Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
2c205c3825986d7277a5189d9fb9010a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c205c3825986d7277a5189d9fb9010a_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2c205c3825986d7277a5189d9fb9010a_JaffaCakes118.html
-
Size
6KB
-
MD5
2c205c3825986d7277a5189d9fb9010a
-
SHA1
9f7ac875f1627e22e9e67a16fca5b469b235e990
-
SHA256
99cd262e66a199e31b6ddfb5f318e1574c152194b26e76d7bdfb7876ce03afc9
-
SHA512
d2d6d15073121d592addf83b1d8cdf4da9bed988d2abd93d6ab071ad0ef8c9f073ee9f08050adf484b82cdb2183151809af15ab7d34a30a4ae36ef58dacced24
-
SSDEEP
96:uzVs+ux710BfLLY1k9o84d12ef7CSTUJKY/6/NcEZ7ru7f:csz710BfAYS/c4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FC3E351-3D59-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e7db47294373e2ea7f418a0344d7a97b82c756bea2806c0e54e38329c4349c18000000000e8000000002000020000000857ebc0ea8124544643c2d0d53226d1d2ac6b050b1f07bbe3ffe2bc1daad964920000000adc56e054d3185e28b5a177d7ad9938be2dd2e08402d932781e0bd43c2fe19f1400000008abc15731fa0ce5321c12f9472dc759abddc36c117c9cea1242d85ebb827d96259d16bbfdc4d607339dafb756dfd3021d5853fc94373bb233e8f277202116ddc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426625902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e009147f66d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c205c3825986d7277a5189d9fb9010a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462cc9234a8c9669e17344be98641a6c
SHA1cdffaadc0f17d43635b28d8109aba2b1ee7aad80
SHA256cdc6a3a2b3631fb8d1180df428a26c692ebdb0c9a2e419ec0a23cd89e5ed31f1
SHA512c140330a895f40732ebdbe814f8b51e6e33fa0c90001c49a2d027590c4c2d984d063a509ea06f8586a2ced53c710176f6a78aac1f76b8401f183de62d332ea06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac9e22aca8a9d4ff51b2a4e2c5dca26
SHA115d3da9ddbeb99c5714e7b78eac7d127987a7fcb
SHA256140ddcd1807be35ca3e27d1d9d490071c561c4dc509b5dfd58ac030b9d7231ec
SHA512a4130f656c26fbb1f45c623209b234f91e07b0a8d2b4400b953bae976163d0c95d0f32d674e2430944897c98fe10dc61e95b4ccf620aca764e6819ed4a3234cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e748c24e573d99f73ce5990dbed37d5
SHA124f4646b5d45343a36e0d05632203ea69ff1757d
SHA2565ca4220238aded6a967bb0afb5cd1a17ddab30ffca03ee2c7ffb79e46bcd1db6
SHA5127e1dfc137e70d1f5810b3e5124067e9cda9082843b988ae3096b802d5ef635989c168c0ae438578340ef9cfcea14854a838ca6b350f8201ac59e33e5734c6862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e10096ef7e8d9aa55c0b382d60e1ca
SHA169277ea625cb8d1a9c9f79a2fdbd82ebfefcac92
SHA256a5c07d19efcbbaa85fa31f6c29a11c3ec9865e66e13a285ed7a271899d5f39f7
SHA512bc26d301cfaf9354adba4c07bdacff07577454141e4cbdf1ec3e353a98ce4d3f163fc293b24b3352751f6d43b8ffa75945e3f24a9a4efebf052f50b200e7634a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275180d06798bc8f6ccb85cffe2479ce
SHA11ec70bcd060331f3e9cbdc4094a8d6ce804e7432
SHA25608621d277eed73ecbc3795d128802cdd1a81d397de60d147ce22b2f6a84d9db3
SHA512c8e436d603200e8cdb242229f2f92883a68580cddc826a71fb2b4926484d4ce660306f3e8ba7f5af6d81b47f60a464ca33fc3eb9df2db9628a3f946528c7089d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58279d4c1e9fc12ab09d978d9a702f573
SHA1d077409ae74c70d24da0279653a9ab7a9b69c775
SHA256e0a263fb5864e9eb36190811871d1cf9be0fca133730331e86dd089982cd5a0b
SHA51265bfdfd8b5a7e977b1a4fc332c08895049823764af11effdb5116f6a928cb7b271e6ede03bfd154f1427f8411cc98b451977ff3903e3e166068991f47b7fa85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515092da640c84efaa21d9c161c9b9b2d
SHA1cdd65421d7451260b461fd5a3ffd59a72a1d8522
SHA25650c61ca2f6034af1a784d69f7897db8f4d612b64cd312c96c987743a5dee48da
SHA512bac18b1aba8284fbf154fec8f154ecb07a9eaf402eb81b6ee08f20b01bb17ca61a626c06dd8b1df4a50f136c05901c07a8942d239f919ad4dc6c9bcb99c5f461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60ab5712dcb4241dd927ce497c6ba2b
SHA184a43f56e26c076f4699fb55ede517920f95f8e2
SHA2566c0d38edd1c60d5498b4539526b60d3c4d766687c721fd3f5a77f4826805d083
