Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
95ed58de9e403db9081dfdb39eacfb66_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
95ed58de9e403db9081dfdb39eacfb66_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95ed58de9e403db9081dfdb39eacfb66_JaffaCakes118.html
-
Size
2KB
-
MD5
95ed58de9e403db9081dfdb39eacfb66
-
SHA1
dbff67e41464ab89a48268009d7dd26f765baa94
-
SHA256
de816a2a0e42aef03a6eac1cc399ed0373e6b897b4891995c2e8598c3cad9d0d
-
SHA512
c38e2ef7092dc275b028f6faabdd1ee2cfaa1799ca03f96328b72572ba8b62e68cfafd3dbab173a21b4412ce60878ac5398583e2a9a7760907fea38d27301f60
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{829EE8C1-22A4-11EF-B2FB-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000caf2491777e18bc42d58393463ae07ccb4d93da74a69610fe1b259ea3d9d431b000000000e80000000020000200000001d20141e4f63996dbbe62c92007361a6cd4374a0b1637b2f85c2ff4dd239ce6b20000000f49681d24b79933f3cd58ae96993367759b2c231ce5fe6f1fbb63c23f27191304000000009328fa76bcf1b77601d57ab34ecba1db5096775558a33bd6a62900d19af39355cf98fa953eea491f77f5a9233ab1d3122f11cc999195cb977b136be0eb2c30e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423689411" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003e3f57b1b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1376 iexplore.exe 1376 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2808 1376 iexplore.exe 28 PID 1376 wrote to memory of 2808 1376 iexplore.exe 28 PID 1376 wrote to memory of 2808 1376 iexplore.exe 28 PID 1376 wrote to memory of 2808 1376 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95ed58de9e403db9081dfdb39eacfb66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a735ea94eb24d61c287fd17ba0a0d9
SHA107c17c942b5120bdac4368e4bb7c9ada94a14f69
SHA25621993a0969e3f5ab43b8e1f0ddee4ffb9cd49d1ff313f8880a3ccd84430eff73
SHA5121f56c6a9e614b401292f5b04558e7d582d55c79bf6cc67182b6a25c3a5a2f6c42550f4ba0eae9ebe9b10e6c3ef22dffc2d7c91e7f393c164188e7be944d48b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30189c03ed41ce7100336d8fd717517
SHA1ddf538a5e3b7f3a511c0d7ddb78d617b77a496dc
SHA256b44ba3c646410cf81a24788204402098f7138f0ac204f2e152cf45c8f36f1564
SHA5127e536ac4a0a1c6a6ecd920f5d434de2f6337b9165f80e11d75afd3ae42d2950cc105eb338563b9d504fbbd1531fd03135a2e9292effd253afc355026971ca518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc7b53540cebf816fcebe5348aec02b
SHA17bfa4d51a356cb8b94fec4a6503114dda804810b
SHA2561d57764473f1fdb701a4a08fe1b7bd6e3e9673305b45f38babd0520cd03893f2
SHA5129a3d870e4634d3cb2051e9de727ddca7e4f7dcda2000fcca2e0027b1e782a50fa239d9e2f0f3fcf3480879832659aabc573cf97de4e92fd72dd6e20095e30f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49e5d166bd04c99ad327574df50872d
SHA125f5cbf9025c2c98864b323e6e367faf64f1d34f
SHA2566feaf81b8de0eb78b02d1966d89b921776eebf6b8ba1bc3d536c12f582c0586a
SHA512fe39df8a0ded0c873b75c1290c993d09e54c2bdcd373d21ade96978a218af4c9b1ca95fc74f8b196868697d96723fbf394e4b2ed4c347a4a886590f9f558da13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109ae7eb036e1b8b8f7eac53e8d1a84c
SHA1dc461024be9f050489b1a8203e8c39c2b0a0fa35
SHA256fa94bb6c11be396517fc96c9593a3997638d6cc45aabf8aa42f8eb8625eb94ed
SHA512b12ce78f9d8c8bf3a5912698246aa2674ab9bc2fa545948e61dc98ab4d9db7d1955eee805319540b0692c4561e4a4faef98f5144c9a86834ef2a078ea9c0bdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29f274762db94eb743179fc5aa7432b
SHA1fd93229e6b5038ebd2cfc393f3d38da3d3b0415e
SHA2567d7ed0493a1fb5c30778fa7fa88c952348651a6ecde0529f10922e1c220e0935
SHA51229189bcae2cd432d1b21a97f2818504f198a1e2a2ddbcb50f97ea9379687a2316e52c7f42d2925653f948f8997aed53df6ad04fa307ac0038392b7f336070ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbc75b2c030b3f532357d79e161a212
SHA1e69cd1474072212e7def1030f29640d9eff1d692
SHA2560b4d8356e9a465f095dba21e4d4f821a770d8c91c54d3cc8b3c1e6723ddba5b7
SHA512fbbbac4bbbaeffabfe196f1cc4e12037462f19c6d0029035e56210c6538c1da00e7bce659de8c28b5d0fa65c771495cc95131b729ef351b6e580979a85f22006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd0c7290daa6f01d3d8a58631b3f04a
