Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
9b4a4e33b0d9adef6bae2288b2bd05f4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9b4a4e33b0d9adef6bae2288b2bd05f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9b4a4e33b0d9adef6bae2288b2bd05f4_JaffaCakes118.html
-
Size
15KB
-
MD5
9b4a4e33b0d9adef6bae2288b2bd05f4
-
SHA1
7ec9cde8a5b372db1d9763a3a856661e910b657a
-
SHA256
d6b8c9885610692702f583e5be0c624f055e364ff45d53536864ec66014ca6a4
-
SHA512
7e111d8dd4dc3d49bb52443f60814279c54dacbdc6a4e4c5abacfe8a22d9a80cacfdf260e8ebbd318292e466ef3c387f05aba9dcd6f814d770b1afdc1f5fd4fe
-
SSDEEP
192:SI8NlNzRD+cTuEU1KayZXAZRifIsX9QiwSGWnf+eXayzgn:SIod+iq1KpA45qNn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f2fa4452bbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424198334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056e27d7815e60e45a9b00cd16d2416fb0000000002000000000010660000000100002000000038505e9b186cc01e4977dd8a9e629e5492e2a3dd99877d314ffbf3812576657b000000000e800000000200002000000049dfd16c438c29e29e0bb790309a78eeb57f37f6b888e0842d39392b3eff3cca200000002f0e7285729e966780cf37b635d2736ce0530918266b6ae706f9458d4a7b2898400000001f71c6874bfc2d34ff45590e8c020017f5732cbc89176eae5ce90408025109bab483b58fbb1f542bebea8011fff795f83dd0ee7037d01b34b1cedf5ec25af101 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70619221-2745-11EF-9D76-F65846C0010F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2552 2320 iexplore.exe 29 PID 2320 wrote to memory of 2552 2320 iexplore.exe 29 PID 2320 wrote to memory of 2552 2320 iexplore.exe 29 PID 2320 wrote to memory of 2552 2320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b4a4e33b0d9adef6bae2288b2bd05f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5891f619111e92d7be7898b32a9d84ecc
SHA13904d7b8d254b0a2462c47a04fd1d05220842716
SHA256b53557b4b47a57f3733feffe9a65c9812726ced0217931c74b8833a52fe2ad75
SHA51255b8b1bb62a91bfa250d6860827ee57e0aea386550ba45542ea1204a21952290c91f28a0347a7edd5d372a96ad1e2467afdcf988a89ac7e8d74cb6e832c9da28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b333f95dd30c4a82a8bd9e75cd2c9ee9
SHA13d5d296b9d2e0dab0f98f27f5c73d10732503b67
SHA256675262c4fbb86ec9fe5ae6e9b1a200f586c4e67018413bcede087c9e343757c9
SHA5121d733e36aa7f3af610fd618a503f957f8756165369f0c0d6a420f0e448b4af11a6f4aec4f0242e34089b15485422b9cdff83cc8dee81af6f5a2a4d91fa14313b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fa8bc8a1b78b1cb20f17b53c6871be
SHA1a87b7cf4cb73c697976b01283eb3877b75bd9440
SHA25619fd7c8035890c6cb7d122f7e15006c6d14d11873b25947fc68bc296a370f130
SHA512e120d3b4c1d6cab06b21834065e33d705f2ea6eecefc16247601f994228a3ab66ff3b4c8d0e0331e2daab864988439f73ab404dacec2691f69e81eccf702f7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c22ecfa2f5b453164267340b36d37f6
SHA1cdd60f8e9d495d0fbddb7ccad3592fb317a8a4ef
SHA256a19379d75462f8078af9e6e0534ed145c89c4e2445fed87d66660a00798e3b0f
SHA512e97274ddf0a99d0855c4cc2d3cbfe3676308ad07e2ddfb461a5b10004da5561bcd0d4c13546adc5ddbb32bb19b4f01a140fd2cc69aa9ccda5710dac59982cfe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f4397d0f6b710eaba8467826a2c534
SHA1241bce776456a3c77ff6fb8cd4af67dd536b7a98
SHA2568c7f5d2fada3aa079d8f87fbca8850f6d5c25762be62be5f4dadc80651f58472
SHA5126032f10dd419856e83089b4ada94e2d7de394028c7e387a8d4aef58cba41ade75ac8be1aaf1bbf0b432002a069fa3b3f6a897fb9c6d9ab2fa9ebf172ce77b660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1630a68434ea8ee0114819f4790483
SHA1dbd6fc2a211c99344c534588b2a8c248baf0233c
SHA256226b54bfc815e26f8b446d1706fa9d0da97e6cc713aaec79a7f879b6d9876e7a
SHA5124fcbf08d0f0dadf1f0534124dc3037023d39b7a593f2267ce5f3a636c99881aeac5dbb20f64926a34a7d594d5b94124ad144956622d1cf357f6d9eab46b838dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadd7466bbb66d7cadbdec034e950f1c
SHA111dab90e85eaccb940fc5a814aa0c0fdf522a84b
SHA256e4b599825453d9f1e8fd203c6131d41056b19177fa08874dae98fe326abcce08
SHA512840f69c2fad15ef3d2036707ab81f88c5ad47fa2b469942846412da5c03f21158428e64a40933a35178102bc272018b0d6166ac616464eca5497c8486f5c81e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea3e82412bdb76e22484257fcfd9077
