Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
02a5d52433134c12f6f60495ea7b4404_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02a5d52433134c12f6f60495ea7b4404_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02a5d52433134c12f6f60495ea7b4404_JaffaCakes118.html
-
Size
60KB
-
MD5
02a5d52433134c12f6f60495ea7b4404
-
SHA1
4bed20f3fe3ccb3600a83369bee9978e097881ae
-
SHA256
6b8523e774f64c5080332a73fa9ee912b1a8d9a67843f74a1b0843a95863e6ab
-
SHA512
8f35736d5aeca6cb37c646a0490500a0af75d0a464d278d714aee6b9432568790187bffa8b578d7d709e8c4f7fea8f6b9a622fd433186d41ac547d2e49d1566b
-
SSDEEP
768:JitgcMwUc9GeCSXuhvtP0ajIoTyWhCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/IjkE:JTiR6cMFTRgec0tbrgamchNnWC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420361807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4AB1C91-0460-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cd4aa96d98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000dcb9560367320a367aaf2233de0e2d579c338c173caae4c381ca1e51d77e1b93000000000e800000000200002000000057e3b83241fe15a2b65e534e9d79b13beda2c479d540b8a99a9d8a089629cd3320000000786db978945d62b9417d269cf5195cacb249b154be16080507ed526b64b6910b4000000059cd31a70cf5ea304d21af8cc524514d0bdc317b690495c35913da14329c42e087966dc708b95e41c7e57c93ce9118ca9e8e809b59ca1cdbd4b81301a0ed7634 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02a5d52433134c12f6f60495ea7b4404_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af405f5f386e1520ef5721bb998cad52
SHA1a8da1bd3cba4e57df53f5a2e2f9ca8853d0b8704
SHA25683427bee15e8c9c1db86e7034f350af16189979aacdbe95a27ea3077f9f6fa97
SHA512fedeb60ab7eb09bc7e40288e3b402e19b6ad997740b26cfd3ea25f0fe54a94ad610b8c79087ff2f3631817f36ed2675c4752bec813db12ada276f1278a2f8332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ebf2b81b890608b8a98928d78a93ba
SHA1b1116ea79261e0f49fa49cd66079088632e3040b
SHA2568c2f357712e7a725dee1bcc914551bdbe7be9ee18c9f3d9b3da7a3c89e69c9dd
SHA5129ca8833ec42befe007a48b33cda5b059bbc30bcf2b1d154f84bf87ce5ac51fe6e89775a01eb4d312ff29fa9b5b6b4962eea0eb36d5db3bee4e9e51558efef16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5673f7a6d3e5d6348b6fc973a61fa453f
SHA122bd3538d27045d141210f21bf3a3cb81fa67a3c
SHA2565c6af4a1c0601df2c9092fb0c680cd6eb278ad24a43f35506757d042501d4858
SHA5123222cf43b3abda14c4ab879d066720b3ca72d9b4a3094959b606deb266b88aad9dc3875004943334880f90ac9a2dce9e3b8b7d63c439d6bff0ab61b31300b220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5451d8f17aa320f1d4aaa911e061c28d1
SHA147ae1f758019504f39685e4a5c149c76ab6c94da
SHA256b6772d53e552e35966fabc368527f0f6ac9b0987a44f6cd26d0d59b9e355e287
SHA512c8d602ae4c17bd3e126d5db6daf1bcea405c1f7594b8c72812b50c0fb9fe558ee4fa08fd8b2e4d2f3fcf58d9903beaeb675f40da242ad217cd51ab8b7c96a3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da55fdf5e62b7ec3a0ec32f91ec02252
SHA181326ed8268c010022b7a20a30ae8a3401759786
SHA2561c64cf00be0d2b8de850868f152f6e9147fdb9aae5d12b42c78ba61c484a096b
SHA512dac29bb6ab6a65c1d22ba0b4f39b5a305fec8081d52d9d833acc73bb7d7a26d4bcbc20c9c3452c17217ef8a1c420399f4b6610c3854fce4e3424db7b3aab3961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54265ff4e8ce945188b8ce0026bc6e735
SHA10914a304bec121db00269b6a4cb6b2419c9bdbcb
SHA256df92a05f6467f884892ba1ca64d662ce4412a825416e7579b405f600976a59d2
SHA51265fc656474fdf5f7f3956c50ecf438375475d96c073072de457e9673f6f6c453d92ecbfa7627b265f234f9e3c99339b1e36efb2d719db57860aa58467efa3358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a76cd8c0e92c7b7dc6c8216034295e
SHA1ac15a28ec554a9c4ffe19cc19f8f8e7f29ffa3ec
SHA25678ca21df9b94ef51a9172d845bdb02ed87f50bf05f4227215b7286d62fda3adb
SHA5123631dbaeaa6ebcc6d8e34ff730ffa8be95f7a4f89dc0cdd096e2b8d76367a08d03c28c531f516882a9696bed14c86e17ce55b35cc6c38b9ada4678a85a9780b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d87d5fa77999dd43bfd3d7afc4cff1f
SHA111d056791f7f0e6a0d9786618dde0f29ddc45d2c
