Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
6f35460f5c25f688b6d8e3120f3b4088_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f35460f5c25f688b6d8e3120f3b4088_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6f35460f5c25f688b6d8e3120f3b4088_JaffaCakes118.html
-
Size
4KB
-
MD5
6f35460f5c25f688b6d8e3120f3b4088
-
SHA1
89af37fcac996b83adad46ad456adf264b908774
-
SHA256
b760701e0a51fd76182aed04d2096cdae084e8b82141273a293b9797645451b0
-
SHA512
67630b000ad34c3602b07d8133339b295c0f5d00c9d9c9686f1c0fffc52d172f47b9e6e1f92f7cc5c1896005d89d5e53c7d6cef1e11a8598d4bc0d104a5280a3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZFUObCr:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422731959" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bdbb61598a1c9c46a0d686218f18d7db00000000020000000000106600000001000020000000f7a46fc62d416cb4d27f19e75d7668772d6a2f7ed9ffe594e59b94178adf2917000000000e8000000002000020000000f44f553f507432cf015ab253712b845380555a3766a1977af973906173fe4889200000004cf29394fa0feea26fbe1e31b77e271f89810275dacd96f7760ac36f881f78604000000010fff31405947bf101a2f04b680cc7f60337ac36556ae015c67d661efa8dac051a028790017036f996665a383cac7b5595e51a0c0998a002fc996eceff769f85 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70484d19fcadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4486AE51-19EF-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 784 2180 iexplore.exe 28 PID 2180 wrote to memory of 784 2180 iexplore.exe 28 PID 2180 wrote to memory of 784 2180 iexplore.exe 28 PID 2180 wrote to memory of 784 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f35460f5c25f688b6d8e3120f3b4088_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57159fbcfc85c8b0d47b7c0febc8969d4
SHA13b81af321ba7589f188c3eb2f1eb59cb224a7c5e
SHA256681a36a5369aa6bdf1f258842b678638ca34f62a12a9e3bef7042f84ea5f1d9a
SHA5122f7b203da22465bf26b8046d69c6a084d15516f69015b6c829867b2e62582b0d550d711f1f5ef5635b9e0c0caee0550d779fc295bb0d91ff5423c86159264737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061e23ff5f0da1ea8ed582719ff152b8
SHA1db116b01b9db8c5d262fc398214e69daafdd583d
SHA256039950cdd710698db18f92a45bb4d701595fe76cedb4ecf59b2aa2449bed91fb
SHA512d340a048b43355c1b86adce47147b176a8944a5dcf97f1f9fc2e28fd325a4f0c7e18f33a1eab21f65af30e8dda7dc9a93976ef7d4fff47bbf359932c8e4a82df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cff6602a6412c2533fdf151157c01039
SHA1f656e0b1b80dba21b92aa6e1d92a3d9556c20942
SHA256d5fccaa596ba739d10d3592bad8b87534af34ccb0dfe246e2ef84e645d488cc1
SHA512831b3872cf4cf7ad46d8d27eaf6abfb4a395f584f2678e1b783971261188854a49f9455ca5ac638edcfca57ff261afe77b71955d2d3e18cc8726f17f16ed4b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540245a11ae65dd489f6f1c220590e439
SHA1d3f42607a8eceafd32a575b1a29efa104f242126
SHA25676935b6468f7f2d03752b760627c4523d69dd0d6f0ccf618e4fce856db4fde96
SHA512ebd1997d23e35d478b3273651861fc55b96dd2d7b50ba5b14323fd5d112a7cf20ca3d35a1c13cb5df0b4b3399cd7bc260c9e9b039c5125e5383241e2ba79b0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5215e92b0c76af1d79de495164522cd11
SHA1760c52342606279041fc39f083f16ec4d94d30d0
SHA2568ce8633dcbb7eee37e7adb81bf50eef0eeeb2fe49d60eff6d84a99507c1d5f10
SHA51211897e55d313668b338150392429c1d5b1762462fd5143caf1ca2635d787de3806db108fb9e9267cef12672415e39b62e87826826e20ac2c86ecbb05fb20223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53143a3776cb40f05023d3a81b4c0ed97
SHA164d080b3b14dac9c037b513ad6783ca0b8e12fd4
SHA256c62537311545c50074abdfe5c3e1467f2245647f522f66335f9003a1ff8c4d24
SHA5125075739969c52fdcd99a941eeacd1d0cbd4bebcc828619090b1e433fbe3f1ba3ee98d68ade5f16857620154c2afbc89cbfbf74879159f2923daf7f2e71bf4e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd3bb6b99ebf0d757f52e4bca0263a60
SHA13b0a1ddf83cf86fff4c382cbceeb2e045d775a27
SHA2569d2bcfedb2d05544ed21958fa5c1a85a4c3bb18e93588214fa5a959be01504c5
SHA51252e338d05208c30d1aa9a9afe2f90a6e4abe86bff2e08f504e7c72a0e3ab419746df6be23414d8e5658b7e05d34ef9e29d4c4a95aef09e1cd7b4b1c32c3e7db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7ac4476621ac065f7b7f7d682da0fe
