Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
5e81c2ca4ba88224893e14d69c3fe751_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e81c2ca4ba88224893e14d69c3fe751_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e81c2ca4ba88224893e14d69c3fe751_JaffaCakes118.html
-
Size
26KB
-
MD5
5e81c2ca4ba88224893e14d69c3fe751
-
SHA1
e2e050d1fa035b8cf3efd48e6fab12caf2ffcd96
-
SHA256
219930cb1a72c0517b1c016d6dee4cd10055bb6ce750c62ae0ad4e26d8c98b9b
-
SHA512
6be3683c0ca4c3df04cc99a09e7b5bc7958a58066c09a38b815de988002fe552c2345a75ae239edea8d6821ed111840e6d1e28f8ae6f1549980971506947a757
-
SSDEEP
384:Q8YDweurs1IQLmN6cQsQuIf9wa/0jxNK3X:RYDweaslLPcQsQffT/0jxQX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422361514" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C135D0F1-1690-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f279979daada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000bc1f6664527c4b8215085e260e5a72d5ea7cd27483f7d9f4f72fc929cd9b9658000000000e8000000002000020000000e22a17a985ad079cfbe31b796321ab9002786d30acf011b965941f54030a98492000000093d0548f725df8d03f285b278f25aac1097f45828e9316afa3250bcc37bff17140000000db305a860e3a2a8d6534df5fa0e9c66b9a9591211ea0832f63dc1d78c9165e4d212a053021444ae9f12710b365bbc3b77a4f8c74aee1fd6bc6d7787b22be093b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e81c2ca4ba88224893e14d69c3fe751_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e4904f2d1df8aeb92ed557fdbc3c2ab5
SHA17957a5a153cfc912b9934474c2b96e1662753f24
SHA256ea9b8c7f02718f1f13893898e223685259bd343908740f620fd3069f88d0e584
SHA512a58eceecefd0b14d9de4b20d00ccdacb017a67f938ac15dec6ce346965b1b58e8ea30e2e08e5192044528966176da2188258eee417a65a44dcff768495dfd750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec21d042003a06258e9f99131c67d138
SHA1e7a2c7f1e25439df6bfb59c2903050c91a457266
SHA256894bf343b6415d0de869cd8c6e0b40c208042cb6f018f413f425d45cf404883c
SHA5127c77a047d6818a3ba6c2dcb4307465d591bb36c685ff3d01425268c76eff016e31abf92abb46771e15e557e1fab13bc4c278f8fb766bfa0ffcdd17f00b6328c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a197b5f825b6d91a9521bb5b091a8c
SHA1a0f74dba6154c8b07fff1f24518656a92b462f37
SHA25605c478ffa39ef2b6ba21601776628502a144019e79e4056467e9678d8237fd69
SHA51240dd7c4225d85089b3725de3b808b7715eacd5f867c1a587d65f91ab2829a3fb9518667502d76e209d5f6c884e70ef390b0812b72e518d05cb39578c536ea263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec201da34f7202fe8fed28f3f12972f
SHA17866d4eaed698bfd5350b18b4341e800127bff70
SHA2566a861f479e16bcc9a0a67d301883de97dcb25bf1e26d9fe4d2e8541cba65e899
SHA5121d4f8d1386be1b6d93d36df049f960501015815ea7216244bbcda9a3df6250ac8706eb79a2e471d87e919ad13b3f2e160b9c7a4e432954b6da666a4f82b8ee4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbc8ad86f9faccf9b3ba631055b0c84d
SHA108524924f6da2e3f000aaee3ba89a2cd3debfb82
SHA256f4589387215581e02d9dd637449fbedc9ee5b17b479d9d3eecf70324c62910fb
SHA5121ee386a9f9cbbb20a8333aaf8349abeafaf84279518972aa5e32581568ba7839680448f8662bf2feef8134b5170ef7e5ba753238c2c531ccc36dfca1011c4af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6d953ee98be53fc53424a963de6202
SHA1baa900fdc0095d50bf73880a5c1024ba47c6a831
SHA2566241de3468368e5e1adb504326e32793e07f2bcc5a9562bcc9e11840969f726c
SHA5120154e72d19791371f3a2d902c53643ac4a52d8caf2f8140fa4e8a3d4d7c8609f02711cc7d59bbe5b2e1c9ea1791918ff98b9ba0dc9125586e822888b42bcda74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500db726a5a616b3c72ba44233a7cd3af
