Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
97f557d7b778067cd4f3e44ccdc1adcf_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
97f557d7b778067cd4f3e44ccdc1adcf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
97f557d7b778067cd4f3e44ccdc1adcf_JaffaCakes118.html
-
Size
69KB
-
MD5
97f557d7b778067cd4f3e44ccdc1adcf
-
SHA1
6d7e87ac5a42aa376a9be812f6852df7c1977e20
-
SHA256
8224359db4d239e0717ac006b7051260d9397f4ffa4ad5b708b221917289f347
-
SHA512
6873cb5f55f4c3fcb077f5a8102f38e7b2de046950e729c092bf88db8101becf081021215aaa66de53a381a676f548623b4d20d7c49d424ee78d743ba716e5aa
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6si6QPoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:J3tTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{404927A1-232C-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000861681486d9cee408ab5b3412236ed5700000000020000000000106600000001000020000000715d88e090c3a4a7814144e7a216ae1412a4edf944d9b072e73e7d82cc160fc0000000000e800000000200002000000068be4e47086fd09180c05a8a00ac732927c6d7d964201cc94bbfe5cc31d655182000000080304e4cc0ebed31d4ca181eb05ab26057e3c53856d8a5685b1d5d010643d93040000000ed1d537dc5f58bfe6b6073903d8a240e2ec3eb356463add6a236577cc975b5e7fb7bd0ba19800d6fbee5acea68fb903422e1c7479d9db47f453bdf7d19ec17f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03c0f1539b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423747711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97f557d7b778067cd4f3e44ccdc1adcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc44ac26e50e688725d3b9f5a38df410
SHA192084d5c1b1c076fda4e6e877eda70edbed5c373
SHA256675382eae1e85f545fca7a088308227d8b11fb8c7a89deca8a1cc944c557b722
SHA512e7f77ba80afbe677dbda0b78bc07e9d031290154d29212a03359183ce1b14fb1d2ec3450795254d1a0720d89bc5a092246677a1f60736fb18762633a0bf82e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687a382a3b7981747d945636d40773e3
SHA16cb4c652c23440889bc3df79c566271406290000
SHA25612cd808558642d0da9b5eeda6d95b51391116683644da4c1aa121176db287324
SHA5127bb42ed5df100229fcf2215bf23967f4c824acb28251baad483b0ff3e627efe66af3350b297a7ce27e630b0b7d204057dde76ccc2eda53ad2b39dde62247c73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc986d6b5779538bb26ab0bbf00a05c1
SHA10837976cc41e96c002becee598bba2e78cc428b7
SHA2569e59c96795a72d360cc1879d55dd0fa4bbeadd015e9630fbee306c4dc6c52671
SHA51286b0a3637dd49025c76132e675e892e7d5bb3dcd8e8c307eaede96d1c58988603c53092ffcbff45eda84ce5058a885c0fc8d6461ddeaaeecc2e0d0f6fc237419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b616a0f3cf3498cf1a212c274a9f60b
SHA195941b08cddf244eb665135928e8559b1e599414
SHA25635b68b4b33291ff505a8943f84506e89f0226c91142cc3eef848ac5f48b5aaa9
SHA5120022a73c60afc22e499a128cc17985b8184c736a92dcac8414eb04eebfddbce1b63d451f1fc72cb4dc725c146e2ed180826e107e3a3791afac5262b86867f0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dc91e20effebe79089d99c717f41d0
SHA1c52e4df65db599c3a418c2515b9574f25fb7efc9
SHA2568998fd36772784ec40f620c6adf1364a59a029e44f8e67aec1c6ac0532079895
SHA512954c7b4ab467d6fc75937c07281cf1df539e3ff01342657d1b94c51fc7ef6525a57f65abcdf79873f4fbeb2758377ddc0cbd58368263664fed99d2a12c7bc95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a7870cbd3453804054c60c9c7953a4
SHA1c98cfef4e3e5cf7b8c5818eedffe4007ea9b7d01
SHA256e1f2211065b2098fa2e44c7c9f5f571c89933911708353b77f1f16d0f09fddc9
SHA512ef1da1ef40d5c59e0befb05a94c4fe8eb3db2b379f5fd9e5f2ffc17bd6049b5e7d7fd4d648afb87b6b27095d7bd12d7145b4ad9da64e951076476779a5f2a0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e41a8f2d21e92b071f34ab2f5756005
SHA1670e24f364f8fb3989556c2c8f8077227407be3d
SHA2564e76c62eb50f49365316faa12cec075712e27a870908541c95277eae20f8ab23
SHA5129148ed9114e62c23878e4c7034d502b29f0df9702f5194a439eb1ea66c7edca06938e408d8855b630cae193b5a056ef59092a680db9dec184403b32dd1c06d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9a330ba225ee415486abb688adcdd4
SHA1fb06c68d8d75d878cfabe9aba51cb127f0fceb06
