Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
b1e0cbcdb2b714b2fc1da29ccfde1b1f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1e0cbcdb2b714b2fc1da29ccfde1b1f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1e0cbcdb2b714b2fc1da29ccfde1b1f_JaffaCakes118.html
-
Size
460KB
-
MD5
b1e0cbcdb2b714b2fc1da29ccfde1b1f
-
SHA1
fe0b5ad9dd39129828d60773d4ca90ce3c6ff430
-
SHA256
e012bdbcb6b1747cce21ac29c8feef891dca46d31a95313320cc39f3ea720c1e
-
SHA512
4ae026f77fda4e50c958d957cc085382e8701b93b502bb18d075318ca120a5592c931bb4e3d5cf9d70dd117f3abd4b64f32df58153f82ac3daff6e34d22302b5
-
SSDEEP
6144:S6sMYod+X3oI+YVpsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X3715d+X3j5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efb6473b65ebd241b671861e2ca19a8600000000020000000000106600000001000020000000f10b08fc62c8f009075117aceace7a2e3e89bbdbc7e02b5df6fdb1f54d5e89f7000000000e800000000200002000000086aa102800f43c0b9210183adda6e66a4e1ae717600d74a2f81a03ef18e54dbc20000000b471fba3d76c4fedddf06f91796bd81cd857efa1f3764769924067642cc7250a40000000e5e01574103713cf9926fd7602749b291468837ab23f6bd7cc316d17150878c87fd64e572307c8802d8e6c5c047b7275d88ff1d3388719e8b01b21c4feee0181 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c1443cacbfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424676772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63A997E1-2B9F-11EF-93CC-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1700 2204 iexplore.exe 28 PID 2204 wrote to memory of 1700 2204 iexplore.exe 28 PID 2204 wrote to memory of 1700 2204 iexplore.exe 28 PID 2204 wrote to memory of 1700 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1e0cbcdb2b714b2fc1da29ccfde1b1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a5309b2fb9d10c91a9bcf829074938
SHA1383ace4e7d0812dd63742e385807999687c82d33
SHA256032be693ba804303641f25b0da2b8b7a3ef5984a839565518a01eacbc715862c
SHA512dadbc4d7d44adda87ab7c9c25dd58f29dcb3f217c3061865bc9709f5ba10be1e68ced2d1ce20c4e585b77bfc992315ec83702b43182473d3d72be2db2b54246c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acfa21adee5d88546d9557a17e6a28be
SHA193ac15267c8398a2bf76e203a215ac23ed2cfd44
SHA2566a37a61c8030fb7d3b4ee3ff164f66c958ec1e13407b65ef201259742acab3ef
SHA512f5ae71af73ddcd8d031b5b261f91f1652b53d1c98ea719d10c63d517587c5ef26d58c57d1ac47bd7bbbc7a65eaabcf0638a1c71a97fae6ea660afac9d6ec6ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999aaab66664c2febbe10a11c5dc27af
SHA14e66803cb36f0d185a7c37d6579b13c294342b09
SHA2562bd046866bea1315f4d2e55b66495ebf9496f08c2e982e65a7720aa5f8b3433c
SHA512b32ffa31d957ba746efe9185f43fef8b7bbd55eb70a90446e019fd2e8e53eb2d4e59757e98e16c748f7bcca90c178c9c63e9cca0b533cd9b1abd296779ffad6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f9e4551320ae98bb8f5c8bd828bce3
SHA15a9a2c7647fbe11eeee73bf680d22541e78bfa87
SHA2569f46428a8f52c958383c3d999586b7751174dd500247c1a541c2f402579f5371
SHA512f899b929b10d0ab9217958af31a7baf957e4fbda567e11b8fb42365ed4d49a68963d306af6687ee5276b89702409895bbcd3d163c2b494d6748f542d88cf0a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34d19c4037dbc39f02c2005586776e2
SHA146f7e6a9c0fa982ca5bdf11552cd6f4be79c45f4
SHA2564775fe61e81c327c498e2c6ba543f578e417f16a2bb4153d94e9310d8bf03adf
SHA5125d2bb8f4d2586d9bf34aa4e7d6640b8d5acaab2bf23d17aea07845143cad98b133f864bcf7b8741eaaaea7b948ce8f349f77e577f7308d920fdcef5c717cbc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8aeb51cda2d821955ef331a794d9cf
SHA16bd367b9e492c3e23e4c51631390f04e57d6887c
SHA256e4475691e01c6503854b47ba51cef14353e201aef4943d2734a72a351e0a0995
SHA512b7f01bebcf19e144f2e394f09fe5ddcf39a066091f511a5d90cfd532f34db0c29ad1acee73c6ff893b581c6cd3dc426e1db945156616ba3bed0f5699e9f76708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575137898df2883971d7d7bd20d373f8b
SHA1507003f7610d41632c26a6f6d1c4789bf74b9761
SHA256f54bb92112a9592c62b8a5877d9dae123c8d67b4f4f8ea1398369705787c6a82
