Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
0abe27dd916469d325fd12b1a83b219f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0abe27dd916469d325fd12b1a83b219f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0abe27dd916469d325fd12b1a83b219f_JaffaCakes118.html
-
Size
9KB
-
MD5
0abe27dd916469d325fd12b1a83b219f
-
SHA1
4b3711b166a8bcce583fb8dc98f39ff106c89307
-
SHA256
57ce2ccab0cd6c6696b3ea31c12cd597c0fed7134df1035bd3c6e55070f4e859
-
SHA512
c7afbacd3ab7ba37f5bb5a29ab18b2b7e13382e29feed74774d8a57bc5937c5e80e7a1f4115a04ac17ef1fba23583a4221c8713fe9951a52ec9008f316a31aa0
-
SSDEEP
96:uzVs+ux7XfLLY1k9o84d12ef7CSTUJzfJi2NF+KyhgV+Uhdphb+h8cqkOJfmeOOJ:csz7XfAYS/RN6pcvqwEgb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425427072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5147C7F1-3272-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d440267fc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b50d8905f012f2459a2ab4cba21c5298000000000200000000001066000000010000200000009f29fc887eaa481e56bc18dc40cac004ed1442bdf3115dc5bc26cd635b743929000000000e8000000002000020000000fdf9eb9eb30ae7e5a002882ddab7697ec33a3972784724bdae26a9a2a3e457a620000000b56dd00be3e8091affed03a619cc2e0aca338f1b61095de09cd34115a82d468940000000e74293d56336aacc01a885f2a5c97f5eeede794932701359ff4c4c15603ae182990725c29d1e393fb65ce9e6c509d6ed6efd67bb180f34580db76932548e5e37 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0abe27dd916469d325fd12b1a83b219f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c2dcce78c8870540b01598be81db15
SHA19cbba9ee639afa8ddc44c0ddbbeb519f87916787
SHA256b78a5b2b59ba71ecc55d0b56a05720327f4c25dc47c3401713405e9d5907fac7
SHA5128a5a4255b594455bf42c1f700a52cb11ba5bf1f88a97ef8f3961e97d2a286a0b76e369271ef5c2a77d1875c269d2ac086599ada6e2764c182230e2810f75f416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829e13849f9af6f6a30595ecdbfedfbe
SHA1be15f51d787e25bb5c22517937ad103b7bdbfd19
SHA2566c1567fd308a1af9189fe53abf609ac9f267f50fd20b7d934fac5b82b0c072c7
SHA512121d2493b55fbb5ee08cdcba9ec46c2bbcdcd2a0dd99ac3cb882ccf5e72f33b09d802cbad07516359c127ec5f209492c1ad3aa72bf7f3c27a5a01d0415f227cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72559b17aa79035c2b96a8628595861
SHA1a4f0a360dbe273b7c2deb512335a0b1a83ca40a8
SHA25682d86839eb31914d5aacd062b067a0f8aec79060aed371dcb73df39e97675e6b
SHA5120ee6e1edf4cb0e8391c357b694f33c4153e46d57485e17da2ce08e5ce96e43b3f81be1219eca267d80b63d14329a77caa8ef44bb9779e63563fbe11f4cc31cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e0ce5fc1055a011d7398b6207aed91
SHA156884165d93e0ea425f22f8cec621916e9e6e55a
SHA2560b9e195c368cb6afdd9748f36aa5cd332d192ff4a3ca8d04419eca1ef74c97c8
SHA512e4d95d0bd486ce0c61e01848d507e04595f1afa366d150d435ef8c358d3468156b6668959bcacae2ed2dbc6f54f1c5751257593150e4fc03d64ee47d68bf75e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154993c79e410fd09159c98074359295
SHA1cd61240d8f31ced3f5e5bf52d5c877429e9da713
SHA256c653ed3b81d60ca836d9042646934f5df15faceb53d8e8d2e78bc32f535d750f
SHA512ef31d1aa70706b7bc7054e607bbd3b9d5b72a9210393e56d63b2c874e393079ab14c39dd2fa965a04906c0634d32b15a4e6a5e452fef40f0acacb609d0464904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e1364f89731f133372f3b30994c1a3
SHA1a5f8b28e0c80a4dc50090aa7c875ed28f1f4faed
SHA2566bf853679df7917d40a0ef45dac4ace314e7ebeeb1da39226ba785cb3f5e1c4a
SHA512a075340e9c9e32c201bb00dd0ade4ebbcceb38c5303ce6b4a811ca41deecccec8f28c83bd279914d209b89123a26d25c133207db6cbf4c273845bcc5c0a66404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c515c25217268dd4ee9eb210094977
SHA10bfaecd7d50115b264b5342382fa89db10251f82
SHA256db09c67658ce7912f294cd6023fa68868e8b0fe8de9e1997c750a81ab9d7e6c7
