Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
60ce079cefc175ef31a432e3ceec67d8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
60ce079cefc175ef31a432e3ceec67d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60ce079cefc175ef31a432e3ceec67d8_JaffaCakes118.html
-
Size
4KB
-
MD5
60ce079cefc175ef31a432e3ceec67d8
-
SHA1
5dd15bcb3c15cbdcae4143abafc3d427e14269ba
-
SHA256
65ecb16db5cc299ee6a9745f4dc0b5b9a2b7f7c5fd165aeb84a13245a4d7fb15
-
SHA512
620c232a066d392509cdcf25c99fa4ca9205b255fe8e11d50389dfa98f9faa7bbe773a8e0fa87c2f3365117a9c63c53d015a4a6cdd7d48a3be35e1178fa6b91c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oGA0tQd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96A77E21-16DF-11EF-A339-D22A4FF6EED8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805c536becaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a2c41c5f2c70634a86552c8bde0a5de800000000020000000000106600000001000020000000c4dcefca36757f5d3e3eaedefc9aaf1790d7f46f3a72c5da877869810b2a90c1000000000e80000000020000200000002c098d91361130fc80289b67106c3c3b1ddfa50cf78fd41b8236b6eec4a4816020000000b0c94cb55459c4cb4cb93cd4a6a859f98decca9b9167265a92cebc431423f0e240000000774118a330c1c77c2697fd0f80cf9fceb51cee1adfa67f992bc037a78a7fadbe7a4cf67717fba7dd09ca984f9770a5e0bf8f7bac55a3daf739454d994e50c582 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422395371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2512 2488 iexplore.exe 28 PID 2488 wrote to memory of 2512 2488 iexplore.exe 28 PID 2488 wrote to memory of 2512 2488 iexplore.exe 28 PID 2488 wrote to memory of 2512 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60ce079cefc175ef31a432e3ceec67d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54135efa375fd86188a8fca3bef79cfc2
SHA1d5a0cae24fa9a336819f02fb2aedf78424dd6e81
SHA25662a5aa92efbc05cb4c7056ddada37cac4207c88cf264af2d7b4c93c99afabeb1
SHA51257ba18b93a775e91391f80ac1134de85055033e5ccbe9c6d2499f0790339f78fe2cfaa0874e276be7ab5e86ee8f9260e118e17bb6b8fd680bc49811e4e3d054b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ac62da5046f1ead9f309d6960e5861
SHA131c8d19e85f59fb2b16c4b8b0fa00b90902208be
SHA256e2a2055d335d3580629409c55ad2639faafcda58156cc6af5b784796dbb50088
SHA51244957acdc65fe8e7623900e0788b1798b65a3d31be305416b0322e35f8a5a92739fbfae304d56ffdc932d950617847cf02cec3de35398ccc307a55d6657e147c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0e7f73d249916ae0cf5f7287c7ef8bc
SHA186d4daaa201b33189b774931388bd20d16bcc589
SHA25650174b129bd43208e0ea5ad5c4d736aad2e36b50db7cc7907561db87ab4eca05
SHA512e510d6962d9a97b154aa14c23b299bffdc3ae38025e330d25516ac6133bda83044091c5234e58ac96e0d203cfb8154bd09ab5962bc7794e490837ea0acbb920f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517b53a2f554152bd10f25b8f4f96f6ef
SHA11da98d7a038bfc399fa860059a9e60e6292219ba
SHA256bddf7b0b9561227ec4cfcd7029671d0c3cbd6e3eaa7a4601d90d2e7a4151c845
SHA51293765f49bff595dc74c0ccf7eae1a6b69d5096fbbb57f61e315006661c10343858f2d3c0612311e861b32cd3ff12aa5513a7e9d5d5ddbe5d3deb6edb91e5ee1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cbd670ba8225e2e21fe8cf31ab4dd89
SHA13583cdb0c3613134c3ad3fa7aeaa39d4e30123be
SHA25624a416cf4d74b9cdd04e6922092bd020125283504d610114a268cba0ab9f94d9
SHA51267dbc46b514059bb769856723617a3f0fbb0dfeaff71dbcd45b2d0cae67c137eb86ddd8917001332571988942f2a84d19e217c790fbab1001e7a9cc4fc4904c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d1e3c443c8a56f313f564625cd3560
SHA1b542af2a4683ac54ff21bfd70e9adab400c963ea
SHA256c63d1af5f78b4a6b7bd4d8de75396c7e56b70d0724b47e4132a74987bce2c4d6
SHA512a851e156e7f8feaa664aa7f6228e0121c50b423eede4724a5c35ce319137efbb3750faf77d7700bdbe2d5186ddf64256c5c2b61257a7bbfc09aca1168b990c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5320b737d46a279d603e7ffb1f5f73780
SHA17a64fc3ce44f8b52f758ac8f0a3d49af20cb6199
SHA256e8425bed119f29f06eebf7350f4e9125fc9da8f47d2f7309dd6832aed68dd9d9
SHA512b49d73634d7eb97ffcabcc2464fd6df46fd00f13bbc2253df251c6774b8e7a80cde94d05222a9f64ab0421868692f09e89efe2d05807a742f7e87829d5c79793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17f47090857fc13257e3b65f9c39d9a
