Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
6b4a2b158a0b0f370149c9b90c4c8278_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b4a2b158a0b0f370149c9b90c4c8278_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b4a2b158a0b0f370149c9b90c4c8278_JaffaCakes118.html
-
Size
70KB
-
MD5
6b4a2b158a0b0f370149c9b90c4c8278
-
SHA1
1627d322bc5cf3dc113d2a14874d5e68e891e8b1
-
SHA256
71fab21a669d3e11ae82cd316dbe747306c9ac62ef10a57147041098dfc5879b
-
SHA512
01f9943b4d9afc45cbc728325dfab1b42940526123f2118aa5f0f1853ff698fc4480f5f2c964fc3d1eea396477064750cfac57e9b203d9c054f25d132e279769
-
SSDEEP
768:JikgcMWR3sI2PDDnd0g6OUza2oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8D:JAhTTNen0tbrga90hc+NnhV3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eb3e9adbfe5ee44a7c086f44fa833e90000000002000000000010660000000100002000000069fef08093b8303912662449ddb70c32dbeb7b47cbeab6326f8863f31b798162000000000e80000000020000200000007d9b6dbae1c259d91fd6006199565aee5ceaf7ab7cbcf5b7a55134473bf67a19200000009e412a42786d8c26ea4a368ede5e846c072204ee485f5dc737c048c1e8b1edc2400000009a71a1ecf55d0c34b69ae5cfdb69a767cafd0ab529f360e140f0a56cd2f67b665362df95baa20dbbb86ae551a2152591a60a87ea1e4755f3dfd1d4d8d30586bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422637547" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{721A25E1-1913-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8021e44820adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2240 1412 iexplore.exe 28 PID 1412 wrote to memory of 2240 1412 iexplore.exe 28 PID 1412 wrote to memory of 2240 1412 iexplore.exe 28 PID 1412 wrote to memory of 2240 1412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b4a2b158a0b0f370149c9b90c4c8278_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc35a3a071cdde9d4b531ddf0ce278f
SHA17412b9996825666ae8d298c04a8d19d49231ab4c
SHA256559bdabb45afd3c3cbfb971b20068ecc5eff4bcb88c9e61a720e4cdf0da4fad8
SHA512a1ed5e02c674ea4b8d4c7f648b1d7c0706c140a2e5d672813a37c3681010b50deaf5b416428d48fad86b9796e11f99ea685d575f255c20da1c8345596b0262a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882917533c98632a5d83e6c982932dc5
SHA11f9511743a13420c510988865e9a4bd7d26fe686
SHA2566350cd35c09474be4648a764e8d81056351ab3e0f7c9ba8951231d3e3262d03b
SHA512a48bbdb2413ffc0345df21242f664f10075cc1b366346b221cdfff7a1b4497af47d5034cc0ba36bc8fc5fd89283f3035713eb5fc71d05cccc1f0e3b9b10cfc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0d3d23b7da1e84cf57681cc7b041d4d
SHA113d6b00f85c0253f5a8fa1b068cd3918a6eb7723
SHA2569c1aa97c3684f8ddc48941f685651906deaad4331325781145cf24a4608bc27b
SHA5124d3f3a6660344951bd146df16c8df87862324bc3c67a2ecfe29fe874b7cfba16c7adaf1c511dc2dd392c8db0b671acb0ee913b43edc5cb22b3fb1cf42e442a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556fc2b407f9596a491a5876f63fadb6b
SHA1dbc4d27282d56b79d995315cc0aac4e6ec541352
SHA256aeb16dedca1094c47202a5429f084f93517949cd466f09e95c7dcf08d4cd7dcc
SHA5121e1a71e8eb48036cd3a4e1db9ff79b993e3beae36410414984ac026d6fe8bee911b91da566ce6e0b4c83b4d7a1a03a7feed1909ca2a0247dc31e032cf9e9a1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c289a0f6170226e70292e78b62adc7c
SHA151ab15d6916c8923dbf821c6223ec74a1e03df87
SHA256dd46decb43a580508986bddea9daaef509a7c9a7409d266763e2ebc016effd95
SHA5122be021bd010f4a699deaa7f028656ad2f1d7e6f93e1c1315bd74c77cfc90aab6909608796a353ff9f995e96f6959954a74c41951a318dc46ef2c166d0e088e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f32a10103ca3be9d5dba712516e427
SHA126c66125277b3d77b756bee186ff886c4d779974
SHA256a3cce1e47bbd1d2b443de4fb8e0c78cef7d18f4a1dfcb67f65203835870a2240
SHA512a82c85d2e1810ef515da92433a91d2d865bcedd283cd48607cde242125bd145af2e83fb9bdeea97841eaeb6c59890b06ca8abca882a0fb3a0f08b1735d83706b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f88c6b7b35c0684e4742f7f13ecff47
