Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
f864249578c5be85241671f122ab75a4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f864249578c5be85241671f122ab75a4_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f864249578c5be85241671f122ab75a4_JaffaCakes118.html
-
Size
16KB
-
MD5
f864249578c5be85241671f122ab75a4
-
SHA1
c7835d65720b0d6d7c1f8cd39b23d10a3942af92
-
SHA256
66020df64923f9fb5468b03cd58cf02ca055115b488904a833d569f59cb171b2
-
SHA512
4784dea08e574267c859969188e453b7e6ea800d81d7055426928b5060666c7d4ebca670d213b0854516eb1b0d2548382b9a0bae9490f9b0fa92656f7b5f64e7
-
SSDEEP
384:pPKfpC5IgSnbmFe7Acp3THB0t4bz69G4MZHsP331:epC5I9nC4Pt0y699Mhy3l
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00fb92eb191da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56BAA341-FDA4-11EE-9B4A-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000006eb48bde972ae89e8732a45ec623051c73676d1ab080dd793b51f95ebb480e4c000000000e8000000002000020000000138499dbe4805ce1b23ae1f6572443c6dc87bb73559ef2930f3c026da45e2c19200000007be0fd392c8a199f7df6418d5f6be725a6f423dc60d70cb200b6493b59131b6a400000007a33faadf8aa0262fe6a04544df9ad142c83c2b4b2ab6f342a15995ad75baf548354b3f0150fed4f6c1c2733ea86209d20dc4f56dcccefe2ca27d155da3e6909 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419621147" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "18" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000e36f90deaa515ff248936abf6d410a0dc95579f55134be5ff6c2ffd8802793a0000000000e8000000002000020000000d3570800b09c0fa956426efc7352cf665778731450906256d69079d79b55c15790000000f7da42e078f41a443fdea1c654996288bd025da7b93d936247375d9dc67fbfe8dc7f618f03c6dbc7b9b108839079a71a4ad0cce8ccf47db54394397135a59542f9fdc623589ed8b5a433411bfb95a7fa3423f6835242a51e606a8f75f9f2376d5c4b807c4dbd9579822e1d8bfca988cb972ecd703b8bb09c1642e7879fade4b0fc8676b104e44d8a930e427bccf843294000000025914aba4763e16d474eac89f661173121d2da57eec578716ac44f6e68f4c591ab8e5a94039977abe02d91ede3cac62853fd8409d4391b6346586ea0f6e0132b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2676 2320 iexplore.exe 28 PID 2320 wrote to memory of 2676 2320 iexplore.exe 28 PID 2320 wrote to memory of 2676 2320 iexplore.exe 28 PID 2320 wrote to memory of 2676 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f864249578c5be85241671f122ab75a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ce4c08e13ea047975cd199683e771602
SHA157f39dd6bd32c421a7f54388ef0c93837244d6c4
SHA256b0285ce58ec8d969fa4dd23a7d4c1efbaa6db7f17f49d01329d32c9bc024a94e
SHA5124d934e6da6f6c46b4409f28a8ff9f2a48ff42e0c6b11de51b7f68c776e409f1c9c2a6d39b9d4677337e5b0e33782a09f46b0c9155b7f3afe2b0a4227bafea935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1327f26af29f6d50d6697f5a6570003
SHA1c224a1b33cd9856d603bc47889682775962c97fd
SHA256656a232bb3769f4a421e25a6794354ae8bbdc64e0dbc62b5a5cf3868b5a3d682
SHA512fea2c19e61fd1e67ad8282ff2a0cbbeda76f889af7c9e01c16f91c4e3dc874571a7b568ce83d0666c86e9b997c6bb78678606b4df69bfff66f25fd28580c3679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e50d23d9d75d95deaccbdbb23e0d484
