Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
7312d451dd9c4f0ae1dfd3156d268aa5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7312d451dd9c4f0ae1dfd3156d268aa5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7312d451dd9c4f0ae1dfd3156d268aa5_JaffaCakes118.html
-
Size
68KB
-
MD5
7312d451dd9c4f0ae1dfd3156d268aa5
-
SHA1
d015df1e4f880aacb68f8cbbcd9d89d38f5b69d2
-
SHA256
8e41135b1bb140ad20f8b8ade0c441d7ff0d704c8bf9e392bdcd1668bdc86e3e
-
SHA512
80b61ca1ae880cbf8b9be657687648a088e7a5137cd53f7b3c0fda00f17e218d0db7c283c92a8b6fbd2fc3f046351dcea7db740bd704e41aa08a1f459c302396
-
SSDEEP
768:JiegcMsSZ8tN99OIsq82oT2aQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//IjkK5nK:JyWST5Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0E639C1-1AD0-11EF-AF55-CE46FB5C4681} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94fc4513f4dc54e90e187207be9cf8100000000020000000000106600000001000020000000ab1d2a303aaf6e379f2a36532f1d2db4911e5e1072914d8b3a64ce9bc9a440e9000000000e8000000002000020000000b176c0fcf395a59824e7f02034268db75bcf6a8047cd417e1a2957a859e9913f200000001b821a5c3d259c7baa44bff8e26251876948d259186145c85d8cca2ebca30a2540000000fdaa4249ec97411e8e2393d041e37025866b89f14798f0d048ec9e1a0bb399f429d92701b6dfd76ba76293e93a95d6ed841f343e66e4c36e8db17b2b25d86875 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a37c95ddaeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422828804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28 PID 1772 wrote to memory of 2660 1772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7312d451dd9c4f0ae1dfd3156d268aa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bc9b93765ff7cdb1101d237dc0b54a3
SHA19d3556c37d2b1fb8d93dfb05c3b516f95e270a3c
SHA256b5466a35d819b094fa0fc29c9eafbcdadea368599d6baba6ccbf16b746b74355
SHA512a503668537f3e863a37e274830b060c84d5e4a991b988370fc9476be953e1ecc9c800bd9d79b36b8386eb5efef881af2d842f1a5bc9f54ce60ef8bfd3a96627d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a00e848bdf74a71114238ab150ba32d
SHA133c020467a4255e1567150e1bcdc0b00be1017e2
SHA256d43977244bbf158ec32288ce2b4247756a760b339933030d6d13937b4d072594
SHA5129a1f5f45e33024cb784604eae61c08e9d3ee7d59e842b014990fadd2782b4b424ae7870ec0fc7d0a1226e91455fd7696a7f0da1d159dbaff74d2f6d7043a6993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5def2ae3298a1bd2b92dc324342326a23
SHA121d8409243666810b304313cfe888cf6186c28e7
SHA25662fb1a9d510ce4b107e485814c3e51b3d5647c1fa9ae1e008317c09d64d52f37
SHA512ef56a28905417678c384924ece48cd535e3e5cefb5225eb0b1ab847414622d136042462066adb88ece5e58d0909b1ab26053f8299cb45fd8f3019b8aee42e83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e405002c62ce12f4bb968ccc85a137
SHA15a114196b854db830da0ac91dfb204f6c229cd0a
SHA25659b72c16711aa5645d14b4f5c46ad72c975a789618a55cc181485ae53511ee5b
SHA512952e688897cdc44fd89b7eb97e5ed32cd8804eae1e50f4f33da6619563363c638993c1945d349b1f8d522b91c14ca4997b54a73003687a3d9e126da0d76aae52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748880d52e8fe1ad042fd101686af315
SHA19a82526764658e9ddd745018425d8e4ef7e31f63
SHA256017ca05d21ae43e6a16440bab16cee347ef0e875d37972e699f298ff23c81e57
SHA5124786a659d7ecae53b7a2174d79b3ad15210562f3fbb0839db4ed8cabfd1f979f6b7ed1a781d508e7b13cd01c28201ac7552d916edad5b49534ac593f2bc2a55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538942d22d083e52991e87186260738c6
SHA161b06ad9bd4bd81f5a75cb700c1effa19bfce38c
SHA2567f2e5f0b26a8260370c421204cbaf29097838f99fc18dfb75bd442b4c3b78f62
SHA5127a4e94996750dad9379799d6035b370e363d2c9acf5f406e86142a363fc23ed38f84c7473c69337c981a43967d0b29ebab2ceda539bb46e88f27b991fb7fd000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb5bc4de8118fc9588c839c0bb8843b
SHA1d851f86801debcff51787f30b83aca2d7108aeca
SHA2563c8e4bb054f9f6351aa84bfa621d527aa11822eb853f9e58a7ffb59a971903c5
SHA512b84a433e66d0dd6918e7edad4fa310da1ecd46257fa5664300822a7b5d080705e92a81dbc574c2a629dfaf366bc12ac44c852fca2a869f7fd8a72c689be82559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6abc830668f4201b3322147aa1c53e
