Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
0355f1a3eee2956c03e26242c5cea53a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0355f1a3eee2956c03e26242c5cea53a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0355f1a3eee2956c03e26242c5cea53a_JaffaCakes118.html
-
Size
8KB
-
MD5
0355f1a3eee2956c03e26242c5cea53a
-
SHA1
15f7d23f72425ef240582aca91078f0ee80e9c6b
-
SHA256
a8738ab0847639d870ff418dcbd126f0c10d3ad50bed6ea8d90f40a33c134508
-
SHA512
b495cf3d05527544435a09b7fb2a040e09629c1eba4b2fe4b7f1616bea8a44476f2d279cd04b9b054c630fc655819bdb3d8cc13ccf28b100798e6ff2ca03e90d
-
SSDEEP
192:+xOGpyhoW0MNyVks050BPpfTW+74p9mE72j+ih8s1B:+8GgxN/y9px4p9m82j+uB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00abff07a698da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420386018" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3392E111-0499-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000594ca3132ad39429dcd57af5559bf5f561b4922aefdc0b2e9b3e8ce411337dc5000000000e800000000200002000000086a32804c0f9a38625bd2d3e91e5898214655f3cd518b6133afdbe9580cf830b20000000885c9f28a48f8d349c2a4f0f8dbfc8db8de7166bfed26cef67c617e1ec07886240000000877405e19ff059eeb8ed72bc58b816191fc0197db80c2f8514da7daa6c0d82e60ea9d62f900ebf3d12e535aa26d7b713b0031b45aa6f8881510e1a6d8a46eeed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3044 2356 iexplore.exe 28 PID 2356 wrote to memory of 3044 2356 iexplore.exe 28 PID 2356 wrote to memory of 3044 2356 iexplore.exe 28 PID 2356 wrote to memory of 3044 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0355f1a3eee2956c03e26242c5cea53a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b570183e578d8326903f502cfede498
SHA18bced61bd11d5093bd7cee16a7cd7f7c2c73b400
SHA2564fca696ddb317539d3d06072b7edfd239edaa6cf77da97007d9167031c7530e0
SHA5121381ca755a6d06bb2daf230cc14aac310046091d450a0bdaff59d1b1deb1891631d5682ebc5cea068ff43acbcfdd8041d48a6f23c41a3cbe1114770592b908a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57901ee4d2a87b95218dcbfd8cc51338f
SHA1e530b6815cc0a608ef6aae2461bc4304a19fe1c2
SHA2567a8155a453a36b437ee265bdee8d05f2bdcf5700f0598fdca4364b89e95d94f2
SHA51282cd8502c4b0d8f87dff3900c29c602cb27253d8ef528eda694a2a820648873954ed79fe64391d3fd3482ef670427e782bdb849efd68476af8ca56ce3e958306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58467023a25566a2ba69453dbcd566b1b
SHA1a97d737bbda59d6a8c66c347e36f190f309d62ff
SHA2568bd35fec423785f5effaec1e8dc894428150d803dc40cc2ab0d5f1c62fe259fa
SHA512612f23b859fea53ff144d1407395ffe5c8b4b6c774589baf11b25f7100dfcd35f2189d9a55233e8b828d3794fcdd4988ba3ce1adcd60ef551d08420287e2d123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e6ec04b91549a9563ef155a5cc37c6
SHA13732892691d1930f66140c8977144a06f92b650a
SHA256bf42cc369ca1b5cfdb80768ae7ff7984d859196099dc2b3fc3c86dcf9ed72c46
SHA512e37b1c4d7109b5ad11f91d86928a00b4f37d3900bde306085d2716d83b1fbc2c7957d3edc5f34af756baaa2562ee048674dc54bdf9119370cc4259d3f6aa8b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05e160b18f74ac9d311f22f168529cb
SHA16028d99da2cb76813f06cea75ccfb15e953c1062
