Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
2cec089b237e81173c221756168ae95f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2cec089b237e81173c221756168ae95f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2cec089b237e81173c221756168ae95f_JaffaCakes118.html
-
Size
6KB
-
MD5
2cec089b237e81173c221756168ae95f
-
SHA1
53f05da97d7a771987263f1f7e8b1441891509b5
-
SHA256
2f6adbd6c842890c7ea9d255b51dc07d62827efaf8bd0cd6af15f9defc5dc855
-
SHA512
8990dd659efb860362768fd2c74a5ddbc572ea34d50c89e56d0bfd708f22511d83e402c7e9e85fa68c3b9a26251b489c040265163712000ce9fa03e32832c32e
-
SSDEEP
96:uzVs+ux7m8LLY1k9o84d12ef7CSTUi7cEZ7ru7f:csz7m8AYS/Tb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001d33f390d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000cace5d6f25a5724bdcce52b518e9b1da1d2d804895757b0ffb86f1235a29d0af000000000e80000000020000200000002f41ca5eda0b91a48ca00e2153a8c0250a9f7a8a1fcb77924e4ab8de6b774f6920000000111ff721687d68a08c76534d3e446907c4f77ac4cf126ad6bc5cdfcf57d7a2c4400000005d949a923843c23891adfd4192f11d4f9290910531db2d8fbe80846841daea3ad8646f9a346de5e5a08b098e02965f5c33b8a221979409b6dba7f172c769adc5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426644180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E337951-3D84-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cec089b237e81173c221756168ae95f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789149c01d18aea41c3ae9ca126d0c98
SHA14a98b3e74c70b0b2e84551bf031be84b8a779f79
SHA2564247b942f04ebb70fced9d41e23606b1db103b48035ba2e8257ed94c68f14283
SHA5124e5cdca214f61b8ee0213891d3d911d3a61e0c9a3f51d1a50bc51f680eea210e1a3e563258bd41fe0aa2bf7cee5fa4a66a55c2e741ebf50441788fa4c5b1b2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe306f5b256de5e4a5c44675d6cb31e
SHA15a4270ce6470df1a9ffefa19d9a24d4818057229
SHA256869e3d4be9896ce1f12e03a940c1bb34f5629ed50dbb820450882c13a643d498
SHA512f015b3ca8fbfa397ac1075a7fb5b4f9bd12f7890e2a2efc8ecf5c9b0503f3006a00cce6488b80eb4e31ce2a66a4cb1340df7a9a576bf071a07d44d7f12ac4ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d766280e35fa8f6c8225a80501012911
SHA1d257e743499474a9fedc8150ac2055726d624f6e
SHA25689fad54f97269b651294f8c621eaaad0db4796028b278bafff775d26454cf088
SHA512cc7c7266b2450bef0fa4b49e5d55af3e428cb6ad9990e990ea96510a8a9acf883114a4f0c89d977327668d6ebff167e76e1d631f8c2e94c614e39c984dba9b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c1496806f4439c935793ff8a1fdc4b
SHA166c5ae4c19bdcaea1fa4190acabf53f09241513e
SHA256f06c91ccc306b2f43f98757ddc0301c7a8d10620431666eedf6f51aa35beeef5
SHA512fc443da17e0fd2e230872201c7bbc23d864661fc1c7c70e2acb592ccdc3d01f714df7615c407f1c795cc35f1e538320da0e583d604fdb88ec4b560eb8d002782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f3e96ed6d542a5b38e8953c05921a9
SHA10c5ba31503c3816f7a1bf7d09ec4635601ae9bc9
SHA256b6722b385c595732f8bc40e1ccf81c1639b197b1ffa22a66e6a28e847598a6a7
SHA512f03b70e9127874c0ec8d870b3de8ee42153db49925ce8711915d7bb2dea7ef77e624b12ff3c219d3c4f07fe0b24d9b564b83f66e261e7170c52db49d37379b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c540fccf65c67dbf018a04eeed467685
SHA11b11a687a8010d05cd29815cce22861184490a85
SHA256e07da0c3b348485fdcac3e45aa992c8babe341f117247910eb11311cc15d0b18
SHA51280d47b1bb95a0f6be648d5f4f7f8bd04f9dded9ca4229ceb7b3e777a7283ce96b5a2e02dc4d852c2ecfe0321854be4e1bb7bb557e6c08f02c39fd03e2702ed6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a191369674f27de11eabd01e1e9ec944
SHA12eb658294dea07343643d40b69c70cca1ef0ba62
SHA256ded957710ca8dfc073f9a18783c5e7cddea4046c672ed6393a583875f3654769
SHA5128710ff261c6bf1719c5ae5f91347e3902509eb8cd5d000d5be3cc3f371fb9f8b129dd33e41ea4cc0bd7bdb7ee4e5343b278613a28febebc4743fa0e3a54c7bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca76021e99a47c38b4094594ead06fc
SHA1f146e572327eb57c9abb49a22cf5cf06f0ae4d6b
SHA256199fb38d1d59d76dbc941d5ba32fd03c71fdd31c36242688bbc9d26108b91305
