Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
9b1d26d1abc8db3ba6cc24c84fa6777e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b1d26d1abc8db3ba6cc24c84fa6777e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9b1d26d1abc8db3ba6cc24c84fa6777e_JaffaCakes118.html
-
Size
44KB
-
MD5
9b1d26d1abc8db3ba6cc24c84fa6777e
-
SHA1
9e557edd6cc0037c41e612bf2c9efb42918ea90a
-
SHA256
7ef0059d70a71197524cc4d5bcef7e5037c80c10258fd2640be492ada1de788a
-
SHA512
d2667c992b023316eee0ee6a39adb19c257d676f72a2c0f5c5d76524a744d3ccfc7c926a46f00088b9dbea46a777f74957bc5d1f6006bb4406c5f21d8cbd7357
-
SSDEEP
384:sqr117vfWbJKuBKCru/g4MtzrsJSmVDAGVe5GVIcHGV+QJaNGVAhhGVis4GVgNHc:7RsJKSU/g4MtqQmpcXZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001ed0a6732acb4a4eb2e6e2b7685c428100000000020000000000106600000001000020000000d6aed870841ba3a0c30b1b356e289c945975d7952d6f6b751818ee048ab1dea5000000000e8000000002000020000000774606f18c87f1f45c167e32cdb8c35102f03860863a748b917b78a02e4316d120000000e6167beee83516b770e9e8aa61e6d245bb656e66426074ce2f2108ca5d191aff40000000a658bf6b5cf7ae4bc9ce9add1b44014dd5d2a721ad33e436b04030f575bfc8479699a68b9f977b8699fac11c71eabe51817bfc7a4b1d4692302cc5ca52920b10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7007cfa148bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB9983A1-273B-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424194192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28 PID 3024 wrote to memory of 1188 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b1d26d1abc8db3ba6cc24c84fa6777e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5200753500b8e0f8f94fe0029da55193b
SHA1e71fea10a341da4c6236d5fcd577b61b5bdb4467
SHA256de2a5e8b373abb452db1a7d206629fa952424dc6539d3cb319ca8d2f55faea80
SHA512809a27e6957e241071e4ad755a59fe546be4f6c79d329eb0c3a85e33e4ce81a9571643819c4f5b4386f714b441dd3121057457bc90a1e4d071fe231d4e6d66ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53083512d0acccf240598a6266209c74c
SHA1b233d5fd186e6c6ebbb673603ebf86a313a7a2ce
SHA256bcbc43c22bb88b26067c41b0b1f50cc50db346df4be266c983d27a299942606a
SHA51229445acce006781234762615929fc9d335f35865b644006a88253deca00dbdcbffa54ca8802ee9bd8c1ccf96da7bbd6fedb37f127b6d8a6902d537253add41ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582c20a007b32c103dc0dbb4048f9bce0
SHA13ccaf3b8759c739749967d99dd13cececba8f358
SHA25644db99499d27303e489aa4ce82196e13518c3d99e62a3fe561fd837bdb74b74e
SHA51293ab22a6b846409718d459c5d397631a56f3d6ab634eceb90c63ddbfc71b6355adc45b4e18cab07d14fc4413524649e2c8326ad60bd0540c237d385ff66a0499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51cdbcbdafbf1c3762b4bf738777f4542
SHA1eb030548c4548e46585eacfd3ee1ddaa582a0b92
SHA256e30cfd73f293e700113f8a78dcb14d9678192cf8df9ccbd527fae6ffdcad2089
SHA51224ed528ee0cd6564bf22b7b333d115edcaa0385cbe2eda3e04f7b018eaa20c9a0ec55b5d3dd288023bde8bf3738512b0ff455602bcc10583beefad73f49f2150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56225bd541a8e783289fb953cf4815902
SHA195697b3dc27bdb6a439daaafd4d3abb2b35a7ca5
SHA256863f277f6abf9c2b0376d5121d40f8de934b63813537cbf1acc1ba8c517841e4
SHA512a163455b76c19f086bc4c0fab42498d619af1fd0d4e38a51d996b75241b92aa29c38afa346ff9217947d261bda119c6c8330147151ba489c8d561f18be4e807f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aed0704d0c237832daa1b9759e8879f
SHA1adba9992cb15c47ffd05fabbf76602e743aa246b
SHA256526f23ef5d7915ffc56d270e5bf2ad2440effe6d63550593cc0fd36942547294
SHA5129e53f7c1e138c810f02fc506bad433255b2eed2146b315c1e7be742fd44343c18a4847b3acc17793f2274b8c75b46c74e64fb7928e686c643936dc92e5d6b7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507c487c221aa136d8e1fc771e77080e0
SHA10e80db2319fb2225e09b10e78ca53e06d0bddbb8
SHA2567f19a7e03b8474622ba5ac1840932ddf54016b16ae04cccabf046bec8289a814
SHA51263e777c394e2f5f35138ef3eee5fdc273da49a8af38381fd4f7f0037826643242953642efc5a8036588317002f318b430da59d7762eff74219475703bde28986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c15f863a5355163795efc636a575fe9
