Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
4caafd0238af705d22158bdd8d56c1fb_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4caafd0238af705d22158bdd8d56c1fb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4caafd0238af705d22158bdd8d56c1fb_JaffaCakes118.html
-
Size
13KB
-
MD5
4caafd0238af705d22158bdd8d56c1fb
-
SHA1
8b9dca57b58709409781816be174a25e28704ef6
-
SHA256
2909715e6533ea6a6cb12b03de3a569696bf9143cf0ba5ed4ff066bb3bed1bb5
-
SHA512
91fcb148277bb3514f37b77d3d5bfff4173e24075d418d5ffbdf68cf04e4022af20bf03b26053cb794fcb8595e747c33ce7517131690d2c68139aa97afbf4e89
-
SSDEEP
192:uVf8A+LGA7IWd4XLCOaS07nr7HRmTxP8JeZqe2Pf3T0CSiZe0fS5jb6n8e:2fb+LG62XLCPbr7HMTxEUj2PM6nv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427263110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000b0facde4fa2183a963df865430d1e162016747fa7e18bf4820b5365d1be1384c000000000e80000000020000200000009c4ce118c8b16dd64e08eae6b6e6ef21954d674c19886887fd2a7954f35a211220000000e5314fa784e05b1dd1c85c1b200ede37437394f2b86cb6369d3326ba522b3814400000007ebd6be5a262ae61f9d8c935bc13c16c716f820464723d7f0db94655d2b1957e2d63dc4782d9ea3e55b990cd384c2f980858505c3c1ac4383f4168a79ec5ca2f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a1254232d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D2ECEE1-4325-11EF-B507-C2007F0630F3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4caafd0238af705d22158bdd8d56c1fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55726d373b5579ae52182566cbba2e103
SHA1e56ab3e16571b04d9e2d2fbafb9cc3c53b0c78de
SHA256b3fcc81fd4b6cf5c4f5fd3c3decc05bb689534bcb09ca91412ab3eca809eff95
SHA51223935e1c8b9a988e58cdd9bbb14bd0369e6a2f095adbfe538fd9563ff94395718e3841f3246ca55bd3a67c13ae3ca5bd4185f1beb0a7737280d3da28638ccb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508f9d45add417f02da78a987690008e
SHA132a078c490e72906089ba1d00468c7dd6d34d48e
SHA2563313dd64f2d9ad8535bca4daf2dded0a85d0c3c7bc95ffdfd4429c273868bf96
SHA512c031adae5321b88739eeccc53f878b158eb0ee4f04fc0f3537f1e34f28497d81e3d80abf081a727014e3c6ae1f036e400f32d04bd6e66502edfc173043374075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a79b7fdf18741e533aaaa36e7fdbd4fb
SHA1d78b0f603bdd6120c0b0dde0eaa12c4467a1a3a9
SHA256e753770c947ecf0dc8edf5b6a7cb163708abab7efdab29e2527fb1f53100b82b
SHA512e17353a03853182fa70057501a6215e139b8ce2cb1145c048e2d27da80526c8f212ca79e4085379dac7178d5b3aa3d151c8ef4c48ba012d67ddd74dd3dab5fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7b6fd6ee3c03cf9732305374b80197
SHA1e7981243c40e4ad9efc06d6f754a5c7c3b02accb
SHA256980e6c742deccb73b5359d0d376d29de7cbe12eb1aa620dcbb8d8a96c04c79cf
SHA51284a60c1ed7a9df70e08e028d1556cb6eec048da47cf2f85955c550763de02689a34e86b1f878aa022c0524eff7c1741c6a899b3551f84cd63005f3f150615637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35d364991cf1b0baa147c41e199ea9c
SHA1d12766016627105883d3ad9cd2cee803a2f40a99
SHA256ed8cf7d26bca7f2deecb4ace99632b22049ac2ff85b56ce5e6627c5daa8306e4
SHA5129ba5a4e9e1b4b98b5525eed96d9a24ceff71403e8679655aa9bbdb63542f072f8afd483dc42c00fdb5857841c10c5d2daddd2efb5a42df119a0a7736b7483341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b03e7574225f0e6a0845a78c2448907
SHA1246bce49b83eaa2a9beb0058d92aa9c847fd8a40
SHA256b99395306940e22ed50df404976e02f85422b34bd53ddabeda67f27876c5ebf6
SHA512a63e7efa0977a1dfac3b49a3ff4b5aa3182b777fa8d77a4585f8705214e20caa3fc190580b1168a714e4ff927e7cbf5d6787edc0330121fa3a31fbae51748ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b15c1b0b1a5d863882cf8f9ce115a6
SHA142ad95d0dd3b122f4196e99ea6ed80c0d3fe97f6
SHA25665d03df93d22d90c30a119a3113ee38ac98496db5dbb5eb26b6aa7ade296eb7c
SHA512d7a553a0ae87574cf7180fdc99f730f193cb50476fe7b32af4f76e941700ad941cedc1c435d7ca735ebf4b5e41f29426b14ebfe117088d46eb3793d95ede5879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9dc37046ad634e873a773259222968
SHA11cbebabca3f596313d015f6df88241e894a2b3fa