SHA5126f37c68b8d2b8a7a7dc8b6237a17e8fe2d30139e5669a89eec2e99be110fb69f40180b75c1587ad5d388d0e1e29666050851359670d0a35c428b81a8699f3611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e7fad02321d347de7362848dd656df
SHA1eaf71146bc1df9f4ed6a07ac5c7a2c9b29006d5f
SHA2566cd3e6406ddad271f3cdd54bdff2f813b10dab1b79cc4985b5105a0e0e30e288
SHA512bfc36dee97c92caf520f3302d43d47bcf0ee5b3e633d561010eeabe1a9a3212cc239db0135fc801a81562d5f17378034dfddacef3c572e63a3bf24a93de52c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be09abc5d35c92d3968e13a528070ba
SHA133483114cec7e4a06634fbaa6a176d8ecdffe0cb
SHA25670b257f5bfbdfa2b85f30142d96706ed7328e30a4454034e61dcd3337a72fd04
SHA512981c1d5d49ee44027c467bf9e2dff71b9ba1736bd50666a68330bd517bbe0b3ea668e289da8adabb23ec7da1bd184229bae3ae0eb5b31f18bc8a82ac017cd31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f51416960f4e3cd6fffaafc5aa2f92
SHA13e7784308fdc2f2cb9ad1907526a770e5858a76b
SHA25650f9ed82a3c956512d3b39dff4a6eba2a6c184462c0d81646cbf35cf36fd8e45
SHA5127ecb577bb1a3bcaf8b47918e62964e4ff0eeb93949339bfde4e7d86f53ca4ea78c1d819dbce9598ee6caa257f292ae2f52fad7979d71d863dadd74ca78f9eecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9bcfd20eea4434d60dd9b9464359d4
SHA10e97dad0ecdfb447e18677e24605b1a33dc41de2
SHA2566ac16a3c4b4281d9b4f0a5ba4171e63394649fd1e52134482488355a3d7a062f
SHA512e01437b5f1e2ea7a1ab6b35c4f9a908b5d38b169140bf7fd5bf67ca056444701e84cdd1cb7f2e05213da57e52eed53ef8be28e68c97af2480c6b6a68cbce086c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6492055b107ecea83b88a0a742627c
SHA10aa16496309f29c97cdca2c1d4d3ac3115fc16a3
SHA256fae56f39113153e70a189bc58dc3bd031cec9542becd519032cac0850c7d172f
SHA5129af0b116c87d0f1923398a98f9a372fd05f165a10bbf472a0bdd98cb127a49caa56cc6aec7333ba2cb586e44a5e92cbf50b2bd4606e0b6409046570bf01ccda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8889a4387e4599bdc82686fb717e7a7
SHA1597b4892342ab105eed1c1cfc1cdd160a7a30262
SHA2562d2984f0d2d2a2021740c26b22290ba2227edb3666e1c4f8351f64d74cf0bc4e
SHA512e7e9032bedff6cdc33a0fb4a9f09b57315c399cef4918c32b266e81419e7ebc884f4f7abaaa074230ce08334d43535a094e06b91ee2e3c6cd07ce826eb9520f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37e734387c9108d9b98571fd36194c3
SHA1722fa2d7dea12190d3643d1b47d43fbf1601e710
SHA256c4bf1d5d576bbe1e7b67323d260ce6f4fd4dc7280624d05f77ae8a5a752d1a97
SHA5127a1ba623cb9e307d7cb6f74fe52dbb10df1b44e51c42b2d5809b15cac08d2ea1821e96ccb3adb692105059a6872937d68ddfa65b7881f937b234cfc4f1686df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5312c4a2e327e0906292e0801eb0986
SHA13e19e433535c8ec8f6bc5189cc4c478befcb0073
SHA2561d0bac43ff45e624f7b9bea4aa445d1d1c5fc1fe85286ac04c1263341f2c8e65
SHA512d1e1827d9dbca3d674494a5b2594a5ec130b639f686b37c70da51bb4917f8bb8cbeda5b16e041052c84ac1cf15dcdea76def77fa89685d5a4a6d0ef826f145f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa088fb5cf0f51b691394fe561ed363
SHA1bfd003ba1dea8cecd6febf67c5dbe36ab4de90e5
SHA256ad5510cf03e27c060d14f3785129f4855010e0237b020ecd2265462f5092177c
SHA512dff73d23f6d1d3ebfa767b18265c4c4346eb3d2ecd6e555dcb60d4284df1c61671c8cc271883c935b382a72323ce1aa128dc86bff4e6730ef03e9482ac7fdc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80c66820170b5d0923e643778c11c32
SHA177bddf261a370f94f4ae6904254a6907f675718e
SHA2560c842ae20d845b64edfa1e01a35220f42d5793b2291f13b39f742168cc3d5590
SHA512d71b1886b966e3ba88b84cf656d01211c2792d94553e647f5a672241ad6444ded3158eff8d9184a0db08a221b45d71e41532dbb9e9cbc5d8ca32d12a194cbe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e74e0b659086d4ecac26d01bea6520
SHA15c644042fad244043597390b91cc30d2c50a477b
SHA25672cc9acd96d115e3ee0f256ea965c4d49c2acdcbd7b852e4308b4ac386a737cc
SHA5129dacd0cd60e20fe7b9d1db911c940cd341c118b08325c1039efeb7136ea306a7731b723558c87523f3ee069450a1f8ad53f9e9c00dba20e594f4c7b5767806e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b