Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
0e22758b4b7595027ef225dd6dae2b81_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e22758b4b7595027ef225dd6dae2b81_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e22758b4b7595027ef225dd6dae2b81_JaffaCakes118.html
-
Size
6KB
-
MD5
0e22758b4b7595027ef225dd6dae2b81
-
SHA1
63c8360c41569fd87c66ef13cb084eea49670f89
-
SHA256
3e20d0fa5e91446dc21deeafd0aa560e4491ac89e3af234119b3f14706ed69d3
-
SHA512
cc505092e74891bcc82c867637fbe42c7255ba9cc33f16d62d6072314a10dc4ba35b385b03527cc252212d72deaaca8bd0121e76dfa71fc8557fd98ef42c0279
-
SSDEEP
96:uzVs+ux7D5LLY1k9o84d12ef7CSTUBZcEZ7ru7f:csz7D5AYS/8b76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d21ef3fdc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E010851-32F1-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425481532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b623e9b7128144fac96f874944a227b000000000200000000001066000000010000200000003aa8179fc5b74d9b9b02bbca90da89c7c4130201087238c6426da3e3e725b620000000000e80000000020000200000007eb8730682f67620d152552aa48b618f64f5b3e2b13a394d7274fa2836e7575620000000b52d804f07d6490ec1d0d4c2a6b62d1e3de7fdc90fa18f5f88cc1f3471c0f11f40000000b5e045b1779d70b0fb6c7854efec47c0cd8942aa7a95e55bc21cf8a7f44c2136822e58f62b26ea1a879a814e48256b08318584f33e2a89188f10ca7e87e0a56e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28 PID 1688 wrote to memory of 2884 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e22758b4b7595027ef225dd6dae2b81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22aae0c683d13da747e25375df21ec9
SHA117fece3b59fda38c6433eb04df11d2f3a62d5b88
SHA2563b42e0b794a56d15c47fa1909c536d330fe880751c925fc9d303e531cb2b43eb
SHA51237e6a1469ca814ce8f1646a82a634da03754874f8f7a2940677fa9302db226a99c4fea482896eb912c596a389d7a302a681bc7df09385b073b49d50d2730a6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72d00ea8ebd1173cb611a563280f453
SHA188a64e61a80954539ba54b9d3cd44a454d2a2dc1
SHA256602cede5b4caa375591131a3d89d514bfeb119a551b3983227cf8eab5ced4665
SHA512b10f72be7d21ac975d48cd22b9060fb519f8f7e1f11b93ea146f7183aeafc5bf835f9be5f214d5a2949924ce20337ad613d372800f1aee6b91b418ef7004e769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dabd11cff59088d6bfa689ad3f3a5a0
SHA1c4fcb63ec223ca2088a6bf0fbd5882bd341b0522
SHA256d34d0fac282bd994608c01ef1da103e4606c50ebd4ca4808cd1878732b921326
SHA5120574c86a7e552ecd6f8110fce8a72b53fbe782d6e99bf9d8e166b230ab8f16c590ff6ea6dbf918e5b568de7b5d7dae5aee1423e73695ab41e75e7ff6641e8f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a3df2c5fb3e3859bffcab5978d4780
SHA1b56c58a8a696f3ad8ea871a4ccd891923ba029a2
SHA25632499213efa4d3f2009f9ae95339f3286030be3bc2d87a7159375d465295803a
SHA5124a908e755a2817bcd491ac198ec6411984000f1330ab78a470e6e32a394a5cc2f433a205868b2d136be38da79fbdb29f77782016434dfcf7ab3f85c8540f28af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794bf670303027852c3709a2d4f1124f
SHA119ed4127f7a747e2a172253b556d79aa91c7f1f7
SHA256fbbc7ff183d689fc45bbceeaca5094420984c666b1d9bf04c1f61d0094babba0
SHA5120802b04e93e729a8ae78ed3b3cd79230124255c0e194d7c142492821b209c115670bd6dd877869eeb349752f22cf128e7c7efa93eb8075ac5bb63f05a19f974d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525afbe27c3f706897cb8ca063a075e20
SHA1aeb2775d8a2283dfa297ba6a812a0ac4caea5b7f
SHA256946d80058cdd32b0c96b839b2a73611df464b3ad5c5c24f18cffba49d0f2deaa
SHA512ad3719e9af93b19fc4da478c89a8a7f8367ef67321229631e1c8ce84669d3c99806f2b175845a5de86273f72a291e74f0c5a720b2f9339a94efc72f68d30b8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f577a77b86b21b9a6f540211ed0a9e1
SHA1bf371f0815605833b6b33d5924342b35d24468a5
SHA2566d46efabce49b98b476191a6ff626b46bf7887788206945c0bd129f150fce7fc
SHA512f7419814481cdbfbe0e758c5f09a55b6c57b302454524c6abb1e3a3371a1fccced4af0c723bde1b0e904307648def6ecdcc0723121619243e966e55c55a8d0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f656a4b57698eb94de363fe67bd8bc
SHA1cd1cdcb358c45a4844f539e39336acb75ad38377
