Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
003ec18793f44570329545d324c53cf4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
003ec18793f44570329545d324c53cf4_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
003ec18793f44570329545d324c53cf4_JaffaCakes118.html
-
Size
108KB
-
MD5
003ec18793f44570329545d324c53cf4
-
SHA1
7a330981530c491d628b4fb43c0679fa6ea7835c
-
SHA256
ecc6bd8058111c0757b69b81d0a9578caca05e7c69d7b25df4f3268d470afb4a
-
SHA512
ca9637c12b3e4ba487affbfefd17f086516fc7dd550332f216ed8cd58ec9167126b6f658990ca1db253ffd2a567e19a72d6a736c803b756ef34b6e826ab72822
-
SSDEEP
768:STmWZs5nfzEBg3UrqgdtdHravvtW64xCsO:STmWqRfzEBg3UndtUvM64xCsO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e1cbdf867d764e897867c55553a5cbd20ccc32aa4944a159c03f5adb1a58ac2b000000000e8000000002000020000000ae6e040852a1f4827f2ad50f90701ca46a09db91680a1ca98ddb79eceadf03b720000000bf64c561be8a316ca1a39eabe27b1c8480745296c6db1157523f3d19ea1fbca740000000794eba919b86ac7a6eb639b20d466ec7542e3ebc754b308a85797a301f681632af4d519a33faf486216b7615d4c56cd6d2a2948948d28a7e08e115a3073853f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d68978a897da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99EB17B1-039B-11EF-ACCC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420277104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28 PID 2020 wrote to memory of 2580 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\003ec18793f44570329545d324c53cf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56dd1be4e8c067e0e6e364ae67756d01a
SHA1a567125a728972554efe64e97c3ddff62f9bb9aa
SHA25660ea498866155ebb6a66cbb276df1de404586bed8e01a64061382fd1272e2095
SHA5126241d9a8644f8c5803725bc03327614844077da6e960d789321115e2188d2335398f30f0a27419d75688bcd9b60910ab4c1c74fb4b3b57f6a8e33c69d06b78d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f2c5c89b886e93cb7080a83825f12e7
SHA109ec7989a04b4dbcb081e969117e0293374696bc
SHA2568c8c076fedc28222ec44fd46527601d28bdb70d2bae56bd1347ff2ed27ca4e42
SHA512add8a4008fd0fa768e2a7b26fe8c464f368f0f793a7a01b80e35eaea5bad6c9c60ef83682cb972f15bc448614648d692b1b47506e1f538adb354b6b08c9aa271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ead3e6b6cdfc132a79cfa62cb7a48f9f
SHA1fc9c17cc5af96a2f418e749ae4a176057a8cd8f7
SHA2567a0529cd8cb02c8198bc2f3986f0e939283f8065cb1afcbb0f0a7ad362f59450
SHA512babdfb2d963300be2c6ed4a62f6d45039b7e9f2451a6204c99783253735bb83bc256a4484903e02d4385ca535e727a86336d3f58c2baa4ec599d37f370c8ef46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9ab43bf2fcdc5fd877d073020043968
SHA15fdad32cac4420d67fe6228338b4775e7053008a
SHA256c83b89675b6ded48d8666f9c6d93e7d79e91ead5a95e76333afbf542d4ed0d0c
SHA512a8e2f0735dc6364a742a119d50495cc5e27d7b2a2ea387c23ddc315232ff66f56b6521e09676bc39131d062dee030ac0a45d550f0d109973494e8c52789e46ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac79c29f5f39a52c23b8dec89b1d3af
SHA18133d2f32066772ce47c63fe2c8d4305e1a4db3e
SHA256f6589878df54033dc94640f83837aca02ce5a3328ba77fafa1f5499736943b6a
