Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
eab25467d8904aac5809f971802a32cc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eab25467d8904aac5809f971802a32cc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
eab25467d8904aac5809f971802a32cc_JaffaCakes118.html
-
Size
43KB
-
MD5
eab25467d8904aac5809f971802a32cc
-
SHA1
00e43bff35990f44dc6036abb2675e98d3e3610c
-
SHA256
292c6308edbfcd3d9f850713ecea99f7b660e983c48335f5c07ecc8faf3781f7
-
SHA512
7c5872847b949f9d3a98154864c0b505106456d3a29decee4d036ab7c7c248ea56891d488ab7e93cbdbbf66a8b8ba065009db7f0891ca380e7dfa58aabec98f1
-
SSDEEP
768:ih3Wa0FNEcRGKvtqGMULkj3lrVx5MvPsq6qTqsqNqAysqCqzqkqNqgX+qkqBqcq3:m3WakNEckKELPMvPsq6qTqsqNqAysqC+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000e467b56f81290c6a29676d1f57e2457f7709c696b2966ff855adb0e62d340fb6000000000e8000000002000020000000b1445b4fa4a6247ed210d8a146900a04c8bc076efb8b8597ceb929780ca4eb6d20000000d0c2dc5068eb15fb3032eb10c91dfd9418abce29d77324a33576fe1a27593b7540000000b40f9d64cbff970615175203791799f276ae0c287f0334020dcef70322b46e997ef88cd6384156d4ac7984990d95c2a33ca76be584185ca8475c1f2c4e970d3e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d6a664248bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DE37A61-F717-11EE-8795-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418900973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2344 2952 iexplore.exe 28 PID 2952 wrote to memory of 2344 2952 iexplore.exe 28 PID 2952 wrote to memory of 2344 2952 iexplore.exe 28 PID 2952 wrote to memory of 2344 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab25467d8904aac5809f971802a32cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391eae32d9b97292244a86895d9e26b4
SHA1a3f13dcaa397e5df54c0a763f7fddda7966723e7
SHA2568c73b3650664e1ce1f76232a594beecd0b875501e8d73bad951955f38bd56b6b
SHA512dd004b94cb69fd78b6b64695364dd4bb3dc0d5d23e0f547ebad18f510bdb24af47d11bfba56535dbc8ac5f44d41f4c16b4d945b54979755ad1ea86034ad5aafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc8661b2e3bfa898c75c3c6fc3bf291a
SHA1761a98d0bca4014f8c07e936fdbb68b2175950a7
SHA25619beafe3bb6c4333110edae50d700dc5cc9ff07df208d0721f9a4d7b99416026
SHA512c66f48ccc9fe5ed2c7234e4b0fe7241f6beec10f9e42cf44ab51b9c35e83eee8d4aaef16087072a37e1d7ae891c38768eb1848e0ecbca035bf0ac298276e6ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf41799e789ef713aba636ebf980fe4
SHA1c1e4665acd5df2c2ed5ac12d4c489c25148528bc
SHA256357c28180e50386379dd2bc87f240deaf49c0a4d80bf6fb02ec8d065e091dafe
SHA5129cee4cfea476ac75b386f45d9e0278b4f6e83f8156bb11e12d3443f3e71a15f6af94f89cecfa9349e5af14b09df9d76c574f76a4d2efdc73d07b6da0a756c448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5164aa8281a100ad650af1e04fe53827c
SHA102f037bc31d7f1099442d9ee03095fab89c3d214
SHA256b1538f2a8048137daf51a853b3c83d86810896f02fa446fe344bef9a6b2f0c2d
SHA512cc094e26599d9063afd71f44b563f0ee155eb38a6364b72b6914191941ec1997b75f9371cfc886688c3095df01fc0b7426431e45f518a3036af0d0a55a0ef5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59403f9dc585de871b78b725a34c5683e
SHA1b5c4d4b4e24d66da92b4206c34c786f9bb50563e
SHA2565c68d6e1073fe9f7bb35efc79d6728abc39f6bf7e4fe80221e841d1a7b0da7ca
SHA51275e11aee4a592af1b53318618ef3bfb5deb2d0ca87e0bddd153371951c9bafb8087fc089d639d894685347522e81095cfc3f07e8c75117b558716f92ba8a01fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6bcca5c8c79b21b096db0be657a561e
SHA16ad1802874b7f0fb3dcae9d68c606a48b12033fe
SHA256903a10883d0f7858a018059aadc12218d97a46b910a056ef75c88bebd82e03de
SHA512175efc3c695707223b1957a2c62f38f48adb1286934e596a491d02c9f0607509d7959b18bccc058bd28f91939379e10975e105c7ee2ec534d1142161266773c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c624b6ac5df7f3d5d1b4370fedb616a
SHA1f74e00388974da6e6ffd337934cb216f613a7615
SHA256c3ca8a9e64051c3adfc10591d20cd83c5f49b4e9829d06fd209d7c895d6f47e7
