Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
71128b2a18c820bcf20cb23d4c3ee4bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71128b2a18c820bcf20cb23d4c3ee4bc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
71128b2a18c820bcf20cb23d4c3ee4bc_JaffaCakes118.html
-
Size
36KB
-
MD5
71128b2a18c820bcf20cb23d4c3ee4bc
-
SHA1
0fc4fa5ddcd95c2fccc7fa968fa886c8cb6f382a
-
SHA256
18119c5a3ae37d5197bfa83613b5ab7cd5d95220616e513c1ca47c252fa37ae8
-
SHA512
70f1888d6a92f4689cf978c1e3bb7641001500f4c96c5c635900e349ec9366b0a0db77f704214a8e61305238c6279d4794020cc987287edd42fae1261e613c5a
-
SSDEEP
768:cC+YMK2FatGh5x8vTQ/M/mmbte8wuxaT4czqu/Kuk6D/6:cjYMK2FaSyE/M/mmbte8wuxaT4czqu/S
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1083C2F1-1A5D-11EF-A564-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056aac6db55cb554dbb6522496460e881000000000200000000001066000000010000200000003270d01aa316db6c461b47768f1c9427bb4f130f74ad1593abe7dfd4f372f4d2000000000e80000000020000200000003a6ef5650411314a8df0d6fcf17e71495849216571cdf5b9329b24c1f949e755200000005b4b76eb017670e891c5e04d5039e34468b91554b6795f6e167f277efe0771a6400000005f820b7a03bef0ef1a4dde3334e97134690b7bbed5fca3d606f619499562574f044a439dd1b9a6c668da73a318bcc2aec4b1de331564d8f76348438fc64720e9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422779119" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20457be969aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2468 2000 iexplore.exe 28 PID 2000 wrote to memory of 2468 2000 iexplore.exe 28 PID 2000 wrote to memory of 2468 2000 iexplore.exe 28 PID 2000 wrote to memory of 2468 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71128b2a18c820bcf20cb23d4c3ee4bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56f6e3fca3096a0e7e7eb59d51f4a5350
SHA1c978fa12d9045c593d5e7e097037ee465e09c3b2
SHA256d27a9ba9c11dbd9c2b2bcb61a4128f457e7d15a3db20fad170588821e4003d78
SHA512c45004cb6359a32eb55f1f2ff762ab948d79991ec890ceaf988d513ff9cd4dc0168deb2235b391b43ca8d69d960ba302fde0ed13a2b0e1dddbd63135f27cb546
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5a1e2ccc99de4c8e002f8e548bba0c9b0
SHA1af52dc1c43ce5abbfe7982a6a47e47580925f7e8
SHA25653eff7c18db324e7fbf6806841458d5598ce92e952ec06c333603c122f48c5fb
SHA51200cf960d0fc889f68ab3b3ea2eee574eef023988ff406c4752507c047984ad791c14c7ac801988b7c128bafabeff44b9d5578d7272d54c373265db4f332bec23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55cccb2d1e505dbf28547f890a67330fc
SHA1bc8c658d97cb195b4e832f9478b48bff5e58cdf3
SHA2564539a63f100dfcaed8ec9dd865e2aecea87cee5bfe10864216bbfe1f8a698f73
SHA51270a60e1a87a4253d39e53bfeac5859ff6fe62a62e497db71b43d418c0fa2ca14df11d5fe2ff807c6461afb73139ddc018eb86debff8f8fa6bbca04f16c431395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565ccf8e1205694c87574f6c2c1ca3638
SHA1f5624ae643388744f0a9d6b6a7ae95b90b7659f3
SHA2560104854c665c176c25fae2b78301659cb3759c79f57266ba13050d8663e6e2a5
SHA51275ebb629713d60fe1613db303b6a9365074a195ee2937a0dd3cb3b295d4af1634c662f1f026ca0f344c17ec233e42408a0e33ff6a13975ae99118a55f500fb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578f20b685bfdf6c8e284aaeb36189f34
SHA1b25411d636d584273ab9539f9c5f30e3d7cba375
SHA2565d029b491af8becd724c0e06997bce8d657589f373c186d545b3dfd4ec78829d
