Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
7ac225fbcd9fea8c54a4efbc75b533be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7ac225fbcd9fea8c54a4efbc75b533be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7ac225fbcd9fea8c54a4efbc75b533be_JaffaCakes118.html
-
Size
77KB
-
MD5
7ac225fbcd9fea8c54a4efbc75b533be
-
SHA1
a50f65c1df9c917427bfc31a9b7c6cc6e173d0ba
-
SHA256
76b3d00479d43c460754e7855e89489e22b3f560a4b662ba47fe172973e6be0a
-
SHA512
80f1b98aa6d3592e57a1315ee0da9047005c933866c13b19d157bf4e1e2e937c53af2bd9d6b612aeb9d998f141936fb13f4ae6c9b844055dd9c1f1811f79d1e3
-
SSDEEP
768:tgicMDTI42mdVhz2Wk+pU+CnXuyLEhMzC:tgicuI4T2Wk+pYnXVLEhb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506b780e86b0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423011107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35E8D2B1-1C79-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003906bac29da4484ba84ba45c23b29ae2000000000200000000001066000000010000200000009ecb702d5c2ff4df2ee7425922ac3723f252475f90cdec7c7ad8e971bb3d7f4d000000000e80000000020000200000009bf3a7d62fc542651f823bd0f8eacc0cd1bdc3a3330b2eae31a499ff3aeea73720000000e3ba7cf1d2759365b152b089d695bb7a9ef2fc56f49527352bc6efa7cd84c05840000000edb93f22b955919ed7e98d14172c209298f49195b61670052d5820409da17abfa7bf83723f0d80d702f15d7e434b2697d7ff7621f2e7f7d449d4d62f1901e9eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ac225fbcd9fea8c54a4efbc75b533be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD582334b16b91bd5252e6a85de2b02e53e
SHA15c782037c7e21d4fe25e78ee600bab1aad6621f4
SHA2560174b8ceef93d3185f5cfb1b90130a313363b13369dcbe8b3d7d2d91af345c36
SHA5120b72c14150306d9488e3392de932bceaf32ddae8697196882d4a28116acfc2b1d57030735e3149cab966591d5d171617087ace007f6bd89c11e40851c1d64054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecee8c6816de9d1e9b6cd36b870568c5
SHA13da8a9488589b89abd4271f5b201b8d5ee8b0e36
SHA256959d798db025b1cae8a54537051f1dfa29fc6e03dc8381f59784ad3fdc360043
SHA512b1b2519e7899d134978556025118a5e0dc8d00896347fc703ede449a659a25202b5da02987c80edc4d67b32d922f2e145160d4cc5eb91f3b108454388dbe137e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2fbee2ae15db578f37e2eebdd5eef3
SHA13ff3a3daca7faa9aa62059c1d2c045bc4c160f68
SHA25689da7b6f04f78ec040b12cbec4df4add5959cb27366c3d334c34d563b1813963
SHA51221788977ed216ac25693538ee0159a57954971edb8dcc07cd1423ae8e9015069db7cda1687d67995d3483227f487fa6899617fd8884a7fcbe1b453b58e268c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509fbc1d1cad6f848e65ea07b80e49882
SHA1bca629a4bfe8d76690dbf525adcd3f118c7cf34d
SHA256647575ffd1039465984217f51d232a38ac93b09db94f81bc70c6da6cdd27e7cf
SHA51201ba49942c4d0e4bf52c568877d3e37b0923dc63f7f8496a1022be65ab2ce3818390ec442724a08849d157d39376c08666e7c4eba7a6a2a155783e3ab29607d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0a78daeedd7dc1eae68426dcd28243
SHA1533668f578764d406579c175d63903826e79c53f
SHA256ca75e2a3ee73e163421086cb767b4f43ab5a97eb6c30ee0246c74547d54b62d6
SHA5122a64031f31c36b83636c44c68f4617a2807471620ad9eba8433363a43622be74c94e08ed5a7a547243cf167a33819c48e2c6e71df5ff67580dcba3ae44592f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589ff6ba43875a8b3662cc06e77964260
SHA1a48b55126cc5b59695e7606c92e31032c7ab4634
SHA256d321f5d26f1cf14f633dd6b131e7bbee106e1b48379d2fe1abd510ac79d833e3
SHA5126401e5b53457f9d07a201876aa63c5612d77229daa0ff0dfd64e242932b10d2e15ff41b971f4a0dfa9f36c7cd1bb8a73d0e9c5201af433f630956a270587a0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc67f94913639d9bd0ba9a1c482fef7
