Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
68e32ea8d5598cd875d24f039e3cb90a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68e32ea8d5598cd875d24f039e3cb90a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68e32ea8d5598cd875d24f039e3cb90a_JaffaCakes118.html
-
Size
3KB
-
MD5
68e32ea8d5598cd875d24f039e3cb90a
-
SHA1
682cadb9b3837c1599044936d0f10a8259f4d09f
-
SHA256
b5fbfb82f34ecc4a9cfc12915f6000dcc7388a60467005e5823c26b922980e15
-
SHA512
990a144f664e0d57d9081999e234f02432b74fa7bd9cab0533a00a07033fd719a2ab04b9a1ec6ee4f8a386f745aeff01f97595b78b53c939595b5ceee1bcd71c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F16E221-188D-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422579827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03cffe399acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004dcbfaf0b1e3a849b03d9e2b5d0e482a00000000020000000000106600000001000020000000a7d2ff2e1b145d7b34f77adf3cd7da7220e6ce73c0649a27e2f8e3973e254847000000000e80000000020000200000005f73d90a671a1c77af453dbf9cbcba073b32e36e793ba3f9487021307d2ccb2520000000286a00f45743d864c56d5a2a78861fac3b33d8ff2fed10b37081271d4b38019a400000006336d6cbf8690d62a4bb8d3242ba25b7aa90507e455041cbe84ccd66acbf2c910c34106114897af03acef42fd8dd9bb6618e713ded770bdbff4107a75a28a0e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 112 iexplore.exe 112 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68e32ea8d5598cd875d24f039e3cb90a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51120ee15ccdcc7c0b6a78cf56e078c50
SHA122296c41277fb44ae2c8c74968ee53931b92c92f
SHA256d6e833b4a954937e21a5d96f25da7f88ca45e5bc11ee70b1ea9ce929fe28f49f
SHA5126607c609d762e6f3542adc8d8a4f6b2348a8aeca5a432ecde58ad2e1dc62b8046194bd867389b08d719659610259b645385c51d67cd5c35b5206ef293088a440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584cf77a517ca96ddadf79f2bd32fd8e6
SHA1c54aadb4ae90fb7be7bfed7d4bc2d5258d8deb22
SHA2563693b77cf74cad333a42fffabf4847c32d9c1e8073e97079b46caf5534a0131e
SHA512ea4750e373fd12d95149c90a83f7f203e36ee5cc8c7cacdbc00b3e978967f821537e917ef303d597699c1e1d433ce7573b16f1a80921695229eb8f8d73beda11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c35134f490994ee0873bcbddf9a49f0
SHA1c3b1cdf21652f69d0de512b901608c099d2ecde7
SHA256e4f248c3fbe124a20ebfef584e3e8e07bbbea0d4fa0976e9d99388504ad0ecc7
SHA512e2ab82a18bcc43cda08618e70333c5dc8fc0a7686d3705824c7eac20eba5ee0ef6fd5801256d11192b4c9f939de4f738f14b71692e4395d803831a08f7875ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52acd9cedbec25b07b9f81f81ade8d8c2
SHA197f2d33941c12b1ab4ad0c3df1e04a578b5ac423
SHA256da7349a746c437f00ba8c4580237673355c621c5271cff5fc175622d90a34658
SHA512acd1db9bad570f2c0a40e945dbec47dc766119110f2ac786f1a05987a48871e46a17e425e85f41e984e36b3f25c7a1ee56e98fc8341eb29d28b7685afc677cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad31d72f349975faa0453aa9bdfe385
SHA1db31178612792c25503135d71304e5c7fe971128
SHA256bdf35daa7d176f230f9effd6ad37cdd004e762bf67e4488745569048ad408030
SHA512737bd8f654b718a83edd03efad8fe1677e71e9a25267dbccebd8fec1879b81b1f6bb8b7c29fcac3173f4848aff280269547750e30887b756de38f906a7203629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a58e9829089c49facf93222c5a684ab9
SHA1310123ecb413b8bcb13919d85e8c0325b02bb94c
SHA25685efa8e1b7ccff5d2cfbd575b297c3ba9081e45fbfaf6358ea073070c14954d3
SHA51251696e2a3172bbbf5cb289b63a851db98fa8ede77dd76ffd2e399ef5b3739aef29ebd3644b0a984c24f46b5372945a798557a2120449648a83d8fb61c58b8860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54699804df6600895945276590b019c68
SHA13364d8f63620b894a8cd5efeeb88afebb8e87151
SHA25617ccede2184f0ccbdc54030375e79ead3841f52bf6c11a73477997816b7c5db8
SHA51224d0f1eb0c53de4ee3c14a127aba957a59ae9370c385abf78ca73f9e4f91c3015efbc3e41cbfb72f8d4cdf500db292c7a6a4b43cd19b1fc23b60996094135e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528ffba61f6acf42c07133501bba214f1
SHA1a82228f82451435a405c1103951148f8f1940d20
