Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
4617a528e2f8a3c2c7cfa6301d83e09b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4617a528e2f8a3c2c7cfa6301d83e09b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4617a528e2f8a3c2c7cfa6301d83e09b_JaffaCakes118.html
-
Size
245KB
-
MD5
4617a528e2f8a3c2c7cfa6301d83e09b
-
SHA1
973ec065565ac1cabf013136a122212278aa85d9
-
SHA256
a7d5765fc2be9cdcc90efa8bf84d9b50f26d3e11f49f6ebb38101dd5b384d0b2
-
SHA512
b2366594ae7af95ded4d2da6521db1be8054c2c7a2cd16d2243430163547eae706d53c196951548f1417357268815f61d8c6f67499db54724c7fc2d903089eeb
-
SSDEEP
3072:HFFG6y9NPRZ/lp0MdD8wyfkMY+BES09JXAnyrZalI+YQ:HFFG6UNj/lVD8tsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c089bfccbfa6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000d19b7421b493c979d757ac0b92eb354c60468f76b1e1850f103e5a9250291bf4000000000e8000000002000020000000059d9a2be6df1566da75f695b93b52e306edec70c76ef34044c9bc353cb35bdf20000000aa0797b1ea3ffbdb992f55d66e71f0ddade89b2d304eeb9ed6fea1111a5d2d8b4000000092dc615c9e29e7edfae3493e30f4c3cd1f33eb9a8e4c85fa16526d36d2fc1c7987f928120cd247d37275175f2a9b4b1e4f0d6681ae4a3537a68d8757fbae9391 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421936401" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F73BD961-12B2-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 332 iexplore.exe 332 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 332 wrote to memory of 2620 332 iexplore.exe 28 PID 332 wrote to memory of 2620 332 iexplore.exe 28 PID 332 wrote to memory of 2620 332 iexplore.exe 28 PID 332 wrote to memory of 2620 332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4617a528e2f8a3c2c7cfa6301d83e09b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc16c8890412cebaed80f66439f1be1
SHA1d75c1c2619e1d0d85ef1d634c851b17641b8532d
SHA256dbfffdd16a3a05750b1966917cab9ceb58a26f1beb53de8b106337e4bb73b84a
SHA51228b8fa18ccfbde6ba9a4e3b6179a2b0d7a136a75433dbbcf4e35db1cec55b18accb9ad47b0a09774a52beaa5104a495d3a7517012bdc05f13c87472b6981d79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d61b962657cc02eca3a5e72d201421b
SHA15e1d307210332267902102ee89e637a52069505d
SHA256418fb56c2077595540886737c8b2a351435d0f09b787e10e98ae81e6546fc864
SHA512e5e10e2b95b1d86f8ed0a37e19c8da23874a16c9fcfe2e41075625b6ebcff8d61f2cfb69261883209afc0893bd5a57942fc3c1812a894d409acf2ea389fe36bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5889712208a0ae7d190da900b5044072b
SHA1f4c918b5f8c3fc846da5675a1b5485c0814b4bde
SHA256341c875a569c88a7eb8060f82b44fac5d9b6048398b2b70d744287c846fa2e9c
SHA5128bc0bc12a1fedc6dab84806527bc851840ff5912eb58a2ad5e719df7e3e440d39d75a27178c5b45d413f7a23698eb83143dabd3fd8801e690504929dff0d7ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9176e84e323a9b7efe53b3102cf165b
SHA11e0c1782ce6efd2cdb63706c1c440e89f7cb4b79
SHA256dd26def4c77e012c55e4b1f37fe185428f3882ce1074155558f8c32d630af61c
SHA51273f8c5d5ceaaa7afc2ab898974e75d260ba63f28bd79d781a3143971c47b553edbeddc861035f23aa6eaa800ef8606a94d72c628fe90449928b0cfccfae4f297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15f75197057d972b908bf7511b3bdde
SHA1bfb61c96c452778e5af4f1e72929024913672263
SHA25635f2c9e028ef61d90b17aef389c2de750521c3f53d4b1a7c39a31e5e0d3e000f
SHA51252900e1444546d8894d6e4bcefc67e43ab51c2428f6cd6a6e08058b18ca7374355772a340b50e37bc2672fa5caa0be266a9780f8851600bc6433a03dd8bf3eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56690cc79ab4884d28648976f218e921e
SHA1115064c439cc9b7fb83de94a0544e4c4c970f1cc
SHA256ae87a928890603f0f0330a19cc2092234ccca8e872163be63effc1f4874c834c
SHA5123ac6e6f556273b5371a8ad6e983255e62269a8b7b4e8521f2f0cd4da707c8db9180ca97fff5be9116250f9f6aac8fe9f7bed9c027d324be1fddc2512e5874cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd3a3d01ca400298ca3161a6cb56947
SHA14e07d5dfe0721fb3598e0c8e52b0c456856d7b24
SHA256b7fa56fdfd1dcb6bcac1399d99d989f02f7441689c12b2a59cfcba9e28a6022a
