Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html
-
Size
17KB
-
MD5
8f63173b925d152c70fff4bbd4bb755d
-
SHA1
191b2b9e6d39512174365e68ba451249607e933b
-
SHA256
adb9d9049dc95b71311cd6b136db6573fa6ce36c714fad4b1ef5e7e2804999a0
-
SHA512
61421a6afd9a1cda32ac47bca2b14b088298763d755434f53f5a0d572630cb59f54dada4a30665734c925f44de3b7f5302b190bf21aefabcf2286dcaf954ef1e
-
SSDEEP
192:Ekd9kF1QixElkEyX6KrzUbpCK2zMgHkQsQ+brUYdTX/dzPpzs3:Ekd9deEe6KrzUbpCK2zMzvbn1zPpzs3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000009a396bbbc1520ee4c8eeadcbc901df3358199f1ba987f13d83f9d754ee318e09000000000e8000000002000020000000893befc61555c602cec6c489a79202ba7af3f63d35ec2ababd77d17e4428c06e20000000f3bd77f17ae2a7415117b445199d224e89c59ecc14cb48885abb30777c9f57d94000000033bbe22e7f0e9aa6b4e2307b5cfca89423eb6dd7d9fd593a04f7a58513dd51ca122c0eb321a58a7a9c5696bb3443efd1479331320979a6e36fa8ac402930cd7f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06f01f02eb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B5E8A41-2122-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423523452" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2152 2944 iexplore.exe 28 PID 2944 wrote to memory of 2152 2944 iexplore.exe 28 PID 2944 wrote to memory of 2152 2944 iexplore.exe 28 PID 2944 wrote to memory of 2152 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f63173b925d152c70fff4bbd4bb755d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539948509c66eac1c708cec88bfe3e8bd
SHA1609f45e33a5c51ebc32dbbe8463bd0872dfafebf
SHA256de980520f3a9168754a1cf6e16c0f515dea7c73eeed482e8b46e6effb690f564
SHA51206868ff37d5374bf7f804b90bb83720a227931d63a564e9980fb95533ced884839f871052a469ca5bb1a8a1131d5cf2acd30dd8a6297129499e5de65843681ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1c8ed2dbec5f0a087ab4df00469d6d
SHA1e0766f033d3d6b4bc00060cbfeece838f637516e
SHA25673dc5055053c3ba1e0addd119f472b494411d55d2fa05136b49691c83866c09a
SHA5127ffac342e6e7fd7c928ca7613ac2bc8a8ccbdfd0a4480686395f9c0f77c2acfd78e98c8bdc38e18cfee3983d34a6350acc50ca375795d9489b031d5e57c20d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb93401f3bf790cd81e29aa677b2450
SHA10e3a9d5cb179b3ed750d7f53e2a10227705c22f5
SHA2560675c057fe3c53c5f1fa0594054b4aaabb0d58c4c00d26303a4d79a2a82a6035
SHA51246e97f7b9dadcb2f2f9cdfce9e4d0929aa3228f935eac27bbce1c41d76b241bd1c9ad588503c6070357a5076c12f4cb0e98705168937f8a14524302035b4b778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a5912090efc6d1a55d9383fb87c106
SHA18d239eac9bf804944bb665453b4953c5149b3008
SHA25606d8dd953999d73615b8d877ab86d321abc20be7c1ffc9232dd71d159081fb9c
SHA512d1e02cc1b65c2fca8c281a9f8a64be3054d8bc1337aa0d72178427247ba231a29a6ed2eefcf67c0c7c472e20c6d184e3f880eccd91cf171af9902955afcf14b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524365f33101d239e3c6716699400add1
SHA108d4662edcad1a8c196d7fd9de20eecd8745b88c
SHA256cf0f8d02a9ac74875c120d1993e8bd8ef04812abfdece466cfdffa626a7dc054
SHA512332da7caf22eac40f35a8fae44fda26fbc3b1c4f06c1bac6a72e428c40ce8e1c1bf1f32c6cb981ae057a7e0313fff178660edcada5291e843a068d2b68d19f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33ded7ca3ff7268f1904f2c2cecc82a
SHA13073cf1b7b0e709dd566f20c445621e564b2da6c
SHA256ef16eca751719708f2b63e2c5577a76296534e962fe224fad5458c4997b5139f
SHA512375f6cd1867766ce8a8c6a3a9995bbd0094641be822625f5be79846ad31bd6859c0ec4670f913bbd31a730f8feee313aacdfbbc67fed57f30feabc2eb15b9b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54428841dbc419afefe85053d8bb67017
SHA11e9631434358de4f06d8bcd6f9250df1bcba4ed9
SHA256a3df5844e12b2843e3b855f27ca00dff58795a83c47ffd48ae50c8551633b98f
SHA512c54e813b976838298b69b9e8e0084ae60d03ec335f1b1502d0dc662519c13a4a506ccd749dfeca7081dc9c1754e5ef4ea0ee5c5c661141ef894f7f680eca545d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff97d72d83f2e0b9d3a210589db85397
