Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
8eecdc1ca3eec45648c7be7c4d7767c2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8eecdc1ca3eec45648c7be7c4d7767c2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8eecdc1ca3eec45648c7be7c4d7767c2_JaffaCakes118.html
-
Size
461KB
-
MD5
8eecdc1ca3eec45648c7be7c4d7767c2
-
SHA1
321d3a91e4a72c01b69386335475f8d5dc2b3669
-
SHA256
4eaeac54d69b788d02c9a176fd36985cc677d86d922eb40bfc79dcb6cf2bc67a
-
SHA512
f9b9c903cd67e9b66cd704dffa96a5372aa382df0f201faa50c5c3362b75abd6da1b3dcfe14df0906f8815dcaba935f702b59f8afd34c3b6c60d4031d460f841
-
SSDEEP
6144:SGsMYod+X3oI+YssMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3s5d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003af3770fafa023548f3f0153d4dd1759800590823058fc40e8a936bfe99de4a1000000000e80000000020000200000009d4cdcc9e826c44966d37407fdfc57c7d007e4fafe8928dadbbb183e3a13da482000000089297f41a588666e22c75b6b7c2729eccaf9314550a581c1df28724336227c4f400000005d181d67855ab3ade7f2be2644ef3579a368e51ee14176385e21a338af42e5d857e4a81ca265bbc31e70d4453254b8a6db5df46ea02582a6a702946834b7ebc9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4558BB41-2109-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423512785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0055e01d16b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2604 1724 iexplore.exe 28 PID 1724 wrote to memory of 2604 1724 iexplore.exe 28 PID 1724 wrote to memory of 2604 1724 iexplore.exe 28 PID 1724 wrote to memory of 2604 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8eecdc1ca3eec45648c7be7c4d7767c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6836a85acac648cfe99a8d1cda45cc
SHA19559991bf47981d3afcfd5e3e2e7c05413c20606
SHA256d89fe78dd3d39b548518fadff4c8439fa88450e29bf51819682e3f2a6004cc53
SHA512d357b98015998c681c129e8b7048a7cc43c7cb7d0332e8c1762c49cca8f6c1319f0cba6f54a9fccccffc469314e91b54236fe1f68220566ad685f11f32208cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb21a204ab35041553df4965d9cc5b77
SHA17719ace0c0fe9280586c5b13f0548e3beff788a1
SHA256e2a04b808a28c78fa21426d3595b59a72401627266a3014e24851543187ed75f
SHA512e9ea30c59051795654608a96600c8ba0741060c84721a0be3c8f0e8425925eb5c877ad77335e101ea943a7ee9e451d674ea45e76ebaab616316579681f092d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d87734cd26a080c8b820b602e0ad74
SHA1cd6c7130bbb6278a3640f3e8d0baeb0e218c3ea3
SHA256562c5c581a6e9b4565c9257eafdb5675f926a7b9667dfcf02617da17ae14da86
SHA5123593d8a44beb7455cbc372334ec4acd237c5a65c17d3ef802f3891e3244b3ccf734843b2f6b888025edd083a549f586135f0772808560e8208cfce294249d862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5d64dc1d87a74fcd2219937ca18a01
SHA1a53ebf7f190f50684b72255816e825d5dad05e96
SHA256f3f1c04c668b8cfe3fbf7cf0aed1c9cd87464de7bef6bdc94f99676b05690706
SHA5125b1f96c9bcb76bb6bff685f4c1fef8b3eefbed8879dab37524198a7e1a8e98c8e2d5cb7f1a22b4cb12c190187edd31f2553a32f096448d24cc93ef961e95841c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3d520df04860c4e3309f995f17c833
SHA10a5d4f7d9202f7b8c28a953b2678678959aa27d5
SHA256702eb9f4f8311a21b2f8a73aabd3d10763cd31b91347d14f0ea4a69ced660918
SHA5127c212d7fa902b4d58c5b718cdd21903a18f76973f47d3124b8a9976600c66449f1c56bbb05095d8c0506b3834666b280d1a7c947a31baae5970fba4e784c66cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a1fdf3e04c9f95d55ededf6b812f88
SHA1caf7142fb6b6a58af620d573bfe5b9e431824809
SHA2563dbdbde0423724ce5100db7199f67f429102426ca3d68a77469ac3672dc80a7a
SHA512502b9b848edab93b533cc281f3dfd26f49301499445d94a43622919c0a6742c5fe23b6f97de241379d350e938dc16612838870280b0353c21328bb2f1e373967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f295f4b632381e5d0c07736a4b2cd9
