Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
166dfe377cb23f8dab0ca3e0713c7c3b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
166dfe377cb23f8dab0ca3e0713c7c3b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
166dfe377cb23f8dab0ca3e0713c7c3b_JaffaCakes118.html
-
Size
118KB
-
MD5
166dfe377cb23f8dab0ca3e0713c7c3b
-
SHA1
1b1add09c7ef613c6b460ebb165f9dc13ba21520
-
SHA256
48777f37bf71c017ec58e531a180ec7f1e9d12d0b8616ff5c738fe8339cd99fe
-
SHA512
c7af83ee91fb54dab256e59369729291136e15b10acef2c7ca15884df2d8c69d1cefc107672c78e0f8bea92969d94a167a26013d4a9a9b47c00afb731b12460c
-
SSDEEP
768:E0x+28Ri4qvRvjrYb2vlGM3Juc+Qpj7p4gRKMTDBQIy1HS8Vl6vd/J2z+nTjniA0:9sfGRXW2ttd+pi1Qx1y8Vl67HjP0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fa50cba2c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000000a7bbe10a73f2bfd62e4ef4b49d2e1b1b6d52f336486e3f3153b044da4d01051000000000e8000000002000020000000c5506a02ac7062860a7687b95ab62058cb0e0fd5f98be672814dccf0ee1adccc200000002bdd7958b21845594b83b480e498de110c8d72bd701d6a4fbad0f138eb9daabc40000000d6876e8243ed0582a0db48938be18b4e1e4dd13b3d65e1a2e85f91243aaeac385fcac37615c7cd79903c195ac4b6391d99d8febc8b9e4b5122861495a2c897ee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425662255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E545E021-3495-11EF-A1B3-D2ACEE0A983D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2456 2360 iexplore.exe 28 PID 2360 wrote to memory of 2456 2360 iexplore.exe 28 PID 2360 wrote to memory of 2456 2360 iexplore.exe 28 PID 2360 wrote to memory of 2456 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\166dfe377cb23f8dab0ca3e0713c7c3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50874644d677c77c02f29865cdde66a1f
SHA1be894c55df652c2c6532ce05ee6a3d85c1c9a2e8
SHA256e794867121189d1f72ba5a4f4933cbfed26f1e77dfffe11d946c8e9d6aea19b7
SHA5121c77e9f76a7e3206333880ca0ae384fb0c82651a847e8594c0a9e1722f8b095d92845124a4de813e5a55b4dfea627537d6d3a8ebb7514053878666c600003b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7ffe034a76b74fdb95654b81976fc0
SHA1b12de2709c47ad52d1deb66341f60bc85cc6cd16
SHA256ca89c99469d11a8cf5f2cabca663e23334e09f4eb3626b46d15f2136c18abfb8
SHA512781ccbe6a79d9c9a2706a9ec66e1b792b954e123283883405ad3e204eb80609f967508cb0f121dbbcd81bf6e84d82ec47a57d2dc479067dba3676ef7a3e627d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6f9ac93c61f10d9facc79cd67cdb04
SHA108393e3ec1e3a388cf13d03cac9ce73f4944527c
SHA2560213d12ea58c3205d6b707088fa89f9bf1ec2ad5da196fa8c6575db7a7f17633
SHA512cbd82b5ad1ba13cea8151d7215fed3ffa041297c84656de552a449d8149d72ca85eb9d3d904974e622cacde3830507e89b63c2bac3a2b1ee1ca24f2722cfe94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e6255085f4e838ffb1483c4b88e7f6
SHA1064c4798b72521629d7a0de678714024125dd145
SHA2564668e186fa29e2812a579287a489f44c4f8d0dc0bd272eb6916751e481db8029
SHA512acb79e712050fc8ef72ccda64a0515f9b05ced23504ad90d41f6a3ec1ff3dbce3e3a232fa7d61b8ca0cbcf82f0b7613db5e547673ba6538bf4e4af3c881dabd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597982f7fce3f83855ac578ec90fc2e7a
SHA1ea2f1cb251374ec93cfcdcd50e5aab87e24fa946
SHA256db2e31eb732d23d22c788da28cb3902d8dcaf7e98a3f0a9ecb03926c661da207
SHA512f835437a369316bc59dca6667ad4f8811c0f60dad07921c9f2cda37ec6aa98b31bbf46195281e7c287fdb261797a4517d28ad932a3c02e315d8332e966adda28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c012dbac6a39d8d20079453701d50f7
SHA1496593fe17efe517885a04f4c712dde26dd53674
SHA2564807288f1926d04f465363b6aa891145d46d8ac7deba64d5726f7207a58332f3
SHA512660ee667756cbffb7fdd0520e7425e62a392fde4a891dc5993c4687ff67a4db4de119db49d3c54952d5cc5725f95e27d204daabd1b489fe5fc7979cbf440ddd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b82465ea477f11d2e7770d17de2cb2
SHA1e6c81c8da505a5d2c01b0e2e8b4554013d47b61c
SHA2561469228cd34b47bfafa155ca7c01ed92020dc822b109c0afa8cac8c113cd50d4
SHA512806844111f7c6cde3466d26941b4c88e2f61e79a78033ea386d331b0d814cda975ae6e8745bb82131db2e668228f54c5582a2af3ffcf943689711e29983271c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b61991ffa26b723fb9ea0948e0c506d
SHA175756d7220585dd77a1a9c6b7dd32c912acb2b0b
SHA2566c1cb5780969aafd7ae1068ed83cd98990723b38a4ce7d5670c9eeae98631932