SHA13c730d0c1ebcee13cb0a39bae0645a9a496b5e3b
SHA256f8b75b2684889f61209c5c2d638990867ef46eb03a6fc7c4121d757d056205b7
SHA512588f961df8b1c0b1b76c40afbe7b70ff2a841f1950891b02a51ff655e33165184b306376ebd72c8c363379d99cc415dff6a2f5102aa6375da6df899499d3a3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b2e9e78d64f25fc1ea9e0aca22727e
SHA1bf5427eff6d556ddfbabad6e228c232f2600edad
SHA256f4504689c78a190d26523e5b02a74a580f3e6ed02ed4fc38dc4e21c42d525558
SHA512c3a9a4367ab06ff8ea9f31b22e2b4aad4d628e7ade0930e7b47647723ef45a9b802d4853db1afd963779eb11afe58e78e1023494af586aa515ec98104976acc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c373e9af0535695e39d76d5cffca082
SHA1ce9bce9d1d556db40a53478c164cc7752db0c03c
SHA256fdc7008276b299ec779eac97468aa0347f1848cc2c7d05ffdea7a3cec37e6524
SHA512bb045c91c72ebd1c953eb227321e861e161be02d41829d3dd876a8482981c1bce91a88bec1e4517a144c65bda2201bdbce730faf82db4a5e5cc67f2c49e5fbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca8d720870427fa414b699a572d61bf
SHA1aacf184cbd7cabf51a504ca5c2d73b7d6c1e9ab6
SHA25652f1b7e0a6d1321be1c24977f1a4eae5a40cde1c5eb47cbf90da6cd1cbdb00be
SHA512ca1a0c6e1c89ab6c1c24792539e90b75012252e0d522a3228ef881d65347623e382a401f4bfb0ca473e5d01da445ed953b8bd464896eb007b441309dd936b0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eaa164f37a39ddb8d14d0984f281575
SHA185e5e61db170824d7f1979b70d7312851ff7272a
SHA25612a9f3862e39e99b133845d89b389e848ceaa792e2a178f1cd50a93631f9b29e
SHA512a1e2ba950e6ec43c308a784e68b7efcf4907d1d789edbe64e4acc63216e7b73e5dfd6008d14bcb079175a4cc81de484c1b1da921f4b68329c03ea42aa173140d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b172baae0d2a0eaef9df60be6c2edaca
SHA1c43c33c07c9df7e66381eb5132d92df0cfff14df
SHA256e47b654df87095a6b396e838a6cb1b3faa00c220c03cdb440970c3c76c3c3677
SHA512c7b76e3c9baca66c48dad25fd795cca9eeaba3a5f1e6fad158d81cf18468d08ddf3ccbada3430f9d8977f753232aa3044cd86ba3c730e91c66e0beda2bae8f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54e310ebe1ffc6165b93c17f0a5c2825b
SHA18e6ec000c722dd6d96e140b7232491a05833b401
SHA256c4c4047e305de9f776a80387a0ce029fc7d8bf5af216e5192cd99fb4fd5359d6
SHA5127a590739f5303974f187b2c0cc567912c3e502a7549eb0189635d7534524cdd43709a3cba3aeebe73681fa678f4a213bf815077032a4a2d9ce2175437ddd8c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5757cb2b068205ec6b81f9d0934587cee
SHA125675799f0be763bf04616e65e9614a6ada50670
SHA25667bffd065feaed058ae0f4997a561aae80e5f8a3a17ddafb5400bf8b24e37e27
SHA5120eaba9a1e9498a0c650463b24aa23674bafacfa651c044c46da8fabb2f4bab77914b92a121fd2f5df127bca0c44be97fb096de523a02615301a30435ecfb0f6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\cb=gapi[1].js
Filesize64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\3604799710-postmessagerelay[1].js
Filesize11KB
MD540aaadf2a7451d276b940cddefb2d0ed
SHA1b2fc8129a4f5e5a0c8cb631218f40a4230444d9e
SHA2564b515a19e688085b55f51f1eda7bc3e51404e8f59b64652e094994baf7be28f2
SHA5126f66544481257ff36cda85da81960a848ebcf86c2eb7bbe685c9b6a0e91bca9fc9879c4844315c90afd9158f1d54398f0f1d650d50204e77692e48b39a038d50
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\rpc_shindig_random[1].js
Filesize14KB
MD523a7ab8d8ba33d255e61be9fc36b1d16
SHA1042d8431d552c81f4e504644ac88adce7bf2b76f
SHA256127ffe5850ed564a98f7ac65c81f0d71c163ea45df74f130841f78d4ac5afad5
SHA512e7c5314731e0b8a54ab1459d7199b36fc25cd0367bc146f5287d3850bd9fe67ba60017d79c97ea8d9a91cd639f2bc2253096ce826277e7088f8abfe6f0534b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a