SHA256aec2c4621020b0b84fa7373f2d11b9aca07cce3a4ba6132fa6ea7365c0a7e3a2
SHA512a84d7b311a9705e3ee624d7bc38080f25c0ed7fb25e1ad74169a32cf2fe646d18c6f1e7dab7f8e9ca435d361cefff063b8992e2762cd2c00c8d826c025339960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e59eec5d2add222c1f2d03f6024e67
SHA1436982f3024698be0d23a4df0edf6ac0a588e10a
SHA256dd0d614c01b18391d523d38bbcc8127e3717e4f93b69028a2a84cc5eb53292fd
SHA5125d9233238c7949addd11980bb547ac71a11d9b3586c2d2312af51225807ab5743efb1db0907eeaa44f25ad55c92b498a7c18fe25502d0776c59bc08048ab644a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52146c8a08b060922742d0959d93d72c5
SHA1c03fbc713ce2977e9a031e026fe33ca840b9d23d
SHA256f085e783987e00bbd73f5d3da98f3f559715e9b90f579b701011fee208b65d25
SHA5123cd68a2761f431058824e9594cc638ec6266ba5650b6aa4dd7a9fc0a5d7aeee39ded37a269c2d5645872642349d7a0bda81a43273432e9c57e7a5e79171176e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520d841acea56a366e425f57d56813c39
SHA1169ded3f44b2b0eb9a73160a23e91c83577ded51
SHA25658017ac0cf1940bff02ea60444f76d8ef66fccede42e740c9084349d0c7056b2
SHA512b50ae42206e48db0ca6561085623e8d2dc376f018b07ac40642173f181bf79b7209ba9f64af9686477b0ae7024d8dc0f1a20db487285ec4e2f13a8db39364cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592e1164e843d3434ff1064320c7f9491
SHA183990eeaba7abcbfa893a1551565906410720059
SHA256babe80c179705e9ab81d2e3a689c3e3e54dc185fdf0463c76f1f55c8330011a2
SHA5123eca17042896d9aa9b9eb9064fafea39ad47d8f138781bfe8ac343459e252468b43a90aa5f99f68288b84f198c268d74adddb9af3d71e79652f8ebf5b97b61fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d74db7c97c49683c39779ed2a87f431
SHA115d16164a582b2d350dc070849b8e117ca019903
SHA256518371a8157a8fc0b3527ed10dd6658d2dae345c9a437de358d83af6ea31487f
SHA512c3782d323e9c5d388ce4c90144a1b0b0cee7debda76677390a7c80529d2b7ad43f6d7238424d5d2ce5a12c83c7646748628d8e0d08b663228448d8a896a42927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58312883e93f6c522a72d6b3bac7170ab
SHA134edfb112623e808f3f474679a5eb84dea240f3a
SHA25690bf0262fe0c40ee72130863979637a592d237286b8eea8fe17f11a13bb3ee7b
SHA512e762dfa96388d162ca00f1f972a8844d908bd972bc1f3058e4cc2c7bda763377ef180df62f68ddf8c674c8d154d7b693feed5956c5e90733360cb415095d6dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab90976398e3b5c7d6142d85abb03e4
SHA1196964915d64957e91c5b7367f89cd6fd58dabbd
SHA2567d6c836d0dbccb4b75e5caffad802c4eb58e52a9e2840b859c8d1b0989051a93
SHA5121fefc840e544f21a69e06b07d93239b44e5d2f9a27a45d05bc4c48e2da41f0fbdd4a03f0454a249ecf9c57fe360edb448e0a067e1c8afa2cda80bd7dde4a56ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5024db995c0feb034a659606189f3a377
SHA1991266694c4692ff23d6196c7327df1a6cc26f3a
SHA2567adb64f2d9457dc6779b49547f0ac80fcfe773885809636953c9c5ecec4a5f3e
SHA5124ef3cceda36e3d073996e7471c993a2d2db9eeeef679852e39d1d0c6411071a76b60f7020bae2876e0eeb12d7ff35cadbd9cd391beff83b2a7c27f28ccf0b355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51103f9cfa3a0c961b6998946de7a25bd
SHA12465d0e0c41d47dc47b0ba9e6dc95528b01ecb31
SHA256b2b9952173519afaf525851b0ba3fb7a000f7881620c7582ab3e6a1ff6ebfa39
SHA5123e3c6d8177d7e7e786644f53921f41589492b8576d5e86e0829e217c3616531fd7894cc27c47280fe3f81237b62adc2d6ac4cd2bfc36d6f11496927f7c95704b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc5412af34286f13966b734f0c75fda
SHA1fc04ea76a149ee64b0ce1d316a24d6812a0a242d
SHA25673a9feed97d57b20da1bb71b53c4cd9b363e4397f267cd21be579d7033ec656d
SHA512cdcc587eb5a3ae9aa7ecc637fee9e3d2fbcc8bf0de269b3a497d5eab0c0c296b71fe7ba68468a8ac9c35332f9f08287fc84859c679038823f64aa577c2448587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfdf0f548517d710c9fb831122808f8c
SHA1e195a1f7d08f65eeb6af02dd9d4fa14a97035082
SHA2565887967964013e469afce1e6e9500e3fb267cd2891f06ab0d5663a43ab0e0207
SHA51202a889c684850a3690bf7699ebd5198f41bc1f9f9a4fb2dff2bbec7bdd65e38f990f68c3fd8cae98e178b8ca2ab48ccf6ff2d17e07d2eb53a16c4f83c52a0a5e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a