SHA1288c8162533305b285ef4872472286b924a10b4a
SHA2564c3dc27f89c612e8adfa7e433887157f2e96e9017869351ce7ad564b808e7766
SHA5124d564939766b0126062bcdc7b8318c1bf2eff1fbc920a7eacd61de92971fa1acdeef28e9a35622e0f24cb71b5c36b9803e558dae6416a6c155dd17b96883e5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b245f5edb35e5cdb706d7558f912de
SHA19f43332be884d8c3b830fb91fb4213666cb3265f
SHA2567c9fdd10694e2b7a30a47dc96c19dec127cff41250dd1d4777110112daea653e
SHA5129099d10cab5f6ede90df5995dd7e2c58411da5cf9db850304b9a153a816ecf136447cf751b1c479bdb338fd150a22b2101db1428b31b11a9403eff9310553374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15ab20afcb8897f38a6f4b85bcbcc31
SHA15913b4f8e6f7ca0bc2ae5fd5c49b1a2a41994be0
SHA256c8ede7e84417637fa51f75a9a453a3c1dec98f29e44fee4fdba67ca8033d63f2
SHA5128b4349b21f6d62378c0d4a14430e47e2f81ecd6068279ec27cc1a6575f8964d5fbf538ef0ff42c82e901371b00572b342e2e8c54ad85e9399e7d6211cf3c8678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0d7651c390dfddcd394399f8a89d80
SHA174db0a786426c663cdc888b5d96ae33348a01121
SHA256c0e2645c0e0f4d90b5e1435d0d14cbe1944c8bcfd7ce6f132803cb9b100b5e47
SHA512a81bfcbfd640b8a2fa9221687ae86b7b4f22f5e6c80a97f08baa25502df28541b270763dc2e130cdcf26bbbe0308d7408adc7d9b6ca76b660231f4508e4376e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f451eada02fa4c4b724540bd3e082223
SHA14a2e073d2c6ead8d7caa950a2f4b02ffecba0436
SHA256bf115d3512bfe8d5994e8d6317d716825fca3b442b3d468675640ae51d82da69
SHA512988ad75222b0b4bd89b28dca7d086ac6418607de934f63ad024d1c59b02fa260dce1dd9d99bf9143ea8453b5fe68a5bd479cfaf5dab605236871b51e6b0c270a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549480909bc5b49386cb19872d4952faf
SHA161ed59fa2ddd3895538d2a814c5db4cb8fb23aea
SHA2562e0676858e26a53210c438bfc5b91a1cd7f63168eaf7411ae6e9c9ee87de9542
SHA512c281b23643f3f5da24b9eb049d3ab74ccd4b9556baeaa95358da30e6d3d6c065d304b6a1a0b6e9e6d818fbf661dff8a2c520b5a5f29feae08a9dfcc65e4de96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad74baf7a7f2921bce0a0df69386884
SHA17f1242721d94c269a0125fc542c770559db60c09
SHA2568bef1e783edd62edd552cedee98bdfe3164172f2b75c9cacd2c212450a5768ed
SHA512145409ed2f638c26fa577f8b6f46d2aa2f519709467c957d314b3594445406eae5eefc63c7e5f14ea55edc9f57d01d5f97fffa53f53b7a707e691f79f5dccbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578a54b02e3dc668b8350b7d19f9fd180
SHA1b5d19719a912e5d9f2d3c1d5941b6aa62e6601a0
SHA256bb56cf5950815591509f04fbb4cbd50ec8b7d42bd67038c4f803ec895c32f5e5
SHA51267eafeeca6f3b805f2008b14c3c08a7a5c652f74f3e4988494ad41b7ed1d035bce16266272b5cdb9226f6c1f6de32e7ba60cea85b13eda3e8b561cf98b06a089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381cf10f7beec236db5fd8aa4d361ad5
SHA18c30f0c71deb1b1117bcdf83d2e263fc60b21885
SHA256be6fceb3b72215abd22884b0b4da7c16a7e0209ba4d4362db42bdce97df03cc8
SHA5122dabaab096184408d59c2913e130c289030e765c7180208bbd9df2d17099fe6bf0d2c894297b12c4177b8028571f3ce0ed0931b8bb3c850e002350d4e6a531f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fcdf7c5b995b5f222f812fe60a5c7a42
SHA10d3b0cc78860c18f863c14bd00083312581068b5
SHA25694b1eb56b8e2e65e989d03a1ec10fb902f6ca657ef3b5dc278053c2f64c97598
SHA51261b6395dd5e1b13ec4029e0a2cd8d9eb7169697df501c63c24a3b8093d4ef6164b1d67e4a08e384ff89ef5e7152478244311013b70757c2febbd7e6e817a7316
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a