SHA5120dd9beed05233e188d255f5368d2124b623ff3817d36ae2700350d25dde27c70fd4fb856dd358e48419ccec95d7391bd3dbc5a4404fabea1394a6852a286579b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5797f9cf1b7c04e3e345ecc4f3f0209ed
SHA1a6511160344b5c1c376d1b1eb110a0a1713588d7
SHA25642b6f296803ba1cb0661ddab180ba9e3bcf0ac2ae78e17505769698291422dbb
SHA5122869955805b08329b742665aa75ac89fcd21e6ea586e3b91337db32f2c7d49ce96ca4e8c8339717c2f178eeaae3242a1360a33a19949c0bf05b4964e4e590e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c246fc41bff587faa035b84387e302d0
SHA1ff1c78a579865e2e2add9b58f6012f6e9301b111
SHA2565d1ddade30dcff98fce1087bd8328df988dc4653068116c176d5285562136be9
SHA5120af9694096970ad19b1c85be6970e430646dfc5447899edc09dac8fb028c378f4cfac8d66686a6fc4dc82ad9371052f9a132649b87f5d9f917010ce77adb2b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b0018349442e84fc7fcaa0fdb683cc5
SHA1483b34a7f7f6f6251f03fbd750a0e1ef07329c8d
SHA2561b8c4b9e3ce819413b853489547eb8999988b28f7e815c076dc209fc26aba318
SHA5128cab6baf6d3ca1a7cfee8bfc025bd1971367fa873d0bd346d8c952cace3cfe53c5db74c7fdc7642f0b7d6f57c17e4062275e4fc040ef8745c4740e71ebb20744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5a66cf1397dd8f6a837c4d8141f90ed
SHA1ff1d2ae2032dac4dbcc52b91b4284af1b2c89f97
SHA256536c55a2c4c57cb009ef98d5a04ed0e60dc76f6c53ac320f36bc57d1e8d08cdc
SHA512d1be22d670d707653a651d1391e3104270e2c73f00c5a761ed3f19071b9167053dde740629aec3d5cb1e3a4a9d27c09cf501a0765c4a7b124e47973caa885d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0ee0f70a89b97addfb0756b428541e
SHA1c6a2099349e7e8e440781ad954617b1a18d086dd
SHA2564f084a28495abef6b5568022f36a5943210b703eece5c0cdea146bf587a2805d
SHA51229fae4e28452c28f0a98765835ca8b5292442b8370393944ec651f0a81944a242238503c1df458109abd44506577436b1b5cd16e583fc97d8a8d6ff7d28373b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9ecf33a2084610d6f059538074e78ce
SHA164d696776a6cbadf611f3be8e2f57f3150873c92
SHA2567bde698eb67effa582897da3db8c79dc9e2b0aa050b4d350faf6876fcf620c84
SHA5123369e8441f24401c009faf68fd069263b3f0f5f5095fb05e47213cd603bf54ac0cf6ba4bccab21b399ed86e1395cacf4f03e04a65de0ae5e92e9e2fb552634e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e473418938f70abf2bd4cce0e5e35c0a
SHA19318e74a133c83add41efc20ea4dd4715df8f9a9
SHA2565231d5377b0dc62885bf9cfd69bb08c1001b45bad4299e56cc57f1df943e0bc9
SHA51244c7734e49457ae319d0041d246c3ca306745e6cb3184e05ae2a7dae221fc7481235e7b0ec39123cb367bc459a0d40eb781de4f72a5bdea3a31a2ff37a3e1ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0c44ee9891bfe947dfd607b7b610dd2
SHA10ba2ebf3cb8290e248bbebf96880462081d1ad8f
SHA256d50ec45d4613314fe0ee709c8b2b0b124835a9967ba8ead69bc963c8bf2b297e
SHA5124ef16f31200a86bb16351d11b4741e0d6cbbea75854d49739187e11a816c30b88bcbbdcc4fa5fe7e784e39ad36d0885f7a3ae9ac7c893ea2a520e19108efd201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b7da67bac8e5ef71f3f978eeac29c587
SHA17b1c2ea3c53228c9ce5d4135dda0439ceae553c0
SHA25654002f5ea51465971a5db9add5e8cdb52941eb39c0b88f5d588ad4c70f17abd6
SHA51269484c9cda52bf0ed5df0397e855bedcb5237bced859a5547d98d74d34b06f1847f5703925ddb8c54408a658db35f37f5f20ff832f8c340ff7a5c87bad2b759b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\style[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a