Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
5f75059e56dcc77d36fed19dc0014ea8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f75059e56dcc77d36fed19dc0014ea8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f75059e56dcc77d36fed19dc0014ea8_JaffaCakes118.html
-
Size
460KB
-
MD5
5f75059e56dcc77d36fed19dc0014ea8
-
SHA1
f8fd60b7ea00c48fa5c21c3a03bf062b59c42d67
-
SHA256
38a5c18ad0d813636bae5f81f85c5d8437b40a6736c185d293d1a6750c3cd8ac
-
SHA512
388a3336e16abc8572a3eeecf36626b779c53a45f14484b6a079b342f388fd66ffa527eb8ab50b0749985fe1cf5bd54e7086d97e120e125fadeb9b5e81d88a3e
-
SSDEEP
6144:SfsMYod+X3oI+YsrsMYod+X3oI+YZsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3u/5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ce0e56beaada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D8AD641-16B1-11EF-AD96-EAF6CDD7B231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422375571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f3b61227d4426776c933ab36725101a29162edbefb51831218c4d633c9d8c53d000000000e80000000020000200000001fda501c207fb00f42ecf3f9703f4e34ccb689c62b7523f236aabec9703c2a2620000000b30f7ebccc130124b2ce5becf4dad495eaacc4e98040f04c28bc3652594b794240000000803e633b5f62b91afef5373cfa0ae8fe2b691bb8977b0b5abe3b57aa0a8356b1a17e788690b5ffd36a323cfea282d26dd6d9a72f53bb8fc3d4a77cbdb6090260 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3020 1280 iexplore.exe 28 PID 1280 wrote to memory of 3020 1280 iexplore.exe 28 PID 1280 wrote to memory of 3020 1280 iexplore.exe 28 PID 1280 wrote to memory of 3020 1280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f75059e56dcc77d36fed19dc0014ea8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb4178d5a1ada590d22b5d7592ab4297
SHA16b1699c5872628f261ca2a64bbde08187f8622f8
SHA25617c971130b9992dc70bc1d2f43d90f25c2999a5cbce87b6b830d2db2a7c5f2c8
SHA5129e94a3122820512e5e9e48e66cb25ea6ebb7d52a419bd43775985473243ab1d8a32841434195af83cde8c08ffd593115962eef52918234f2a6d626b41624b4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582344a18b9c5006aad0735ee6f9329dc
SHA1e01643af815d81db33f2cfa75ddb7a667cc1a720
SHA25607d83beaea999df662280f30694609dce35cf30268612f32f4ea33eaf691551c
SHA51264e443d6aa35bcad755e940cd4f04ff3d189c5acdd12e2c93362a39275b14b3bf905ca53c4af1ec7e5ab0d4f101fb6217ec53f9e5d8aeb8705a56d02275ca044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a77618b47b4edbf95df948472f5cfec
SHA1a2e501e92ec73d11e15db7dcd5b42da109739f57
SHA256e08e092c7f8484b20c8280b39cc9f13702d23155d1bb9ffdca1eac1990da5230
SHA5120a7903bc7695b8df585ed6583dfd78eb56d86470d489e7a118c8236014fdaa078274584e0a416c3dcbf08e9ac60b377e838a6579a0e157c183df5cd19831583e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593dcef222591b759ec9efbfca6d1c724
SHA1044da0a823a135897ae0cb56789055e80ef95bbd
SHA256e83c1a3caa7921e30f5dd6b33f7f93edb774a2ffea46b155d74cd0d41f0b9af4
SHA512bc7d94212d0fd07f1e0a9ef0f6f67b58b4e0620769d649b5f9dd2d9276c9e1b09493e429c171417e371005cd305363c0d1b2ef8d682c71a2a97f1e2ed1a2f2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a845c9470cac3b5833000d97d53c6f54
SHA11fd2355519cba156aab5f793997b2657dd9cefac
SHA256224a385a1c69c95f2721157a591481d90863f614df3b27408ca7e82024e24704
SHA5122f98b319c5e165dd8318e039cb9509a251e5386e26c4dde6901672bfdc5b6e3bd8fec102c474f3f090e69d3b4ce92cb4682f814af3c72aebcfc1eb0506e970a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599bb47f714fddfa0781c90948e6994f3
SHA1c7a5be1ee6bf05d29f4a4e63348359b87d79e339
SHA2569ef8f6f18795a5a3ded61b57325c7c35cdcada970482767be115fbc78d6a6b8d
SHA512f7e2865815c81e3041998ada991e976ce57c093edd01dba5bb93c7315668e36a50aca011a93915a4b92ee80bc2f309a8c921c849e0fcaf984d0594102c79d3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d512a407d338e3666603a00683f45487
SHA121ba9fb727fcbe79d8128579fcbd1a30e3eccd95
SHA2563b5954a5d2bd325a830df7f0099aac6092a2a9bb0a5aae57cd073af9ec9f66d2
SHA512b4a5774c94db22cba6bcdb2b910e33c61cead71b55062dddc02090b8e59d62e8e3c3e01ac8d031fa7c792146060445789af0eba48367417e287f6b80d78c099c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523e84549f1c7faed1a7362e827bfbe8
