Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
68be13b6de7dc51fae41e2e395dcf11f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68be13b6de7dc51fae41e2e395dcf11f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68be13b6de7dc51fae41e2e395dcf11f_JaffaCakes118.html
-
Size
4KB
-
MD5
68be13b6de7dc51fae41e2e395dcf11f
-
SHA1
2344c0143d39dee6183bf0c33c0c69c9ba28b7e0
-
SHA256
fe79326a5425759845178bc8c91593986a9a1b3028e741d4fa45d56ba5d0184c
-
SHA512
f27ebe0160235455b3cdd37aee1b3bd361ff8eacc1dba8ae90dda52a7dc5279de50cdf9914686e490572cd25220be20d31a9f1a670990f36b5014556bba43134
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oPsgxmTk:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5692D91-1884-11EF-8706-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000157d7ceeb28b3840ba350edb9fafb0f400000000020000000000106600000001000020000000c96c11d8140fc6a946250aa9d121d1ade193260c38b3b21395b6416e69be053f000000000e80000000020000200000000872bdba2124f99e13bcf25c58dff608348a4a47eb96685e2ed171267a6d8b2720000000bb04531232c7fe9ab8fe7fb6f033f54cd727c9486e68f43839dc917ebbe8efbf40000000dce744795f7c0dfed0585655bcf62ddcfbb23b4819973a0ad821ccbfd4e2b9215b71da52977f96157b7d22466aaed74340410307cff3440e13359225b61226e3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903b637a91acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1680 2032 iexplore.exe 28 PID 2032 wrote to memory of 1680 2032 iexplore.exe 28 PID 2032 wrote to memory of 1680 2032 iexplore.exe 28 PID 2032 wrote to memory of 1680 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68be13b6de7dc51fae41e2e395dcf11f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc6323eb86bfca2bf2a26c98767428c
SHA1cc32dec171927906e4ac259845a1a5da49993957
SHA256fc6040bb8f0346cee53f02223ab1898d9b17702d3c99fe6a062a930255a7e1fd
SHA5129847e7fcaa2e50fd2388e8b220e2b090c6be0d1b5b88dbb5fdff832c97cec3e856561a2990a3938d0edbccb6427ac0bbb0d421492adf8b9af84b6b798635ea2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a77f2724cb8c364c416d148fa72077dd
SHA1b223b86a5e0af0c6b74cd9ab03d60e5876de3e6a
SHA256ab0818e64c1baff07d697861f7f70a8a68c71af45756b7e945df1f452dd6db66
SHA5129c867cc2bbcbbe1934010f3aa7abca8333d003034e44fa9d0527bc636a0ac6b6ead9ca814c7fe77e852e98819d4d2f4e16a0942d2ca1cce120e129cca83aef30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b36742b01eb488f0054b9ded65ed0bf1
SHA12df68ac2c1b39780d3a4568cff5f5db82a22e1b7
SHA2569a81d9e09678ba5459e7d3be465bffe2fbe4ea351f4b6336ec3d7febdc8e968e
SHA51298ce21587959c44fda4e13428308318e75731ede5ecdd58052dbf722fbccdb515888d3781665b78ce96e77c4a9fa152a104652b781ea7a99d3af981eb70d9223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cdcf129b63c8cd71328eb8f19dcfa6
SHA1d0f256f5712cc9651c5423c01e726abe6ddfc865
SHA2568356392ab7dfd5691938c8dd472b5c290424b1db17439136303d51f21fa77b23
SHA512f59eccf474ad4ed21ab710d3768ba98e5ba7131cc2c25ffa140e8e605c77e7c4f14be7006ee2066c313309ae4dadecf754ed8677f8074f8a4d79d8288bc63646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568e81840b7d46f87c04dd00adba398b5
SHA1ec144fe3d68dacba2dc45826895af4025fe29159
SHA2569c926dd01d6c30d254a2ee506b54cc0dd0f112a3a4e20c3ef0194ad9c5490844
SHA512874d9a09f57ccb5fe5a6e1a6219575824748e630e661713087804453b6f427a66b9b54f5037d10fb3f4ba55fdbb8fcb55fca9e224825b123cf3a2b9b1f178da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7f5150693251d9073b93d5836f940e
SHA1b8c8417d5ab4f17dc58deaddd1b17147f5e59354
SHA256c790ccb9c688f73694717271ea01d475201a8ec7c7686d28f6bcc00953ff8c17
SHA512a09d39a0cd6948982856b0ef7267873059c90192378e92c38a79dc3802f8b4b94d99df876ab24ce3774c03df8fb01e280edbbc2386970d3e6f30a198f3415bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79dde842e5b9a152800fbaa9a698f79
SHA1e8bc23be8dd2c10e4ed46b7215d5297e17b74457
SHA256ad33ea5e72e2ab44dab74368ca4b27f4c52699e63b0634cc4f7ed9ff48cb7063
SHA51236fa805caeed1db0cc3d1d1baa183994d8c7d20f7208cdc6e463117dc082c331d08e1208be28cdfc0f3019669622b389d3e9acbc9e323c1530c41134d288a6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5747c349c507c64720fe15aafbf69ff3e
