Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
8eb6219b03fc45c9e1a01c27c5bc9a55_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8eb6219b03fc45c9e1a01c27c5bc9a55_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8eb6219b03fc45c9e1a01c27c5bc9a55_JaffaCakes118.html
-
Size
345KB
-
MD5
8eb6219b03fc45c9e1a01c27c5bc9a55
-
SHA1
aebdeb14ec92c23c58fb90a59de1c4bd463d7d89
-
SHA256
1c1fe1c6a8bdc006cc0fd45f7e95f94d4ce2ac12c874f3e704bec753b2aca82f
-
SHA512
10454f266b71df9804305437d82c6f1f874694f95b9b0f03f8957621326b0dbe05913073402189f8882868678a6bfe32d9bbd2c9881e2fc5d6b1ceb9f3b11d61
-
SSDEEP
6144:SXsMYod+X3oI+YJsMYod+X3oI+YWsMYod+X3oI+YQ:w5d+X3z5d+X3u5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000088dbd46966a0f945bd0878542991511600000000020000000000106600000001000020000000cb291c78b605e38fa6eb33bbc235d1e2549047078789292f93a989bf2c9c58c1000000000e80000000020000200000002e355b9c12f67149b1ec02e2ad988a3448f5450499fc64b44e524d855ee0141120000000bbcce8566cf0d5c70b1b280e97cd891c1a44a7892c649ca881dc316d159706de4000000071701891311fd91c6dac4ed62d73f6e188b797a6a76e89236d406e5289332fb6ab5ec910aba6af685cc446fb0d123e2834c9b08bfca515b18f451aa0b4ed683e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107567eb09b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16D037F1-20FD-11EF-A41C-62A1B34EBED1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423507553" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2052 2204 iexplore.exe 28 PID 2204 wrote to memory of 2052 2204 iexplore.exe 28 PID 2204 wrote to memory of 2052 2204 iexplore.exe 28 PID 2204 wrote to memory of 2052 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8eb6219b03fc45c9e1a01c27c5bc9a55_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a814f5677593228f67cb198135e0ea
SHA1951478c07bb099de9e57b2ba35cd8492d6e4f587
SHA256c06a2ba7a681c9ba0e115bd5a442ca6b3f36b8d596c8ff7b12e3d2960329c91f
SHA512a3d7cfd6d950224ea4c09bc1ac35bcaf20065b935fb606e0a07c9bba74980dbb61e16e78e4ce08f99ee8659fc94872e8853cf724eab03c5a54c90faa59af32c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507095d7ff280b78541bd63e0c22e72a5
SHA13846871678aa7079cb1b9aa1c4dc40b2f1d3889b
SHA256b3aefbe6ce507df17b0e729373104a24e3b1cf925349de2b8d23be26dc2e0f08
SHA51216b22bf40af540a8027e6fb069b0b9cad9d98f9a02c5ce068dd365defd0e203378ff955c3c080054cc094066e20c2b2e913686de4c39f27a7e71b76a266f4ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561a38b5eccd572d981bf4013667124b
SHA1efacd3258d8bcd8a52784804eb32ed6dce6458af
SHA256beab241a6dff65c7631ae3c3f47d67be56a4efac56446cf8ecfada135782ca4d
SHA5129d8fb40628f988a343e81ec115ab43a90fd8e77f4e231ebbf58bbb5d2a430632c8d8082fc59881818968d8621ddffdae3560b9bbbbf5f5fe185e0f2e8617180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2001df4ec387491a9de6fed0ebf4666
SHA178bf3a2b861925887d811d0315253bec5c755e86
SHA256c14c8ec0415e947744d0599d92bdc1df2067fc4495544483ce15f1d21696e770
SHA512b81fcddc4fc5a521a2d6611b0d2c16b66cc68a6f17952fafeb5f5632cb5adce5313bca74b3df9d48af3acbb810418ad052d42c65598881215025f9cab3e8c200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a02ea3e601846da511405910e337963
SHA13823aa38efae816ecbdf56c5eb2873bf6f6641c6
SHA25642e1837226d33106799cd1a6319128fea1767782e306b8b420ee449c0e7252b1
SHA512a782d45559c533e141fe6c51d1a51beff5bd049d32299fcc8ecf3a7f8c92f1fca3ac83aa2b73a07322843a9b00062d6245fc9880f75a6baf61890db7a200dcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51499453ffd7340a37c42ef9dfdad72a6
SHA1a3baaac2f2358fc37f36335cea036c9d24f0bdc4
SHA256b700e93d45443a2c5b25cb46a765974c47d5e52490b41633e56247fdace833f5
SHA512d4fba21452acdb27517c6f1b0b460638a1f500a213e0a975ed825a8d109412d34c40b53f87731fd4627a5449667f5c836cec63d2740ce1a75e6befaad350f6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43ba5b46a7288832659fc2bcbc1e401
SHA1204ecc9a742102573994763a7409d1e56eee31d8
SHA256956303d68b207b59941399946f65bbbcfcf114bc54e0c9275ef5d5f9bcca678b
SHA512241ab694bf449ac286462b503a3f8662d579503a35a64a741c416501e47f2f02a88533ca1bd32e6666767f9ef675aee94843ee2ee2c64ff00464a5708ee45f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135233a831dcf6da6dd80e204fce27a5
