Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
013647f7ece2e81373416bbe154bffee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
013647f7ece2e81373416bbe154bffee_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
013647f7ece2e81373416bbe154bffee_JaffaCakes118.html
-
Size
3KB
-
MD5
013647f7ece2e81373416bbe154bffee
-
SHA1
078c0ae8136f7cb57d4dc8cfc2f941c0fd9aa74c
-
SHA256
6e359cf1fd20b4fb32c6148b6a21a1c2b8f66e4196b630fb706351bba75440fa
-
SHA512
f9f74a4608fd73b9064faecfcf295021d9f7f347502b77e4b7510ccf1e74729367c0a19d7795e6cb9292fef72959e8e65a185234d1a95e8a2c09a93964f15618
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c3e76cf997da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{980AD291-03EC-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007cee6bc9c375870af81ab41dc68d84eb07765b480bd225bfe24031ef77c52a77000000000e80000000020000200000000794b3ad21aede7b418ac0f61cb6b1348e3fcd533422fee5257e65f0c407930b2000000014c5e1e2727f02351a6943edd85efc8ee98f1d9ce03c7a8aa2724b4c2c3e40fc4000000001ca1ffd79af9e84e7e732daafa313df3e91cb10f11a9ec84542edcbd52de5c838e786a0471c233cc86dce8480c699b0f1445cf4897faa9cd9aac4e5f5fb1ae3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420311886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28 PID 1712 wrote to memory of 3024 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\013647f7ece2e81373416bbe154bffee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59844e400626aaed6a40e6063d29dc8e2
SHA1f496ee6b35df9ddb4aa04b8f23416904875fb814
SHA25606ae060b32340ca614db1dc64e9575f48258e060955714928e0b3ad9d8061c6c
SHA51233306d5f7f242627ee91c4b6b17138e428ddfaaa7c0f9ca1154903a453bb1ca3bad460740d26a0350d5aa36118917f2192171bfc93fa243679328b0e90da82b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589143dd2d12ccc69af6c471061272098
SHA1402dc19d01f644e8cdb8873e85fdcb0459d8f562
SHA25687c43871718d31278fa6deda1a877603e7867b7b1dbca4f0485b4e5ee4e7836f
SHA5120917dafe465e305a6d39eef2ce578307dac87a16bb136ce6548179d831a019b3598b320860d7f9d6a71265e0e457b04ca2612c2a15005dc1b0c1de5e72c7e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce0c1aa234073367a406393fe88a800
SHA185e537af5e3411c2e5564538e58b8a528af4e3cc
SHA25645c78e659e092243a767a5517b336e43fd609fa63bf46d146712140385a2098b
SHA512e76ed58ad58c5a921307d94e346997f8d588d36fe7a51279c707ffdd7a34f467c19ed1b519cae8dbc2e8b4f643d55846f490b4599e65c1213e23b7e0b3378729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6104726c6a0831a1337d5d56c2ea194
SHA1f50a02ae37a0eb1691e2686e02860b45088265f5
SHA25663be300c1c26798cfa10465143cc685d0a17183ac8bcf433ca7cc3225870d348
SHA51220ee15ed8eac43606de670d1e5d87804d53212298f510aa701cee3e1c1d8259cc90c69f4f7c1247269c4771f0004f0c5e344922e7cd3ba6d12f720d8039ef3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bfdaefefad21f5a7e3deeef96d0171e
SHA190eda7700e37ee8928479c89277e00a235eaf317
SHA2567d5d4f948518a6738c48041389e625e8a4ca94cb8bed19a7e10d97469d9d0401
SHA5120079b88f1ac709cd2c55b84c6b0757c4b579a8c7c644024f87994f913b5f0e084efd831c020030220bf7d984319d92dff31dad7a75ab427e601671ea427cd1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb77bd7915218b9f270598e0670d5a2
SHA11d230169b048573b8a8c57a9ddcd7745e0908abc
SHA2561b137721dec6bbe2b40dbea97a102264192a0c7d5e91a049cf7a17a9e5450b14
SHA5125054201f1a0addf167789510c11e3b62c09e0b41ef0312a44e3f9c4ce47dc179c3c7542726b7ddb4dbc613a32eb31788db85923b82bdbe6c7925d4df9e33cc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f139c7e207682b7d7695951d7516f52
SHA17a04fa8baf22eca5c3fabe8aab63ec5f384f7258
SHA2563fe2b30dde5493bc080fcd17e056709f92bf3c001287fa229da97b81465eb5d4
SHA512da7f37b6487e88b0010e4608dfde5eabb5ef19a5076355958b22de4e38f8d3abd1d4db894e11b0c9d87bc159883a20c55cbc318bb6a7fb53f167bdc0f491952f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85f474914bbc35c070dade822056f69
SHA1a228f7a45887bf4182f4da451e3eac58d14ec9af
SHA25684e0b775f4af1ff221bb771a4590befb2cf5cf0fc1f4d3b76fc1c42ed7ca9698
SHA512c6d3f52251f59b32457404ac0a0f40e7cba0f1fc30a7a2aa74addb8e3751b8b17d8e5511071e4d7fa52a044f740138638f97781b7bfe1889ef80efca1602ee66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7d18edc3a8beeb5b7669decedd16f2
SHA18e578dee0a419dfd64bee2b7b3ea5f4c983ae579
SHA2567b8ff26464f0187bf7e29859337a55c346604448c846de800476f518f704a3f2
SHA512addf5db662ada12c3ae08cbccce71e09858ff8b0a8c9a1d3399954ff44381d0fb76b817ad80c46ee712dde14c6ccdf72f5602b43b96ef8ddc27496ec8033e5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838ba63943042e1f1c9a13902b2c391b
SHA143a9701add2bf951b25ad48ef875e25741744c11
SHA25696f43bf9424ad9b3ea0c80ea035c0ffce39ca8f67b3008b7646a3a9f3ae14359
SHA5120659cc64dc16e1a2f38c11f93964917f967740b1c5a379dc0e8376ca4551fcab4e7bd20f62fe90b5729774fae2c2e232ae731ab321e7f412c4ff297552dab426
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a