Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
44f3f88ed3f25e5ad0e9445f3e68c52f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44f3f88ed3f25e5ad0e9445f3e68c52f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44f3f88ed3f25e5ad0e9445f3e68c52f_JaffaCakes118.html
-
Size
21KB
-
MD5
44f3f88ed3f25e5ad0e9445f3e68c52f
-
SHA1
5a5a18ebd079cd0e36378a2ac2fe78b9df133f29
-
SHA256
e21ee1994dc389b537f5ad5a694fa375cb62bf08ab5dcbbadb9f8b5efbbbf084
-
SHA512
3e5cb3197a850186c2300ecdbc14228a84b3e0837b0f5a0f1ae00a4bfeb89b167c778dd66d8cbcf3f9c8605c189a4cf5a08430b09bb4bf60d7149a4b860fed0a
-
SSDEEP
384:FzXZXwX9uOByZKh58+J4JBJtt/VkYe3L67HnJ+aXQyhyigFPHR:lXZ5OByZKDiPkT3eoaXfoH5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000790826d18467fcf862a857f533b1dc718776c8e6d9aa5924cbd08e4d1263cda2000000000e8000000002000020000000574c61475b5c2cb68af670e1003a92917e2c6d06bfb36d12676439ec6eaf9ea720000000f06d5d8df0eacf0a50fdc2ecb239032422452f191dfd05473d671a4c61e6b2634000000007a7d0fe363b5cebc3dbc2e000dcdd2c4d5dc40c920268661214f43fe4fcdb33641dc7f0400a452d692268b49af2405dafafd22b2116ba861d6768395005a48d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c0125dc3d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427105638" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88954D11-41B6-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3052 2512 iexplore.exe 30 PID 2512 wrote to memory of 3052 2512 iexplore.exe 30 PID 2512 wrote to memory of 3052 2512 iexplore.exe 30 PID 2512 wrote to memory of 3052 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44f3f88ed3f25e5ad0e9445f3e68c52f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508203ae14f6aa0bf77699f86d3c2d4f9
SHA1547acd82b5095d7f09914120f928d2dfa9c37d4c
SHA2561b12637a070cc6faa503ea0415212e4a0e65ffc5752095527d9810305cab94ad
SHA5122e2950fda5bb6499969a4efa8240e2054ad8694ef84429e9cb5702be0b47e569c2681eac0a8e16d510de404486d17e3c64afbd2db26b48fbe3b81a52de7d0aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461a777233cb49653e750b068b857bb0
SHA13faa7e7e63467b285439e58ad72f5a4f0b356cc7
SHA25635a4dc9ba3dbcf48e7505b864e2577bf1a49b524c44e23781efc0d35e754b2b2
SHA512c0fa3cf1ea8488f9bf2ee4739e1dfb06dd2cd7f83fabc30428cbd0e85ac5e5954c67c55261284dab8f7196fc2b0edbe5e3f04cc5ad24a7b1b8af8b2657347ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1457ae7f46514adfc9348a3f3710a3
SHA181077816378aedecca418b0937763ca0fabb7a0b
SHA256edbde10ab1e264f2a9d3a28eef705efe41cd60497b52fe0ce26867e1ea602752
SHA51279a06a81991b6c875ef6ac36bbc442d9ebc6e040518dabd851bc105f8572b736cac8269b057ec5556cc2561313d9c1064aaecc48bb673c2368f81e848b1a0573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b676221b793c82b85d97686bb64d2cf
SHA149e3c26ac88415d4d833548e95ae909f4ac02690
SHA2563a0f5f53e5b7aa53cd5f8314c6e7e8a86bbed6aeb875cefedeefdc539e116469
SHA51210f3a09a795f268af1dafb84254beaea52d5cd790174c1cb1adecb8efb4ebdabc47f1b8dff15a1f7b84fa3a18c15d04b73bc3deaeb553a2eb1a66381569c941d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0bf89026aa4d0cd78dcb0ca3e8e3fe
SHA13b25236d176f40d8c41a53419b496ea63264a2b3
SHA256d74395511ea530258f53ea23832c20f92f1c9195644308567747f6edc8dfd7d7
SHA5124c0e00621e1f6184bf1ca627b94f2ac774cdfed30a37ea832129157673dd97ff6dc1f6378777ce085259bd1b0372df8e983dec77db1fad0f29c588fb59cf8917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58794f94d21379fcba71d7ed40efedd5c
SHA123892c05cf5f9e3a9803e0d6f8959a2eeae99a3c
SHA25661035e1e5b9726d93f7fd16c1f7d9d22bea8f1a10e557d689f208658ceb040a4
SHA512ce02b81b6e80e29ef597981a3a04025201b402c27bda9a659ed4b1e54b53580d34feee7167a1c870a6f0e0f074bb8eb23b7dd753251085227a6afb9365f2c9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41e674114c1d39f37c376374dd11fb1
SHA129b22a1c28c630a8df304e2655b8cc99b6509409
SHA2566425e841bd2e5656616ecce8365e9b295699b4dc8e6cad08c7ae4606961e9bf1
SHA512fd49337f9f7ccdad585876f76aead5f8aec0c002eb0191dcace9f396def503c3128e5c1a5ce67fb53751df358d56fc8ce3cd41db77c1b722c088f0b9e93abd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6fb8928e678b4d635de2528b8cecdd
SHA1818cedb4585799fd0f73d6908651056fb3124484
SHA2564cf6de4438c0696537cde1abbd19c9ef8807649fb02312d44694f0a81a99e7ab