SHA1b333ab9ac03f1b00f78cd656faeebc729502d375
SHA256d73b22225482f9ade5de3cd7d616c08a5809833c64645a09cc8b59ba9663533d
SHA512a3c731cd02a5fb1559c922699e3d3066d1ef36de7773753d6d70ddbc07b2024cde55c90a5a78789bcb79d99dbdc8b985ecc31e5fcd9242e83f09aeb5f6881fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871b46abe2b0114bf70d41adfd006ca6
SHA12ecc2f30beef762d88169d20869e19111150a345
SHA256315bac7858b99df0318600184ad0ddfe38febd660597640fb5233e1033d5c95c
SHA512a4da3a569ce5ef569ccab4388e0fbef995e37c33ada8033a8036bb325137d8b8da52213efd9c4c84475bd382685676425ab4e9df4fe4708a206ff76a47531dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522de03d2a90a84757503d6fb34601a0
SHA1aa53e31144535b555ed63503b93c5f0ba176bc8b
SHA256d4fd001609d0b07836cbfc0676999d49f766c051a274c33e7c6c0fa1228657ab
SHA512ae4f224a2a46aa11ac0764e1634a60cd9b13f3b9c23c9ab31158735a51d910b2dc5b47e3f7b8fae14aa5ca1e1ae37942359cc7efbd5e5c6f7bbe17516bfbcb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d018c89a57aebfa92c2088b93f19119c
SHA1b1933d2440a20085cf4d063d972f5fd72d074ed2
SHA256d871853e4971422f5154591ac0515401387dc4d6e2c5ec3d4a2e72ddf3048b94
SHA5123058b6bbacbd2b2b15c6652b2756297d422cd3f94b0619585c883003b6c6d134333847542ef9bbbe6661319cb609246c7b2e5cd891b15e1282a3819214310e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55511b2c369aa495de912886a46716b41
SHA1afcd78972b749aecd92eccb6a54f92f6c1c83553
SHA2565fb06dc65387a2f8089e87f2e9648c95746d727bcd40c578083bfc4134887dc9
SHA512d6dac86aecdb4b5cbd32f2b4556a9f4def775bc0b27f6d5dfd3dfbb68201b19830dbf33859f5091b6a456820b542090ffb8092d50d6feadccf1bdede1a7bef4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad8491503cb9fb6de2cedd55e13d69c
SHA1666d793fcb74b2fa329c1ca9804ed3e5989bfe76
SHA2562f24de26ff9033b2e24c128bfc9fd96ab9097766af0ebd417ff1d8133cd827f9
SHA512c7f7d9ea38aa879b0203b6e89803c1f2f59fcb252d7d6c3e823abf9149e643737461ea1e3f160837ea8dbd9623b6890b5719a43e43d96e3d5a35189f6c134894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503946be1792ec261e2da082fe0a4640f
SHA1ae6e80eaed40654492e1b991ae6ed8b250c7ee48
SHA256a557f250df741693c6fe4c326ed1e005fb47ec2b874f02bebc32f8dc2774f49a
SHA51232454af18d55018a310e89aa8154f199ebb4b824fab118cbe3bdd3dcff1611bd9e7cb6c9fa92af3c4d4b32648374156a4ab42541722e2d038908b96f5c6ded7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b32223c1884d33f40be9e352ef02a1
SHA1ccf224e38fcdbd8772d9787388962dec458ecc90
SHA2563585df122e377486e1c1b4ced3ed50c4f4e4b26e2c47fc14b326a4accdbb40cc
SHA51225dbc6a87be6b460b750f834dc65817a086eb90b9c0c9fdf428c7edc3f3c69220e8d1c4064096a8f6f884ad754a1596047f442a422a794c3b14d11725b11e01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51732126d6611a38a932151a0af7bebd2
SHA13804e9579f8e4187424367cae1a3802166089712
SHA256ca709faae1e5d90ff840c2e2bde355ad2633c8793debec62ba218c16fdfa0b8f
SHA512922447d5b77ec12784ded13af664725b25f8377b1d07b5832d80969e31bd77d79b2ca69e50d1bffadd44c89c88dfe9583a65e5aa0fecc315c6ce741b35e17e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234062689946903e4502e048b6a8f0e4
SHA1b23d383208360422b2e9985f40ada88b39c6dfe1
SHA256c041a2b60b68e102b9019e79b8d2d76210f7b93c2aa630e112e3aeec470432d4
SHA512f8724ca59d22f1d2a4adfaf6a9fbeebea33e56d46c3e99a3821562e099eecf7d33bfad4a23aba22b406fa4c2a9b1ef8828cb397444d79dd7fb81f9152e42421a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732d8c4533e46d3e111e855eb9c9c081
SHA1ba300a1b26bcb2189518aee2782acd4118865d81
SHA256a6b7e3bdec08b55454e4ee33554b930669b2075c32b4c1411d74b34fe77d64ab
SHA512455b8a6117502ebb17f0fb621ebc74020eca45159171aca2e4e1b9d57dd218c3d92b75c1fdf687bfab97d5700066b464665a4993cc1c0ff69a2959f5e7e87e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cda6c054d810364b6da7843c6cfff3b
SHA1e62c51160f2cc148d1f4e9b008a50f95578267ba
SHA25639a11f1ebd78df2ec2bf1008c96bebd92998fe558cd8d4adc231785e2b973a08
SHA512e6a75d6be4900cc1f8795ee0b38da20d1f0fd613e0afaca38b86412fc9f23135780fb6adbe7337da841fbe25b951d9573cc76ff973ea0c1f51889520ba6dc1a5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b