Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
a2b0822ff084ea45771402b234b78e9e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2b0822ff084ea45771402b234b78e9e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2b0822ff084ea45771402b234b78e9e_JaffaCakes118.html
-
Size
179KB
-
MD5
a2b0822ff084ea45771402b234b78e9e
-
SHA1
f8de7c49c4faf9a8745614bb73aa882a8d93582d
-
SHA256
8abfb466f0fc3b4bebe8e145f81afd4ebaee168e8088375f3f117f571d57779a
-
SHA512
cbf85b3a1a543060f85d012c1cb2ebfb45f726bee6a695f7064d250214684ce1c8fa4d2e61dc050ab55f63461db4593ab3c16d583ca120e815a50b4f1db255ef
-
SSDEEP
3072:VyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:AsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006530a617e1e84e4996adb42f2a06ca71000000000200000000001066000000010000200000001262517c093555064fc21c00f6b7d6dd7f845001df785c1051570c6f4c8412f1000000000e800000000200002000000031239507b389f15512cc9aa2803f0d83e3b433592c8bb3304cd3b00f99dafb51200000007d39d905bc7b522050e6d9f04dbab5a3f8e8f444f1faf1155f3ffb62b7e891f7400000003397270459313a356a6587d9d50e87a3bde18b8d0c7f637cc9038822b667bfe647d23f76f12016d9bea199874b8422c37c541fb8e30c5545f6f46582e162cd0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bb919317bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF09E821-290A-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424393028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 iexplore.exe 1420 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2b0822ff084ea45771402b234b78e9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f961b0863df9001a9d0db4bdb2ca1ac9
SHA1067c6bdc8a17633644f5dad994aeab02250ca958
SHA2566f0c8dc496b25eb8c5a87679e6260d3dd1b5425e74558c5917ad646b4082ed6f
SHA51262d6296a95727d99db4cb2770422811f934475e8ccdfe1eaee33cb2277c63b3b3c179083c69bff7df24ace84429ad31922dd681f58804627a18951ff347a8ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444fa4ac63f45df86714a858bd0f0b57
SHA139dbc64d3b687746fed438b38e7f2e584e896ec3
SHA256ac76dc2fac65ed1bb1d4f329af319841dd41c46793bf4f86831f5d1d62b62169
SHA512e4e767ae0bb1b1a0d8c64f7bd43f18dd00fa0627aa4e1a31d20a442374d97675b60d5ef0c7e12a8b2d5e39676a74db4ec25b07b3730efc2dd80fc2cffba18a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca393394535468ac97ef7d57381ec38
SHA12c39cf606e3b312974004e49a50f391e8049db61
SHA25655ba09ba6dbe667381de11b5ddd7f2b6b1279e796b557f2101c27876a5964baa
SHA5128b5ade52bd558fd8e704156c49db8a81e5ec6dedc8e09a42b2dc823a4ebba2a9733666dc238b9874e1258e40fe2ef5fb84d9b5ed7bdbbb04cf48297c62571d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6621af7afaabb701f53f1da9e3c8cc
SHA14a32c07a71356a261c04778b8c0e646750fe3d36
SHA2561ed1e06e614a9167a83796c1307a8958b94f314e4c18325e94a909356154bd92
SHA512655afc521812ba20e70ccef364f0907c5bd9189c4d835d64a24b9cd57f0b5b2e76a330c350a8c746dafd7a977bfdde00fdaf9edb7f84039ef95876965acff7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1b635d2495470308099f32c5385674
SHA1a4b49a0822a0665dcf54bd9cb92ea70eda7212da
SHA2562cdeb594731ad6a473565b0ab8ac8c64d8dac5c63002c5eb7c33c1f557e09a57
SHA512ec8c33e60d88e8ebfbfbf48d50d387357247fe7d0336ad76115a11163349f8e22cb35afb4396f432e2a6c461bd757ffbe0ee2e90dbb4e618f9f609350dd43006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f39c2e534d166c3773fae14ca0ee591
SHA1d67096d2dd0be60f8b942b15dea75b74346ae243
SHA25668d29d3de1c28ad1fab2f4cecc881b8368eb201c33074e2ea235a02ac4e5fa92
SHA512fe9acb3a5ffb7426ec840cf61f71712873aa8027ef320c78e26a83621169b51d40168f01ca88e73a6f8b77e1911cc84b319a0006e36463a7d39bb446c1fb80d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b67b55697d43d70cc55a414be23161a
SHA14dea0614a5348fd939c30053381546a09ed2d176
SHA256e685963f0dad4dd1d6b3952f31f03144b5d4b5dd1f0334d0846b25a8b7428ba4
SHA512de9d6373c51cd8f698a78f2f6c720ce9718fd5035b53df499fd01a04ce1e534a7f567b49a339694de6622e784450c36243af95039bc687d7e87e07cc47d22c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583dd2731e0e1e780d919d5204beb1e50
SHA1d2fec6cc187875d05219e6ec46c4d012fa4f6599