SHA1c015c14d9a498c3fe133f4723d6eb174bbe92c11
SHA2568f264692996ff4709672707bf70c8ade83238b50c6ca99618b1d8eb9122c562e
SHA512c7935bf4c48cad716fa7e72a3bad47865ebbb52ad0876421abe97c769518a00d0df441c8922d0edb78aa748f2095d5ac847511d5c2faaf16e55ceae2542b7c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59296b2e42d9b8167c64e4d483a6798e2
SHA193bd442b3993ce8a35d4a475a32175fcdffe2ce5
SHA256f22c1e2bdca197c51020c73a3b362f41f234d479e0f84f34b51589b21765f8e7
SHA512be6816ce559496407b5be5d940047acf75bbb0e4ed60ad6ef749beccfe3c9dfc368758e70fd0f012c082bf2d74a2c4fe1026d3e39026aea2af69e857d5b074df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d54d0737c169de267fdf290b200502
SHA107329d30a565b50e97ec0f0075b746e6d3de6c4e
SHA25697726a312f08274415d18b55aa13277141d54d0ff0248e689a416af934598425
SHA512b2338b0e7ac9d99a9f47a7becd72cc51a7432331f448f9133eb7cc04a34c4513df7ca8b18919add4ba56d907072fe5916c14ea08d105cb8b01be3db771272f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518935aba6867624a0412453f09ae0879
SHA1039d48e0d1c2f3a5206480c71f22704ddf0bec0d
SHA25682598380fb0d5411fa3b83349d905c9dd0b9e76bfb8f6185017abdeaa039b505
SHA51290c085adb1ac112da8c2c3c9e0aa10be913aec2de5270b398f474b8c1944df50c67eba8708f8537b68c1e78b9d4744ad3d5f1af8048e8ea9cbb49a765694a58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb386c9d4fda97f1858c4e2c2c799a63
SHA1c377a755dd6b661b097f9caccbb3f5843d985ddf
SHA256294e6a85b81a50a50c4322fbdbff41de256e44fe8b38cdfb79f35c8f497885b8
SHA512ec4c6a7ee9101a36715df3b74295fa0a6ca9bd7018f4af1dcdd5b3804efac583e6034e24b7a4894c73734c3af6117b0c93b1d137ba9b8696aa91c86b8b8cac18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faac43f2d32513ee3248b91f8474ab2
SHA1ace52ce659e2d24eb233159dbca8427297629776
SHA2569a661aa2c8f02e8f027a690c5786f72c91a558926508c40f55e68799d5d49895
SHA512bd1afbd3d7c0f7f04c1ce2f6915f659ebd5f01b52860d2c1f4fc272350214f4692b80e3e0db3d2f733a01228e013586e64662c3d54da022c2c598c679c9b89ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619425b3708eb4bc677c1fc370f32c62
SHA18bd9ff363e308c463f1ddd0572e1da177261cbd1
SHA256f98e6340f9c8aa716fa45fdb7682a2177978d409120438208db81b541fbfe9db
SHA5123e3692785f3998f8ba82f431c53e1c9943b1218445d6c4b6ffc89984d0887ce7678c8c6bf9fbd9339dfe8cc4566a825fa649ab51fd477b725841dc7e5e4d86bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426baeaee84f44db943cd0187b5a23c8
SHA11645f4d63b4dc1ed2e32a2cf7343a36375f90b3d
SHA2560dbe99d7f71a19d0b54342cd76b8aa732b1e00eed24cb85bd9b2a42407373fff
SHA512bdf25d22447e05b08b222ec65a0ed452481ad1c91d06808b39f76ee7d652e774659595dd5170e004de0263de61b29aa136d2468c7da6c40850b38f65e0adf91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef49b56138ebf6a438ae277d892d3f03
SHA12966789cc88eb4aee4643b9b76c7b1d1aa94227e
SHA2566c882cf6174168d7682783bd0e467e135ac9bbb774a3e75402d4938985846a96
SHA51224cb0ae8c9161c5c2290662262cf77e39aa51e45d8396e7374a10efe1d9db60a9f6fcfb66cdab0791523a857f4b69f82afce4a475a42fcadb6d23dbf9e96acfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5655faf5cecdc6fbb7e9aa6b01f127
SHA105aea3dd2ec314354c6672cd5e86c0ec8173ca80
SHA25670d16f0042977b4441f4d62c6d4d42fdf93c28fa6618b7e77696640398f09e07
SHA512b367971fc72895d8da39633c17acfa4c7f1ec87c43ee33a037881ce126b394c2adcc1c31659b755aeac3ee0a77bc3b80bf4d2799251928868f44656f6178b459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187016345abaedfc9b3285ec878dfaae
SHA1509aecd7f95686b665f6234172b7b54de0423872
SHA256063058a74bc3861dcd5f0a9607d4e3f04e4aef0ad43d755f387d25766d04743f
SHA5127f190fb58fb1292e5ac3fe059d443afac25edb0b07708a285de8a546081e90b22d55cf3c68c615c8d32126ae92eaefb807c468cd79af7d51c41194d5a583f996
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b