Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
e89316d4e54d6067513c1c0a33a293ed_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e89316d4e54d6067513c1c0a33a293ed_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e89316d4e54d6067513c1c0a33a293ed_JaffaCakes118.html
-
Size
254B
-
MD5
e89316d4e54d6067513c1c0a33a293ed
-
SHA1
b98fabfa90bd8dad7495002b8452eb70756b752c
-
SHA256
b984f4fe3b9997034c436413814407ca9826ceb9aa9f5524a0c9870c6cf92b4e
-
SHA512
b66c59dffcf689e846eaabe2f63318bef9627d550be183c929023f972b9d0c07ffd871dd77d83d7996c518f65a74b68decef8e052c75b3c53c7c459eba60bbd7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b200000000020000000000106600000001000020000000e0ed0095164772664f2a728426e2e47fcd9d4e3db3a8c41af834b6a2d3458849000000000e80000000020000200000000d0eea1d0db1fa4a93e3d57b5b162f914c1bea925853f38bb7cc48487ca97829200000006730962232ca4dd492910248f555a8d9b92c5a0ff7fbcd970a3d84b2be4083fc40000000eb450ece9dc1501ca82a3a8fc12ec64058cb91ab929c149285c6a0eb7ffcb54a85109ddaf4b82845ed92ee2b30b9cbb4eb876f8c926fcbcfcdfa53eaf5963d23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0440531-F5F7-11EE-A801-52143FA8582B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418777388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0be4fa5048ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1496 2252 iexplore.exe 28 PID 2252 wrote to memory of 1496 2252 iexplore.exe 28 PID 2252 wrote to memory of 1496 2252 iexplore.exe 28 PID 2252 wrote to memory of 1496 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e89316d4e54d6067513c1c0a33a293ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac377c5b6f057870fdfc2f16463270a
SHA134f9af1e4852efaeb1718b3e1c1134cbb18f5e6f
SHA256b46db3dba60d1d6c158b13f7db6cb5b4ad2243a6f9c452af41879a6a3bf868a1
SHA5126ff64e7371b258e599e7e9b914fbb144178bcd845811e418848594d2ddb9e3f66ccd0db718e2d70ca2780e6d418d81ab8a1b39f05e9556d91b60e5aa8ddd8afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522da6299c8a75afe5416bee250ceb24f
SHA177261997d5efe8c7d9893e313500feaa2aca197e
SHA2568738ff0ac87507471c4f0ab9cc3d9622a5e8573e4313d47d9d54aa4bfba11525
SHA512f176100b7bb7dc50bf02829ce3ed75d5362661d1f0d09952a9b180fdb058afcbd14d4d1dec2e8f473d7f17bf92b4a9d9c8b0c98e41bcf940990a216a641f04c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513aed680eef7019802372e1be5a71f1d
SHA11da220931c20ead3c882a7211aa5684afca28a3d
SHA2560bc73aec25af1f2eb52152d9b5fed68b9e87d6f0b61e4ed467b6701d52ce6c99
SHA512f50cf1a1024f1635870f4d8ccbe3c236e0c6e682d648c197723212527871f4d941732dce55d0b1ceab8f03d1ea5ed1554748f897b0361b77b0f8b588f72c5d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b77d3665756a74318587bd03e5b3273
SHA10684567d6d622024abe33aaacb9ca7e6cbb877f4
SHA2564785497deaf975e0dd739e6a0f8e76c107a92ef0b94141af2d3f2eb36c5d0334
SHA512bb74f6d520d6cb16a32a48fc82cbdcec0b3a653b66763651879e18606ee51c1e02eb167506e27e7739f9fa3fa1e5e0842de20c3c84920947be316012d5b23520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500cf14c4f53a42e0ec28c3016215e084
SHA1e3bc757a51c0ad964b633b5ac64f41dfdce9941e
SHA256c06a3e93489320dae53b3879a17cda16ffd7a5f6aec3464a32f341f446c9c666
SHA5125b5807fd09f646ce6a4a2ab065120b174d61d66f3c69b15f6cdd2fb1bd6c99fb2388971b898612945d58a7fc4fb01db46f6013c1932db05439fae92f1be5d152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956a7345398158ff4c1c09cd852ea9e2
SHA1dd6d695420d2982d8a5f4c02f1dffc62861304bd
SHA2563fb9f373101ba3d5ac683ff82efdd2f7da0de21fe6aff3ee4ff9024f1714909b
SHA5129c772ddf1e5d8937b717a117c5eb385f4e2681de0637962147c0166bac23644abbe144b77f23ab9affcf3ab73e9eaf3d14f0fb5d18f5ccfedd33fd455f19995e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee70f7a732bff3a3350578102d0d7f31
SHA14cc96f7f1603c58ee72848fc097b156e91a2898d
SHA2564724a6a9edabe0a5fde2a2d47fbe084ea2c30d3f90c3ae5159e3c76c6f3cffa2
SHA512d335f2adb3e010996504568cdf2e7b28d928e5af46db5507834aa3bf65dff006231addbbf06ca8e4682bbf727c59b9fc810a78d78533ace31605efbdca5703c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc5482371ecf1996299556f44948ceef