SHA512ac75f027ff5f73be06f318e7c14f55179dbb9d0fa83a1ae9c9b887906a0cc3a7a04e93c2dbe0075676cb6102861216779ff338ffb70355e7690802117e369bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e1579757896004735b80e0fe0e91fd7
SHA1188803f70ec6b53edeb987a9dcb001f31e141c0a
SHA256ec2080b0987e25ce265f49f58c36552c17b39d334796e0ea5bda7691a99f801e
SHA5122c757f5bf73079e862b9599dfd3c45ec2d39a8bd769b63bb56b6bf4dbdfbbcf0d67f3eac591a229dd47230fb5f4f54dea519d90a10d239e9a30b4593e49a78f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56361dde35e857a69e1199f9460cddcd5
SHA13beb1fc43528899305b42c02336e8d76bd4ff0c7
SHA25694ffac5ce332d91c9098a0596b06542fa9c070a667f90604d2fb97f9599b04c9
SHA512452f866eaa727451ed1f53ed6fde0b4f35f0e0daa2294abc5aed326815dc8f7d3e694abcd73fc361475da42d6fec7bf5cc09a0220a241c3b7bff2e0348ca8825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962264309d6cfbaca47dfb9cc1c144e9
SHA1be691474b5334f96a24cca0e1d5379852cb4c462
SHA256155731d63018928bc772601c06db6f2566427d89d940630bd23512b3e87b22a3
SHA5127580ac1afe7fb63087f20b308496f25998913094e747af57815df4ebb95b9b44e68d469f3b5eb665c7e33aa8e738ea06d729ed4c69b1362268cdad8a3edf0e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a963305645cbcd230d782d751ccf9896
SHA16f7427ef70b2148ebb9c10d138ac813a7bc377fa
SHA2566b41934f44f8cd45ed8bde5698190812ffcfbfaeeca0271409d00f5404e3a9fd
SHA51287c680fdd3795d1aec5435aaf1f3d900ba6d083f7ed11294b74f97477332cb82f383d4a6717f5db6456756a91b493409957a0d6d571c40ca69394922531bb96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58336b671551111dfbed85e91fca248f1
SHA1dbb7581c93db1c7cf7e66f15c5c48c6bab930de3
SHA256f876a9ecc21e6d2ef941a1429d74f698d1fa24f00c4182e94c3ea4ba54bcafe0
SHA5124d00aef670233c0600a3a2413f62d21b35e5ceab757abe7b528bbdb3c56ca615fa29d49a02cce4c0ee1a02f806a188f0eb1bbc36cb863fdc28e114457b4c30c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557322a11b6fdfdef2e82c2b4a13b55a1
SHA15036d465a0455b8a0b700b03a1e50a3cfda57878
SHA2563e479e85231c77bafd44dc670036b2c7a5bea5ee30813c6872e9b0d300d57388
SHA512ff2e62db4a0e459d7f9b219da672618f0276abd137bbb88ec1c14f2e744bb871f6d2904a82e82fbf1a88b58f7665a2129abf1d5ec520663cf230d401284488bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dd7cd2718d36be00a896fa6cf7e9215
SHA17d1f6d8ba49df9fa275c45953465e578c766017f
SHA2565c7698ab5f6a573c4f6483ef3379fc2082db39f2d40c33a2256d2cdc46ee27e6
SHA5127cac2beca5f7c6c9aec105a36dbbbf63517bb90a60a41e711705689fbbd47816a652c01fd727f34cf94dab2d2898fe8da0b0c32ec5d8f68af125a3549aa6a4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b6c076eeb31a21ae4100311f06fea9
SHA15649fb8bdc9b40247b88971066358232ee492c0e
SHA2568777ab82b2fe0f59d2f8733bc9f8d04a1b83d1ef12b151c2f33aa6740d256561
SHA5128634c75141432e18d350e1d8c63139f447ae818e69dd0c7215b2b6640b5497a4e4232faba70b0cb4f435a04eb39afa8d158e1c5015ffa8ec15f3b03660444681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d8f9a7fb3dc171ab54dd37bd679fdca
SHA149300cfa1b54b381213c5151624252649f796f9a
SHA256a6f32990f27305cfc585a80228e73a08a7f3d5d51102d7cd80982cc1330f5664
SHA5127a987fab0bda670af470ad89d6966e2df2e61e1ca274dde3b922b7164b804e774553a1af7deb7d521e6603df72dd30c8188fb3f84f48c1d9729d2e39469e76ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535de17df1b4181af5e289ff5fa23b211
SHA1b8ef5158616b84223c9180fce70b6ae02c64d6fe
SHA256e4ecbed0b00538209e14b9847af77103202a79f7b54da0d2aa3c6e6fad4afa4a
SHA512c15cd13b1a8e6bc12be0f2dc14e716886cf2087ca59df00139b753cc51fe4eadf80e6276ea46e4474c61ac3a9740f26e152bd0e01c3680e6c3f24c1e463d8f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26f671c1fd631562549247b0c477ac6
SHA1dbdbba7e40bc5523ca64f6477a6280ba816eacec
SHA2566eb01ceb44eaa71d9c0be766be7b9ba72c2dfc556739fa9f50478788afc503e5
SHA51204cfeb21f1b8fd6ef4e9b6c710e0ac9f794300fc44cd9ef1a98539587b939339c516d421246d6a5f009c9e16f860868c5cc9043f36bdd15e4540c3c2801b3b5d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a