Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
65s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
98a04f53325d87e727227fdf493f1b76_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98a04f53325d87e727227fdf493f1b76_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
98a04f53325d87e727227fdf493f1b76_JaffaCakes118.html
-
Size
72KB
-
MD5
98a04f53325d87e727227fdf493f1b76
-
SHA1
565bf5f027936fef953034470230a030052f2179
-
SHA256
7cb99c97f600dfab8ae514391c468b5316d018ec1740571b638c06d03b644e00
-
SHA512
e4daee6d05bb8100fe00b292c7c90ee3359f165e0b80c513b50ce2e84e999f5a332ad7c3407d974a626eced2cf028576bb1235063b4663567e6c770b87d18c77
-
SSDEEP
768:JiTgc0YRdsI+mInDD5BLF0gGe7JmmuZoTUTwC2aZZGMdtbBnfBgN8/lboethERTl:JVPuuTI2F0tbrga9nhE8nhPW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a1268d65b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d24bb604e8e4d34ca7e270b3e910209b000000000200000000001066000000010000200000002575cfcd2c31a30490f4f797f5e008cb70c8cad7370df82378a090d30bd2cf6c000000000e80000000020000200000008caf953bd36301c1a6030f4784928857f9ee34761bc1acdde541c64cb3d4683b20000000ba089ab039f0ab691e36321e93b07c74a7921558ba1c4b4d7321d260ae06b3ce400000007e87d75ed6e42727c85b83c929945dcfab9c9d5fafef5366e3b4c1defa99202046cbe0bd31696d62fc86f5b0b0d59d3d7c670a150f781a73991a3b8a2819b46f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B89CA2F1-2358-11EF-8E7B-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98a04f53325d87e727227fdf493f1b76_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70e671e7a2a2a868b67dae5b417e931
SHA1d4c4cc3429f119207b3df44f02e24aea62d3ba72
SHA2562782cd2d17c4b440ff1598a8a23090e0f7058aeeee35db45d92c80fed8ebea2c
SHA512b71546d542b874f50aa89e90ecccf3e3aeb0e95ea2588a80b1525374f5321e02b56f42cf0522c406eb8179e6368008412de4d8de8ab37b646f42ea633a350ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814d5b5b52d970c82681bff0022aa74b
SHA1c7c3793a3025d0ccc0fff192419c52a9ba90f477
SHA256ff60ce87949ab7714b5d412ed28a8701a474bac8718817c5b2e092ec1afe2129
SHA51240ecaa225e8fd015053d7b8644ba520354131f235ef16b790b731c0c468e63df19ce40295b6f7cc7a1cd93f9979bfa901da01ed773837c51fae27c80d238af31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c19d50d6ec7d992242169bbbf93afc
SHA1b28e55bd30499da9f9d0972f2ed4e1b48d713944
SHA256f4c28e90b889254159898562cf3eefd3bb0fa10de0675f7e204637faa3fb9c0f
SHA5123987b91872d7d17284ca5f6aeb189779c882a4d956ce25e9e7c71258a931ccbbbe67f4e5acef6f3ad4ce86fc4d493fa140cc57e20066be47600b21628dbec16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a419297f0deb451ddf9e2ebdfc8f7d9
SHA1e17153ce0ff216f2833a254eecb0fec5681b6e84
SHA256b83ce7d2b95abec926ee50cc69c355378107af6aab14fc79e6c96ee4201663a8
SHA5121104c9a9ed94901fddecc2d55e232f16dbe76797d9b5d4c6c04d39ecbab7e0b2602fcc62fb070090f95a2d6bfaf2f8d7fc2935fc0d49fea296ed0597f73bf6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88adf7fbbd744096ef143e3652a0f77
SHA140d0ded6bb8c69d05e44f3e2f1abd1485c941300
SHA25663f08a51db784fe21b9d73713aaa9f541753f701e1044d8c7fb9a150bcf25295
SHA51202a3fdcade8a010bf60fd38f5fc96f950ff422df6816a9a6181b87518a8539919306f9ddc36d8619abf96b417c40b114fa75bf4d92997c0ba07e70fcaab1fba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e78c200ba6f52577fab69c0dbae3a2
SHA1a310a099289e1cd5cc2b1e854a0e61ca7ada9020
SHA256781470916129b5f1c49fa16527bec623511024ca526100130133e9af8f863c66
SHA512bcb61728de0d9c6abc501c02bd9465349d261c9b356e59ef1723fb8c23f2ed27bc9a9af52cda5ab2b2fc9b24a3cae33d03088dbb93fff82ffda14c99ffdfa373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e99e163bdc6f763d0d3ab9f8d2369f
SHA10c219e0eb6ac4ccc690e958d29733d07d2e01715
SHA2561c47cfb5ea3dccf015d0a29f64f8b577adc0933e2bc44969210aace5e07b9d07
SHA512fbe3dfe0559c962e54efab552df7a5a7f8a67f99e3017dcbb0c258b8aaba7e08dbc50a5d87793c43c06c874e271c045af15bc3c0deb9b69eee48e83a6d1cd4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86e56a54f75f8bf9d18120028f07d26
SHA15f81a564b882e25609bf1286a0c63001cf2382d9