SHA512db13ea2789ddfffae4ac21587a0cf9b19bdd4191aaa532d099a279efa0fa651a0cd73f5a013042e16341f7b7bdee428d01eb5c9a49c2493780e5c3c3df7f049b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001c54dd3d5e14319d5df156ff64d32a
SHA16fe7438fac1cff09673dc3b4a4ff489485af53e8
SHA256bf16dad77d84bf870b9d159b42154e9df3c5ca3f1f39c4abed39ddf75f855cd3
SHA512b1e86a22fcc1f2440ba1866aa16548dd055635b700b46b589b62da0b80b7a420c4eb2b1cb8910bd2f76a960f61c104f8647e7fbb383f65981218a3403017f45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7ef42be0157d548cfdd730b4b0b202
SHA1e5155bbc264609480bb98c69be458614a2c3e9dd
SHA256df9deda8a5c9d14e437c47bf2e13e745c97e0a482ba746b6c1a3ccc3af49e252
SHA512ea2fb7ebb346454ce9af9adb1105489b59c87b577f2d21c154a0b14aeb62527ffbc5e70ff1aabf933f1867febf61f7befa82104032bb29d97650f8f6c3f63931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cad99c646db4f08bdb9015b23cec68
SHA1c088885340dbd983a7189ff32ff3b33bb3846c35
SHA256229d69f6e62119b097d4148cb8feb757f2caf155335f7b2abc1574abbfe85bf6
SHA512b5373793e67b0330aa469bbdb5c59997d32e022ad0f139ba3d535cf254e6b55c46c01a318dc9999321ebb8518e7ca9e4e7d4f727e10358b3ffcf3cd65ba9c2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f38537e8a4a650fb9b3ff5d74e738a
SHA141d728f27ee034c4419d2f26aa788d59807bcbb9
SHA25691d168c1fdd9f6de7d667637ccb93112462dc357d080ba5691faca6773848c4a
SHA51202052effda7bf187c3dd713d57c5250f3c1a53fefe709dc19b34f761c6528d762bd7aad733d8f2e5a7ae597501fb996cedd2b8a4088f135287fbcbecddf35927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592855702e00b0fa5b9b26ea85a564427
SHA134e32bbe3295f5d4835e21ed03e94800130a75cb
SHA256041c1a0c8cf782bad859e9925369fcb81bc711e482ee793137f8a8ba80ef128e
SHA512d3dabaaf847f89eb412f52fd5e2232d979507f3e39d1003f492cd6397c0f8f37c16003fed843eb367fa6e867bba1f26a32762a00ef25c498b9cc235a94457124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a20a7acf3e82c35310940777ed4fd48
SHA19aa4e41621e8dace041554c6cc26d8529935066a
SHA256120d804a2a01de004df803de31e49475e5c21d7ad32ca27dd5cb3e40057a1260
SHA51254416c9388a4e6c5c14e5c668c7b09e1c0c3d1c12298c937072573460e7e23d541fada325d32653f6f9291f80833fa72c901f1fab71295bb6580edb46d268961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507161215552c9acfc9fce80068fbf990
SHA1ac942f3e7925d8e23c636a4a0b27123ab2702cc2
SHA256f0fb38cf068836e64e9cf5b04f9f820e907a88c5a0656cb73a9d0da73d8feda1
SHA512c2dc1b473d6d1e476d466279cbb7d5d27e7dbbec09ea8569a484a78c4d141fdcef648589ee32fb30d61e95a703d8d161199dbb68c6f425ae158519aa98d6e51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07d5660333abe916024cde29864ffd4
SHA15aa06da774e90488bbe23ad98dac813aea5db860
SHA256cf8ad710430f5219a5a0a8d586004ebc915b380b1b0de37820c48fd8c401dc8e
SHA512474d79286943b5e11baacc94fcf776c8a229f21abfae23d0a6bf385327d7f2b7faab5026cfd12c8f688fbcb01d63e72baf8fe34d5eb6184e188f803d40368dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f8cd0872a0e26a3cc9011e5523cba3
SHA15c9c287bb82dc2f876694dd047c67477de6477e6
SHA256b33a9747b72f3cbefdc8001dc9a723ab8ef7e0a460022b351067f99cdfc83580
SHA512dd049b41e610c0278e9a3a378be2ee8d9231d561d10c68a2163aef2d1c717954a0bf8053597df33f16f7f184a4d7ed279124bfd32ea9de96bbd9294b6dd62687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c686b9a40d31cb010f1e1a69634339c
SHA153804d9440fbaad2cbcd1d0d9a4162f95f9978a0
SHA2562feb14cdc81b8f2c3eac8bd91828a8907208f94edbd26e4b4d8a8e871dd4f801
SHA512f3cba8b20568edd3e5788ce547df36aa6e1e1a74f8ea6c4986079803594e867192d231754c124f28cc17557c935374a8d0b64107a96ca9116bed64c10211180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b8c7e9cc66825b83f2381980516399
SHA1e6f7e194a007ff17fe8e507f043a8b64acfe8bab
SHA256329fe0ee94119a5ec70be8681cd724d18311685952205ece24b7a1d63a6e9ac4
SHA512d538059f2e824a6acf07f8193f64dececb6e3de3ebc031a4722bd9e1a1d215152f52a17b8377d9f25cf4e761e16d995c3114c7a559e8a2909b16f0691cb994e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb59be0e9fa3c34d61a3fd8c494442c6
SHA10ab7db9ca8c5c178ca3b4bccab1d28fa542f0ce3
SHA25647af891127820fb91beec6becfb4f570b3cac494a3c020131af6715ee347e7f1
SHA512bc98f1b659cd58b2b25b507a20db0c95d235cf30d77cf1cdfef9c94912cb3e3235985416dcddb4f7a35801fe548aa83d1208934eebc95b3761e815c0f14c6077
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b