SHA2568f4171a32451f18cbc21c672fd47915eb94f7d552b2cd39f954eae6b5a603284
SHA5128f6da4986850b1c4312509ed970779e72d8872890e0e7fcea97b8eba84a27b775f7b0b0f9d47669d5ae72ac0cfa76f5d74f6ac004c4abaf5f8e96d831e7d1bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb742e6a714324e8ba80758e95b94663
SHA17a47035fce95a1dc0480ae767ab68f906f26c7e2
SHA2568bea63d9a3dc0b6373e58e933a3c7ab587d231d23098fd5aefddbc8dbe24374f
SHA51290f38f2922cd03e5455eff515e58fc71837f9d454988177df5e6b65f7703a063043b0bcb2228214500156b0cfd24836fb8c51fc491175c518137c7a744ccc677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1b3411275e27785de01bb4ceb84f7e
SHA172b8c3da3a40deb71e1ee9d0c2cc4214b55c2be6
SHA256d91f3c55a738024c78f9ff7debdd606596f4bd3cb3443fbef187d1aec8c0e2b5
SHA51237986f35bd80c3fc58f73ffee0915919bc945f8de2a874799abe0a9410ab72c4c4ad001fd93cafc74518c138e805a6ef530a24658b7c31c7f97161acfa592dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2aa763fbab79f22fffd0ee652a5e221
SHA13972e1fa44cfbeb1118a7869d24807607acb9342
SHA2567100e2b833390973e824ba232b5e2a1a9a7e61148e326406725f295e8c6c465c
SHA512c5ae9331eb63fe254532808cc000392022c0392364e74b7d302b2304a46f18333682e552f865772e9f798a1bde8c4a2e8040b8e4985896a8c7af0ac16cf06179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51946097c6c0289a0071e33f7dd1e2f9a
SHA1be3a28820f9e4b47606f9231168eb37764640c9e
SHA256c79ea975a7bb6badecedcfdebd594eab4c8113e0230f434223c80ca074844f65
SHA5120ae175e8765b57fa0df5c03dfe10bb2555c72ee8e9f07362caa4882173127d3659f2c197a43b66dc49eb97626eba77a80ef0b078939c4440a4024c3a07ab8484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029ccd1d31a713b250f70b544546eeb3
SHA1ea0005a0f545fa9f867508dcbdfe24fa611ce6f8
SHA256e4955c2c8c9d7d6433a3b74eb00b036b85cab8bbae0aa35efe7419b5654c4663
SHA5124b02b20831ad97dc67e549127909ed203987c9fc3ff02778d7796acd2ebc55f7069945d7415c6a3d5092a1af1722ea784d4030336f27e7580ca70c2a1235095b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577247f03e16c488bc5d6fa7303953fa3
SHA17bb7a7a0944bfe8da2a45180427a6bf69758234f
SHA25610a2fe23895740b2aef2a37d105965515b69226f445a58c8d6b5b0f977ab3f91
SHA51286fb25886da2bd4de60932ef402a8a6ac2b28b40784b26cdc98f792434f11a5ee02cf7f3b2500c8cd5bceff813f32fbc3dba1118a4cb83ee159fc0c0e1db5405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f1307e7b706ad6ecb87ef5e4f2756ac
SHA1791a980ac14758f9e30cc8c75e854d186575dcdf
SHA25622e3fc63deae6a75dcc3129bf0974e6ae00d1cc860ac24dde8893f86959dadea
SHA51295fb989d725efdcc030aadb6f2e6afaf6b645627d57e7c1e616fc11a3e8d19984bfd111224187b76701ba6e4e560a35b393222dc23cd60aad144821591bc8a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cefa2dbbf33db67ac7c2da275bd87ca
SHA17dc89093dd47dbd68fca87a7c571fa5a6dc0cbb1
SHA256b778d48e761f3b82449fbb91d378d8a39c8e140686a49b31481cd1d96995f713
SHA51254b4beaf452190f0dddeb9b6f32d25915c2900556c31724f668fd5ddf91b3cca23e7e0b048d569275d71cce150ececb1ab28592a2607fa45decb59680a60cdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4e856d86a5c273bf1a14baabdac7175
SHA1d6389ac820380cd7bc3909ef65a62ec345c0d17f
SHA256b67a3569c5d07f91ab5e3866ad7f30a572165087f9b032213e028db6d962049b
SHA512336fa0d2aa1a9674fc9d26e266398e37d233d48c9bc1fcf3393c05f8a5c13eefbe329a69de90487c11ce93ab33fe270ef4d596dc870c1e946f89c563ff07cf93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57811721306ca05ecb39d3f889dfcdcb2
SHA16dec21a4f2b316edb14fc936e4490be3b2d945dc
SHA256391a0c13835aac408dae090525b31d19ee70d2f5d3a8cdddc55f9eac70fc2f9d
SHA512de36510bae60ce8964530ef5ad2be25efd6795253c4c13a6070164389465c5c3d4c8bdebebd40c2443c1d11ba8ed7776135e2ee94a5d727661603b1f89a9711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec3c184978d385251a355db28f66816
SHA15f7821ff04ae07f91b813c8eba9c20e1b21daa02
SHA2563e31a4d15fa9fab6f22473655fce1ac12aaf843cf15e92a8b6d5eb483b4414ce
SHA51211081632ea857f0e54a8c809879545d6454539a81edee06e3af7f8f65983f9cf57fd3e4abce37220aead62916b32ab6bd324c6da8cee8d349877d2fe4671c0cd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a