SHA5123337cc42d31f585b5b2638cfb636db9f9a71c0c7a6ba31a180feaaef7140687cbd3f8d5da1fbaeda71061731a8a2707a73eeeb1e6956164da3fcf93a78ecb5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7a65cff224d49e32b141c4ffd78dba
SHA1a591be0933459941f7de94d09a7891080448a74f
SHA256eaaf9ad3706be41a1672f37b1ad396a6cba30557c33b99599a546595a9bdbd74
SHA512d780079e65945e46e1fc02b970b9d77182b06a5e5940ba3656d110b3056e5e496f896739d1ddad57661b9c0b74f0823d748afeeec8497a042cee8ebbc0f27248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054ee4b81699cb19f1e574bd498d8ace
SHA1f425170a8f02efe138acd5e1795e48e1a704bdfd
SHA256b838775945629460b970e98b8fbad925b65a19d47e44703f5e0d14c9953a7c0f
SHA512b451ddf226cc1df1f63a4f091540a6df79ee51de280ef16697919162a3860c10b74b72edc91d70f4eb37e8cbeceeed39e53c1ea4a58a9bd561147b91ce2cb21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44921edd8604295e10088a446ded5d9
SHA14e160c3e745f6a1527e090287e7760b9f526b318
SHA2566be3b5c75ff388223ef4e48a334a8d40fbd7219d1e492afde8eecfe4d2579c55
SHA51279ee490a427cde8eb8c939bd970da5a9768bab88d4a0f109dd9de625fd4fcbb43f5656e8b9007879265f0cdf120f4b86bd46fc860b69c564f45549e25d1326e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f08f30a09ae46df5aeb882eb8a7707
SHA1d2734f91b16844429a677288863974b9bde9e4c2
SHA256000cf7fad21b70fb2612664a1ebe7e073831d089fadf422081a3862eaa8b4e9a
SHA5121f745097ec106712fa6ea087549b9035950a650b64e4f5574b5666ed0da81daaa9e07a36f5d17e1f2c096447d7e19efb5894b21a5003d22925e3bc6957271294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d7112feecd6d99c1cdf2d83bfa0125
SHA11c4091a4699fbb4450b631d1383fc20594f27aaf
SHA2561896df4a32857d9a0d1b3bc24a729adac2497d70d1d344a9c34fdfb8691d03b9
SHA51285aaecf7480ec706736a188df699a17ce84f5713ceb3e25c8990e58d896c42f800dfcee5d942cc494a8845bfd75121abe8fd3710e07232c00b08ce64ca4aa2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51658b2968a77fc2561024f8b01a0b1f9
SHA18af84f15df68fa6fd64723181b560c446029a3bf
SHA2560694e8bc9c30dac9b7e63ef3a5e02ec48972cd66e61e0a5600398c93e07d4cb0
SHA512911ea7613a6530545c62634527c385855c369b6b53e00ed353e52a72aa4102cc78e692ee5848fef6fcf0c326a9e006f250d77eddb868b379647eed3e7aa57984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ccbf3f93737af6b85da226bc7a6083
SHA1623477d6e438401dbc4594f56b1e54a96aebcc02
SHA25656729269886a22c10f4413a839d117c6bb62f67e462024ea9a3417d52ace32da
SHA5128a5b2128e3686ac501fba2a6334b670af051ece9cd9e0a6483a77a96df173752e9bbcb854940d739103c3a954e386490d3f7cbd9cd1b56fcd00bdda9d49e2dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30bed4f7f0415331e92242391599dab
SHA1d2f6ab8f812c849e6fd2000a030221a11e8ab655
SHA256656ea85310dc16d16919dd3be0df43a07c9daa49e33da0c3a7ed56047a4ebf75
SHA5127bdf50bcd663a7aaff5e5c0d8da2a7adcb8769872e21c3b28e38b76123d6c55430c3c5bd40f66db129a0619d083290a058537dcb33bdf43831da7c41e4617cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae491f788ad27a66822c25f97d8d1b7
SHA1888750acc9d183e8e6cb8269f8d016135e1a7b5c
SHA256c40375e3c4ec0b27232b8411f25b0191e6f1c3f60dc66d197ac3b9328da672d6
SHA512e11beb23fbea4f71355bfcc2ba28e0ee2a2b717991339c44363981bbbbbcf08badce21fdac0b70c66dd98aa6ea7644ba3f43d88c6ecd3eb3f897548adfaaf929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b89c8d23e15daf537eb6ed2f1fbc24
SHA12639b16acfa9b90e8eaa08cec9b3a2264b97ee67
SHA256c29ee18f8f0e46eaaf2dbf162c613b6a96c1fa2e9c8887bd793a8688824c52bd
SHA512474497084e665178c603238e166ca8a7c5ee5a326620dd8f586ad2016a35029520b8e58c49b9bc0ee48ffee6c491a3ab5f459c14247c320a694a00b398f0d689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0d6af092036c4ff44e28f3559ce462
SHA103622eacc710b8c7a24a6082b5155763216434b4
SHA256c6effca7d47103d8703efd4294f8d48fe4d95596f00790ec5a08245e761c2a72
SHA5121a17f5354b000cf4905318272ce03a2660366f34b0cbf067bf3430bf486178045b233467a51d4f3eeabe4404b525dde4641c257a768a1f56d7d973e77f1e9940
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b