Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
0244270699cda2e127e2b2b9ac8e88ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0244270699cda2e127e2b2b9ac8e88ac_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0244270699cda2e127e2b2b9ac8e88ac_JaffaCakes118.html
-
Size
3KB
-
MD5
0244270699cda2e127e2b2b9ac8e88ac
-
SHA1
35117e13b49d85207b40b95d79324a91a59b2023
-
SHA256
d16a71004c7a867ae5fc42fe31ca6857f674a0e7b5513c1b3da682e6f7edb573
-
SHA512
2ae5270b54d8e7a9f20de9ec4031cbf415b29562d36c51018d777157e70c3c2b040d977d4420fe5fe17ed01b1247ae3120b616d53793ab161a8dd3af820be53f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420348660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206f6a104f98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37DAAF71-0442-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000585943790c5bc18cefd8739ce32bbd3eb7fa483ad4290d2b8b2a316669518807000000000e8000000002000020000000a4c4320b5f35b0450cc1f55730cc8a9cbb15565397606d74aec6fa124bce6f5f20000000cd1dcbb8f2af760ef44393168878421eaf83d9367e497b6f8b1679fab124268c40000000ea80751c9207ba78305e7468c85ff991307a4783163a30659bfafd3541a884fbf29047d8ccd4f28ffae704e5b504063578032c03dc45fba12950e8c72a07b4fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2208 2152 iexplore.exe 28 PID 2152 wrote to memory of 2208 2152 iexplore.exe 28 PID 2152 wrote to memory of 2208 2152 iexplore.exe 28 PID 2152 wrote to memory of 2208 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0244270699cda2e127e2b2b9ac8e88ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bac5447b73462f99fec959b43507a4a
SHA1e3b0d12b13ad3023bc1ddce763b29d3a2ae36cd8
SHA25669d4dcb974eb2540bb47af4684b5b5071dc420e30c5dc7405ba46f53e2da4cd4
SHA5125f888af0252ed470be487d5c03c724ed2e68f0857358f430a4c6d3239f4bd8de387181dcd683362f25de0effa51a25921ff6c88239b591590f8fa305e83b4309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019950f10d150ce546f523360f10cf95
SHA15ac639bd55be97cd3bb58da29c605f72c2dbcc14
SHA256e39e2f3b97c595a8cf94b1728f7bf4c7e4d1757d7618b2f6e3b192e2997a3f36
SHA5121d087a0c57ba5c336385736aecdacb7bf5d64df032ae8d820a9efc33fe85565752b646996acb66447b8aca855c80e6c9551739b889a8b72c1d042d7832bd0659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa6fe5b94953790a15bf161b90221de
SHA114cf8bd867574b1fa2b127bf903a775b926772e0
SHA2564eb578ddbc709928652274956d2be766cf81b070c36bdad4eb7cc4675cebd250
SHA51233972f613ff249db38c60ef3ff781a96cd9b99e656854b18051ad8b38e6decbfcef9e750dd2369e100203f5d020f644aa28276b840481bf0f529ab07bbaea493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ef71de0535d76a52cf389c99d1465c
SHA19333f1d9007bb8cf31a8490ab876ab78b7c6c71d
SHA2568272b48cc1ea7b4727108a9581e24826d9275028897154e7348e9127bd8da978
SHA512a6d944acaee1ae9036091d6d9735d4760fa07b653a2acf6b8a9062d3c354c04d5543c24564a0c33e765bccf1fe706c045df84d872f016b689a3d7fcb4d1c7ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ce65c2e89b2759b68e975451f82900
SHA1a0894250e20a902604113a6a2d27e6e242c6d391
SHA256848bc23d000c9bce746fd35f18be762a67f1aa4eb966e2453b2e282da492a6a1
SHA5123fc67dc33c735049bd98dd6a81a61f428f7b81770d15d2321967bd9672fc4ed861f233e8e0034871c9a2c54ffa755777dbd34a95c6e59eee070de811eb527d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c39a9e2cf969310c14ffd81e41effe0
SHA10a364a6c521f07008b6ff25f000af9e81bb567fc
SHA256aca141fe99d918f303f58bc95193db7b190b81610cde60beff82748695edd1ea
SHA512409bb927dea121bb0edb8a1f81739faba1a2549bbd9806d30ade3e0d0d4ba9a413231b2bea8a0221689408c0ac2e8a76497c57b868d33bf4a4cc35083225f96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bcfba3951af5137b01d6274cd2d05ff
SHA19a8de802a4835df732fae436dfa428054dcdca9c