SHA512a80bf17165365bfd70bdeae2ffa2e2e5426256408edb5e31dc9e72e25675d55ecdb34c2f5767b47c0c6308f3d660866477b4a39c3f2de8fb0480c9574f772b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504897c10fdcbf38282eea637edad1fa8
SHA167fc45119b48b5c84b58377d636f9c9a2d8f7ccf
SHA2568310854d3c24812e10aed58ce92ed6053e0532eef0c2fe045b82f567288f17a7
SHA512797a9ed582696e898433e2d46cba0a34db4bd3894862f8b20fd2e4c35d308a2a42918b78b38a2d0af6c7f8435275fe164fe04dba15450a5a841728038198a4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c98006fb3b19f8c7a9db83c56cd9fbdb
SHA12629cd948b36afd28f63a85ab43caf5871da85b6
SHA25637e5e171f17050c2735c98a2b236eebffd356951e4b3eb8a0bcc75708ac56b0c
SHA512275102ae3482165de75ac44b910e465cc9223772c6efb44c07f0d03a40b273e694f7eae63e7d5c8cc30bbf840be26ed60e2def82c65a9aa4edd1d58b757df14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e27ce36560575e54f526288acec91ad
SHA19839c0ff28f0e7dedaed300e97b7c876449b4ec3
SHA256a0711f2a55797e4a2292b4b81dc9634456101429218101f92a49194d0285f77a
SHA512d50c6b0874d67b74a0692a280e3b53cb5c28384bde700a1e921e981932b181adb651467b9f3d0bf4ad7699051a45f532ba1c2fccc008d359b79dbd9dfce34fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5918a9e2e21211fe69a0f8934a10c3e67
SHA1aa7cf3147a885dbfc6fd8688eb6439a5b08e81a3
SHA2564515b9e206146882f5a09a2207b5a73349dfa731bad6e5505bda738727441e8a
SHA512ed4d0f11b8edeea96580bb915b035826bfdfb97293fd81f28ce45127344d9f43163e7dff2bf635c944218cb831010fb728271ae9f9fc6f38c591b20f24edaf8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f9e985ef3f7c3f66b66a9f15fa7408
SHA1af1be5b2fddec6870e66a58781ea8d4c84562b32
SHA2562459cbf442a75015d437b80bc0bd973f54d18c00bda6c50c230067bcbe55c047
SHA512fae8ea54e2eadc00fd6e6d2a3ea0b25a82bf383af98fe561ab63afe250f7853934c7c01d4020fac0ed0a6400af0c2527bfe7aa51fc1b31e099c66822f711b465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0cef1af84d624cd250560751f9bea7d
SHA1b6327b0a4608374cc65e3a8697fc6873bbd752a1
SHA256f8b3c5eeecfa540afbc5df15421d31b6b06a4e86efccf3d1ef95bb1e4816108a
SHA512af28bc6be58295b971a170db364314d52f92ef97c8e64104226e3eb271935c9fa543c25ccf67f2b5c8691cc68ed161a90585a173f99942a47e4a2e83985b9c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb7aa0d2524497eaa8bd3fec1f6db5e
SHA1cd587a225c8e8d787585d0438fa309005ee79c26
SHA2564f47e5d2840439531343554b8fb1505269731c52b5e0f1392097a0bbb3230d08
SHA512b6e889196bae9b5bb80008019f8894e285a67e41bb528dc016ab2b47ce4ff3d83f234f216344f3e0ecbf4be4b1166215501701ec30f47b45be7d81dc29bb5ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d24c5518d88c9ff450339279ebe0ae8
SHA1a6ae2cad4e0be55c3894bef41e462dfd8bb6b376
SHA2560dbf18f9cfb686dd75adf7cabf3d99e64f424582cca9bdd173f3867e77e9d4a7
SHA512355696af12142b62ea10b72926ee34243bd1c64690f87e19cadac4dcd237f2ae9e2c8eaa610cb9b93219e631ebf5aaea44eca901aeb600a9c041787a44eb5a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2feab9d4c9bd359dd7c1f9940c0b5d4
SHA123229a1cb7e1d2e47ac4e51c74fceaa554e8940d
SHA25616dc6bacd72e7b56039ed83d8d854d31d70deb2fe700a69054a6029405824a56
SHA512f02c02041c76f5446a7a47d4d743d9d69000e9f65da23b906793033ba1ee477bd868275dcebe7a9eb45878640d8a943eb5f0a41bc27a172db28046f6b6869593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543dbd179ab847c2f68bcdf3d42fc12b9
SHA1677cf6e24184a75dd48e3e3a6f6611a23ea530a5
SHA25651527e12ff18b998f98e3d006b44244485764cc73b34b6fa683408af542bbf50
SHA5126e058bea99608dae71cd0fc1862f24d8b56a25fee653906d85b426d60ae71c481644bf223a6b98b72b826a4f24e346b61d1687120f4f1b3e9d296d21cebe3405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b04a93676c93c918af6fbfe057345cd
SHA17bd8eafd3d424b5a61c2d8d77f30cb9c7a4e18d5
SHA256bd321f766293fc11570856f134109c10bbef0a23d622e0f00cadcb5eb13e1344
SHA5120796910dd2f3a607ce9a44d6d79aca69ef5b466b976f20cc73beabe025d199a9d41cd456876c2ddeba14f993dc96f6fb25ffe899694b9b87cd854a55c9911cc0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a