SHA5122f8d8845234312c5e5243bfaa84f6a1b4278703456f981ca167671bc4945df683f4c1326a4299f99e407511c5b9eac05aa53c4e2c30ba315bba738a2c584d5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd3cbf7a2cf4152c8d5312ed6efe785
SHA1395c35b9809fec0dd6a3cd4a15fb228577ebacf3
SHA256f107a7dfcdf1e88340ca34da9ee1a026e0cd6ab2575e0aa9af077e172f605111
SHA5124c18e5a5ceba40e9fefd569dfb03815b2591b771d757d796992a7b95d02be720e0afeb64f0c01504570c214227f466eeef6cc66ce03e46990b13d743b83848b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ea9295eb83b8139eac6e37ce1df2df
SHA18338435526441557122c75a6866fc262757bfd24
SHA256d589f78e8d93bd7ecb6cb167a4c82cd0abd086bccae212137e63a890faa5fffc
SHA5129f57fb82604aa85386b78a49347611e9f57647769363301df9545ba31c11ae766bd81d54a75ee96c6a5e370e0018ebf9c5d66672beda9641030f1f48bf368573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d552cd311379eb6a88a3986ac4d501
SHA1ce06874bcd3476fcb159d28bbd2581f95a9fb1be
SHA2564576739cceb46d32d42adad3315a0f124ad4067adcf2f2338837042511ee32f5
SHA51256bef71c55a2dd679b32390827af2efd335e55b2caf04028601813cc0b4133fa076a08229e98646fb9865811216238646e16fab1ed7e5c4fcca484d7c8851870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fe5675d177c296e2ac3449a4e2e374
SHA1eac391914b8bdd5fd883e96cbb97e40c76aafc9f
SHA256917cf8b329da8d8c25a10a4f386f658191dc812bbe98cf3ce013ab2be89b8b3c
SHA51246d97530df1b872e4e169fa6243f8033757f2e4f5fcbc882e353eee183c20c72f87fb47cf266e68a98088703d76b86cad5186368e6ef4b7edbd3c5311ed6df9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585332a37d91eedc153036d9ae836ac0f
SHA1a85df211823832e3bb9b4d34fd2ebb683313288f
SHA256efe1d37f62eb37bfcdb5e75be57f66e0b35b2a3c1e6233f2e4e173e7fa61fe67
SHA5128c6510fea87d096e5e619e0e0d015c1fc51ae95906c1e7c80424616b7a353dd7a1ac361bfd40bc076f545bec1d876e23551e04721d869de94ce504e98596cb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a3934ff439479452b5c4fec60df65d
SHA169eb24075c3f3efb2913498113c941e5cf37ae2b
SHA256b6c74e8247845113ac1a37dbcdcab9cc093622a14f53e75ce43e8014a92990b8
SHA512a7846744189475993b37de7c947805ff4d16ad65d3cb09a88a1377b960fa06fd8fc30e839c50888d485770618df2fe5c80e7064ed2b43d8d170f0082468a7e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c9eb2ab1376d74a3e420f29c1b06ca
SHA1c78cadeace1c364955f77397e458cc7810fd13e6
SHA25656c65334c97753d446466209cbc4aba69549014a7104a1e140bcbbbd33cda87b
SHA51278b5b5520986518430b193a1499c905284ffb0bc249609c58fecac49cdbd3896e91f9772a9f7a7fe25fb2d72f4720b206aff630e163413cbcd1834cf7bc6a0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b17c310c570541adc660a9189438132
SHA187ca45d1e6062a46a436a25c901bbf1c54bf5a20
SHA2561234b6ad5774919a874ed0a852963a630487845991ae3410a849ee48d3c0f56e
SHA51241c2ff4e4edf7621b63632bf6f4a1562c3d2d953b5f67f346ad21bc1231f3f64630201e38832218b70b955adbc942ed64368ed40beeab76ace191926ec6764fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217f1ca18788520d2c5223cfda51018c
SHA1e51aeb0968616e9e591f38690374cf89c3a233e5
SHA256fdd127c6c8a1d2797fa92f5c8a6e444d46c7d8695e1b17b82863cc7dfb7b1ed8
SHA5122ce46d2b77103012de4877882c4b81d1fca1ac2c84bf80beb9b490152903e97ab54a67bc9306fcf54273d29bc82b507da5f180370b9f0a0eeee5e14051e895ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff2344e9e08dcfe19cc48ea1c8bca30
SHA188faf2934bb378bc06459dd99e77fdf5bbbd2a93
SHA256d1f51bc2634f56c555bfae2e8fa9085f4801120f1dd97415f1b412a542fa717e
SHA5123a1743f6cdb55ad4fbf89837d9568c71244c60b328e707f7df17919c5bd6cb72dd5ed5fcfe2e90806888545ed14462d13e8cacda3739d4d3f6431faf7fb0ad5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590448398ebcabb5ab5f3226ddf1acf10
SHA139acb5592227026fbc645f72d5356cc450fd03b5
SHA2560f4a9ed6b7516000a223df0a0ec791ca57924fa9f90934c32f3b6b9f09c4f744
SHA5124941bec548d5e7450ffd6f247d3886a957c98b5e314bbcfef029c379b17ddf1e43125f73b6836b412532bd70e1d6131ba5694375e185761ec08e5adfedae068b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e08fc74fc6970ea06272ed35e2373f
SHA15efbea51bf96dbb8e86733be4da3be6dd425b6b8
SHA256bccbf9e161f24686a8627b38edb25b8000c0c950d12485724bd723980b59c1d7
SHA512fb38e3119a649715f24c8c7fb57e7084f774827ab927e823ae8522374a08bdf06881c6b5d5bc6c7a2b86ebe78f77bee13b32578c4d8a1ee6468d107d9742b56e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b