SHA13142c16530b795abcdb4365892d543f129909459
SHA256d3376f7966da74084f41b813d9ac7fae9e28bb63a804053d47cb4dde6ac76de0
SHA5121b86e9982e3d2a09d6b71b8002fa023a8413a899f99c8d830bef575cb71b304bd23fa75fe4dcccd56d616d06cdb502da8c822cc9059918c673dbf4cc73620a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d39d0dea4119b01058855fd4c8467e
SHA19ccfe97fc0ff775cb497d9e91a205f80246d971e
SHA2565880c0cd333a44a99fc5ff10a72b8f7d5a5b1e2afa5073f91c712b4876b19b21
SHA512f758aefe2b874c40e7258cccd466b9022ab58d2cb5a08680a6793557daeae4b8480fc96d8e4a1a4e37ca8223f392625f33087624c79208bb78559749ee0bf91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b778c721d008d99c56b6814fb45fbed
SHA160b90f23f269d2f8e674845f2d42e9e49afc822a
SHA256e652be9b40319646f8ba760c0dc83bfc1fec7ad2e74838fa3f4dbaa287d708f6
SHA51217a1f7bbb217fbb83cc36a0cc919f08c40347511961238e5ec794cc3dc9981367fc1f574653f208b2626727ae259bdb992101976adbf83c49f1dca1b1aa38702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa4fe0cde52c2723ea5e751dbf9239e
SHA1941f1835085169bd0df7ca744e14caa43f8db04a
SHA256822d13d53d047875cf967f9e4fa73555f85d02c7d74f4b58cfc17633515fe3e2
SHA51247289f9220252abc1d1843c807509e1c1d60caa883e57f9ea95280b4fd9bd679ba6d33cf3319a54693b9252569f1719c66c36045716a374815341b3b0802f649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52328bcb232d718ee5aade363ba8f4aa9
SHA17d0bb989cdc99973efd71f009b35d37097851d28
SHA2566ddebc4f98646d902e55d18780d3052389a992755dfbe1f891d5a34094808b0c
SHA5122c50ca65ef5b06de764c6b150b4bf7ee2ff61f71b3f4cfe365eb2c3e5568572e1d16b84a2b47601281342b15a5827ef63f438a1e0523b48e6d0fa76d4bc934e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523281c55c6661bfc7de8dc12052449b2
SHA162c609f91a60ad92e5652e0ea620d15294b97c9b
SHA256b314bb313c4e62c6cd9dfda1c2f2434bd0b14d7f6a9773b96ea25298724e2186
SHA5123737e9350f252c8ad67f72d07c652389eb2cf885406391d27ac49a93da18621be2e8c431e54a0298d9303558933fa4b54175317289d375d1de9601f5a012df9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e4c79c3814d591ef651fa9323d4ed5
SHA156111f1831d7edc47c624588e16e3a2f670da44a
SHA2568673527a7fb1e6505b22c89744954ec3ec85a74f78d897331bd07853720c066a
SHA512df2c6ae603a6fbe7637f34fcfad10127aa5b442b4781e5b1f52b9014c7b2136787d3b5c13fc4f5753135cd841cf3aaf11ccde51650337719560a5399e2ea4943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567903111a596439a99ffe02281cb005b
SHA1dc90ae3bf7a9d6f80d6ba8befd0e042951566485
SHA2569e1ebb20744d8411c632296a8930923b55e1ba58bbdc1ca55a7fdf9add12bb32
SHA512f6b9565598662a10fcba649d13fd29fd1ae7f397c60b23373dc75fe0b463002e1e614dc83dbbf67f7c584d5e8ad2dd92076de296c21653933355d4dda7c7107c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55635948f8d4aaab4c191968f1d40dab6
SHA1c6433b3f56ac7ef5517af19fb9402379f4b602b5
SHA256e94ab1c1f64b8f79eee9961f55dfc9c434a19fabab96a307f718d8bf6ff69475
SHA512535689d289fb01cff759c2d86ff116d7e93848e1a996d9d5d6c0cfbdcb3fc7d67f34008b359ad0ff737adc53c7b5b9c5f4ea1aafbbe033036d96cab9c1ba71c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f25b50c1f6dff2cf8ff006508b7e3adf
SHA17c051edf67e0c5fb873f1bf23b73ab76d4f44239
SHA25647f29293d4ee33f5eba71415e29c7c39469ff5a8ee43641c340ebfe782ccec83
SHA5122c359c493566fb690c758fb3078a4936b6f6e1512f0327ab87c85f537188113c1f8ae2620f14c644537808f791d7dba9804228ff8f95cdf1f48413e80cb628aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbd03ec2c8006044a353c15938821f6
SHA1a05ac74afe903c6039a31a54744747482aed3395
SHA25691586a314522bc5a07ea73a7d1baeeccb6de84de73566c8e37966192ec2be3e4
SHA5128eb5aabea919ceafc063e473ff0f2b978fe8f34385b864ee319411ebeba794854c46eeeb979bd1be10135939436c281b8f89176016536c0e6da6b6c06842134b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b5f338d2c6070aee9ac9913449f60d
SHA117e3afc3a54bde346e282def3056338fbca78d9e
SHA256bb63463f5b408b3bdfbcbbd5d422b2bd73e9d3ec5da008ee73b574a9b0efeaf9
SHA5123c8635f5025391b0aef07882bda19f45a86b9cecbbed5303c0a5b6ea8fe8aa1380a149e3f93dde7ea2cdbed64143c62ac28b6f6196a1467ca6656bd54b1fb5ca
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a