Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
8edbbab979058adf7c0cc9a634b05c60_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8edbbab979058adf7c0cc9a634b05c60_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8edbbab979058adf7c0cc9a634b05c60_JaffaCakes118.html
-
Size
2KB
-
MD5
8edbbab979058adf7c0cc9a634b05c60
-
SHA1
856a20c813a9b3e325be941cf91989c5f01d5863
-
SHA256
2389f2ca23026542279d555a7f61ba3322c03e2518545f6dfe880a85b2e7408d
-
SHA512
64e54649ef57b5bb3a96a53475df1da779f7b7caf292f883478aef20f6f77b531533472d058041ad7675568ea29d1c39b30fe3bb1092b65d09173714a6906cef
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{821E1F61-2105-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801ac05612b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fcd21c6234274094c53eacca6e9d1700000000020000000000106600000001000020000000d078ce1e19f1ce39945180a3a7ed1c6537cc9ddcff077defcdd0fdca2d25e47f000000000e8000000002000020000000fe611d553f9fb9da3ac54472894f3bf81241ca29c7ac92b95ec605d49193c93f20000000e2d40eae6ae4d679a3de59cc33cc0d941383cac3e7c83482a30090f76c4f3f984000000069351c91fd54b16c364f52903480fbe30b88a7c6acb6918f30ec34f0b6fbb59e8c4b08ba1b31d283b797791690b6a85ace848280b1a4edde864279a73c101eb6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423511169" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8edbbab979058adf7c0cc9a634b05c60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532398b8554b41586aeb85f53247dcfdc
SHA1ab9ae1bf546699430dc8715fdbf5bb84a08822f0
SHA256f7f9101f5c18da24a7232ead1e7699a13b6bfc2a251bc3689e40f8298b01ea54
SHA512ebf0a674fc30fdeb4c84d5fd566d3900f5a4d3013eea95e98eacde3ff2c5d98874067239c224e1e23ee08c4298da65b5aa73c93d33345ef1b37d195b7bb7937b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8b50e501c062b6bf051ae2b18f48552
SHA1871092c91389dceeca958ddc92b6ca7f9c4a33a5
SHA256484b88d2172cfcc45eb0eb6020ed0fbcd50534abbd97216c62b96294750bd542
SHA512893602bb3b34f569473a959d60df51ae6bc8311fedce17439202ec5dbb7110d20407eb4adca0dae26247bc5a1cf5d5474c4c6e8f9a7beafe795b5e73cc36badc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca206fe5344f727fa7864e610e707e0
SHA18878070b88ce13962c81368da552aeea88c569b8
SHA25634c5c9cd6abfc048128c81a23c93c4767ddbf65d3594cdeca9a625b72850b024
SHA5128fbea69ba44c0f2b5ef4dad05dcb655a933d756507964e397ffe9b91fdaa10ecd0e5b4fd444184f5e83dbbac7fadf325bc7804c43c7897c6e25f88dcc5d5004f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e1a514f6ce7e8d97bd1232111b4cbe
SHA1fcd788a822b45da19a0a3564d29c1a27e68853ee
SHA256de83d9a4b89bfeb067748637b9217be5465c35895773cf4627390eb5b96e8151
SHA5123573eabaa811074af95ab8eaefcaf0ae123d9669af7f2a88ebe9955c152bb4ae6e207c3d0ba6ed42c456129f2fff42e77b9fbee57cd2f56d0f2272d04aa764ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c0d12fd6ae7a7fc3bb233142d6b5a0
SHA1a20f9e19a2942f39bd4bfaa70d62ba00875c4efc
SHA25623fe820461052b1ebc16a740e5ac58bcf5ca395693ec19894ddd8512953be347
SHA512f03c2c39e8fefa4b85a9470a94f2c119db55b912479cbdd6d39d1e82ce1c5b7b169d458384a305159a321b35fec7240fdc82fae0e56afc288d859556d2788051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae2368bb496aa5b7718ab2e9f07a9bd
SHA19feb36a3cb5e54c513faa33e10f5ba75c885f112
SHA25652e2d4cf7fbb6bd96d74d1c5634830d9f187aab149de15e79c7823e8f996e799
SHA512a08264dea8a31eb25cb3742c706e6eb7c68c214faac4121470dab529a5a1eca7aac1eca8dcdd700fecbe4ad113844a8d1baa497f1d1f1db06ee72337558b9cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d5a7bca0f0f50e5b5594c65e22eb68
SHA1a9555b7f6713edafed3a8ecb204ebf795a46fd39
SHA25688109001beeccc0bd8440fcaca25426aec1ed2486375a44bc2e99bdede53dfc5
SHA512f84c09d2238721920ac26cb61c3747927ed8285eac8bee27e894a95ea102a288ed836418c98b4c32c355c8d18ede5ca7c070ed9c731ac315692ddb0d3d753c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7cfc21a4ed8f2a91f42f1e535888a61
SHA1c697aaa72acbb75c6124809ccd71ea7d0b15b71c
SHA2563cf1c651be31e10d05e34c655c479b4676896f13d7f8ed8bee88932a16f83598