SHA256250360ca610e09499636b19eb74dd7a20d8909d904b6690a97345da55043cce1
SHA5121d7a5e9f31a2b0ced8b7d64fe7cff0241706cf080b29bc193d057b965f55ad55ef00eeeb6c4005a9d5c9c294fd97eef96114ba614f013af03d66bedb1477bf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbee627cfb0c88cfe4971381c1546b20
SHA1394e360c69904d973393a7d28e25113b71e61bd3
SHA25638c3462eea848d4fd72aa0a7d2389192e26f80418a6810440519d8f9c38b3e9a
SHA512a52012806965e2ae24971892211138d8022289fdbe5f1c852b9f6f92e40fb1d435d30ddfd1c884fa466e9ae506cbe29dbca3144db69833d977bc92e0d959dbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87c65fef231b9ef94b53494ac36fa10
SHA15f2dd8da38d994caf64e1ac1ee10e01d3b1fa164
SHA256a33320a6966d29eb68c8d9534430098927007420f1837a77a52707524ae739b3
SHA5121c6aba5848372529fea6cfbeba28090716ae863de9870b9604b0c0e3f7552f8e204e6f29848bb1fcb7fb95f1e83cd1ae2fb378f62a14a89c8a31c79f2116d140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a69a579ceeca48cf0369313dec7fb83
SHA19666d578fafb4c95c9784ced2cad28c5fd826d9e
SHA2561747086636992b91149d009c80ecd9f53f4bddb45050c7eead92cb84105f09f2
SHA512ace762f52b4ea3e18ff75df744717621b48f93715492b7c80162b51b17052ce7819d48ef3845ea5088dd15f81062b62f95a6ad18a402eb682fbf7a2bbdd28d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d9a612d1ac1ca642904c0cdab07ea2
SHA10140fdb63f1eb29b3e7168a763e49b9a9d127667
SHA256aea5e982ef754a5b436ebb7c4ba78375577aa69afcfcaf20dfccc7c26e57e9ed
SHA51239d6d8bfb660478854dd7790e854b7f29b03cdc55baa8a24586f4afebca47768609084ce231845a2b3749febec128eb16c7f0befc149aba4aa365aa91df8bcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e368d1bd625de33b46b600b9b6c9a348
SHA1184a20ea7b2ded656d80fe9a2037cbbf84759c84
SHA2562e294b0460968c97bc07494a65af52cc629d91ff49b2c774a9f3e272d90fb1a0
SHA512079ce1dd1f0f3e2679c43848e4c791951191022158c94763179f5461b07f17862b05b37eaab5919d46006dd0c90225c0d1b3257e028a04895397a82cc9d4374a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e188bbafaa2c196944bb577f3382eaae
SHA1cb3ff710d49c8ed00218134af7a5cf9f7a481587
SHA2569a2721ec0787f0750e02d23b60ad293cdd7d7db48d3a7ae3d3ec8c1f213ee81a
SHA512c0c4ef654b973b68b64c5d39fb793df5f91db860962c975f7f126efa439dcb3bbd92b64874b38bb80e6d2718532eea0a4604195d453654277c3be387256b7b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54332d2a903866f099911c1be5f25c9ec
SHA1fbe6a7f9aec117bf0c00864ace9cdc4936c7bba1
SHA256455c3ee7c5298bc4b156393f5904833a1f7690d77e54021026f467cd9fdbd2f8
SHA512ca6d839644bf94566512e7159674886051c9014e7ae84daad2e2f457875b35546c50f3c4dbc18b038c93c4b4f5017404b13c52963e76dd3eddee919a0e0aacb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a5bffa8c5c15c2cea702bee9443174
SHA1501bcdf5e8aea33a6c348e1e55ce339112b45da3
SHA2561d4080c3cfdffdc9bcc9fa57ff51b8ac1ea6a0f0b5347b509d1164be694dd9c6
SHA512c4d4eb3b23cf0ff0b78285694c0301a3d14eadee2b093da49747c1078a3c098ba4810f1bb2ea31c413984eed6999bb99c62a13ea8a9174deb68630e5f858ce38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50336edc748621c56ac31a5742ce8033e
SHA1178ac7169127a5779ffbde0b04c2a07ba39af6be
SHA256b64c2396d5e187a7e2e978447c27aced30b8ae8dfe0994309b4df87b89a876da
SHA51207a326c841f9d6faff320ff332f4b6275ea84f894079babc7f2d6265e2fe25384e74faf922fa59ffe3bfddaf77199bf3b4c6f01e4f13df73c394963ebd51cb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d6eaa2f06fece465c9a83c910e7e83d2
SHA1183983b6bb25db13ecf356e62abc493350a383fe
SHA2561cb71c611dfffd29dd666ba947402962d552462d9d730798903d829eb5395895
SHA512c5031b7ede195090f68567c1b76ead53a0317d2035f1497448a5be0e59ee3c3fa7199e8062d8b7e422ad292e48083daf4b7be8126adfc46db49125a083f027d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a