SHA18096e4bea1c4da384de8de4c3148644a6b57e633
SHA25613ba12304e0a50d639da51c5231920cf8e9a57c9982f2992b85815e723691c87
SHA5129364c0d56092f4f1e8b2e8c3bdae85c174c2c3d6f5de4a25823c967086c1d58dd09480b711523c8cb8bb86404f8457adb7c1e82523dfd89b48f7940cac7bdcd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525647556cb3ec1694f13169e32e4c59
SHA17a6ca2a6745658c4cb6ce0edcd4b43fb64d16752
SHA256f5abb6cafa6f8f9b6a515afcb7b633afa430e7d163477a37cc6c4aaab3a0311a
SHA5126725c331413f4b993219a72a9873dcbf87d90f3d8c403d4df6f3d2bc622f88e09c1118c3c3d6ed3788577641380d7672ca66ce3b6c3231c349fe64b95f45b0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e00afb6013efc804e0e827289f2ea89
SHA1c2ba7b5676aac9cceaae06f297ed5ffafd10a99b
SHA256b9ecc6b831987790c655b817032fde46a80e3cd018aed63b088f58003695fcc6
SHA51254244dabaaabbacda2c6ca2b519508ed0fd685949d2ac50237a4a10dedd9143b07de8efca2f6c3d62fafd71c481c4582be52ef21da867e39e8a6b1ad22734807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea67553f8a15d82447f7f197386b1dd4
SHA1dd6b129646688a89e585c6582d7e600b78acef12
SHA2561154e5ada8e21be149c1bb48f1a52878030ef2f8bcdf18d2a38b97f5c42c81c3
SHA512c01d57ab9814ee4f2c8126d74a7dd3bb3ff18b5ebee06e7cdfbea889883a948e17670877be0325868a8cf70a84c74753fa7f5b24d94bee762b04d7e3455d6286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c2f919045adc2a5e55b99563cb4c0c
SHA1b1a045b66c07dfd988306e42c04b1dd0e0d7a6d4
SHA25686e963c2eb213c1c973f98060a989f623af77b1a1589df22f775078cc142881f
SHA512fc5228ba98551648042652a69068ea6d2edcfc89d260afea273aa5f59d00758cf1cb0e3fa038c372f0eaafcdb67b9c4cf16f5dca3e212413a55bdfcfc86c0b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55634630d7903999a32315d94e82cbec2
SHA15e56c1dd16daaabbfcaeafc566646e1c2b1ce042
SHA256b31f52de8b5df8865286a19654a3db074b86ee263f5bc38ac1fec90590c66785
SHA512d23d45102173a4cfd8cec433574c4f66ca55dba22bebd357bfcc234af87e8c36ff9bb42f85ff6bd822e97317aada278817125977c493c343525ad61a97c2d551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562ddc77f486c19b8124e9429d93a623
SHA1bc966c7db8e2d781fabcc965fe9464681fa31990
SHA25607d2e71daea299603ac590a94708cf98e39ce8ec43c3ca960eb75b3e298976bc
SHA512528bae06450de49e686884c90dc26e95604fc5ead8e68d4d72571543caeb857476df65f926fc7f107557e2c6f135ff1349017131881311cdf392a17063a85d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c88cd575b3be25da9d96d8357e458a
SHA1f80d05a8cba3a5d24edcd0fafb4d22fb0b880809
SHA2562c6d1602be4c60e966fb590a3578e0c2d059ff3de4e9085190aa43e5e015b996
SHA5128c62b1e554cdaeac4dda304782e6a34949187f794ed430a07106c8d4ad5f10f4b331e770dd54ce18d5c37a66b98e08bd0185698d842ad50dc672c4d1562504ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5447d7052ff5ba13dc787969fd6ebf126
SHA1ff6368f72f431a706bd284e246ef047a2e88d8ad
SHA256b25fbc9c26b4fd514873d46e8a113f9986ad338cc4a9aef65b1b2cab2b7fcd1f
SHA5124da3e924e9693c243a3cb621b2060f6dbe6a0df83872b382f68ed1bb1c91b5050e686cb9d1a14ce3c4966ef5cdfb46c29bc5a2e02e147eab78b051e817524861
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a