SHA5129ea712ff33b565f517f8a96454c22f7d55b0c9fa653d80a0a7573cacc6e2869e55699d476a1e55b9c540391b3ba5475bb2744e905cef1b00cb7ecca2022795de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de776d0208ecb1e23f41c90ab5b5cc2
SHA1f6920f99486df8ef132a9465eb3a35642e2f420c
SHA2564a0456c858b942d912d741a0b3a3cd9ed425b8f5de0ce15bb1e01926814d8ce2
SHA5121fd4f679c7d185fc39d7226320c71f29a3c7e8dd36328ebd1bc4b26339d56bdfe6f536f7a999519a34caba99c3070c478fa6dfe40f555c33e89d5facea6910b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54602bae4840bc7bb2cdf6b11dba7755e
SHA1a1407bb9684dd8bd1e7cec067177043f73161151
SHA256afaad97c5976899bb349161632380d6a678f80549ce051a8d0bd3bf506e3342f
SHA5124aaff035f58c562d3bd2f0d210623bfc64eb49bf0efa1bc6b078b6eda4b8c16dd444d2574cb4b0a82b796e8cfe95ec4b786f644f96d4bd4ed362e46c5305ba49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb0e6dc3d066b6786153b1fc4b3a80c
SHA1dbaa07a910492620a7a8caf6548760606ee833ac
SHA256482d1a6e8d52bdb62b958f1288969b25c80e56174b69959d16664ed291346646
SHA512371b52bf41d905555b06c498c422ea7c3d9dd618853d71f7e7b3ddd033a3fb6fddbf79448e09125e09a77c49f47ebb0b83d67af3488dfd6624d002b7ae8f5d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b823646ded6bfc7c5aa78d8f7625a2
SHA1206ec648f5db0f4e19c3d4065b70b8498e6789ba
SHA256c40df60972f9a80a443f6ecf15084c109a90f90e4fd2a8ee9c71bc260dfbcb48
SHA5120169fd7d93f61fe095d7a4a39346ceaa0ef0e4f80c00cb86249c12fc0b3bf03ccb210509ee7892597ca0ee87607411c05bc1173144e3d56f92ab6a0475ce5590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc82e0ab393257e66a2cf8dc3e1ce79
SHA1e498667db6520b7ca643388ec2b6ca2bff3e96f9
SHA256b98b11e74a04de5d9bdf5a6879f0778e82ad1fee902e85035925c93f8dfac962
SHA512155782057939ac8f9eda2045b17b97e129a03525f6abf52436f599c50222c747c92981ed45d5586f821f2a225c23a90dbdb275a158f2e6e604fe726078ee73ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f0e373188fe85e3b6f82c983235af4
SHA15c3f57934d7165581664632ac4008b58ebab2759
SHA2565216b63285b732e0999619b98289b6e84d072ddff3bbcf1fc934694d717b9bf2
SHA5120a21522f935da7636905bba9a5205b03c18953af6dee622d4f543a492ff7beb2c27757d462521d7d27c940dd1e9d1bc4be15bedf9bb33d1359de99c21c893095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5636a9d54b6b04d92e768d2524aa0c
SHA1c44741a0a42faf0c1dd8b22a1876202aaec3e5dd
SHA256734d38b6d694191a178bc8c2d7a4e2c7fe776aa00f3735ae838e9b5d38cf23fc
SHA512a7f6cd31e893cdb37bce969d376975fe36b870f0d99c8a12dc165925e5ac52dde3f1c937b99d53240642159999b7ddb130d6704a95d9d43c8f56dc6a73dd68fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f53602959ab0357ff99530d3f3952a8
SHA1b16d74661c76915233b99fc50db2fa27073e198d
SHA2568e4dc8f8bfa14a951e14806874c32a03a2145fb9af8fda389d72cc2455b9df0a
SHA51291a3acd97c54537b3b2dc12a0c74e1072581508c43f7d0e9cf27b9301936216c22f822acab3d3e80aa27055b3cb3e5e3939a6171df67e8a2920601dd7630263f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b671e40a8caaefc7897d35c12822bc
SHA1fc9b053bdc68c42756bec1790d6ffcd83bf0f441
SHA25679324a647c87645b80f5f5b15dfffce945c9e8f961550689fa98307bf66ef2bd
SHA512529a21a7c0e86e52bb8dfad87761ab9b0dc544b2953f68751e47e33d70ed89852626c7d3c81f40b1093782ef7bb45350f12ca69fb2182383a994260d4f6b8a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b825b7a712c7c911c61a4e7c5883eacc
SHA1a84bd3218ecdc91a6b04ac088e6211acde51ca18
SHA2565f5ed2c71c86a2fb7465b2d5478d882f40c9386826f547264cbc0ea35aee7d1c
SHA512b27341ab2f223da4bdf6644f86df62c58032a490f380a070616cd239ae3af30e5ea25a8a0f24e57144b5d6ab57c7ace35e875fcd282be08b90c632d30e29b836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2b2408f9a41c04987a94ec836fbbbc
SHA1cc66ade3bccd6e6cc58b477a16a2775a0a917bf5
SHA2567038825c7be1f724694ea6ee9bcac45dfab36995d5bce22d9a356e871e1724fc
SHA5125e5ba8ea05e4a04da0d9b2b7c6b1938b0e34ed05a1a986c88aa9b7e82d2f15167680e462306a6bf0c23cbf11e6dd0860db54b51dfab0c88a4308bb1955d96b2a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b