Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
0a0818a4d009f832dc3653b7ec9982f5_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0a0818a4d009f832dc3653b7ec9982f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0a0818a4d009f832dc3653b7ec9982f5_JaffaCakes118.html
-
Size
10KB
-
MD5
0a0818a4d009f832dc3653b7ec9982f5
-
SHA1
3ebfc8f2352125b31322a406b72d894940591fb3
-
SHA256
1a8089891a8578c82845e40e37b00787ee527a0d0c1c83bc0b3872d05fc699c1
-
SHA512
54afe6381d4c53074dd1a106cffd703a56a402051b856cd0e4783313ba71c0aa8d33bdf69d50de1cad07752273afa16b60cece57cc54c3186a0354d929f72a7e
-
SSDEEP
96:uzVs+ux7TvLLY1k9o84d12ef7CSTU3GT/krIpfLWN9xzhkdZMVeUWN9xy7lVHcE8:csz7TvAYS/GizwAUVVwQPHb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425414346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFFE48F1-3254-11EF-B5A7-FAD28091DCF5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a802fa78bb7ce1e8dbab2d69edd57e4013dc26f93854b8a0f8f377e19d11a8d6000000000e8000000002000020000000a92adf3f32162bb4c194926841308ab2e608ba84e0d4eb2d9301dbc047e35cf12000000037cc2de7108354e5861e50d6d75f677a6641e7218eceb1d0dc1d0b800a9ec65b40000000194fdde9967dcfc7eb3a46dbe5eaef9ed19173949b407e3a9211670c78eaca196cd1aaaa1fe044d4c456e80c82ddc87714fff17ddf13d34514a5b9676ffb1e5c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7018f88461c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2588 1380 iexplore.exe 28 PID 1380 wrote to memory of 2588 1380 iexplore.exe 28 PID 1380 wrote to memory of 2588 1380 iexplore.exe 28 PID 1380 wrote to memory of 2588 1380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a0818a4d009f832dc3653b7ec9982f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812dcd1c84065a43e52fd2ff2b56929e
SHA15ce2b23871b434bf35621eaca64bfc0f4ce39d14
SHA256d890557d95744729191783a76817a1613d1f069a07649f6d6551ab790d282e4a
SHA512514ade3d76e2528ad92efd43e05f58e1fdd43acec357fc99255d526e7ae1296aee2eccd9e64df1739878a71a83fc94d47426e3577ae6e7cfb7f50b95a7acdd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554daaec8098dde05f6a03ffa37fb184d
SHA15f57d8ea1a332ab615d2685e73f33d2a941a33a6
SHA256285cd6fabe25e689e4b43af3a4a459ae2d3f4baa7a9e3b2a742344934953ada4
SHA512a0a6442190b1d26248ac51d3ccdf49c704a92a7b4430613e3fadcdfc74a2000e1ee358ff64f2fa68a67d915afbb678c68b040c10c00452b3745317f3eda405a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57373c82c17015caa94558dae152efa0f
SHA14036d6624de78421353350719c2f5b8346ec2d39
SHA256d649d56f2bf4f4d879fb010c400f1f0a880b4c979dbbcafbf89ee0141afa5e88
SHA512160f6ad4278bb45b78c85ff0b1cf87b63d76c099a6cc78b127b681eaae2e23342dda6bf2002dda09a56e8161fcb0d9f8f9fc813483be9cf7eee9f0894b96ac33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c557348dda1b2c2e3defe14d4dca18e
SHA1b7a10bbf7184861d3fe3cd4c55d5835780616939
SHA25616c2c732a0386ac2d8d393bbe10a45386f0a114cc533d4649d20826661d8771f
SHA51259c9703d7a4336b9dceebec5c1465505be56c9bd8f9b713102331711082f8337c75169188b9763e38a66682e92d42d94adf8dd280a275490fe03ecb3d239f6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2bcea79ce11aa26e18aa79c9276063
SHA1666ead454c26042c29e6dae0acf1a0606d0a3a06
SHA256cfa97f0264fc80d12043df1e996658692bf8518d49fcf5f78959b47762a709ad
SHA512bdc6dff8c2c02c1396a6048b3c20e86365ef1e133bef7b53d0b6e311f578b0e67d7a231821550b3302d14d8d32262f758a11ba18ad0b52982536555f3a6b847e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2fac9c827dd94a2491f06ebe875af0
SHA147519ab4c4f1f2c83c988feaa0fae1259c1b2ea4
SHA2562fb97f119f8e9d4bd3d2aefc028e6ba84d3321fd9299af4a6594c47b251bece4
SHA51284b6df2094c607cb2bfa6a7c88feaf644b54017caa36585eda8a33d277cd6fcbeed12ae988624148cdcd22a9a97a93cedc07ead7e57673f87e3380b710439f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcdc99ac3aea30dad96df490f504510
SHA1e57c830800f15b10dc4a680810a8267e2f608ece
SHA2560a9426376f26595c5c913985b3241d05f548eaf01ac78c530a3301478565e04f
SHA512aa7bb47bcb5d4b66fdace7306d81589bf71e3d02127d995fe0eb1cd80ec08075efaec021efbbfe81f806011e5619f85f81b99b745f96878878f56e30b2abdff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e251cf62e649f529bba1e8b6e5039bb