SHA2568907d99f0ce6508eba24285581e9d583cd579349f905317f94c623b7ca27aa4e
SHA512e28b371f6405e7dab16535227914ef0f3f5a2b2b28fd4d6ba25e5de1a0372c3cf027b2ef70bf34aac5020f70951f67feba32b0005c95d7c9f4006c809c36cf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dc1bb92466136806d7f82453499831
SHA1fa77ebd2356a2b857a7299d461870be4fd7bf524
SHA25622c7b957a784677be9725643ab0f447926738a693b91b73068cf94780cdbb9aa
SHA5124b53b919e4ad2e275919c06eb58faf9b483fe0897290ab3404299277ad5911146f599897398a9595c3fd9f09f0006c9cf9d55a4efe3f24b7f2ec297bc753522e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d50f11ab328562d53678bc55b8ddf91
SHA1be0b38d8afadb9c57b6c9b9d993a746891d24c8d
SHA256f670b0cb78bf493946e88df641d56b10fd609f8c2d573a589a26f4bef9f498ae
SHA512298745ed697952c6773aa8e69f75e13421b9e116b00ed18389eddccd013a6b9a80557db82892389c5bec82ebf3fce5c46667d16344875192546fe0005ae1c285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887c8fa80e594fd69571ef0cb7a5d917
SHA16ebc20e669ee7b79273321443308808605acd56e
SHA25682df6bfab32e6c8f2c5519b8446268579c9313d51c59246f219ec94a41656a6c
SHA512e7cc92be3a8a27dcc4d8ac219b00f26a2d1c8b1e756eeaf0792aa2ee727258a20655f1b384fc83b97145c37b7a02f6ddaf9b60ccfaf7e5e9a67f84ca1f84dc31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535b09e6f3f6eb99b575201c910e384c
SHA1de0b04306391a9778baee7500157d02a894ee711
SHA256a0283e39be0397e9ff98463b839072c0427e9a1c20775e59b8568b2f220b0446
SHA5122080741c9f66a52cd79d0250fa666c6e76c568d6a59fd7f002c193c6038b786dd09f6ae5d483f80f76550b6184bd1a41a967f0534d575f346071ea1abff69969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d395bd5385d9af84263b11dcb09b92
SHA1f3811709594a5443b82ec40dae77c551ea897b08
SHA2569374681f85393992669d1d9479c49d4d41bb6f6207be671a23a3853c8d0d05d3
SHA512bc573f354fdb88d4a0fb617762f7cb844f19433b29849f39e6795a7798d88124a9d8935e703b2e992aae42b1134faf420b77f5d1abffde4f4248b4700dff0c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56edf83911aea4fa8c6fb60869ee315cc
SHA1781cfb49acc3d31d5b87fb75e4e31ad19a687295
SHA256cca3609c36d9ddf7481d0508f2dbb63f6794e36fafd72c9d305cc9823f3b495d
SHA51288691a064c0bd5d2d191d87386ce2cb1ea8fc8b3fd5dc16cb376899ddaed3404f338c63df519c74420ed546d5da470b7fc689617c929c75a8dfc22428eb5d2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacf4d82189d5ab1f64f6f012495158b
SHA1fd2bff1f8335540fb48e619c2efb4ca16c86ff53
SHA25681be4d1dfd1a4800cc127d1cf55268957a42f148562b3cd051409385e1988ef3
SHA51207c5fca5a8931025277b6cb89b56a9d1ba54976708943a09af1abe22e2cc072f5f9eeab3c455017c620087feefb83f52b418735c23db1003769286f77c30b982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2283570a67376e0d62d041f6d31011
SHA127db0d164221f54c530d1b727734f3b4454a968b
SHA256178199024c30a288c6e1def9862befed9024dcb3b3754c1c3cccd23cffc48fb2
SHA5128c264295a603447762454e070eae3ca86ccaa6426aa19e446916d712b4dd6fd347846cba125d2da3b0b7210678a5c59e80640e489d8d73a83c310c60e93cdef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c43499142dbb17a334ee93db6b6f723
SHA1a16457fff483018246ad71e998fecd7dc96e31eb
SHA25692c8df898f7fb2fc5439ede72f488d37c25d0051c159e24eadd7b8c6aa00a41b
SHA51280a91e5c367094e719317a5916beb13238dc5f6e46cdafaef875ae4fe82298162e6dbbe30645e16750a4a49f5c35738cf88307660a03a7a74fc380eaefef8acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a05a71ef05dd03794da8e2fa9e6de2
SHA1cede014870c8f47c86a04a9034edc610f14a062b
SHA2562265c3ea266c2ac47745c0234795c2e57773b78772f4da2abab16eec22b248e3
SHA5125067432ae438244dac8e711629e89628a3b0d77fa3643ce057a7d68b964f6212180279bd7478c55080c74cb7f3fb5132bae242f2051688a94fff002df5b125f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53176c179561bd7cc43facfb64d829fb0
SHA1e3c87800d8c44b2fd7a4354f010c19eab8f1b4d8
SHA256a1a1eb3b47b06c6957b7804422d4d41c0d4a17f2ed255ad80e82ffefdb2743be
SHA512a0dc344f077040943f40baffac028197de49e2f6deb7c4fa27b10b24cf43257244a8a22c05b0c37d3077491771d52345460d2da0d57dbc4c43a8bbacbca1c4a9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b