SHA256b2ebec9dbe31c2a462b85be0b2cf9f5c1ef00146b435bd657fb60d96d94cdee3
SHA51232fc022e53673884f459181da6bad6643ffd7e21bfcb5ed9ec2b2bace795eb7d0d474ddb82bc09761b76f9a2ced431e6b9749b5d4bfd25be64f5324f9e0308a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d92fffa46921acb4c64cc5132a91d32
SHA1c3a90de3b6f8b88ebd62c6ca126b575cbcd9b0ac
SHA256f4e3f4aec8e60724ec7f656da4d9803ac5bbcd54e9019ed9a384e0396cd2e63d
SHA512ca371a125db861b51eb34a21ed9cfb15a044cd179e9bcb0913de26b17bc96c4b91f36619f0be607f58aea674398c1f8d75a6af1320ef21b0995d32b5595bdb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d924eca06f4dbcec414c0323db0a132c
SHA148110cc47e2bfaabee1408f56a3f091058cc3be8
SHA256abdfe5687c1eb1ad2d7d68ef22093d776b884a224e87593a48ba7029aeb9e1a6
SHA51296467d1471ac65b286d27facae46d39ce0aa20a9073954aad2a708401d05096de67d3fc18ddd6c22a9e9381b4308eed7ef8c3f7a3e863f855281c13485bda9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dd45ff9a7ca89e2fa5d06da14e2fd0
SHA10f3a12d6d1b3751b9fd840e845112a6de6e8d16b
SHA25609bb3c2ff1c9f07dc94e0de0a6cc40dc5e6ea3c0f50fd17f538c58f0500a4ad8
SHA51264ebf725ecbbc6d187ff9e7475716fa0af5d00c3281bdaa175e56753ff4f4d181f224b8b79f0af8ff555180d8b888268c86aaa66af20a02001979c99ffbe3d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51988f15b2d934fd6d450cc5e96876583
SHA1d15a209143522aea88d4acbb82de2f94864afbe8
SHA2568abf47635a22c1091878fa3f66ba167a4442d70e7d8fd0ec96e3d027055180fd
SHA512e0ab29dfd74d320ede2e6ec723bfa9b69d6c21d0529495b33d641c6bf7045e96e6ad9ec1a1c14a8297727c3eed20e4f0490147c8ee86ffdc4b9a617cd487687d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baddfe9bf57ccbc5b167147ff43cb149
SHA1f9fabbfdb200422d985312dd32e81aa536f6906c
SHA256cd0c457a3751c3b3ad750a3ccdde9e7eb4af77737a73c487b9522b738cf8eddf
SHA5127429b3097914f772b2986e8449dee6c709b5a0804224ddf3c41652c4436617e040026d9d3b5c4ef5d792aaa9f9c80d319ce004e5e75c75ff4841f577b5f83587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ae9872f27ed38d39c31095e2a733c6
SHA181c93a01bef42d180ceaa8c4578a974daebc845b
SHA2566b87c15048d42444051ad1a7cc9fa73529292128ed46d9eabc33cd5739b6ab6a
SHA5127933caa9656a40520d43570f462e93826cdd00b176065f1a0095645d394fb3a8c650dcb130d8a8f01cd83708abafd092afceb61b6d1dbf86dc70688cd7b3caa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c31e931dd679a00d83e451826e5223d
SHA17f5a32bc0658367087a1f26ea82ffe4b15fe7d4a
SHA2564710b805ef53490f1b868b90222b0a64ad0e3d5a7f45086fecc1bfa641b87eef
SHA5128a583245c64a69e40216957e6ee9427e4a79dd9dd257997cceb3d153301dfcb30d43bd4331fc1c99bf398f215c9af81e423006505f513ad0c5a69ffb1af61597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33a455b170c674cb08dee87ca51c376
SHA1abe960a63fc94e9719ffcd50e46d4729ff966029
SHA256d09b3af72cc7bc522cfd88336a47309d2cf96b3ffffcf681cfbaa4a0bfd2b7bf
SHA512d79ba5d49eedcb4f1f7bbce021e69109ee3aaf6c1e76e6222e614fb4f65e93b1b41fa66b1bf37552aef32b68ce7039942bae9b99fd656cb65ae9bbac4ebe88a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2cb23bd3e9bfd33253e6e4ed73aa449
SHA18af7c49ae9ca1372853068e9f830fcf05c84eb1c
SHA25698059bfdc9dad9cd0cb788d082b83c8489b93ecfa355f4522b851d78316cf876
SHA5128d2287dc497f03d00e0409ef6083ad14bc06117d7d9e00a4602df38d11ea66ac7be37477fa8e800c83ad49d0aa1e0cf3e31b2a5abe7e8019d4b18fa4c1669e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5d156f48340f72a40b06d10a66719f
SHA1142b77b6eec031cb49e70ffe4675dbff9ce38905
SHA256fa8ca20f773938e2135ccb0c5d73f7ad80033e4b4b3a5e4ad0cda99e83b018aa
SHA512cc5ffde6099897928de9b1626a0b99999b1689f2e3780120ed585278e89cdc357f1b73bc3e501f15676d29f2b55e4190ac09fcca8fb521a89190de5f4a6f340a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a8450de04a45124d690333e8d8e1a8
SHA16a9a18d71b5ff7fc0f32e969d0d9d2fc48afcb15
SHA256907e89807cde7e70b4b0716c8ccd808194a4db6086e0a9e6037c3fbc786d5cc0
SHA512822c6f434cc5b06079d64228ee632bac2500c962be14ca3f718e922c2b486eda95bc33593cae86aa1699625372ee6a973f3135a98c406a7b0af1e6c850f093cf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b