Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
27a6ba11045b3e58414ec214705fdfa6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27a6ba11045b3e58414ec214705fdfa6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
27a6ba11045b3e58414ec214705fdfa6_JaffaCakes118.html
-
Size
12KB
-
MD5
27a6ba11045b3e58414ec214705fdfa6
-
SHA1
ddae5f476d7d3503807be8b38065849b0c4f9839
-
SHA256
27d586a1a8bcba662a06023f197bbc5354f8a5ab7bd1d5bc40eae37d2c733c82
-
SHA512
2cecf510ea208060ce3868cc93b4e9e027db83fc35a96da47315e2e0a5b08eabe8a3f0850c7c3333fa6443bc30776a8fa0a6ddba23328558d9152c83f38b196b
-
SSDEEP
192:rYak874qilqwQ8jpizlUh7vhcxjqMFB47ZGwIRt9+un5KvEUWFl9u98JC9D9C2CL:rG874qyjpilUFvhGjnN7QXWFbClpI
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d2719ace5532a938e3ec989e1805e926a50fd86884aac3b6b32962103284556a000000000e8000000002000020000000bfbfe9af263adf8f50eac82fa1c83532b1500cdb3cec65cf5f53aa8a4878b4b82000000050d3850d04a4ca288dd584f1bb309fa1ae9082c41938394bd97aa1ecdb76ca2040000000204859b65dfeb160888dce963b2aae54dade238ced42a77387002047d6eaa3abb0791bc27518bce799c321ec7275d339234db92f0b3b111d3af52ce58960268e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B3072D1-3B65-11EF-99AF-7ED57E6FAC85} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c1397272cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426411173" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27a6ba11045b3e58414ec214705fdfa6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619588252ee930b7f88f791c81b31b8d
SHA196266d810086c710c3f973388d4d67f3c3a603a4
SHA256072376335827e389a2228050b16f89339e5dfb921953b197567373fc1f04d643
SHA512cae63d79b4cd8419e7612ec5a638a6e97d570495f754bcabef62e94747a27348c56858f214bbbea39b3c04b266e3277a4a87cc2c41f3fe1e88ffc04587a90a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6658749cc13f5b1f3180fcc88785a7
SHA1f1bf6dcdd4a84e05b1371a993a7e88f2da0e69e6
SHA256f2d1a7ea1535228ce0a9ef330a963df17e2789357120d914756f715bb652c8b6
SHA512bf581fe1cca3d5fb1e6303efa10352a527ababe747d2099feb32a401326d18120de60efdfec41c4a32e8975cf1474cff0212a060615334c3dbcf0caae288d12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501bc2c1dda640aff4f33f28982b35450
SHA1eb58342aacc484b95664b5147ea84932342ebfeb
SHA2566fefc8bc5ba10c1dc80d6493cd78361833b5f5936b42156f57e7c72638ef43ab
SHA512b90822b7804034187b4573c4045bd78394de085f3bb49d9fbaa983776edaaf8c95f89f2088c2e812375d8a68e2c38c14a83beaaf12e1b075abe3571ba2a4191a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584418b92a2ef956f851c3c46d838155d
SHA1f00e109ab09f7dd05c42ee04e03ac6058e5b0aca
SHA2567e153e94c1989ccc83219788034c2bc0184cb686689a54d869fc27a8ef780210
SHA5125ae7b7c9aa6799ef323856b104c9459a1fa4c96b68f261c6a37385013c66c4524d44e684962d7fde7bd1de13b157534df6c951962f9ef2a0c26a3d6234cbfbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f953592a62f54f6cc36cfee706249e6a
SHA1d342e6d90bacaa3f9a9acf86be7bfae00250b6f5
SHA256a71f69ecdf5fbf6792bf360f242da2f4d9b6ebf154e2df7ec47168cb593af32b
SHA5123cbae4e4da4a038d17e10de8606893df40679596a164a6c916c6e38c8ad2e5cc3c07819f12ba3ec4868f626b75bf581a79c8a0649fd4d865ac6c5f34289818c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef15695a5a97c3e7f0fbf1c1e11fa8f
SHA10fc1e0c3ef4fcd5fbd8735e45a956ee8b6f3a150
SHA2564fdfd98ccd48d94316c515f466d3417bfd3f7da7586a5643bd877396bba368b7
SHA512b4a836cdfadd4c5186aa2aa609fda11d1248d3963bc48a0b068dc7289e8e65089bed0ff3bd97019f6472dec3bf9fae260f53c8e500456975e4a00faa14951079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb47c4ba1cd98f92c37fa1409ac12bd
SHA13b3d4c4549d6a326fd3d111f75d569f47e0a4b78
SHA256aa506f0ba7f3a7c2947df083831c5a62ff5ec4d710f79563f4f34ed0871383ca
SHA5129254d8d4e9255cc959521dd381aa84a6d726eb1a4cffea7c1cac1f3e5cad76683fb20d99242ea3587b1999f8962d00da4831988a015f8e8be4cca1a40f5125c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43a074457f9abea87922bca8a9a2f93
SHA1c6e2ca3bb79048a224027d7fb9baeb223dc4c340
SHA256f35b18804169662b450a994e9a739c5be35788d925b6102773dcfc237e925864
SHA512e1e08b392ec1b914df58edd4979b5d787a45ee993f7857741a45037d82dc9fd632d99de26e15dc408ff42d81800a9c0f499f9e6e4f38ad4d8367f93a6234cbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5c10053c3170d183b11ae0e09f29cc