SHA1f69a24325b5c5c6ba1df4b5af5be488f8731abc3
SHA2564e0d3e2fffdf563c8368cdcd9294b1350191ab612ea23ca622e7b3b44b314695
SHA512db630135efc54477fa60c7afd6c8600d06533b7781a54562c7bba334c92f6f9fa9d3efb225ce8bdcca3bfd9b5be49be3f746199fcf3d62ab7fb908055d51202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540067943bc7188a32177740bea85c80
SHA1d0d612f63a10a099a01f50c29fddebe2b899b22e
SHA2567d2cd747cf8a20f6195dbf9095ed434a79da4c8312c78990b58e38e85b02ff87
SHA512981e7ed790ce8d2047e3153226a41e7481a6b7cad5feb17247b6201892837bd003e5b5a87d36583a736ddcd3c14041ae76ee363822561677b7cb27c88cc7d4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688c511d30c31703d2b09fd07b9351b5
SHA148b4e736db05f525e5efe610d07dcfbbc098e1a4
SHA256bc67e2828469a2dd2a7378245f73508b85a321f4e925daa1ce8e02ca0daa9e6f
SHA512860bcf160f51f24a31ad1c28ba5f5a49f6a25f6907d73e07686154a85b53af5c50d2ae5f11a0da7ad4c210263cd1b5bbd9705bf16db8a0ddde9a4f22371465d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55271989804ece2c6804c10e3fa6241d7
SHA16e3d8dd5c8541e7c59b23e79f41e5d79caf45e44
SHA25668af7fe5d956e7d86e248a2b42dba97304994c81847dfc716d8aa92d946a585f
SHA512b6c73fb1ade7e6124b3fb7479e53139718c8aa13a11ac752432dd0174bc58bd083f9e4ac803d3b10ac4a36212d4fed3c1df6133741a8b68901315216b48081f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0bdf3d6dbc2a572a8e40402396ade3
SHA1147c4d9ad67cf0b9f4bf60facb69a398ec2cb9db
SHA256912bbfb3f55eff98a03691055be49a332509c839e7cdd7746855fceb3b1bef9d
SHA5120f33ef0d34a9dbb0a4d44fc80b0b19a8c7d64b42aa6b9e99dc4710ed62bdedf5696b9f01926b113492a932ea39f6953eb507affac679e3df581f888dd041e019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef14ed17ad235bd4a24bf76b08b562d
SHA16ef90d3f53717ed5ce48cc442f15880114dcb8de
SHA2564e0bfe799517e1ee939538c0a21dddafcf9ee5174be08b9a1abd5490b43d3565
SHA5124bb19a3ad0f14097e9b5738de55db656f2fb67a44cf9d15d1ec32816f7bd11b1ff19c98bab27b0a13060553768377a0ea5845b92fb1aafc8b992415f20186e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dddda2e715ec76d10090c45fde1d5bff
SHA172a1a32a33b9b5ba1be067cf5903a4b7936ec7f9
SHA25688c6747141d2866a6a4fc5b532ad3911f7e72fbbdc993eb1f4239ee08cb69aab
SHA5121cd84c623d26d464cf95c85893eb9c96fcdd02f12f3c47a9592f4052f0738a0122393a8c7f3bede1c7f2c070f6017d3e36cd887645280a06e0ddb4965c51bc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f10a4c4338415e70b236d2eee99ed1e
SHA1ef1ad2cb022bca1872c5a5341854ede31fd0e3f6
SHA256bcb5914a9becdd4d9e4acce5dcaca891a9ca599bf15e47048dea9122570ab3fc
SHA51211e0b539bf53032fb5513608fb8c888f75c4f4c677e3b78328f353d10301d02eb099b37ab943626f76a832999ef6c37b9978838b83397d5f4091c3ccf6f88612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5797105ddd672da1936b0040b0bc5c9f0
SHA120017b79693c2c9cda9b54c122dbbcbe3dbd889e
SHA2562e6ed1da3572518a77fb3d1f67661c61ce933ba2dabe2a3683139087d01f9a8c
SHA5128a224a7c2bfe19565c098d7c07f873bc6c50b205b064c1d25fc81b49a60304f85b7b763a5992481abc44a7d3f26f8c0f7b8407cba1fe560aa969b54072b9d433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2cd7632beae6476c0a365bc1a8313db
SHA1bc7ec0cee16e1a8042028eea2132b0ebb0c49c22
SHA256d7b6849cb7bbd88f71711584460c4909ba1b79e752157532f65df8d647fabe90
SHA512c48d779ecd27c6ab074c0bddb6be936a934987852e7ca488a18c1ac86bf337ac7184029e6c48bba39de6399c1431b12b05073eb6ed2ba31b91b912786b382350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb5832557939400ce0873c2d218254e
SHA146d8aa49365d5aad58f749acd9ffb07286e80050
SHA2565b1306824da5c7825b4ef21840b4c474ea353fe568f2fd919162d762cf62a9aa
SHA512c7b622334c224f31fe824d8636e82bf65f77da97c8f0ea745e465817ed8eb54ba26d1b3576445101048ec23a1baf0320df79186483ad40d3c0da38f6bedfe140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567dc50e41c57f5c2eea15799e73588f6
SHA1752319c3db59bb5885010579bdd4b3d3ad41076e
SHA256770b2d4a6d1ce251b38f5d46d49ecbae8eb218738711ee7a622243fb674bdc5a
SHA5123a8301002fee308a26734b605ba74f2a523bf15f037ba065a77a231d981d2bf89f5d0584c08bb0016f540a42a62fbef4e0855b2cdcac9b5392d66ab6b21428fc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a