SHA5123611383846b264326ab10c13adb12efc823cd90138e500ca52dfeb4fae554172c177052e17b267f8cc7044a5cbc495fedf38915e23ca396e416f8477882723ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55404e5726b22afb71f597c9ccbc89cf7
SHA1a11b48702dc1b511975857d5fa955805f251dea4
SHA2562d3ba53c1b4a97b9839a53eaca0acc585803ca789e20861e0f51ee6e4c1dce01
SHA5124ec8e181f1736c3120f179b79b4d853c91c4faf4cda979c829df97f72d65a3b9aeb9422775c0f2c2d9f03aee5f1742ce229aa8f992eaf7009e179f41f793c2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d255b0af656b85c09160cf1219c78ce
SHA1a8f11c6483b44ac66a884a57760790b500793336
SHA256e8c8320c499a8c16705a7f1d119aefb02fa8b4ad2b7a04630dd4e248a7868a55
SHA51219307ba76a1ed685fee6675f1536a66199387d5363f4257f09eac6d33d5b005c2f9dd35d5094a041d2ccedc5418909f69ef125c58b43d81c18a03e8739cca65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab40903ddf42eaf78ca235ea69beec29
SHA1ddcdd0c34236d64199e0ec4cb8be7aac488258ed
SHA256663d4253f00801be0acbe4668d8c03a0a530f318d16321aa156a778a4a975bca
SHA512057d61bf9f8cc9a8d374b342ef3116dad3af9bc6e766404144f596b1071df6b330d1165e0b85686bc3122244610f2008c055240f620503abaae164e84867fc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b77315da1e2d53e11839c04798fcb0
SHA16b2f0e3567c419ef062e68f3803e8d770aec0973
SHA256b647316275cf69796407ba138ea8a5471eaa7a060779878d1bb82b6a4601fe9e
SHA512abef10c6fe1925e804d0a07c7187dd0fbd0335b18afad9f09493f82509421dccb76b0ce5cba5c60a911c01e3a1b737ae8481473f673e23d52b70a9adb1061ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e3e908324877c29be9015727b6bcb6
SHA1fb008f2c63737b5138eafa4fa5e41edb278f5863
SHA256f37a679421ab9ef33dcfb6ec1fdc97742fd60bfab4ef9bcebbb78dd56f4a8220
SHA512dae86b83beb708435e023c9253ddd7228a2794d21d57e7889e66b1f8a3c6c0f67670e0d9d0d8db5747ed0c8aa2fdd926e1cd9664f38e42c0ca04513f0e62f2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a1639461968771439a70c947f333c5
SHA136e34e86a3d70e02e7362c37df2a1d5e45ac6eeb
SHA256d75161002490f411524a5c7299c4192e467148c635207da43b9970ddaffb824d
SHA51214d6c231fbe8e531aa31f55097682d0e601738d004a066f43f95b792cca8767b747610471438e52dd621e560776d10a9e4f79b691b201f3dd0e5bdee536f65d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ead046008acba10602e5037fde59d52
SHA1abf1afe83667c13061ae852e8a5ddb5704d14743
SHA256010313aab5ba0a34fa5e3e0d7dc4862c04a6d294c923e068f9be350c93fafd41
SHA5125518f50fdb4a23bae1a40ba550379c36d9b235dc970feb866653f1a7053ede1ab431643cb0ced3df0e78fbf5db14cae6fb3c92c30d3c516cc485240ca7f3189c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316e9e0bf515e982a694bbbd5fe83de6
SHA1ca81b2c72089ab3a2b33ec8da4a05fb268ac9148
SHA25687fd18bfb10f9d3357ea3fa2f0eaefd1055232e2d487da835f8656a6e8224c45
SHA512a5c8b73ac9ca7a526ef568989b9a04d200f5a0c443c883b2bb93ff532665a12f7ac3fd8d2e889fcb727b78c191bcac7a5b438a281d4c3d406896e06d47ba332d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760a2d6c7424ec4f56ca4213343cbb8e
SHA12aeca3155c9b36391335b301e82a29551da9064b
SHA256534d8f7536775f3b296d89ce3296f35512722d5921d602a7e46a07d7edb32173
SHA51286eaf7f5c540987fb5e206961344b3b008c45749bc565edd9f12151addfda0031bc6d7cc04d282c8e26dd70b10de7ec7e362f68e7f208da4ec28897c6c4b6d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539af03669231e1274f7990952f34cab8
SHA1f9a60d77d7ccc04daacc4bc52fe0d7d85856b2c2
SHA2564b80be7e77c46c08f4685aa89dc0b07a50109928b58e0b9eaf8d82c7df86b777
SHA512a4d4d279a67dea32ccef69b7fd1a6adf6d0a6607cb28cd3250c9c9ebba377877fef933690b1370578c88840fa8a742ba246a6551660cc6aa4567705ac4b50d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54890a0158a3bab3a8a6a96ccf13299b6
SHA17aa4690cf81e240b6519a7154cc6ef7af721a5ca
SHA256da7585aea9e3323908513d37f49115e92747dabaeffdc32e4555e3663744676b
SHA51211afd2c246f6180a6cdda9cd0792751c192217fb577a15a8a0e66bde1421a058a1ff0dfa7d18c5b63474c31c8d0f63a5b45e123e913c8c482786fa416007ae1e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b