SHA146c6ba6f94e8450da65d5c3436d1785008241421
SHA2561f8f6a3b3be83b7cbfc875da3e21b2571b5d70757970f0979c79680809d6d530
SHA51240ca6fcee551e0121efe2f7bca153f2f24fce977100342f8e8a09a7b97383087db64cfa7373b6df85f52ddfd67cc6ef675836c5f40eaacf7611346fe88fc76d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb1d7fc679879ff16b394d82c4135c5
SHA1b5f53aed4b8752d1aa453b5e4c2003d205f06c1d
SHA256376c4e962691a481d06d7850df3a99b456520540a55ac8be5a2809f87d8b6732
SHA512618373e91226e010cf432b1c41b71eedd6700ec70832928286fee06c19c677085e5be97a72266a807a2abe52f3840f8370897876261d1c56507bf92550abc2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54939e05528db1918da089744f3609f98
SHA173d0ebafdbe1c39b8b9335cff19ca078cf2f060d
SHA25606bc529e4aeca914aeb0635dda7e854035a1e51453c1f06e062042678a7b5633
SHA512f60a6823b25ac7c461224df3aea0c08aad1c856714e8827cc3f8f171250d3fd55ea7b23084e22bebd20063200aae71ec8f412c4560e34e4ab6f05e0c4f20fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8a24d04937848dc6f57d1ecc6a9c58
SHA18fe2b608f757d502b7fd30f9d68fcc08d022caee
SHA256e9a69be5c65b87e4045b968778bac247d9db131d1b7b38b375d38647ac0d8a26
SHA512a56de981f742a48796e4dcb779f748a4dc44e45c272b18a1f0169f87864f145048f93feda58aa8fdac4e2705fac2f25ca0c958b2026d698daa65392af55afb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5157afd2ad5d70c4cd07d201341bad23b
SHA15d8c13f947fe2b9278f37baf6dc4100fb523aec9
SHA256c6eece53189e634aea10d9ea2ca2bed32dd6c198b6477c7ee42bc0cc776f2f3d
SHA512ed52af79b0e66e0f4073eda0cf1cf7d83c815a37c277fd73aa9a42ed2b1043336b673484ea996e800b6fa760200daed5af650a858655011e0f079e79ae9bd662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb2dba20a7d7fe57b14d433f9d676d14
SHA1244bf050a1ef60f5637b9d7d3111ca4cbfb6f1c9
SHA2566c22c54b267fcea973f5b8b6f890373da4412053676f8a0611cc692f876b5189
SHA512a616db351c1142e4eb41b4fa0b2afea04235a2e85f748ebe3ce41a9d1c7bab4cae076064f780edc2b72b22ed0f0c5fed5189c96ebe5aa60456e8bb8c1a60dcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb784c233ec4725f5230228e162c0fb
SHA1988a4c07ff1f27315056002e1ab4396dbbc77df4
SHA2566467fd23228a83ffbed014323f3409f26635cc25339ebf697f7d8c264c7b496a
SHA5124957e78037728ca1190f4b35583201354100ee066b5d1afc1069f07695c46dc9338d9852f10a929fdd73117e2412446cdbdd390084b9f43a0834f59193ca5e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5626f006856e3976cdf0b8702cff61791
SHA157f2caa8b145022dfdd540200c286065f1b0ed2f
SHA2562fd205a2ee91b398eb6b90bfc8c6ea87d54f482cd5c1b3451f46f06d6033f7f8
SHA512bfa2e3545b3eb0be836246ed948e659154dc83553bb3e034a085dd9edb8fdcd4f96e9666bf9f7272af96895d6fa2011020cf3dd0359f98c724658a4b82554e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d7ac37116845e520752a7e997974aa
SHA1bd56a8cff4d48b8f5067a2762dd376c90e660732
SHA2568445293b060d891d29cdc11edc0f45fc2216b1021e922ea63f7834c5f34a6f47
SHA512a1f9a41133b44a8a7432c26b996ee9b174552c215fa4198cb2d27c2c4bd0697dbda342d8fa8c8a9e090b3f1b03b765f2c225a9d963a189cf7c22da43cb027ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5050990eeba51b52336deb15c7c47f0a5
SHA1713b8aad9a82d84db73e6892bb9859a6bd992972
SHA256bb013d2f3ffcccaab220b6143656e3fe7af70fc6cf9c147c707776d5e0ac56e4
SHA51298c0b04b5c56efb5f611662cd5cb43bd13e952de567960e55f29183b87a20b37b86950871d483833f185924817da8d2bde723519202b9f1b786ba0d457f386e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527cad0e4186966ea5ebf093b677570db
SHA122f998ea8f714dc0e19a6764bf5b965b18731a21
SHA256cccd8572b8d0b34caa347aeefdfd54c4d2f3e3b1aafb2cb3764ceacf084f8d2f
SHA5124a395ab1f847c55877e6ad7c888a51d31dbe77879bd8a12c67295c54addb56be0655a95bd824943bee7770f7eb3e375e336c688892a5c5a51399427bd169d5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a92ad16ece3a95b03dacd01517c58ae5
SHA1b5d35c7555accd721882b5256aa5acbbbe467d31
SHA2562688570c9fd882e77dd04b6a6ad772273b01524daf06b01250c213f8d1e54b78
SHA5124680c0e59576ad38017176fd9089d7efe97417287718eb94de73fafe4ef41b146a7ea30a8d533435eea67eb5ca5ed3e3bd889ccc7cca16cf2270ffd66350b839
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a