Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
9f6cb69a4c25048b6b1a0398902bd132_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f6cb69a4c25048b6b1a0398902bd132_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f6cb69a4c25048b6b1a0398902bd132_JaffaCakes118.html
-
Size
460KB
-
MD5
9f6cb69a4c25048b6b1a0398902bd132
-
SHA1
00342febb4dcc2fcdbd4bfbbde74da8f8226a891
-
SHA256
eba0c9714b90d4124f2df860b6c9116e80494b9084fed08dc0192d2456fe9210
-
SHA512
5e3e6acb05a36c46bd9cbf8bc70280050a8aa06205e3e7ae6e362f31557d8f6c11fc51041d925cc8be92f44c0741fdccc90ea39d69a8f351ef0a9c8683bd44a7
-
SSDEEP
6144:S2sMYod+X3oI+Y7psMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3d15d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dcef1de5ef8d749bd4129d5a2daacb500000000020000000000106600000001000020000000456179ac91e1cd7dceb6a0c6d77c14191776549a36c104afb38dbae0ab97bcfa000000000e8000000002000020000000257482029112d0aa5878b5b7e738b3dca00427d5ab5795156e3b6c04546d385d20000000a23e8c987e9b706c32dd429fb0b487d719122b32fd127af1e1ee88288051aab1400000002f6bc4f0ce6f8e9537c3774207946b80a025e55e092fd17b816d4d6e4ad9acdf31725836c949455edaca6e55a17ff90d8f5a9d1837862b001e8fc0d5847e236e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{551FBFA1-2830-11EF-A5A1-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7062ac2d3dbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424299220" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28 PID 2412 wrote to memory of 2204 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f6cb69a4c25048b6b1a0398902bd132_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9eafb1a4f1b8c9885a7417b7793e809
SHA1e57cced09b9c6e9b4bf0b8a0b7fd466534aa5c78
SHA2568a84a024eb23f003d6b72ca3d7ea03bb0f23b4227fdae6708a4446163290b020
SHA512017005bcdea788bc22e45000433fbce9f1d48c5837a044b518cde9b68126f88c80d379e0cf9da02577bd6437e013f22b67f373e77d29819235de7620cc4009b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b411ada40261ccf2ea414d7c16941dcc
SHA1c60a5a0045f4df13f8389e59cbe36ebe7ae573d8
SHA256a4d6efb0e31018047c3621cab9c76a597e889e6f7f1b4631d9d4c648c5547279
SHA512cafbdc857a7fcc3bc98fb486aacf47ac6fa4cfe287fb5f7e496e2b3e126bce84b8c544ac8d558638100b97f5aa016e8b4b670e5fc8fed8aedfbeaadb78e2c576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378556a353e66662b9f164f868f9578a
SHA14debb87053749aa64697b759fe1fd62187586f47
SHA25661dc04a4c9f426cd4811d356f8a87ab8410cf4f5909719599ba202a5f9f6ba82
SHA51255822f03a5bd2ecf5378039e432a1c718518e4c854b268eeb22275612c0edcf0add79a8874877bac5cf7c20e4e341fbf8c6e22605b13a43a4450b5c70915724f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2f5c65efec4a9147cbe8f22026eff0
SHA1135bc79bc5cce2bb197726151ab3199921036071
SHA256b8d82244b8d46f95a50a021d9081713365e1bb9b50482cfa8f57dc0d851b922c
SHA5125703d6ee24c69e90dd6057f27a940994afe994d673d8e62fdc342af375b3edd70d7bb1dec4f15f8957b057ae71da5fd10e0c474ab266fc2db12ad08d12187a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9609dcfe3b5c986177a6a89e1548a33
SHA19bdd4dbe2232efd49febbc280cac88d3c7d64597
SHA25691e0d893827f470f2ff3c82888eb02974efabe8a3ac22f6cf1bf1252bc69970d
SHA512bddc42efc71d617c65b56969001fa15355f6ca636d10b23c442b28c468b229438525b1c5dd4e304f02394235f12627d79547d71d61fb43c6f57022a5ae1a4159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acaabeae14504de099378edd1613426
SHA1e4a6c2a6f7cb5bc33b2e330769159b26f9c056b8
SHA256d1985404f70bc9156e462cc41c0b1d3f4eeb3474b1121f8cb212a79c41106d81
SHA51296815363b598143e02dd574e38b017be6e81643ee4410f9bba855d37553a0aa7a0dc21da901db1eaebf6ae4ca0df81729d866064c9364074392c5b2b23a550cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54309fb946811a40422114b966273cfab
SHA1d65ccb2eca36624f7cf7ac2770286403110335b4
SHA256c859e99be5856d8d668a6ff1b3614bd9f9371da9cfee4cc531ea31fb50a60d20
SHA512144ca98b992a2dfcfc5382806177093e78a2a436b2a56f4d4e20a5aecec335a6523bee96521d1aee71ed911dbac68574ff877eb4a263b2b035894e186d4c3b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c9fecff66095101200285d2e82a6e6