SHA15f1f8adf2d767886cf223bf700e15c446d2083b7
SHA2560ac9ab12fa5a942fc3e3ed2d83474815712cea7ae9e9748c60dc126489c0c88f
SHA512e25913abd49ee745a4300d645d4bed9cde38dc825d3ba8ac511172f37f378fa164958ac974a3e48610805a603a753dfbaffb12de114ee44a4f3908ff12306689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58641c8326794d3d8bbd5cf8ec58ef176
SHA1d2ae7ed8d4c21064c3d8d95746f1e8199be9346a
SHA25695c23bad64aec676f5efecd8caae561c04e7e2ec8982350553da7b8dde7b5281
SHA512a544691e74510a60f0f34200eb78bf8a65251fb93611c11d2f4ce0dce409f6ace092b0198667c7263c08fcdfd7d354111108dd76b03b71395863f3fc4db867fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ef40bde85ade77adc0841e9e77eee68
SHA1a99c018c6b09c58235c20656964d76d51e5a6c28
SHA2564543546498865a39a2d4d021310166ca197b95dd3248dea9670d434c0aceb3ec
SHA512d673cb8cdfee874c02ae0f66aa91adbdf6ca495225577d1141b9d9c4f45a406885167d5efdf0bb26e4337c4ee41af48c6fe3ec0e29898a9cf9825532a454b1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542f96cbe6f905da13d3e58927bc63e2e
SHA180cc45f1a068fbebf4df6a4e8d002deb7c0515d6
SHA256b757f47511195c2bb5399e00262ef941ac93a81100a065d61e87bd698f95c243
SHA51237e80e3b4cba8459be597ba9e15da6ab368e5f22ace1c767b2777793fe69661d1f8509579cd5224684b35d8de58d0d35aaa108dd4e2937c91853ca8b2d16eac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db0d33dc6519f1a04e6ecd356271cab8
SHA154ba716952af591ddfd429ffebbbf068f93efb51
SHA2568fc3f873e68b8632123079832c01f2bfac1ee4258fde9634650aaaa54b375f5a
SHA51247e639761556652d8542726481c11a9b1c65395bb07ae4b6e0f605eb7e6b5455b5e1b07f31d0be74d4500cd8cdb64a670a14e5c0ad339d372e58c0307cf765b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD563e4e904241d5451b9f6bd88dc3e6dc0
SHA106f8268c9e18d73ad02f1c56dea480c5bcbe1ae0
SHA256ae329b5dd6428d7ab0706f9377573a9392c928257aae3ff68d5cfa742a33b7f9
SHA512634bae51946d922acea17902abc7419d1d56d861c332a434b2bfce476df87ef55c69a04bebd00355a9c3f0ff66f515eaa4a3a12ec6659e5f99ff15fba2d474e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac89d6cb4af343b26db1e2e2d23c3e03
SHA110cb2ec50d29d0e09c2bb04af80566ae9ec334df
SHA256fb180424df73ff02f01855471fcacf1296d408dbde58e3d39619e08d8091ea00
SHA512478ada151e61d617be7556860d500942f449c0b662c36bcf00cf65de18a21faa712fe0bf2ae1d5bfa9da1ebb31341994ef76d99ef6e0a4df24e4d481498bbc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6d905986043a00bf281f5bb4a637ae2
SHA1790ec0a305ae1c361de19af8ec4095a4e3148aef
SHA2560cde61deb10c3e2942bdf5da6ae31b3ccfa0dee435f69e4633e34de0e9944b85
SHA512e9c18147a8ae41035e9349c613367221c6c96db482049204eb4c758fbd006162a6bbc3ce600551424fd29b357952971e803ac958e3dd9f1badbf6c76aed8640e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d591da7a5edbb63feb1400a48119c075
SHA1423274b622d67bc520a0f41f503b70ff879067c4
SHA256fed41ca5a298857a7d2ad3cc240d937e1f3e8d621ac5530046440c508fb216c7
SHA512ffb6702e78800a3cf47b9072e8c83590a0aa67477a34cc72a2833a9f6de7196dfe76fdae24f7f13c9c94387a06a68d87bd07335688a267580769c59a9e21da2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f5fb8bc166fb4bd550f7eef530b871b
SHA1b0b2ca4b436a439de495b52eae4acf10c7618902
SHA2562f925e4a666b94222d83f0c489a9b8a5c3b2aa7c231900ca91e6a2b34b7c8a61
SHA512dd5a37eb74457e5d587d3af63ef59740f2050cce4a38711549e06ef0e00564984868eb53c3de7a6edeefbe9d22fce1366ccbf861188898632371f274329faad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f1e899cdc6dbb11a27dd6406463eb40
SHA1e7b2566af79f6cf18342d2f2cce6a60da8f59cc5
SHA2562310cf952749d64cbdcba2f7436bb697807433d966ed0676275db20e1a4c4832
SHA51231008deb09d3a0cefbb3dd8d665c9719e6d08532d23f599dcde78bc703cec52c3fbf4636864204757cb656b63cf31fb065a619170d24b058c40f4d68d9228e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef0e4a3bd26b217ab939036a68069b24
SHA17741de798af7a5e26f18fb390ed8e528d4a46605
SHA256babcb0559f171164bd8d7774ede60f2b9d19bfa61004c056907a1fe37df0ff2a
SHA512da3a0d7a2d09b42aa99173c46f1898c0af946340a3f0bae90948f2461f784c1ecb059e2246e8684fce2dbe815857137f050d5824b94e3ee4316e24514ed470ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b