SHA1c992a2244b7e64bc69543e0076615dbeb4490323
SHA2566b45d39d51a0430a6eec55fc3e80c7a894e967c2ed51ba60f161665e42cae3b0
SHA5120ab331cc2d8e558927ce6b53a3599dc98a1e1de2882d5989d468825e6e672de105a5fc44f6b73e76d65a44093b5911cd069146ca8f0789e48831f4e52c8e3473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580f727e603a2300bf2a3ef5b33aa04b1
SHA1adc1ca89acb6582b782d13aff09990f2c12c42d8
SHA256cdb837880a8dc8cc41c08b8346cc0e80db0ffb30a3736f3fb78e3622f9f1e1d2
SHA512238d1990c2a520298558c20601e1710c3720be075772883731a84fa63689e3e27f3d22a6f555acc86201238b8cabcd23764aa0ac2e8fa01fa8a96ebc0fd5b36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffcd046d948321851d21727950f30d2b
SHA1c9ca92d46e89e6d44dd79347651129e39ddba891
SHA256802f0ffb8f2f7824705a69cbacd5dbdfdf5351de66ca13f3d22f8626110707a1
SHA512e4233d9ce4b479bf80c06d7e272e4f18f1f55107ca94875f95243e4aed4764a7f32e995f4c782bd610cb332f58a6f227494e3a4d2515fe9b1ddce4d370283125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc79a49e2e0001e97f2125667a306e9
SHA1f280776a48d7370c6de6a5524d753625d1b67dd7
SHA256a1382a620c23f4ce72d250116bb888a23beea6398c8e0d61b878b46bdf494028
SHA51224976efb304e1c6ba78f51bae94b3f21c69df8fc037efe12e3cc766baf6c864c127659d45bc5de5087e6a6ab53817aec0f3ed2d0ea711fcb8071c07bb86a4bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baadc1aeb0e019adc57abf1a93e1ddbc
SHA137253971ecf0831bb6755b0eabc8c86642f540aa
SHA2562e248444c25f3919b87f6e79c3b4d6b00c7bfff76e3e742f4f342bda93e18f1e
SHA512f8f4a7d5c3e52b8e09b80ae4941d1da420cccdeff7c16745e211576f091f3466647be8e74a5e9e6170ae9aac088a129143ed14b2244f7bbc59795dafc7167ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490b8e389b562efd9d74ef23a133b36e
SHA1204290230341ba4be6277d5c563e15f61dd3e456
SHA256b45636ed3b41e005b876f53109e40dd73486841ced942e7faf60569f45a95164
SHA512d4002c1a9599fcd4a6ce78b397f4bc8ece9a2627110c917dc6b6d5fc92a16404c0076583602c51ecee708d3cfd22f35202870563388b44edc8a05d0a974da369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c723023210e577678d074469861086d
SHA1ac253efd39f21b311bf6a2e4dc2b2e4228ddb6d2
SHA256075200536fb051dc996cf0ff2089dcbd520f6abaf08652fd05d30189dedd54ba
SHA51212729aea117ad34e7ac3311434208d3676c3930a69afbbba1049600bd897b7d77167921baccf68aa87f983056d687335712ba0cef69d0e1db97790b5f5f7a490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0dc7b4d9216ba10fdd640527c07012d
SHA19b0f1d1f6c5d7caf64000fcc7c915aa125f3d047
SHA256dedfe2c37c37098c77c0146f03b55eb0bc5740777b4ad05d3691e96751932f36
SHA51208d67e30f88d0987a848cdebf71ed7846f8c1f94be50a170c9a83886323e176602db7da5389280a242acdfeb9cc1a0eb121a5656ca2e0a0a4fad898a9a406e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5251d26184d87e1d1a966a353fa68b169
SHA131ce84a27ec43034c03abce750b52fd66a3608e2
SHA25630dc4fb2aa5258c68fb30652b300d1a7e07edc1772f84a8d8877f753f3bf6b70
SHA512d06516981b06795ac6ab0bac43429ed466877cb9a9c8c05c0932aad2ca7daee7a13a26b4b8387f030b5382ac07a2ae2515fa54221084e9f70712e15a7c067183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5524d7d100f9faa5e1c20d14147c95ac1
SHA1b5c647f5cae23b04870110d7c44163a6b3a09fd3
SHA25690d262a5cfa50d9f3729b958fdaff8f75dc3c37d89e3c9c3172db47c577f3d3e
SHA512391329bb1d393388542d1fe8f0576031363c072a58bc2e14f9020a689d92ef6e9c71f5b5cb39ac8ddea563955916172109c87390bc48a661929085281817ddc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0db9b27b0745eaaaaef68b110060009
SHA1bd51e261f6ea14e4d5823a83847e68a39119da84
SHA25613c52f12e8079cc5207a87a884542b928f1fc06cbab2631d5077dfc0561b4b94
SHA512c5317d911006559371464b6fe65fd4e0bdf3021175104075dfdd9898be9b62e693336e8a376eed6c6236fe1751664e7337a07e1c815b5aaf357c7d16a6124e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d4b3a4d4086534813902d08e59ecd1
SHA1f720234ddd4cfe0ae9e3a7e49d4b018295391723
SHA2565afc7e2744d2d6ace7c02df146548dfbc3614469676cdb11858dbffadc943ecc
SHA512f931c7bb1b4b513af57cb3405593787cdfe4c40642fa6e21bbcb9bc4112e872f627d18b263fb967904213e0aa9026a2e5e4dc436093ef2c0ec5e643a7deca9e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a