SHA116f5d1141628c426df16dca7f74973c721edc43f
SHA256b9fffcddf7f42e77a0c5f7aa779e4d503d7e98ecc8aaac6476d71b4f52876ed1
SHA5125be68307ead9d30e9e0c22c9d399d75e384c5f9eb0e4aeb0ae69aa5cdd641665f494424c4c3f0239d8b9a970846866be11b02b289c56c91ead7a8d86a12e4ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22b898f78468ec9569661fd7bd14cd5
SHA16d51a99e50680e1515e212c5cb8fd02449755693
SHA256321b27581e2d5f49492c16fe8c3539b52befd12db3c1bdf860c067ce64c9b71d
SHA512408e1a7ddc8c82a66788e06300113fc1b0e8d738e7f4d2acef5e7af9a13153ef62fa4576ea39f108a1db52d10104f26655bc50ef5a0759bf697fa0415a972b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3c60126fba2901aedbf913654bac2a
SHA111301f3f466effbb8f93bfe21661a1eb8cedf5a2
SHA25616cc07dde5bcc494d586de32da616a8dc4f7fbbeaa6e5648b21d534d0a88be4a
SHA512d9569c62ed0e5e42a0a3f4e2039cac5ec15bcb5cd4a0c90984b0ecf5d49765d555eefafca01325598191c511d944fc29b11ff82305a458fe5136aa0471b40154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957f5a5cb510d719e8ac282fffc20e61
SHA151a5677776d81d6062454983b5965f3db9185bdf
SHA256856c9490f476bb0b535de03e56ede2ce0ded96a1d9677448711245181b5ef0d0
SHA512ef45d2c2af0d4ca33ed2e1ae3234cca54fee7ee4e5fc7543f8da2ee9f09001378be3394cee325735f729044fbe409c622f564f49aa7151fdffb5f5f973a5ac95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a19433216021be8ccb48e08288f0d0
SHA171971b63834f5cfc1bc7613d57907de5766b704f
SHA256b4870181ebb1561fa4b97895a83c32ad147538fb9f369bd59f3a7c191a67bdd0
SHA51203552fe7a2533b75025f6808b4c99e66e07f0711b199aa433d888d4a9a9ce36887382df31d28debf0d47a2a86faf1be4376b070a5cf9181d79c644d557e2f94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a31b3d7b4f1e23c3ec851b54fa7c31
SHA1490a37685b6be8081c4c329d760c6d6de73801c3
SHA256b6966273b8e205477d240c89ed4bd4cb4a12f1453927b0570971dfd49033025d
SHA5125e5ca24188456eb1148130a03d44bfa7fdd2152391a4f4abc350c4aa413ff20f8a01168938fc90b7226137eac248fa6d9c3ebb7757c67d93adba0cd364c2030a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccc06dc9660c7b3914abf4fcf029167
SHA170487e2746e036ac01020e3a6e56f1c0a4fb84b3
SHA256207313725e03f41a38f59c432d10822782f6afecc2671615c1bf5abb5e98c24d
SHA51229a5bb2684188cb0ae804de866ed2e318c10680302cca1e5b0a9a8248ac4f02be76c1508a6826fe3ed1d9205b95048d9f4ab2ba2d78083f9d6b8c96336eb5703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32b054f7d1b63431e3251bfd8112444
SHA163e741f02f8eddedff934d09c4c59d6ebfae499c
SHA2563e2a8b8e11031f2c94df7c1d921a0123b86fbbb6b8d56ad6aabe7c1c9ad98a29
SHA51276580d66ec895ad5937ea3116b76ed65317be66386ee64de6b478e6bc489a614db5825f85ab973b20c57580dcb37896fa993b5b892c4a03ac057f91a2b7faea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de7166b28e5b13db693fa1b4405efcf
SHA147d955000bd87f76cb4379d94ad1acbc5d3940b8
SHA256580ecc675037b135a8be35d544ee71d14eb9d11f612cfd9cb88c94e205e5c27c
SHA5120bcd207a1de2235a55daaa8aef13318941d99488d3bb4b95c9542de39563f6f4a984b9aa96e494ed397dd59c5409425aa061de35f3641acaf0c3def08ce2024d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ca3dfb1754bd827b24fc67c5942e5c
SHA1b5172fc99ecc8430fe1fd1e1228eb475dc84d783
SHA25682dd1b2e3fbb49f08db1fb6a5644c64ad82b2d44ce1557e746930692d6a0d7a8
SHA512ac3e01a81e4d6e7d2652c5f27983b8c9cab9813993460a8a68257b6046c1a23c90d974f7ca16b30c0bbc49fb3726ec8088ee004477ff4cbc5e90c8ac4bfd0323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d039cfb7b53a558d73ff849e554e90
SHA1af13281cadb8dda0dfa36f82dad0c72686e38808
SHA2563c9cfb597527253799719231f4ada68e5486abca735c5b2122ad154dcd622434
SHA512490cfe83422e72119e8282ca5800b181c5c7472bff7e6116ca8800ab1773cfd308453c3fcb3cb146c70675293cdfd1e0759f983843df849bc1b05fd1b83633aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ba0a4815c2e7e34be507b1bc6371e5
SHA11e74d32f234629c40afe221fdbcfc61eb7d57e11
SHA25617ba3e5340717f413f5be5bb7bf18188816b54bdbd53fd5dd8563199f214878c
SHA5123a7784a135de984ee207ff1dc0896e1e77a7fb575bf8a5ae49a0a347d0fdef85735f1c6e2915ec517e07dce5fb14d1d651464436ef38c78375363ef67ba9247a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b