Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
ec13733de106f02156f47743d77b67aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec13733de106f02156f47743d77b67aa_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ec13733de106f02156f47743d77b67aa_JaffaCakes118.html
-
Size
47KB
-
MD5
ec13733de106f02156f47743d77b67aa
-
SHA1
1cd32df1d1c6edf4e396285ad249b31401c3334a
-
SHA256
336c22acb8b98e70e3c3a279e97f1828fce1ad3ae5c812f96fcec7223b1bc4df
-
SHA512
7815be9b280ec3c2c8ee764063d64a62274b3c64a08f2e1a3e4d4563ca255e405b4d8c783d074f5c08aeef9aa827e9abde86c7b8684dc0b0bf300904b2253654
-
SSDEEP
768:yI+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGfkqkY26/wOen/ezR:N+vt+0U+v5ikH/iOgOP26YOwK
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000090984eabac1842986ec82c21e9ae10ce5962b82f8fe9bc2387b3b274390c5784000000000e80000000020000200000003488c874e56913fcc1d520b4305f941249076ccf7c12391d2a636cb7693a4080200000008e52c9dfb6daa69c763332ebdc6be874afe37345f3941b4d899696d687d41b1240000000ca3091576b4ccf8bfc6e8179d8d3985dbfecb883185bdce9b243125b5ea8ea0d631a61d0d79a7e845c6607eafa45e391a09f9e37f34ed529198b0f6ecd788f10 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e403f6918bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418948023" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B2C30C1-F785-11EE-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec13733de106f02156f47743d77b67aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e641e24a930c52015085cf9d4ed4da
SHA105a10c67955709d901d4195f32c998813d0b6eb2
SHA256bb542ac7651ce6751d75a809ae3697e23ae3bd85a2f49896804d082a0f3295db
SHA51258a7e9c8568a51efc72ff30099e817f69a74adf4a552ea6905514dff76a8290e70c3e4c69f1f101c037ce5f87ac764b630c30b54a9ee7e50b488e7f237a11559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b760991d6107218b3ae4cd9667a41116
SHA1699543ce0ada84ad8a44e12e72457d02e64026a5
SHA256bdcdb585ee1c1e689c4a29963f125ccf1353ea845b09e9aaa74816ae016c4378
SHA512bc7660d2b5957faecb77bcd98ee43deed5353d7285d3391803e33c39d443bfad03e7f194432172917c2f77ac6770cbf4b8d25e650c230a86e3a1bc8e48cf7bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028a4aefac34c3bad8ef75883f5a04fa
SHA1b0f2b4885aa8cfb3d484ab8d95477bfbbd12ee17
SHA25657e06fe116840aa7e2dbb47fb6daeb151081de1d0734e80d8437cf1511ab7bda
SHA5122498f3139ce3d5dd21c59e2d25b1285a273835372ccd44c910b4b36104db17a1ba80218f14f0c4b7e3e4fd8900636a84afcd4ff1394d21db6641a9eb216b05de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f679d84d365f3cebbe944e0c71d87256
SHA179cb1050088be67016ac89119cd4caf43e46feef
SHA2564198a831eb3dca785e7f94601a496c73ad38200828f8177d32555fdb7c81bffe
SHA512f3148a3dce10497b01c9c7c8ed7ccbdd48a7ac7d5ba728e91890b506b4f21784bcb6ced94d6025956fa7079167efcfa2c78af709f51ccb9d4a5d2ae9b79041fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac13fd9cbcb05d4b9ebe0fc12823569
SHA1c0f5ed5376080c60d54423a4b2080057f1d68cf7
SHA25649d84fb3cfa830237c3399675cc2749723e99f67645061bdf00e8b2e70a1b42d
SHA51224db94fdb2937eb471962e20953d1158b2a41a36f594cecec10c0bd3d1a0e417752e7c826b9ad226e4b7b6cc735de7325ce7e931ace97619e62d48729f66fd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4db97a2d9153a7a5754f254e1a0cdb9
SHA1f4953d36807aa08d933d5140a258178cc2e83dd1
SHA25635253ae9c97800e54cbb368fc150aced10bca39484005f191d9792d66b8a1a48
SHA512f91b2001de2c35d61e19bd0755cc03d08fed6bed87df74a0796f1da91ad828d59d87cd740f343f454cde841959e25045e3d445a9806a42557e04b1327fb00b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e9430d17ad9a2ec598879f3af4cfe7
SHA16f396fdc60a0b00f9e603338fa38dd432c5ec6dc
SHA256aafe70cb00dc10f39d5398c25ba8331ee5a98196f41f05e6db06ce307223326d
SHA5126c69c5084f7c9a3b98e33c6d3f8c3571f6b5f5a516967d62ff1ae833e73d186198b894bb3df61ee905517ee63c92ea0583941ff58ff6f9dd73d835332fa589eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a26b57857575387c66146eb364efb4d
SHA1f0f4dd25f41e8c263de338b0c8bb63eaae9142b9
