Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
7c377e1f818a02219846118d382e3c6e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c377e1f818a02219846118d382e3c6e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c377e1f818a02219846118d382e3c6e_JaffaCakes118.html
-
Size
164KB
-
MD5
7c377e1f818a02219846118d382e3c6e
-
SHA1
022222b43be374e3a4f6fa01ac4c90704fe91213
-
SHA256
eb56e89d314b7ea5031f7db9418c0ec57eb6e2cfc33768f6dab751a24b60b291
-
SHA512
47f852997df12516ba24d7dd14a01085f407483cf00ada79383dd6ea10a94449da84035245eb839feed461013c6e0fa02760f8b44e81e8fc3a2d0b88dddbc50a
-
SSDEEP
3072:hpk4TokcGyg/7tI8iMWbYISZ97nm6GOQwvnm6fQtYQFTNDRaJsw2:O56QaQFhD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BD48AF1-1CC6-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423044188" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70bfcc11d3b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000101b12168e81374ba622b759aa52a93c000000000200000000001066000000010000200000002c3b9356cbdf8cab8eaf96ed0ced0a35416753f1b8d389d568397dbd46f2764d000000000e8000000002000020000000ae4049141c88525675d8a5b87dd888c891ba409bfca37d067f38411f433f5e812000000031422e4c29d7a8c697a1c7a67d706f2093436ef57798b98a742b24919e4e3dd9400000005162c11d2caa6141689d8f77de8f65908ff5baa09713a4d248d49a9b456e70b3bb86e17c39af887c2a0389534b5a8352fae2467012b81a46f858b125b6b8d4fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c377e1f818a02219846118d382e3c6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4265749db45e2543454e068b41ae55f
SHA1ba880a69a1a7d9d7d3ca0d3cb81f5c39cce801c4
SHA2561f61936477afc6bc975c24055d0831bef9690bd3d04bc2420667d60bee437101
SHA51263d59e7b9227240cbb7718561af578e8e1af4082adea3b9479990beb120ba34c21482d664725cc0e43119a699259eb801048e522c6fcd24e6f7392129211a183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c045140d64b33e8c7cb3bf9eb382c3
SHA1f68044aaba4dd5dd1a8e03833f303e3cd46c1cf0
SHA2563bf012b6cd9dd88a717a1c52f20d5a82ac3b7b61bf121ef5f5b41685377c4f07
SHA512b756b6db9f4b09e48bbc95ec0b4202cf7107f0e64173e81a4e4496a16e2eb7dabe88b3036eb03529e0e4cbaf2a83ed50bbd8f1ef76f7cc93d3b099c1c84d44be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577198c14456577839e0daa54cf8ea49a
SHA132ab67b7a9574461edc113de403e0c3b0634615b
SHA25684ccb263ea8dd4d2fd11bac42b67a583b61dbe5b3f2750d9b8be85cc96ad12a6
SHA512ef134f6bf84d6368e57f5dae6fa9f8df868172eaa5e2f98df71e53218120078479fac50b33e34768a4466007483aebd5c74faacb2cf5da933729200d077918f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5684aec0e8561e2bb32a1d97441a6f175
SHA14bad1ce3c8596ccf8957981e3cee25eee1de9dbd
SHA2566687e6641d85fa217fca3f75a1155764eb70cdc0686ba2dfcda77005e09bb207
SHA5127002bac915de9133f484588963c129607484abf2886dcfa5575bdbd66cf409e83c918dc42ad6061e703f812e81f89d1e6c593444972a9c6fb6e8d04d60f850e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eeb4c27463d44c25fac8c117b1a407b
SHA10ddf98b4ddee7e8e9c60f357d91f1c9eee670f7b
SHA2564684c22713346837ebfb449c63c0d4e6cd965d427b1396771d49e0a33ec19997
SHA5126030123d97b1aed8054fb5e5ed458b3563f85ba3faabdaecc7bae0cbc86e4edc57a08857ecc278423166c2703edf58b0b9ed81b02a6627a398fa335079f11a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5235112df22e0d16a2e3d0c0308316
SHA18e25b06af070e4ee8c20c82c0ba8574120f31bc3
SHA25621a4f7216150f35859d465b4e777398c5ddf3759ae08def77aac13eb33131216
SHA512b6346a59772a5e3268dfb4a1c8e800537200d22b311fed29c9e96a3f82467ec470db37bcf3a19ad013e2f3dac7f2d3a5d9fc6b5b809342401aff50accfdd1ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520c65a1b063d72d97659979229e58b79
SHA1f5faadab022dc9d74b383a10e5c163d393ab8bfb
SHA256764bbc78bacf04f832b24903565e367c4ce9b6a33687361b24e02de6fdaac8f3
SHA512bd4baa6574d8bf9cc2d50a6af4714659f6fdf1174d36d1f3368675f8a872696a4e5304483ce8aae671b9d7e4ff8ffffde2ce94bf5c39eb12cd2a8c41229b6bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cc549f410f40d5a984e6b64f958a46f
SHA1fe85570581c13690c65a04fa31d9de69e9926cae