SHA256b9d10eac43161428e976d849569206453487cb30c7ccb0b4c61e3e38f7431914
SHA512eaa86b4362195fdbc42926769bf7b422e6c29aff7c6c1dc3761b6c4ff1bad32f3581f6f6c8e8c9460b624cd1cd68d289d1b731df915b3cb35f1efde822463848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504842d7c72ff9f0779baadea4d385725
SHA1a557bc5f3897edde010fffa70a7abdedf99106b1
SHA256ac03e236176f63539539597eb65c9b4a5b7254bca46fec739107120b10acedab
SHA512effce024fa51d0f531939074cf139c035ac38f66bbbb682ab228c038655c99a992fdf13ccac4ba572dfe56ffc57e1dfa1a2e5f80725066d3bc3659066cb9af99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bc8b6334906730c7c583422fdb4e29
SHA16b9e7995d42618fe9593ce8ee39dcd227ca209df
SHA256abb481e03b091e396f6634c5661d8cc2422d0a6621f544fc1b11a884339820cf
SHA512180d2299405726871929f62b2de50327cd0f5427e762228aa5c6b2c41e9f3e8603c738f656243d346de55c839ba02b8cdc93d0d0ffa3395d7cc476d06ef946da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10df4b6036341c05da867133c7555ff
SHA1e5d099066a64465f91ef82b6e24ba2e2a8245020
SHA256a2215f862bc5e4412c9403b85a204fe3922d20e9bfd2c14233f950c06b9dae40
SHA512b4a042065eca4c129459f4f1275359bc722450f6e0328d6e825f0876cd59cd6b2d621c72a9cc48150483b2e3704d46a81ef6fe9db59f4c21f470e378ec90cd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8563ef72430bd8a9c286410ac422c3d
SHA1d733628406a69d0ee7ccf32fc4a53ad35550bae2
SHA2569ff715c02df82ff93e27e53deaa398ef8dfc51fe6bdd562f994ff011fabf33fa
SHA51290b0dab0a82ba656187131bf6df1c4df9a46e2bab79dc8de41c31baeec39570809fa5c42a1bf56d58c4ac4b0066b60756ecccb90cbc8780792b286795b93cc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fab8b6467e211a05c6276c7a6e25d21
SHA11dfeb5e6341f24edb9898cf8b6419f87d6db49a6
SHA256f83d2abd3b6a43bf47a9156366af317e310daf17c9a70dbd6e22b0fe3361eea7
SHA5129dd30f79103ff18f79af481392723128fcd8944ddc0546d0d287e188b712562d27a6c41ff883907737445ed998b26cee42fdd2387c0c916adeae2d28b13cdd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889e13bd13973d9c00c52db23ae0dcde
SHA191bb23906c7f569d80346b703463daf40cab27ed
SHA256d0ae75c03dabb0760fea7b3fda6ea289b780e51b2570f69b1552f4432b5e6c09
SHA512a599807bd7a41658c6976184e3caf77170fb4d4bf66260247e9d28b80b2cbcc47bdbb6b9be299a6289fe87ee640a3fa84e98ede880d229b5557683856e35ce42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f21cb8e1fb20b942013ca2afa292056
SHA14ce4085fa61e2b7e6faf15c6346522e067b00355
SHA256b3e9c9264f52753dff40c2a13316100bc5d475c4513cef9d16b71efbeb37d171
SHA512d714948f8bb43bbf5858efb835f52a1978900cf0e089d06b0b177f4adcc1e358edfa980fc7ee18dd23c5838290abd7f3f45d6d2d931f1cd64c37577b2424fef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4d487a666cef542cd5943863c1e979
SHA197d21f8e678d65c23c12d4fed7e1ec5cc345288f
SHA2563a82ccd481f0277c3f28087b50ac111862b9e7584958cc27614fc69d5b4160e6
SHA51259eac80e89fd7c063233224d05124b9de94be9cf3cf4cda2808541dd739bd68ed88182b57cf79ba4389865e8cb74ebef511b473c9e6795b13209c7bd0aa74b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8acfe91e7ea1b56c7c374329d7bb4db
SHA17fde5f69c262ee1f8fda902e117eb450d6599f65
SHA256d83a783d5b3c2f31d8580bc7e2d3957947f9f0cf6e4fa4e7d61b8df2f3e3d329
SHA5128085a1ee8a9ad98e5eff5f59f1c49e85ccd91702d2744624b2230e52716ad69689396ca9f697c3fab66fbf59107a1af52b0e2f7494054bee446c973633f606e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f017249c6d710c99b1a54807fe2725c
SHA103568ddae586936a40cf4d0ebb26e8809ba73c7b
SHA2561ef066e646cca03a834dcfe85c497af1324d8952d223a6a66cf6cbbafb609c61
SHA5129d6d04427618f664f78728590fbbd4a85d8a42774bb935e8d62e61ffcbe5db943f4a2ee74517c76c9268102873fca85e082913d06f3ff307f4e2ef69ef4f3c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107b7a0907e0effb9f3fc3c9b49e84c7
SHA189e574369cd9c365aafb8b714f08cfcddb6c41a3
SHA256ed91c82e97bbde3abced6fbfd680e250278430412de1e4a1fc4009e8149d1cb8
SHA5128d57b5710fabd9d363e2ac8c1c0e676bf6baffe20403f3541228467d62bd1e4fdc234565e2d32bb983436beeb0162269759f498acdb0dcbd9f481e496759721a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b