SHA51262f44bf7fcbd0cc319fe35a8179cb0a40651ca300a02ee389d172b0bb3a941dae4b9b38ba887b31d3ccbfa48f8e8f848cecdfb2ab7bc23f7be7770ffbed80a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a85c7042a960704f74c0b78ace550c1
SHA1c908f762e20dd925be0f2a957d504366f54b54ff
SHA256c030cb435212e1edb619c244a67d4199fba6f2de76b6a461a094235010538cbe
SHA512c10044047bc7dd8675005fd2c1b344f3e2b7ef3b6a5440b40869db1a5a53d99f59381baddc0728d6beb8caa2bc788285e18c83ac955ab0f79dab219b16d7e200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14fa18f1375b7c0b4091efe974c48a4
SHA1d37dc1de2d5e3c9691c9ea7db3a0d6727bd225ba
SHA2569bd3812702b59ec3925c9e55803bbc40f774ae80a376bb6895a9ac28874d995c
SHA512841e06aa334050df338a479d9a5435299d81fefcd0d39547a443288ae8ef561cc78bb7efe29366cac2a3a859daeae639f17c8fec94c9f03a874edd4fd653e0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f3ea03f14ef4bad2c9e6aa597b64b4
SHA1b71f4315bcf654c7576a57d5747b0ad208f6c0da
SHA256f639ce2daa628a349102e4a48830f26674a9e77c35e3988e0e0cff57bc30475c
SHA512428426ec0b828f0ff406f10956ea9ec4a9f2aa659649d2a8b0e5fd7a3ed22b3d04d745a2871c069f0334aecc7338cb15b7f8a279e6339884ab357657a2cdeb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed4976267fd18468f796bf50fa95af0
SHA1b9cf7d5d86508ea627680d712102e3d86937411b
SHA256e24ed83cfa3dd0710671827692c83f3dddfbe1a06cdebcadb3b7a66c8497e2d3
SHA5122b12851bdef7fa11f1ff1488a8cf6c7e3d00313d1975dbe71b0463176e7fb4e46f337c6902f703817ff7386b6538c84742d55b2699ef4b8589a708522d6e59e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c40ed8329eeaa59fbbd946908fb83b
SHA1012171eabf0337e8dccd83682d799f78f24e929a
SHA256e51191abb6dac724140b5613c125e5d0c9ee7c1cc9ae32fd148191732873dd89
SHA512c359f1725f023a30b91372873303207d49d47d9e946b0edc31add40ff07336db7241c324c4372c020910f7d4c58d7ce2178fd7543fe1b7e217a381b0de223e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03d2d34e995901d55c00b5bef9d689c
SHA140f2b06870709e92ca28e9591a05355d1058b5ac
SHA256846218666290c468bc651f85becd2e97a6b17b161f0c479697f9e0438c2843c3
SHA5127c79be2007ec28214a2cb857cd1c8a4346e26edf21409f61decc4646497a470245665297e973ce7ab512aac31e00cefa30859889d2f623b68fde103cc9d88b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54383b928309e7c9647a77f51ad01cf2e
SHA1f6f648f3467bb7f12312c3e6555862239af9f864
SHA25633b51d565bd7ff00a9e39634567a91695d27f0e33d8b95e154d63f9723c3bb1a
SHA512f696358a44202f323b7ca9665b0fd061ed25f66ea64ede525a5272de9503f45e6fec2a471886e328c9dbc0b99e7ab086bd9363c21df7e2a7a60da69727625f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5964338db7b9882039828cb92f0590720
SHA1e20897fad07283fdc41e6cc70c9ff720590f94e2
SHA256f32348ab4e9b648a2e10210a364fd681872e0e9705cf51542a0c4b9baddac981
SHA512942d368a7e5ebdddd21a10b49bddff51b922beeb605fced4e30f2b5e714512087a626041bfb58944cb8fefef5d8866fe711c3923e0339a5c3a954abb89ef19e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD525b88763c69d81b6407984c62385659a
SHA14fe104c1c03cc0f479627aadbb33f575e5b8fe65
SHA25603c9436c2c3d683801b5ec1986559e5e3a9b5758090558ed24545f98934c2b08
SHA5121287af2cc76102c539e1782a1e42274d08e92e3d40deb1ec8f56963767d2e2d4dc390091abe2ed66d78381c74f3fe6689441ef449d504e345f450f2d4126f311
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a