SHA256e05469130a08737308af5e15c61a608099fde8dc6cad1904c30c8a90c33324de
SHA512c0c44e3b8f311a4088a02301bb8960388dc60d5dc20b6c954e8ba0ee3dc90db7df5ff00763b42bb8b5ee6556228c7bd57942bfc6dc09fac2a7e2d0f271ae7794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1a2f8928539a040a6576ae00a29902
SHA1a5d1be1a3ad26cefce04b00ab502eca2f928031e
SHA256d9a0d97d8305f95c8e9b93ca53fc4097adbc34ef712219855e37d9fd3415e345
SHA5122ddf18052fd3d9ffc790b76856d1bfdea703ff2843baaa391bb69dca314ea8d862637db1630806bb578930bae61cf8a72905955b2272fd98fefb664b38dd4bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d99c11bbe119189e6b42def0e343b67
SHA1ee444944b75daa3c906a595c9f256e2f73011117
SHA25675643efa885ea433e9738b5cbfad497faed4286875a8670b0aab032e6e4c767d
SHA512de4433a9424e4ffeb9f68c4e418d61ff1e6e67483ab5d91115e0ad53bcb88358525b5fad25406a4dffd2c41271584630adbca49ca86348321582ca89f1325a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548e3823756ffd60a8ee5c4c6ad87162
SHA1fedf056a61419bb3569b614039504de2f014b807
SHA25607c1295b8a184a336cdcab79a321e6c0dafe1a510799fe293c238821e23d5bd4
SHA5125b2e78f85fe3ff1435d4a022883e556eda7c0ebbed68982f7da9194a278f3892686c78bf18ff11c6b5eca7343c26f4ef36da374e6318c000302e9dc1233d7986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599dfdc6682c3e2c60c161a129ff3c34b
SHA13ec26cb1bd32073d0702b72f9fa652d63d2d321b
SHA256daf17df8a6825641da1ffce91e83117d83f875af77d59a34e2a142a153eb1188
SHA512ef371633056cd9c27b6a849ccc064c3ff632c2ae94d69ea4eb42fd9a9746fd6d7e93c51fb889e999c38457384a91aaf3d20ebcb86beafa832d5bf38e42e292ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5107a9dd9484f117f9c8fc2c6f2a33670
SHA19e5dc1669bb8b46732e3d6b01cad693ca57821bb
SHA25634e613886ec86c8ccc1dba5414c0baca9c5e34682a39f5d4e89ebbb1689093bc
SHA5128ab320b30044b07bf1113e4a3ecc6efdacaf3cb8aa7711ca748ddd4d89e0b70e9c0fe75e8dc43191bc32ae6a714179afcd2f2bb1b4d13a61e5aa23e0af2e9c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f20d1e1dba1713c0cf8045b3b6df68f
SHA103c6fd01e0f8901edc61306806fb82751afe1be9
SHA256c91831ae52ba4b60662f3be5bdb5de4a7ef7d752c2f79b9984ed78e463cd8573
SHA5126ad9495e78011557f2c90131a867e3dfcf0b2a074992adaa0a8bd6d58a8cc4bfdf92f984c8ee6796635c567ee401bb8222c7165f90e99f01a9a623059de3170d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc96e9b4be7e2ef41fd2fc3692a12f6
SHA168711a892d31eeb34e97aaf375cd9ca45e3775ab
SHA256f42e5cebbcbef029bf63968c03a0a322f01dbc3acd7fa1dcab66b59bfe6e1558
SHA512d015c59d21f46d8a89f3db49e6bda9b7185928aef5b56dde6b7088e370faad74f474e3d7380fe107079bc0d24bde7c62298d7f6302543fd39b4f7c47af5bfb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56551cf603dc1e1a6c3bd04952adcca5f
SHA1024aebcf373dc5ebbf674b7894140b1bcc83a7d7
SHA256c18b9e606896ef7ed4f050c8ab6b7e1d1868f82329ab543d5326d5d37a6e0145
SHA512429906dd3359aeb706083a3057c9069e3ff0822508b6b7e3730342f231c933ec2774a083c11f5e88b4af42a74d5403ec05ed411f0f2732d2785b728ef2e63e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d9e71d230ab4fa58e2d5daefbe5157
SHA102e6e716567a41a9f829c119dc0a0f7c2f8498e5
SHA256c466e15e1fe1b84404c28776a7fe478dee450559e853ffc6dc6098f567a6a680
SHA512acc80681487db5e18ca98f7a4efbfbc90a6b6e957d390c1c7e51f9c30765a674f4c27f13ec09bdca60fcbc7c1f97e29556d4e8ed09ba1fd6401142c88f2f7881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070bcb986d5028e38c39bc18979793ed
SHA1c9ed0f4e4d8a0b8b41bda6fa543f76c96dc98c32
SHA256101c8c49a8321e55940034916011c08ab7158e17ec91b77354089638d50681fa
SHA512984f82b265c1c64d4ab1c22dc30ed18988a6c152d38ec862f14a6c815ae9f56c34a2699fc31a52f3d53dd192eb5cb7e595debc271e4d6f014f4a93bf18fbf04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a82c8a5bd0707c9f781636347aa6386
SHA12e686c3a24f967a095f6e92e001c5408d03498ce
SHA25617ef66cd31293076fc70aaef470eb7b70c487e3ba979cdfd7ca750ba35edeaca
SHA51259f5fc40f4fc5fbadc61979ff18da53a80060fab78dea525907900e045b08f40305f3290d8aecd7d61240c055401d53e9e15fe8cff0b74acb2bbb35c26fa2edb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a