SHA19dcd41cb69a9968326621f058c54e8862aa89800
SHA256a10efd3ee6768fb8c7e439be482434d3ec3f38e55a9b10f854a71e6b1109c2ed
SHA5127ceb8c46b6284ebe9a23a540f580b253c90818e3c877af1d31b8145bb48e3e8f088e75685b943a46c683a0d936dab886f58968f6de1a4c4bac5c0deca0374666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb410567b101b137868fd5f6e89c272
SHA19f0610aea1e0b59a36bd9ae6c28be85a1a6d747d
SHA256f9061097ad1a8a3782e4c91a63e962fe59804ffb76ac219a168da0663c8430bc
SHA512cddc7786ba1ee9dfa5fb61f1c1da7f9b5cb4d8620d173c4cdddb92d3e609966deec8348102816181edf35016ed2221caf64e5a1157e6d9964315981817197949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54911a1bffb28664e1e6e20e54c4fe197
SHA137aabf4c029b838ecb7fe9a4b1ccaff580a70a9c
SHA256be5f3b67151eb7f5ba5c741b784de0acf964892f1dba0345e914a1360969db21
SHA512df159e75f289ec9dca9d9eaa6b074471599951055b6e0e82ed9df30de4e4e228abe140ce5cef5c59b14c4472d41846bc985b79737e7c055a8cea5fe25480ae66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1973e4c113736580ad43c302c17c34
SHA1ef0b1f9814dca432daf17adb8f8b1318a71f8679
SHA256a3020e605f54ab1fceae93cb8b7119e4d19f0f7bc97312a44fc012b1e5e366c1
SHA5121f5e0ae3909784a05614a5fb51cf7abe5191be54291ef0d5f2d5d6e6042b9c376301fc19ecae3c5b4b4e8c9acccef20ae117c11cb82c18bcf218e168e928dcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cac0834b426292afd4d2952bbbf29c6
SHA14d19c913d050de267b1ac4b627035bfc7dfa838e
SHA2567d9664ba78345b2766d0d78bf8cabc2c73c0807e72aa9bfee2bdbab69cf2e64f
SHA512ddab733e7989c3a43e3fc0459cb86aa1d93492d50ec7d2cd9cc2339ce2b48fc158f1500da506a3026f6ca33d660e5bc1fc371578735c9fc7a8544d61aa8f5708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065ba9d4deef3e20e9d75766a1590958
SHA12c9615e755e6ff9e7a6e12a97ecf37d0a843840a
SHA2561e367afee11f974fc828e694f01f81491e25456ec97048a09042336026eacfde
SHA512efb694a956332231f964f1138ee0269a34ab555ac86235a1ae9b51d108864519b0bd61feaf02cf97077c31bf80ad28d55382ce0875b513a8fe76eaa3652afac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bccca83ae7eda7f5b8e368194f6700db
SHA1ca5df752fb12891802cf79dfc50e25de3a1c8e79
SHA2567ba03be98176508f9bffd473bfd75b6f42b80562e9fbdb56dbff0ee4fa611d42
SHA512726f52805c1b549da9824780a3a8394a580af39bb6c89d205b922b97935cfbbf60d3d91ff2f6ddd429c7e660c34809824f3d2731ad4e59585417ffc6540be972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940815a990c1649c8bd381db2d60b0e8
SHA130815e14d931418184a8fa6aaeef1e3ec93bc567
SHA25670bc738fbaf77bf9f52f9c80972c4b9c688db2bce93f5355662a14dcd78267fc
SHA5128caeda95bbe774089f7707741ea193bcd8a7bb23ccc79aaef35edaaa8eddbd3cbaa2816a40520e572e7af07192f3a6d70806186b38b93738ecb77bdb93b11876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c9db6755fdb3f3570332065e77bdb8
SHA1f96ebc9635d5a310dff0f8a75ed86125c7f2943e
SHA25697f66102adf02909b7a18e1f7d5d97806cb9ce9ac1a04dbbe02034ff27ee38d7
SHA51289f715669a4b4f1961244c96c6af5e869fa70410b1261d35bc245f9246ac2acbb4d0f205027cb30b293c99dfa67fa554b43a429ff3faa38f00c792a20a658907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8f3921c45e9ffd0505951a43b6c534
SHA13d14f05f0c1364159c38ecdbc2ba48ec911fc666
SHA256b8847506a1c39e8c66ee591572ac0a68e480fdec91eec4633e18f0a472f591d0
SHA5128a08a02bae927b0fde755dc6bb2082340571d5177bb104c15ed6b876c3e02fd0e6060e1398fca9e1bf1ecbd5ceb6a07767ec60bddb04411d711e09c7922011ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b861ffda433896b1b8c6afaaec33ec7
SHA1f1357479c2a1dfeb55adbb2241ee4aaf5b6543c3
SHA256e8510a1f2dde7c27998893706f9be1cd4760d84bfbeeb0f6c4c804d19a7bdb2c
SHA512104a71f8676d5cd14b5c0bb2d623a4b8748eaee1ddd9b4222d75fd6dc18284c6dc6f086c108318b064e32c5c5454399fc489d769ff4e9c6b778e6b77a42e1bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b379acc0f887f283c428d485904605
SHA1f8a16d02c112c7c3d71a08ba333e38970d8f4532
SHA256dc66b2e2124de06b1fda63e444d910473417f5f39b8463eb70d5f3ca81442b83
SHA512a00912b3f1adc7027c3df56803abaecc718a669d197b35ebfed54bebbadcff97ac779db0fd0fd696409e87d1e267857c82d88c8956d33450e6fb91efeccf6d64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b