fc8522ef7b0f2f5d6b0ed5b5e5dc67849a20a3c9
SHA51296a8df3abfe0e2298d390fcb7170344e0ff37ae3631a8b061bc7a03da768df2279624819ce9bbf61584643eb0c744810023ee82ad80882a92b62a7a59fb0c63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f77b87c407f3c86c43579bdf14fb6a
SHA1fabf4c449537eefec8ce045c13c0d109d7441aaf
SHA256102c07498c95ea0843e8693540808858df6e57451bc00a9b8cbf1f3961d360a9
SHA51291b12e182258571dd533f0aec9fd7a697c5ec07ab2eecf6a36e7205840ed2a8ee70ffb9e5eb3d0e5917195a063c84bf61b03e9c678cce955de98ad5a9344f3d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124ad6243296113ca1f23ee159c7eb8a
SHA1bbe16463344912002ac62b889bdd66a287c354ff
SHA2564044efdcecb9c920c57b60f26c9f1acd90e65a5091ff5539d00d66383d814b9e
SHA5123bdf25b41cf85b587bcd99c292359b9f9a2b83eb819f8da6c7c22a3c2b7989c858719d56b09ca0edff4b7274a57d8f93e9a6b2646c3e719774e72b99b23396bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554093440350c2b3990473572a84b5913
SHA1605894beaee256ab5ac920c816c676c0c8d919ed
SHA256f3b0f7494b56ec40aee74131cbc976fe8b067d2806360550a3aecc40469041df
SHA5123c5e8c1d679cb4321e5b0e5ee6939e7e4c96de5559dcb0f8c5cfaeb6573ff32cdb2d86735a939bb6dc17eaedf1f8af2c29dd8547a2239e9602ba03fd0c4b871e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c10f83039d920563aeaf82ec8e131f
SHA1cf70fee11f2b0180c1f925817464cb1ca30a6ede
SHA256ac896ec541249a91d8c4358e0c0a4b939102a4da5fe36ac592f12968a6c4e86b
SHA512253133ae806fb0b95aceb6e6411ad39cb84ce67412f58fe0a52afe2d8dd01cb1eb78463f7f1091e735da8175deaede13453a88c0d29d504ba4706bf5e8a4fa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510937eec63845bda6c40983ffcb7e484
SHA1943d4705196c2fb62ba46a12f68c5065c624dfac
SHA2560fda2b60d1f78872f5efc508bf0a6fee24f044711a8973a27834cb0ad0c567a6
SHA512dcc39f34f2ebb20e61280e42f0af758c650f79003356902dfc433eeedf521baa02b5fa0e8f582e4c73a75e03e235500d4fe5361da5a964c8ccaf41ce84a38833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541af103a5fe8a9d19f4426156197dbdd
SHA1c292ffc126c306fb8c8f7df8460544476994a2da
SHA2561eea16c5841947505ccd54dc39ad7fd728626e0241162362633d15e40974f38f
SHA512bf96a81f25806e8208fe70a5d2ff1679f92d417d6e938ace808030c0faaf6fdf54f88a2f7dc68fecd59d927e45aefc5ccf35b82d1ecf36711318c009ffe7dce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba04c90b84883ce797d59ee0b6960cd
SHA10de67990b4209841e65019051db7e682589b22ee
SHA2562ec764db6850249441b784bb895ec9fd64d76a2040ffec0ca0ec4e1c905d2c07
SHA51214533c0438e75b0845ef62030e84fcbde1404ab231a3cc28859c9f371db5d5dcf4967f0dd6bd1ba659e805bfb62125c9a8301072b73f3e28f223c087c1af40fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff3406fac37f5f6eb3986b422332c96
SHA121dcd6b7c5ba4de73db602538de46bd1fc4fb014
SHA2568dc866c941c52278c2d300e10a85a9c06bee045cfc7a883a060b50f9bac12b0e
SHA51203c9fb9ac7968cd08c2472baf308e77fde7adbfd9fb9e05e1050d8785b88c1a6142d08b4f9b640e9aa6d4cb527412e9480468f8369d2f4d747e23bd84de6d19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9dad5b4160e01d966ea43515d6cbb36
SHA18cfeb20a9267308a42cf3f71dd7deba68670c2d1
SHA25640ad4608de9bdae3099f28fb85c10b6904f7e4654c4983f70fe7933c270e9bcd
SHA5122e2ed5a19de949aa5b54c7eb8ac7ee69049162880f264a37a2afdbc478b9bac9e08f8c9dcbb7e5a2a62d17a2bc164bac9cc5e21ff3b92ce5f596f4e46d58c6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c71dad5f41ae9991507530f418fd34cb
SHA10c1aa5b57e3b391adb45ea1f947452e3fa8d8eb2
SHA2567c99a9f4b2442b5fe8c58be893d27cfebc017a7d68df35b5cc9cc16b80dffdd3
SHA51255a40781d4662693223a79835008997e72b426735d3720fd61d6c7702ea4a8fc37bba62649527232abe63868ef062dffe883222ba8ed0f03a7f889362ced0359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed8b91f2c4492ae119a59f0afa46cae0
SHA1f02edc2ef6f65f80e4a4d6be7b02980e8d0f8a5d
SHA256c23dee6c915f64a7f825cbe100437c16b0dabef4e56149425ecb69d00291efa9
SHA512ae8b2f35b03163740042c37be7cea0eb3ce1a985eef72ed2c237042f63efc0cf5cb06c2df8f1ff1b7aa628f8e74dbbffb1fc251969e4a841779e060bfc3bd432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6f8675896863aa091e75de7bcc603a6
SHA11c9840103ce4024c2c31e987414aa0d5d94d301e
SHA256013f542c3db105c02d7b8e9ac62d0a02d6b2d3d6586dfc6f61880dab0485c0d5
SHA5128814154a181a311809e444e29c0c1d7cae5e5a25d9e5e45fe9079baa60fc4088e5b721323e7d5bd97f1069b6b8dc84ad02df8775170a2245cb37164da0bcb5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51b0eca1a6f91b6d9568b8d4f8194d954
SHA11aed275689fbae2679ae2b1a6a4b290ef3e9d41a
SHA256f11612ad22a91dd2a1cf05e18b241f5cdff3adcf06e6b0ed4baa88f8e5160c00
SHA512c9a54a70c278e124cb0bb945678681319ed2151bd8659519792e7f681fad52211b77273ff1c035b3260887f5ba1c016ca7331c082eea426b97dcffa32f01fab1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a