SHA1c44259328e9dc2a94849bf5309c15691454c45ea
SHA256c0f401b9e1b0d18bcbbc0305a17a2bd185fc6edf05f63a31bc48a533f182f135
SHA512b8491f6afd356035de80db6f61015ddcb458a417318df0280bfb296151a06c36df43b870c50755841f95193316b61d8a33971b146ef31b7dbac148f3e3f223f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b17b7c4017eb9a5f5b8cc6628d2824
SHA10084f1db005e5bf9d25ded52b75a81f7ab405bee
SHA2562cbe9c176d37137e336994b4a8a415e60eef8869f677e882813dc20fb15e87e0
SHA5129c6d6b505ba9e9a91725e60086cdef8e13ecbe63eec3aa147cb0924556732cdd2ceae927fcb5b10d9c426a938d240bb0edba866ed6c29cd9d01c3661aa8ca6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515223140495e27a840411a39ea2fa305
SHA11be75f7fadf1899ff177fcacf7007e44cdfcd28c
SHA25695ad07b9b08492458a117aa36b459c6a7d390311332319d77a417e3d631a0359
SHA512a8b29609008dc3be56f741aee3807b7c5c9b58bf6ddef9d22f5d2c00866ac89cd1eedfe9e0baf7b80bc93121c0a585f438bdad74ba5c9aab5615f948201daa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e7bd0df2fb106c06f5c4401e5ed7e2
SHA126048fcb24100a64d7778074370bde1883fdd882
SHA2567fe2b53fe98522697e06842015b8c4b39b3049782a1226dc4a5b8c083aecc53e
SHA512e46ff53ea57c314b7111203a4a0e22164a7fa0cb85bf741db431f8a7d2f4853a3a2591a0245a45ec87918038719a24a80d6bebd8b020d97d361dbfa73f364125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b461fed338551228bf9dd96d69330480
SHA1132eaa0c05a87f505d8ee36f7821d1102aee65f2
SHA25696d9b7601292de50dc040b14fad1f67c27fd32f7b8122cfffa9349016f8bc7c6
SHA51252d5c7e699433b0a332564eb6e16700392e507e7a2df29d65dfc7cd4905a56d87c9f390fdd103e0dd8d9538a24a9e3bf7c3228715f76dcb867d107503eb6cef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e282b7817dd7717025234e760385285
SHA1b8032717bfc521e4467f26af69db4faf0e90c127
SHA25608a0316d60e2448532e40843517c6232f321de833a59ae62642cb5c322759457
SHA5126d8be593a1a7d65950c2f8d6e4604de2a4e9f6be713b93b40acdb453d54857c11e594a9a193a7c488231faa9efa3bf4a257fe4b5747c13582fd50946713d81a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d084cc213ccd8d6015885573260125b0
SHA1784ba6e8f89c521624e6c3d813d410703066a719
SHA25671a8c1ffedea45f9a9dc6c358a4cf1d1fdb7f4b7df04d7e353bfe5018f31eb41
SHA51202ead4de798d93405b0e40fe6d788ea5708de55197ae331183401f74004267c2f8766a2770cbd61efcb5453fc11a288ad2164dba0a7bf3a44c4c5e6788c57a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb91b28371c307884b9586f6898cfb8c
SHA16af07874c23bf5c1dfe3990d69eea6dded26cce6
SHA25663a312949441a9145408bf86889c491ae412bcd6e2fb8e5b66e76898c63ddc00
SHA512de40f8791b959669371917f899dbb5ac6ec82f34ee6e329b42c5fdb2fb22435081f43d5e09bed1c05d108d356ce1199b6bd83a916f827e66ee923392b1a72a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49cb147c871d34b29a1bcccb1c3349b
SHA1014d7e161e662560f40d5f601f02be97ec78f6a1
SHA256e788848594d6c4bee1f4070701ffbc0659286513f1124128bb6102867b01ba02
SHA512467f5c51d5c7469fd1e039a0700f5a660306286983fdc92726c6af3ecf894c936bc35bea7c803a56bccbd6669b4b6fb9e2ad198ffb656509216184fd29986a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3469090168e9b2eed06f04bea956f44
SHA1f29370b9ae2e77f48195648789a5057eec0adc70
SHA2569a0c41601c7995ac5b91bf250a4961ddd998ce940ba8cfdc71d0622ba408c242
SHA512caf1cc2c18d75dff56f7e7cea4411d24d1f8c9035a2d9a010fe5c95db845fbab2615e96707a8eb5e57361e14c91cbcaddf44b952f47b467757e5de0e0c7f58d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb6837c15723363650fa7e0bf9107b0
SHA1f6c3e72ba69632745f65519613babf1d80c773c0
SHA256ce9dbe69ce9f0e40eeb314046aab5c147b15b759a6186f82f62a4cdc19695be3
SHA51267199af1cfec03adb3e6f66437b9b0f0183a2ca8a91649e6ac098b85f4273c9c05bcc92df849aff17c7d30da9365baf7beaaf97798f77b28a537ae7ef0f1bcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab8a1f56d00bdfec696b512f811a948
SHA1da607490981444c1b8dc72b4defafa4da46f39f0
SHA25650d2c0ea161b81c7d9c433786b3ec75186650e81fda967518945b340f3576b08
SHA512c10457755acfe7469a98a627dcc97e8d7885e0bc57e4f5d5e76eed0e715efc7b8a55efd998e99539b34d7cb29db14fd13d0bdb1ca6697a9ab48016856b82b0e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b