SHA25613aa2c130e0c52f0ebaad47c3d160385a69c53305afa639fa8082f4a58796288
SHA5126751ed01dd9f3cdc8c0ec1ed4b1e123680cc9271eb602fbd7b3763668ecea5de24a0e5224f96e3108847031c38cf77c55fe34924cb09583097bf683843119190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140ef4d7cb2bdc82439b3f5ec27d292b
SHA1caa55b760b659d4d2a5ae6eafb18a7f1d6514900
SHA2561bff0c0bddade635322801f50acea2d9c8eb4c79808a175daf4576ff618655b2
SHA5120180c9a68ebf5d6827fdbc5c8f02e109448ea3f2d18d7182db643289a9cabaa93988fd3b0cf6e3ee46d38207d333b91f0fde27662bebbd8ec7ec5635664e89b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56561b9d14bdcdf3af71c4ff16538502e
SHA1ad8b08b2878c935ab11d4e98637b21ddc6ac6c1e
SHA256cde584ac7c0b8d226b6ecc32ab4d1fc8babf8831e5e721c86f9b8901a399d724
SHA512599271aafd51d155cf19f462ca99c3a4c5434b317c9d8dfc8341c39ed6112c634b200287623b7fa16f02e4661b48d8d4ae7bfdf47a15df3f82bb4d17eb0684b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a08ab644cf8dbe88a9e1427e7109d3
SHA178cb31886d40fe2fd804c244bef10ac8fc6b8177
SHA256f68fd0f35d043e284317bcb11e3c50d788c24386e40b0d227730c64b7fd99846
SHA512dc8dff46514f6de44e115a5cc67654cf3bef314c0c68e1318c6d438703fb331fb3ac95d1206724f84d5435c512607a3f72f3ee12762f97a87069c3f2df5df747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b098ec4d2dcd195ce4a61f8c55743b1
SHA1addc2fa462362ea15f6998a3fc387b81c86b3716
SHA256ace5c9e46ae5347e18f28b4af8f2922b8a8b4cf7810f03689a8a94d623ef100d
SHA5122ed07cd7b311fdb7107f5c3ad072ec98c82c38459b6b8a1b9735a7c1ee66e5b94ca9137ba999e8b27410f5fd03a2b4ab4363f75d60a20cd32db1ff21a9e01a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556567cb0211e7a3271906117d12323f3
SHA1b23e1997564f57d62966e06f8fa7cc5083de8b12
SHA256dc99bb88724564a7461e1b750cbebd20a9645db98e0b20abc9e3063f6c6f4930
SHA512e3e0634fc28c0c6f4a03ba64c668291bc69c8f8b32beff978d969d040e9ef88f87140cc5d8da240cdb465cdd49fb37015a3096de317eac6b4eecb167ae751588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540da5a93d9b2067f6557cbf13d5f28b5
SHA1fb0e455087ff7657a3d267372aa8ef321d380194
SHA2569f0b05080f2b224db0de2af37a4d0486ad1296907f6fccfbfed541e20fe8220c
SHA51274b5750048c95a119178891db8bd88eead2b7967ac0d26a8310985d9e650cbd6f521165b4fdfabdba13d24d071984dc280b9825db961e315e0a0c79ca9e6d8d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc3019f66ba3fda70553c5aca46b0f62
SHA1cf63d6235ffe23982522290a6e9a8a6729aba721
SHA25635a2e16e62651c441ed1df73650bf5abb2c556b95f53365d8f3bdfa769412084
SHA5128dd20d5b2fb0ec6ed985f1d335cac3518cc6aec503b11f9a8c503afd404eb89dfd59d2a5bfacf765ffd7b821441f4b67fccd77b3241bbdcad8452033e3c04330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fadea7cd66fe10811fdb92917127b4a
SHA1322645accd7d2e7842932089de392e7bab40294f
SHA256ac4075620dfa0297f0076da9e0a0bd953b35cb2c98501a4ec805e706137cc0c7
SHA512aeaba1d3b43c226a3a11206394d6d3c9b6aa3ca0244e3d5229a9b21f619c354edd172d6809527bd01dba7640e6dc53cfa30fc5d6efb279fd31037aa1352f8bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fc9f426547a88451954b0ed99727c67
SHA14eebb2c90e8575c5508a5c62e4a51f0e831c873b
SHA256c3f64d561a9e6147850a67e74360bb6d01379f639a27b67fe2720b41dc4074fc
SHA5126343a0361b2ceea46c106bfaa25253c5f11184b06a7e901dba5aed9cdf1cee0c06f241044201669098ec06053de35417b7daca358bcd622365cab8ac4c75c8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cef4c85e512a25db508e056bceff06fa
SHA192d3b084ddead146020a9970003900411cec7a5e
SHA256c997f6174f32c9e27e0282ba7b30e9e8715da505917564bc81f282fb9b404a0e
SHA51269141a519cb5f6d172dc285c399f30f0c9f2e7f10c9a7f9290ea58c381ba8c3cab0788cfac7ce4a6b68cbc91e36a6da7acd0bfe71d422bee255d96f1a9db9c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3fa757cad2625a3478d2f161986b23
SHA1e561f101c29e2dc585dca45294a67722944eeef0
SHA256f99c9d3ade4021e9918d5adbbd83d428c2330868a62f06bc5fd95b58e9ff041b
SHA512fc588640ee02967fd6b8aea24141e0b70bdf18dce3926a586c7d09a251d96bce22a6ed956740468d73741f242f7c88990920441677b42564c85d604a57ab5f50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a