SHA256b71ed6e2afcfba4a3d45b1b13054b30372cc67525c25885f13b5e9ee37cba014
SHA512fdf2be64bb12f63a59843d1a7a1244804bd50eeb18e86d80a352f68ee4265de48c88b359c09032a760418d2c8faf98e6dc4bce16aa76ac06842b1d4650d01d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca34bdcfd1966c6453af245e2064b9c3
SHA19059cdf835b21ad5f69c19c1e2211dbaac8f3fd2
SHA2564e3cbaf614d45aa1aaa346805a85eaf7738257ca7c2f1ea7942151ea257ab348
SHA5124f0f22594314beb578b9cd00a3396e668d5b5881e2ab6aafdb20974b252daf218b0e608138473ad85002ee30767bae8d8c0e74d6401ac2198e303e0bb2d23763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512359ccd8711fc8a5ee8030dd978f6c1
SHA145443e5b7bacbc218c2659a89ab2f6d61054ea88
SHA256cf74b45d7c5454911dbc78254412ba34f2939fd1a550e9713377a7ca248dc41b
SHA51225f75872b6411f178f3d99462ac35a6ee813266236acab9b66ab634734d1a9a84733b54455c0bf24495e57993c76a053d3c211a58878650dad24ee63de018c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a3090e2ed6973c897b417591847b94
SHA12fff91fcfba9275c0f4efd5435a748c6352511cb
SHA25611c684e3f301a4cd3cf58405c527b7a238b77b91d8eb39eb9c852468d80f925a
SHA512fceb08db36314d0d89409f89c925951290c0fbbd1de3d4e630aaed58ae69ad4350a57ff1f11ecf638fc21cf32cec406ac9ffd959cc5fb2ed2fb76091f4c07712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a09b3897767402266e2bffc5436e3d8
SHA1362ffb65b094dc50a5c61d30ac404cd8dfb261ce
SHA256200f496246b347006971d6604e9fb748b59cb2e7aa1f482a80d8ebed244fe752
SHA5122328bbc47918bde272c9885ec5213e4c9fa9d045c945a89aad58a5fd515a42cf05cdb0031c3b1fe107563d5fd5fb13ccaabba94ffe83a726156be66f73f0d2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610c12954432ab9369e41b3c318095db
SHA1177df96111212f822a41c3e3fb04f5c60d133030
SHA256d68828ccef195963c1c49656776526630740a7bdeb5c68d1446efcf78d6bdcea
SHA51218994ec610b9ebd7669a8ecd3651833f2f0e3bb3765a24aff41b4a202ddd60e040ee0a6df0444a514ab0a57dcf34c17d0dbd0d4f4ac5adedbbed5c7ebcff8521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95fd2c08c69d198651bc7deadefdf32
SHA1c6ecc8d86cada66c8faf0c91c751588843e64ad3
SHA25680b7602dcd42f262de135f088b5b09437c68dcc4eca87f85d663f16f0ff04619
SHA5128e62d2774c6ee38a490e3728e4f787bd4a55863b9946cae657440586260bc50113548f0d12f73e7e68c5200e89a69364019d496542f9547b835043423375ac8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555878285257ff2855f4ebfa6bf047835
SHA102c5a11ce6a10e68099028cd6070b8fea1e7db22
SHA256ca71723348932204381d9287fab7bb2536f0ad4eb7d9f3ce19e36d615a4b32cf
SHA51273b86d753c68691535c203d24274c6f595adad5dabc97dbbb1f68b6ab4cf10491c5f127f8540ac9c22394fa5a7f8da811fd256b4b00c0ef186676e369434e4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879987d5394f95e6de8132d679cf0bc2
SHA19b6d6a6e2f9e17d10a5dd0e287995f1799735836
SHA25685fca8da5ff5dfce5fc40609d686bb4047fd46e4ae77029116e022f1d832043b
SHA512e096c53b2a50b9796c0f5a4540616f47f0539af0aa6bf52450bb591a3a2695e367fb670c709478f3d69cf614c4a3a1b0756fb590bf1b6dc271c70d7fb0828313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263d7860979ed853cdf460b349c57243
SHA11368c173dbb7a552ede241ed9b28347c0db3e38b
SHA256ff05dfed9b213782f9526807480a134f775fb1ea324a4fd37175ed3e33a029a6
SHA512291baff7c9ce61c7f7bcdb259c5a0b1a203436a84d8ec183b42b0d5b9a43941255da9ce3ef543843f3d2ec9956ab922337f013d86b85981b745eecf11d85eecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687e66704efa3b6333c5118d98f86b79
SHA1ae56f66e959e8704ba8d4d863086101e37d3cf80
SHA25643fdeeabde67ff2ed9ad6fd46ba5b2ca222262cff61e04c4b83a56bcb6906cd3
SHA512980693950c899d6be73a1de5b1b71414154163b3f8e5028dad7288466fdf9d38ee427aad5935a65283be387a80dbba61fed713ac73e2e1c4552a13fffc4dd47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55429cad71310b810380fbed06fe12cbf
SHA1ff8f8baf8d5de87c21d9afb8fff738990858bb41
SHA256391340e1cde8c2b86b59ac741698efa7500d4020be8dcfe79d7a63f71f27a9d9
SHA512c321d583eb6593ee31f452c2ecfd850471103eb122843060701d6691359a1b801325f4eeb9aea4ca1843ec4d0ccd696f0875ce45228303d5faf8febd26fcfe72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b