SHA11a92703ede5f7f5744456592d6ec66397efd60ec
SHA25608272298d4fcb1da291c141850bad649c465cc22eadc5e6ad4523f3a3ed411ff
SHA5121b67010ab3d3cc2ad63a8955e5d175119eba40ad3f8f70d64bdad5e5c4678d4d94fcf0fd46f7c144c0a0ee565fe1af953f1dca72585de8dbbb6c3457da525346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114bd563c724ec938ff19af461d2b858
SHA1b0293a5ae58a5e88f6cfdb08e056dd3c24fcff20
SHA25685cd61373fca40fa45cf2b351c02c6f1173126d2fda9a9b2aca81aedc2b6c93b
SHA512936a4b5401bddb8a62c2ba10ad36bfda8a23439e2418e474280a4d88c30f505674fe5e62a55dc3605aee5eba52d9f5a6df08670f04b18cb9c2fe5d27066224cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b51461c6ccf13f8166061cc4de0e0c9
SHA1c383520f725d2388609f5665c1d1ab8d7fcb85e0
SHA256cdfe8dc80451a09e3ed88e38cc890bbbef18aa9b0cff6840949b14d8fcd8dbcc
SHA51203a8e9000689a4e7b5f57fb500389a9a73101d777b527ed7f96475ebd731fafe0fdbee1ff1079e9e01983853f5598a95ef6da88cadabe96be2e72fba5e2eb366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534579a5e6a3c2953a2ced8415eee4f88
SHA18afce7e19024b566b187d546fe4808ed34aa3d3a
SHA2567434dec68b2b06616a51eeef208e9872a1b9db193b6a85f02c3ef4f94a3f2f07
SHA512ec3bd78672623ffd58521795ba425cf55c7002ade54b574aef26a46e0bc5c3d1351f67ab1c83e60f7292f7c0533aa7c740c7ccc5f34847cd94605b96aa205436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e37d096cb4ef8d685d1ed58399e331a
SHA181a5fc92b86349a669b7e0f0c2f677a9a30bdd97
SHA25615d5ce812d95d6e908b186563d5fbb50d282d62266b099964241921c1565623b
SHA51275157ed128185742da61114dbeb6b21cf59de263dd16d6e208142b6ce857b38ab17ae987958e2e2530c557e8dba44234cc7b44d76218c1f487ac33233f49ef49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c83884d88d6cff5245c16e41a91715
SHA13eafd8991daa0bc7eb11efcf408e4b6d9856e435
SHA256244e9835f0abe3064ba7f3093da820052e252a0a7e3582b17f6521c57c6c7a9e
SHA512d25e06af63df7d4fb865a54f8a8e2522f09ce3d48282148565be28072ae2011931ff4a0c26351fbf2b6c049b999c966860174d6e38d246fafde61fe56b6d73bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d8085e65cea070b1aaa5a627814d05
SHA11330df17b66fdfcb19a664ffe67ec5b0fafaf818
SHA256bfc9aa22c589bb1176d4c033d4e5d9e7abbb3b78f393c0f4f3786be85a03ff09
SHA5126df036a1f95c75231f595e260aba81838641f9013562c404aa584b659636aa2aa39d3bf827a6b079ffeb5f8d2496a1a397332bbf70169fec2253fe5925646acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543710bb54537555675ab82b57bfaae14
SHA1908a80f5cc6fd7012624360e9eadcc5ea0ef8494
SHA2561f366e6584e0a2367962c6d784d5840a84fbe4fd06a46446dcbdb1a0d8b0c831
SHA51215ad7d76a85ab389b2583d1fabe585aae5285b1286d2ed2d150237d6d8b8eb2e84d51f58e86b56a27033056719f1d00fb595251e582260288b3bcfc630c64d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dba4d8de437b5efe909b9a3515f9e8a
SHA1a24689f4341bbd927482a638d5b47b9cc494cb39
SHA256896f2e899c5d5a848be1b011fbe92de29b272b570d0959f4ed641ab9fde0f401
SHA5125a36acb9ba1f1fce5657b346c54572e797836725011089b679b182482a796d7e7361556a33adb3e0eff0fbf94476b7dc8eccf3d501149fdc4d9d38d8158c7e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe2e77798d3151eb6bbc56b33856996
SHA109a24b45cf29775cd7c630eae230e991067daf43
SHA25657a222ac028f9e1ff8be22e931c66ae0d1e3ba68dfc26e88cca985aaae76e8e8
SHA512e0faae210692a5879d542f13c5f3b9208ec812432937d16bfcd5e48a26fcae455ad9bc2523d373cf80c83c5025bf6f151599931a56ea0b12ae6542254abc576d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51622ed66df26647bacdc20f570fa52f6
SHA1afc4bd56fed20ea24d40fdb38901076e16b7bd4a
SHA256bac5b7aa91c83f040f954b269ecef6e1467e59ff40b3d1e2c7819a0f1dde4685
SHA512df7d756654d10e6ae6e79b4afb6f2bc861ef533ee1e08bf4c067f9e9e9e297fd52c401e179944918822d49e1bcfcb8493a7d0cbbbc229de6e345319472461c96
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b