SHA1b2c6418b93000897691e3f3345a5095799a65a2b
SHA2562fc4c34ac74a9b56c5214a347e77610ce81ed56a72a1603729c0176f230ec707
SHA5123e30166c81d110d29c6e05bcd288ccf304b456298282b04733099a5ba8b29804b6b3733c06c0e4acac296fc4142292309b6af1b773d34a579a38c026c975548b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c3cfaa4c719032bdc702e5fe8220be
SHA139f22c81fb9c18468905160e21cb2134c4ac05ab
SHA2567dad70a8bb65c929cb6acc1a3334de420d4765dc0593c5ebd2568edef73288bd
SHA51242a1e5bb7d448860804fde828e28591d9dc79642febd5cbecb42ec91e6af4f17c7a9278f5b905f77af08eea815910d47d1d48dcb9a221c9a3739d06f2c34a379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ab6debd25b83f01642441b96f1d6fc
SHA1d4d65e2addf9ab5b4dd6c27ff44501b40531f408
SHA2565051ca6b8fb9ffcc7e074bce87ede6631299507ddebf14fc14ea55a72ac36bb0
SHA512598811162150a35fa3625a6807908b0f7ca942dd0a196be5d72104738266b1c93a82251d8041c1b340718f0f762dbfbb5ec9efa6455ef5129087ba71ebb3f6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f96844a81cc565ebd1539098d0e39e
SHA1a85fe180c2008a18606451a9cf6b062277d532dd
SHA25695c8f1036f439bfa0e689a84d1e9395a8ee012e78c14dbd467b68976d22943b6
SHA512550aabfa1475e4d33b600686971e00667eba80580e7ecf8499b7c9282c6f5cee3fd8ff4c6c90137f77297f9cee3ce874b9206281f97462332c48bf6760be5944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e758d1508e7abd265cb9033b675b62
SHA1d4ab1b8b1bf2c52dd06448d6d1d31c0ef5a4363e
SHA2560947c0adafeb887bd118fce7795c04bc690d481ad50afc00b75f84196e6a441c
SHA512088d04b15e6bfba02b16feaeaddf6a057eb880b266a56a6273d1daf74dc302968bfe7edd62f8ff72b1f69d577de4ed8a917b345a3d9722670cec09c5bd122af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd6e91689646eb3475d0666c51f7768
SHA1bf3f1e9163e25f48daa0b6e75ac63f8640c1a31e
SHA256cf3104b31792165ff237b54fb545ba4d5a3d40c3b0b0ab414a3bd4503cd7fab3
SHA51237e36c164f6bc25f3c4dbe56b69e08a8c3556e554f534c493ae8439f9b7290c5314290afd224f57da216368baf9e4aad5e0cb1b214aef1f2e1c9dd1853e97b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6805e453f07755595a08d0b7be12fb
SHA1feb4ab8cc18c98a4102730fc250990234ed492fc
SHA256008e0985f93288aaa2f78b391bb7d05f9baba88c48b0a6324f18b9684058fc4c
SHA5122bea60d1a8b20b1627780c649450f265637cc3c5d16875b2d59a01885a7d0a043dc1a458c3e6c09038253f8feb65f44d2e6abcb34574d86a3c052ee9b5c2c81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0720dd6385499ccf11f0196464ae647
SHA10c6cbc642b95a3a44760d2a6ef831566812b8200
SHA25615988e7e9a2273956b6129030a0bd7802ed696512730f0d05c879713be717d96
SHA5128e9a3ccdee7bad1ee5a9b570d673659647b47a8280e8458967e56dbea9c3a3527b4f309f0257c083af2b2aca9c6d5a1a27c2a31d7d4f531670f0f68e71a98f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf12dc9b4a3f8de3c787c78567085d8
SHA1f27b2e13f2910b38cb597cec5a75eca7e4d9089d
SHA256b4351ee4b4e8d802a0235be06b1b3c5dd074aead34421e474a8753b4e5245529
SHA51290599f95155899ae41727d3123389249220910dc73d8ae472314d5c6dc3654557749eb81a90f526719aa5806183436329e9fcfbffb1ceb38b9feb09898672a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a87ae907d3feb16db27b05c19fdd1d5
SHA110cfea53c8fe2b281c0d8bbfacf7b2400fb7a9f6
SHA256cc2601bd5aa0933310a075b20923368bf128a37b983b4cbcf308c0952461515c
SHA512915ca8887328cb77ae77b777b24fada4b1e91aa5a91b1d60d1a492f9baef9763b944778964e9b95548e59ff5fb30a19ff56e10ec3c3bde538902b914d5ce5861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d34b4cb047e1df7e73400bbf4e6bd10
SHA1fedd3fa46db7930fbf3a5202dd66ff0fcef9398d
SHA2561b38a232f119216607981ac386826b06dc94fcf323188ef79ec9d017e4acb6ee
SHA512fcc9a4371b63d4f98aa09348b96da611f67ac80b2f7ea4b42c3bb7bf957ab5151e213c1422351ba353631cdbc12684246e3714f14cf6bdb3f9cf4f61d4b0b2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0ac62afd34ff71a8963ff560bc0416
SHA1028a6dadd9c36600e1dd0d663dc8c5a39c45f996
SHA25688ca25c42b8e469ab63f0321cc0150383d624fb4090541116126940ad7badda9
SHA51222a0207516b519b466b2b13945f80a620bdfebb1f4227cdbb41be5f749945f6fe53c3b5dca30586d6b008c72ecf3efd35fa696adb15d4163fd34eab7e61cecff
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b