SHA1123aa8d22caab5c4b13c04621725dc5ca46a4b9b
SHA25624eed973d56ea445cbc63c6c411167e55d9dcd51c7a3177371adb15a03d8781b
SHA512a73f864b44a31e39376e2285581d8a291a29cd939b467f8152333dadc948fd954fb0fa82f5309f480896502801145c09c50b1934bb806c0ba1d3eca47d54d627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c99a1c66ebb819ac8df1245f8cace1
SHA1da2925037f816f05126d2e8fadd89cc75c08d4b2
SHA256bfed5d2b3dcc73d00a4543df0c93c4795ca5328a1a29a2b0e79c67d321bf8daa
SHA512fcbbf34bef0b1a7d3580cd6a5f8ad57cb487e68b2b00b3e49a87f537004e3e531552d42d2f08de3d967650f2e58644abf39dd21b1caa135fd7a3ef5337208fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9594bd0d2f9a6f8a5fae0a5b844b65
SHA147fbb9899da9b1c9bca9b9e7348b6a08d79b3aa9
SHA2563d5e7e05de6af1e7c6e95bd4477b091e1cf4c255adde1b31a571d5e0a9594ec1
SHA512363727e9987c969c27a94139741c8c99b915884a81bd8950a6c8bb82ff2bfba150e0c1d009b1a67fcac8f142e0f0329c6988332f4b25551a12c8d3b3a537b51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e567009a73452ee84a7f61324b255b
SHA1fc45e3ebb41f2ee609c09e4156f058bf8e3bebff
SHA256e916003e878f073e01fb8e190b24ce058a261ee5f3e00c3bc1dd7063c3f92005
SHA5120a0b03e514391920ef996e7eb8593995280f48d6cfa86bb9b2aefce62ec8c7b85e1a562aa157df14aedca2107a25e8024e86de3d5a0a78f23c9f7e7f9117d7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52550f3d4ce0327b71c0d434579a6f985
SHA10a2da8640ff6943fce4d1a53be1ce97a84cec59d
SHA25671da6fd2346c4c46094471644397a31052873fea6530c0fc96956547a09625cc
SHA5126cb956194c5b5b7aa961f7f663cd7bc5a21dc97e0c57c869427125ad82a3d2183c559d5625eaa3ee5f279515a7a40e90fa787912c05955a5e23891aef1dbfdd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995a5ac1ed9c80f0e4364ead4703b993
SHA1724490397e3665f5bff8fd5cba291efb661a7607
SHA256202b039b0ca8327862b2842f53aa70204b6057fb88caf0c1c4ba4ec1a3d11353
SHA512a995f8a4d7eed125ed542ce2e6dea3b41b283040fe4fb85beb282dfa7a6d8e6f2916873c9475fc50c0dd4eb848c6227abb6e1d35a1bbb38290e37c5050bc5e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582bc7177c188d92501b3b86166c39eab
SHA14ca6e2ce623592fc56248b987559f4dbdc62081f
SHA2568798dec22c4602b0109bfd338aabdaa2551c4c3f5970148d66e059a730f99f30
SHA5121938f741093731c4090d42bf422b59d6c5904fa227123ccd1d8ddbf7261e82a3d0dc3f1db0d3e2c26f864c92d7dc84d199515ef7297c027b5229a73e1f95e451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691ef20e55ba7417e9791e1240ed5534
SHA1c7290232d387ec9ac33c7c7a5b8405c0ea91ff76
SHA2565d6764d015098c8e7f519efe751abf22e680ca63d219d9b9f2b4ee95da0b7725
SHA512dd58b55f8db9dc951af8e52ffc1abc5c42692d474a000f0505bf39ee94f74e932516014e21efd0ec32f73597a450235106831fc7aa89fc719603b6c78a49ac59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d93833b9a8ee55ebed2c51bc6e0071
SHA1685f675ab5e7527d27b8b896dd93ac5eb8fcd4ad
SHA256ed9a4d6670de1c6cee692bfcc0881405b51ec67800701cc57c85ffd841ea544b
SHA5128c50532c4ae5eefc66673bb72fe5a534b2c423b7626ab9a78a41fdce7e223afa14819aceb5e4e0ca357fca3779340ef532004145421ad9f21f216dd92c9acd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da2104d202037b7ae4f32d10bb5cba7
SHA1f5cdc875fd959db53d3123be834d079b33e99583
SHA2565a2f331a7c21d2b3f950e97cff6424bdd5b476f41a72e7713fd67d0304fd2e93
SHA5122b73f5f1721260ac97e6ec3eae41d7c783cd10bb66b372c7ba22b49cc75763893a83193a52ba761463353dd856b8021ba32f81b39f19b1fe1e59fdaeeed35ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb4b0c41091ff1da9ae3c715c690d9c
SHA11b97e8b9a37e67300c001bf028b6b238a7ece2ba
SHA256ff6e1b03fff192adc95a390ee803d3c2af2b6ddcf996c44e7a93670bb9852a26
SHA5121c4e87aa48a1c998f98dbfb93e66b0fe692e97481a829c750fb785a759c8e7f3822002434a3b54a0c2f7eccdc9753b037cd4188ac83e1128916cedb6f5c9dbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5400f02e64e536bd95a4a513bc893251a
SHA1d720860faa0fd31e863edf220ab6e9c4f6621296
SHA2565c4762e533b0674dc7d3c9a9d83223b6cad3a5fc58e2be08f0f9c7a3abfcbfeb
SHA512d266f84a077b893b23b43fe4902619c1cca4fd11e6daee102ba1c46415a3040bb84c976e10676696dece79feee8db9ef6ae4364dc9a9599f5318eb121f37dff1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a