SHA25675d050a5512070783d2b818eda7fe30ff13418090b0b9480054ac2c6fa39b4dd
SHA512dec2475218060bfa26af2acd14b0ab2b128c2474f8de8fbf9419b4f7020bca255c33cf2d965d20a562d69068c67b497eddc85eef0c353ebf3b678c30cbe00753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561197f01a77ad0533dde57cb8da2b46
SHA1a1fe910dc769f7c8ee2db76d53ea0839f8cfe246
SHA2564311e0e2425f87a97c4ed9baf1ea6f41be61e93ffcf01f526f3bcef3659d624a
SHA51271c347e7a410007145a99dddde5d8e6e8fbf38137b682d81e5727e922fb624ca49b855d2127a6b2b4194a7d7a8e672d1454f52286d5db5e224d850ed26e2fce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f939fc2352c5dbb5108ac2b82fea1e4
SHA19df07d9d6c23d3c41bcc0ece9c033cb779008575
SHA256e6373028943d402796ad83a8f73541b8575d23eb5aaa77d20b518957b2d84ba3
SHA512d7e89a94036958d2cda59c8db46f3d5ba12ba55cfb81d4129f3e6ec728f3ad6f69415b7e102905bb6cf17c2d98ca72001b2093fa97c68c569667996c35f3506e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad21ff27aeb16d3af8bbae868d640d79
SHA136f6be76c3b5f495e55f8f7563b02d6057086293
SHA25697ae6459c9e655364532d1137952642e741a102c71b7bd30e5aab463e06dd638
SHA512bc342b448f78bdd2c47c61662b8378c080c0d6f097833b3d613d5b55b0adf4ec30f01a4bcc4bc3750382c6fe54e78e4eebd3a336261c4394a49d84535cf7d57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27e74f2926ecca4322a5fce805c97ec
SHA1eb931f72f74f049e9cc785d86305ff2f05d2cad1
SHA256a4722e2b82f6be39a68562fa6af10182c640a0a15035a1666d4ca95fe01b92a1
SHA512d2cb675459d1154997b403369c20396c0f48b168ccefecf0d870bf9df0133ec4824b8d2f697679e1509c9ae04a2bd77a499223d2491babe4729f61dfad2c4d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc90104acfc65150de3dcfd5bec3ffd
SHA1f4f60a84348b10ac7a17cbc5e4fad207d7451873
SHA256f071768cc0586cb7942c01e9701dc67a3c689bf19ba398942e797065c814e77e
SHA51214ea3ffd45f12e811b7233197a409153300e74b14e4b67c00f16bd19d88c028df40b6e8f980bb1d8bb5ca5ff1bc58ed26ad61457ddf0a77caae25e2a7a13bcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cda0b8598a1286d7d3120ae7c1f12b
SHA17954390f0194ee32f4ead2f14b0823d05bb98adb
SHA2564e8a778f789d573bbf29a6b6412de2c83c99529c150071609d85e8a520b80468
SHA512466f6e7f3ae9f186bacc1518c8bc3a2d486dbac88231c063e4ecfc589267495bc9129d6a407372750bead728d5531ae537b7479d257d3ab67d58398fb33b5b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537824c85beb7980007c12be75642ecf8
SHA1d97d2c59050d3970d32dfbf6e3e544409a965ba3
SHA2560b7c787a7faef17899cbe15db3b5911e588ce5d6655a495572ddf40bcfc01255
SHA512a2d0a7a9e9a8508b237ceaf41a9bc8309e89efe682b92d74b3df09522061ffd50b0ca4c0b31b34c211fc37a4cd428f92898f87e2654b3ed9b403fb8b867b8201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec37b37e9e52a16ff60c426948f0de20
SHA1335c13002693a6e7aa63c97e24a46fc35fe7ec72
SHA2567756ab16d5b9946ae2ce380408e649ed5fe8d6c5f3cd2521a27a25ab9950887b
SHA5126067a0667050614b9c047787e6143c858a027cae4908964104d2f68fa4c13bbc9fa6135ca8bdc131d92c777b0f8b7c36c918fc7b013cd24dfcb29e794e833928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae34e8ae63ad7c53fdc77b378ec2c0d
SHA1502af825bbbffb73a96c34c8e233cf4ff9c88b8d
SHA2568c29e0a45171eef91bd742674b7f2f04d60bf82eb9404772281ea9057b0f9524
SHA5129c657e844a0f6833701888fff9766812c4d15e917a1a0344ebd29979b5159b60540a9b6f159d9e903900b56c467be7ee4e377243970ec7a0ec4dd4f293d35bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523518f4b7c41192273e476b2e0520dc0
SHA191e402918fcb241845057d3dd7f610366fb95a00
SHA25606fd3085883888bf97f539f12356d3fc4b4538ae5406e7fcf17411eb846a30b4
SHA5128c900e44aab999ba74227ec4366422f4706c024ac1b7c4d3fdcda339bc2b1999511f625fb0959bc27d4f99d2acb748c5e86717f91dcf0ecea7649518a69b6c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34b367a41db646c89df97b41c5be0b2
SHA1aa831f34be4c36de06bfb138c2f837c97280543f
SHA256ea8ff4b845dbc6e0f028cca253193d26b3ef5525e63b9b4f245ae9590ff88611
SHA51281f0877ebdb4764d6982b195e458cacaf575e0da61256f11573a1c30fd9eac5a6af361fc2c53e597f68951a90688fad28de02a9cbd4f806b2314a56384f11d73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b