SHA5121fa79a4ff6369d2d232a10b21caf2f6b123ac65570215feb6bde6d6594c3269b8ec6d817925d26d1042f73463bd5d31498f21569f7d8fdca3fd82a1ac3acd23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157c0f27eba30de33c54fc0dd4d75596
SHA1e6b855f491e643f4af915e146fa3e5a43fa97913
SHA25632bff1ea9e535a62d66d2134858e8c2604503a3b72d889e36a2d47a172c74310
SHA51224ffbae038071e5dd6b98ca63050bd0604f4b3b7027728add0745c70ccb0f61fcc3ef4a98ceddd9ecb8d85641fcd6262d272f8fd09f6a47a0551bba81d93b70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd33d83a8ba2d88aaa41c731ea5d2ad4
SHA11869d31663dd089e062a233d50fe69c88927abd8
SHA2564d2b298f6355ef8eec0fb6e659704502ed33f6e345d1ef738e8e73f2ac156daa
SHA51294b99bc8e4db4cc9c2551ca081a25b4e9fca68ff348298643918d245b0b33baaaa14ea79b7de47249863de514273d5004b61ff966d9d2b25264dc690887eb724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a648ad69da0e191a6ad38c64b84ce90f
SHA10734ecd6966ad65683f7d955a42b8ad1c0c6449c
SHA256ae0cd5e67760d2a80c9fa3b87f90dd1f6f5a083617085ee9b5f012bacbcca7a1
SHA5128ae5322b444da9873d37da4f160389d7020f01a29d1f9c1c8484d21e87140a6ac5451f23d02620e4f73e18e6c32f18c5a2fed00591c8aed833c7be5840ca5b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2dddd990bd485dc011f6fc4a3b8625
SHA1d9a7c360709195e4c6be6aaecee5c696cfff73b0
SHA256d34850c1533d84a406054971861760fc6dc10d6ecf2dc760973a6ecf21ac5779
SHA512dff934519b3952b34179bb816626e771e6820297a1957ea1ba77bd7e299d20c953bd9a1875f94889c6e33b30db026b8618304809ed3f4bf6ca4451aebe966020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d91dedf3594d652b1097f74d3402d73
SHA11192d567d63e8c41eb9b434d91b3c7ad951f0fb1
SHA256af4755a785b5fd69927ff8be4dd58ef4c00040dd1b862c8d39abe9f4a203e3eb
SHA512a832f70bb45eab86d7c801a10fb4daea1244dfac25059ef62c47f080741f7885fd71867650157c82abbbc26d397f45933d83a10dfd1c4cd08b83b21a9e9ccc47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50083f8e81ec0ca011790b1f724ea084c
SHA18ebd25cc6d4573d3a94977ccf840fab65e122f6d
SHA256e49e01007c0b3143afab7c26ad74f888a9eb14fad6aa3a83a303719d799f584b
SHA512c4faa60fc1472ffe4ecc26c49f9071a1e351f94554834eae4cd15cc5b6c4c01ccb993268fcb760a0b576c23bd44afc3b29929f0472ea45ce501688f3ee8ef9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5530b837f6b9d46348c6c4f17a351f
SHA155b46e1fa1121ed078e84fad1c68648747c706c0
SHA256a88ffcd669235320ea5db183457c0eedbdc2c70f35f8a9dad46d29a166fdd6b1
SHA5121adc9206e510ffbd769b313520b1f1fc4061978cbf7dbbe4ab3bfbe022988401827f967c9d9076f4e1d736ce199b11279a2fa4ff54d561fb287c77ce4000442d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52328cf8c9ded1ba71dfd95f85b766a6e
SHA18e9db45c7e62da370721f1ffed67a056b61d8a3d
SHA256dee2dce0216b3bf9ddbaee3ee917352d9e2252a92f1c43970ca50acdfafbaa0c
SHA5122f59356c6ec1261278f42cb468d6999d046d4107cdece9caf6fef9782f78f8965591db6a753c87a9b369f1ea602f895c2c72ead830128d8c928cc67095e28fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee65b723d5fadc054d878a396d3a524
SHA1a4cf90037cd6deec1fc14336b11fbe9946f8d91c
SHA2565109f8e6c72e83791dbc06177c51fee6d6d672223728cb59ad6a7e3592ab0219
SHA512d5938cbbbfada7ba2a373f4b07d451f6cb85d9f480f5894241819c51c66aa0919207dd344f6bf8f5ee950f3ac2bbfbd70f36685bf5092e21fb3778a37681c121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be67885cf94cece703fee05002be84ae
SHA18a91cb92728e51de2eb9ea83cef4fe28904cbb8e
SHA256598b124e8cc6938b469b5d21b137da92ac0e7f0c388a0380649d3079a89b3e6a
SHA512d287bb874feb8ed8beb0550e96101bf6811585d035a66c529458c0557710f17d7d8be93591f86c4d663c46586b1222c7af863c09127c5ac1985b44cf71948373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57cd5b8c78908a97048e1c44fbba727
SHA1ecd4bf151944c529887297df9fc705f9e0d41360
SHA25670bad11055101405bbea409cc1d328dc0be8f96d4059a8854a317411e8c6ef5c
SHA5125a313e6eae784237d9184dcf8616a12a32710e0f6d00893111e2c5ee054c707203f5a7d0f765180965861a87e98378a83692507a3113951b1e2b7a349f7a01fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b