SHA102a1b4bb18ac6290f6b4bcdf08d87543164aa263
SHA256c68fa9fcabf5185b02c64161096f26a4ff0d5fbe656d0b0f062b5cfe835ecc59
SHA512ba6a4793453cb74e408604d43a9eeb99cb5d0cff164de370bd5ebe86e12af95033f4edf7f22058a4d9c9bb906a4ad313e2e76698cc2d9def408ab0ac3dc717bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a8e3299e1e057fe0e7426ee14d723d
SHA1385e7d1a9b68a91349e006c55b1cc6fe825c3c85
SHA256da73034a3218c2a655ccdaba413aa4e3f570d660aad2c0a735ea28bba6481705
SHA51274ef73a80f44d910e2f09008c730fd89c0f7956919f8e1ced32fa65835d28e95e4b4307cb98d0a81ff1ddde26d7fc7d000d33ea30b752234deca37f257be7e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ce85aec32354f74d6e72fa4ee70902
SHA1b72da17e9a442bdcc8b03aedc26c970d140f01e0
SHA256da5e9d8d907113a8d39b94df7469b16f8693e35f1dcc09bcf911e5790c5db58b
SHA5129fdbd06cf91f2a10c4710b1bed3e8273b684c61b426fe3b12513b975b86e1e10b0b5791b45d1266f5f4e5427e3a77ceee4af31fb748a6edd0a09b498c0251dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54420992e1aa4a782905e47b2874c45dc
SHA177ff1a1453f656d61dbe77173569dc32dff07d74
SHA25670c0e74310321d962f9a8cca0b1323b42dc5bad7e8fbfe09f6e84001f934d322
SHA51288417cb46d9c1829762f72b0da45b5ce9d12e74ca203983615b39c6f53056e8c13e88f84d4472ebe99d0d26d106a517ecf2ff079da0811df330e85fc66564771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eafe27e0d3ced083b7a97c0acc5fd6d
SHA1a5b721ea53438fe3ca71e878381bafc1ff862936
SHA2566a8bc7be180ca84132f2c9db4131b60ef8c6ec6f17daf9879445ea8088cddff4
SHA51251432daa938f22d5a332a43c4191eb5cfc07d3721f32a571716f281e35d571916aa5c5782c3e6ff30b67d2f7f2d6ffc5f989f0838fe0baf7a52329aec2db8b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd74ad9da837b9baeaaf0dd31af8dd02
SHA1564fb17fe724b48074352a935f3a57bc931e3b32
SHA2567cf4c1fe0521f82daad6d882f877c888184e23fe84779f5f18e01331ce5c724f
SHA512c8e898376c0246aa825d21f1c24649203f071f549bf656b6ba6c0d19bda2327974bb2a1ac89444328d825674a4e58593fc2aa5b89c92273c9f200e0e069fac51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e692ec7d920257c4841e2a14cd9586
SHA12ef57e4009fb45a254e5d1ddfd8fcab52f143a01
SHA2565a612fb332d7c022d3b7278ccc69239e92818ed66657bf0aa913eb6d74e83c2c
SHA5120ace3cdc8c9500b7327639104cfd185833cc2da2abcc9d5aaf46b5aaf68a426e6d6e5f83538af72c949cbc62f24cc16b177e586d1c2ff83c614e7e347ce745b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52691d8ba7ac41c9fb58dbe62bd7be6ca
SHA125ef78b3b8557be6c4693dd94484d1afd3124e87
SHA256711af5d069287d4eaa6f636fddd81e106b64ba5e469ecf4dced21bf7905b83e3
SHA5120def758f6c3bb0fb30246743f044e7d5bc1b6ae55e4db53d11e83dd8d2405e3d7d633c900b61470589754c0c774e1f8a139eef13ebff8024789e1a06a594d826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737bb35105ac094414b721cbba7eb6bf
SHA1a101b5fd409a7a95f195bc5f6942e51becfa1a2b
SHA25603f436fee554a38f503a47eba05d2d642ece79e6e25615337ed58c96f2259de5
SHA512ef517982f806749232a830c133ba29480623b8118ffa11eecd4f31ce8ac533efb5d87588af47a49d216a1879ec0d7edc1ab255f1d63abb50583851e72fecbe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b762552ea53c53fbb3824b67eab1d58f
SHA1a78db74d257e1e1cfe4983f0437d0770d3671368
SHA256f60e73a27c35cca41ae79b00a0c320a5ffe57e29a1e3292180950cbbf3c05390
SHA512ab7be33e05111f2722b64fbd54e0513cfd7f840b0eebeedc2704b17edf9ff1fe34d0548dda43eed5bac87ba54af16521052cb07dda4b12c663f6f5f2368a05bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e964ddc262c105dd711aabfbe141a0
SHA117f299613cf91ac4a9d6711ca23eb36f5af8825e
SHA25638c356c62fee3a189ac0989d13cfbed3446f4efde895d8bbe7c9e56b71687dba
SHA51240e1fda0a554e55bb12f5837e8dd420bd8d704c30eadd938aa5781e4cda8ce86570bdbf176fca2f8c96a99e200b0e9904d3d5057722db8ea6149a3030dac5b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d555f815796b91f98708f201aafe3c4
SHA1cd095c8cf86c8cb92ddf99c4884a6ee1e12b573f
SHA2568e9df72a9d598d8f55a9e850f87ca8c4edf6374d038fdbb027e908e7700844f1
SHA5125cf8a32a10de74b46b3170fb9f9c255237b2c20fb2fbe3bb45d4933735a0494fbafac05c24f73901913aa92a59c14688ef18058a97224c2c10b7f0ad3f768c2c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b