SHA1fe10ba2fdcec6b363e6a8abdd31791f100eb253b
SHA256f830f38cf887239f653495e1d7b7f8e34f38d1e7dd753470a16ca595d5bce87e
SHA5121e536f392e01c3781f5b329ae667dd70e418e931768cb0236e69c344e375efe0cf546deaa9627a11d4db97bc7e5a66c947bf5dfd150538b7066e2274b08fafc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ef81b8d2c6441e9ed9ef746ad92850
SHA1989aee80432a4f913fabfb187c9d9bde2b67dabf
SHA25631ba273f3da27eaccf05e3937bf6d61b9745a4338760d17fdb493599f925c756
SHA51296130bdef4017fbba3a2996453ef1aba800354d2d77ea50edc8861400626ee9aa549b708053a361012cfef06340260c959dc98dbc41bea98487bacbe6c3fa02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54896ffc7c10aef472e2903f922f8f9d6
SHA1a99abb410540e9ca60c31888c7db6b3624886a81
SHA2567cca8d436c8761356c1d3d8843807ac801e99c8c04ba90339438e21533d140dd
SHA512d592bb615d5f1392d5a1470ce44f4162a267b0b0ae2f56dd7005e50c4291a4b4d15e223ee1835373dfc7b57fb32f90cf6011b87b0ffb2fecdec0a38d63cc654e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dff1dc590cfda4ff5d0e087e1e4fdd4
SHA14404bced3988f6db5dbbeb17d02013edd3a97074
SHA256676aeb14ebbec26607a98c3bacca3df911fed450b3600538b2d0d9bff30ed851
SHA512e0927f1db902f274228be623174e36837f8c6fb47ff73c3918250874e8dc7f05fb8c9a1db200a400dd495bec53a95214fc418bef9bffd645b371abc33a1312b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525375c2c04de952eff88f4f864ac8d95
SHA15f94935610c13b7ae2b2003187d0536f7c780a77
SHA256e3c060f8e7ec4a1bad94156f99377f1b7764d03d48c242573375c26a21d99f02
SHA51213442816f5d6b3899174403ee97cf0a48e273e0474ab864c67a6fd8f4fd52cdb41d6a7576e8320134f8c5a0689c817988ea5a0fee91ea2e78e5215a00d5a0454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1c17816fee25d7f90f7b2ba900220c
SHA1e6085e54e77481cccac135a88ad56e808befbf91
SHA2560b8ee4e1d4936d6c4b95c5fb5a135ed2d057c403c71d5b2e54e0f38903f53a66
SHA51256fe08fb5479631a61b93d114580ffc26fe828307608fb5acd0cd33e211bee82838b6b2c8f7e6e63f6837b78b52425f776c2eb9ce96d92b31451c0cbdbe67dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aa4d69d3374cfb80b1cfead674cfb00
SHA1015da200cc2eb565092856d8b59de5a98005f2b0
SHA256c51c8f5376a14ade6c2e8e815e914aec04b63f8471da1090029fd3ae269bf5d7
SHA512f8ba4291f0312dbdeff687df4c2874db7ff0ecba6760bf40eb0097997e7de8befdbe4db17ff40acc743d13f5d6b96e7f5db3ce6170cb2a848310d35ab4f845d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779933c70925b1cd22ee5e08c2749708
SHA16f4d4cb278199cee877ed4282d7d2a7668419735
SHA25687077af07ef94f504297fe67f299a2ad807cd5f2d863e9429d15ca8e95423b04
SHA512f02d52d7d621d77fb1228d760671786355ac6f5a0ad03c847ed6a9064104f1f162ce0d9268234c39b6a4a901409dfebc368794832b002703bb1e24fa4f4fc621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162b353de5c1bb0d67632007325bcd20
SHA1660a3bd8ab9670cdbba6a1cb5542688207de3e24
SHA256356ca8da9f2f3426e5a0e849f07160d5ae96eafe99d653518ae3eb41ee2c6f6b
SHA51254c7a92648ed5bea7383f211642294ed485581722d84bd5d9e3779bec31f002a3f6b7f2bcbce8b7daea56c2766afdf73d53389de180b66f88358c705ed7aba4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e7a2e3a491314924abbe2212253e59
SHA1dbf3f0cff9085ce1922c08b75433105b8674ae02
SHA2566ccb087d04bb8bc9a375aa73f6097a4c2d6a95b7766ec796a85d11d42e153419
SHA5121431155e1d2c426bacaec422e0b7f7d963a4821090e8e1e0c2787786897218e81650433c1fb767eb40b3c545deb92a18c52a0fb8b210897da8faa90e252bf057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f55ae92319dbbacba4794dcfb002c58a
SHA15ef4c970a3cf0314dcf5fc0f605e4db920005282
SHA256451b181a8bb3b00ac8f43c21bff32bb0b2dc0c3e73ba3004620510f8344c010d
SHA51238ae3c58139f0f5795618b1eb47457221fcb3fc83590fb94f9439167c4664d1a624c4813ae377cba8cfd931a237b72e69ce0b1df8a55369d723f31cb531bfdc7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a