SHA1c126564b6869ab7fcb0dfc303bcf42fbdafa8616
SHA256e3f5f6f900f75f409b449e153379ce5be0871024962472b415c82ece645f42d1
SHA51282fcf04c7992c3bc98b088bc0267d7283a8e66fd93fcaa136cd5a652adcc2251ab3dddd862d852fcc379ca4c767a9a9f08fc0f0b0b24c56998fe004ef3c7cc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c7fb3874ba0da475a55127036520d7a
SHA160e6ffa56188b2b70c08692b1ce9b778e9f09131
SHA256771feff830c5ddbfb56e444d285bd659143fd8ca252431607261a9b341d6cc16
SHA512e39ce5d2e5ece32172904b2b3e30c997fa15708e6d51fc17e6bee97c8be558c8f9d304015d4c9bef50e85ab33ba37f6f8f82bd101092aa9cf67ef03fca440b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a51deda0969432214fd68b392e7fcb83
SHA1e96ad9e962992ab98703be179c4ba2f8479250a9
SHA256dbe6edec289d279890b3d3861cd1e6d57dde1c0f82150a8b3d9a85b7d71a681c
SHA512fda74d099e4376b4508a559a13ecbc66125fbcd3b5a4d68a5f282f2e28579fa7500595e3e52e40826add86a1dad09d56ed20657b3970704873c47653d57622f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e4e37ddab434244de90eb7589b4bf30
SHA1b4e406fd13bb57ef680b33f803068747fff7cf65
SHA2567f230f8669703513efd26072a51dad4f1a3f57c06892d6525600115383531b8c
SHA512d8e41d2125b9aecf42efab1f6c8ab3fbeeb8eb0a7169f5663f69e7bb9f54b123921cc1a48098946bf197edb99d101ecbb9f68384e235bad06afc9608ffe805fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537e92d6b22c9bc036a801177b8681243
SHA10a5d1f3e7d4515f26cd3295c033f8d963ddef3f9
SHA25640d646c542895c27a36b87e040cb0ab54bcee2e7f4756cb56c9f097dbd342f51
SHA51203145f26bc808581632935477c792c477b140ab4a22b9856b2859b907750e28a7ab906e47209270d1b02dad07a0657d2779d17c1c4d396df3ee5d92893fcc554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952276bd09a685112de776619dab7844
SHA12925e239ad3801893ecde73cac775c29285903ae
SHA25647863f7e9dc22f51290c46fdf5f6e767e78bd67691b2a59ef56da4e974e7bbed
SHA51225db8dc779c748009baaeb7ffd3452ef62c32aff921b4d9c9ccbd2c51064d92c8e7a286d87eea392ae460e14fc81f180dc4bad8c6969d561bd49630622e63781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a0fc44b98e6d74e16e273160c548b6
SHA1ef82b3465cb108d4a9c93fed80f2004913408131
SHA256b09ec5e10b50b1d7fe1205e7fc2fd6f9e27047f099e9334f173479edc5a40f9f
SHA512da1f9a5e3a648d8ca9aae7bb3088f3f43767c31e9cd916390d73c2c7e31338ea067e3ba504877cc5aed45c57c37303f20718c85c0d1dc8d4274634016a9ad325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c34c0fc5588eb7faa8526e5ce5ce8a
SHA1628516badef15a7830f0c3ada403c472e435324d
SHA2561138b5be034b40445b5e6956e647e7966ad18dd1e74233a8e163c42fae2ea629
SHA5127b3f5fba28bdaa5f9099ac0a05400a7f61cb3b02978c8e0bad1ce9cd1cf8ab641abf8cea8ddffd66be678b87eb6843e4fccd4c4435b7b8b88abb482e6c4c6b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f329c401f03e8f1df845d9cb024403ea
SHA1940454b65149662fcc9faa2c90e5ccda8f8ce3b4
SHA256923ec12584c1232c5f3113efdef3e9218fc4996981337be9a15ea16537c3881c
SHA5120f94c0806ee1efff64c64c8dbf1e57b77e35ca9ff6b58a684af73c5c2ca3c4614b1e1d588ed581ac2922467274531b05d1f728a78dc3ab605eeab7a5c0970c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ebf00bb53ca966495a14557fb2a113d
SHA1d632e75b1f0e1f71da5d5e57ef0c7b3e33b7449a
SHA256a57861b7506b5e74aeeb6269fd4eddf980c9da268f49844470031473b21746a3
SHA512febad3c8a4ee601a000453ce35c1cb3e385c0c5c110833a1a39e7550ccd0f200c1b0e85d2b48fd5d85721de5ed73172859a1576b254fa0ef5b57aaa507bcf0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144f83858474ea2a2fd2f9328cbeafb4
SHA12940e4648014393eea76efc0f9ff915c2dd391ce
SHA256c6ccd011bde5c81bdbed36fcb6c96af283b3313a606755db8271bd5bf9a77532
SHA512f1a69114cd7bbdb2e0a4c5a7fb273a5b3ffb04846dd50a45ffc614265967e8ac775af9e68f7aa2755752bcd38b97f1af099ba4f89231144a3d2a91b1d5a8f575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760598544521fcca3ff027682e13064a
SHA1e88972155fb69863af0a338fd19117d451ef956f
SHA256250f63cbfd1fcda1fc5378195cc88a70052e7cc1f4bcc47939faf2e76b346744
SHA512a95d2e79d376ddc3435952f97bbb214af8b483b2559e72e44138f4cce219b6bc95aeaa8b3f7c3f26689bc8f727f492a5c83f41099ee51aa114344b1c5d5c4d7f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a