SHA256e9db592b117b998ef647d96dc16e96691293743a0bd622c11e2f01bf781fa7dd
SHA512aa99da4e768be8e96d2461f68910cd76e622c493e803f00fc79ef80868213feeb790f3698fa5652a94b0204ce127709935bfcd5af77a8706b471dafda29c36a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528983f373244a0c93d3739bf8b4a78e7
SHA15ca6fa56f6b356223d7558d3b5bdc45f83837b54
SHA2563a733f84334ea0e0be53555528662264815aa1c128c0e1d372079285dc1d21b7
SHA5126d8acf4ad3b6e07b01733a59a9abe4ac9f0ccbcc56405b3120c8b4c4cac7f6922419b9338408db9649ea32c253b3456cc43bc23d87e2a6f47a251a34f2f04f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e6d964e5b26eee6e84f2438d6cc10e0
SHA1e9d378244e0dba61af62c5f1975a624d6f155a00
SHA256cdf26ec29b7a47f0ac6e3f0302a7f09bab0c7c036d7141fee03331c625f1f39e
SHA512470a7ef65322529bb82bc0d5cbcd236f73102ffe40b9816d3865a0508597b3517908b663a9783fb2ab6c1c46b6d8cfe021374db5e45df2278007c6e5a9cdfbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff2281386e40d2329188a9928e518cd
SHA1367ea32aa5d079372a7461d119600fb93e15c94d
SHA256762bec79f6fa62b010321c850904d32d8645c91dcd9f870593785b70b9175012
SHA512867cb6d09599a8099dca7eb7c95b1ab1e055419c1b5ea9bb0305ae55c6460d70644eb60db59694a5971595c3399dfab05bdc60a10eb6290b96e51d64767d236c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1200e009dacc55c12e5b07ea503e700
SHA1a18fb3337ffcbae404cfaee505d4749d76938d29
SHA256d92d2fed1a81d9bae7bf3afcbf4e63f660598c09f4fb7e79f4b5269b2f88b507
SHA512f77d4619e4cffb162ca21cf25f7c437ac28046a94661fc85674aa31e26443db82e6cbfa369ae824ca61f136b539f7ce3d01d8cfb657868ffbeaa14bf02854e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a77b5e1d52c2eb947f210d95380a7ce
SHA181432a9f8d7da2a625475f1e7f5e136758fd1050
SHA25649497da9513574f23863ca9735be1bc754f6283d5cf2065270cb93075bb7250c
SHA512f4087ae783a7a0572b698e2fcdf4544db3a284de4ed65030c39ac4b48db1ff6013fc80645e217765f42461505d29eb70d8c5c6e04e4ba62b2e4ebbb37ce41215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5459fe0a2cfb8795e7925d07f2e64e86b
SHA18c5c4f78fda1bd5ed28285a0fb657ff41c1a6754
SHA256054f1c23952bcf829ad3cec4bed55f8b01f92c05dc39fa966f4a17720a60396f
SHA5126a3867243232e5eb68fb01c3d4bf6c8044f5c60e7e03c0fb4513a57290bef69c36a939f265aacfecc1c3e06946b40669602f685094f87db529aa5d3172ceabbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5826fcafae94c9c4f83e1442880342ba8
SHA1a365f1f6c6ba109d16ec50016c520cbc9bedd487
SHA256f0a3cf63a6047fa2195fa6c829dcc70562aafac26ece2447f2ca37b741542d25
SHA512fa73510963b50c0ec5149e3e71e38013c4b9bf1f8b9832aa6db5f6ca67e3db6cd0c2421ba0c950ab24f311ecc525528a0d524bf8fb4045bab7c464ec2981f068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe9f0d84ede8bedcc42c6907ae4ce91
SHA16af4cc5259e12d7d63c189d466cff845adfe4855
SHA25673142ee45e32b9ae77dcd732ea3427358ea8fc32871c55e2b3c79e28a193eed6
SHA512eead29fed1190d4bc5a8da475e046f590bd1705299461ecf381e48e39b1269030df7b4506b3959fc5b11300dfafc28b42b716d1d69a9d7ffae446cc0804ad68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ae82bd47de7b657969d8945dcd1a3f
SHA15f22fed3e37815f2f79e86804e69f9f861f76000
SHA256dff3a8b3d024b76ced2b3096679d623c01298d7dea625488e076e4817b5a9a53
SHA51266cc31bd356c2faad61e2f9369d88b8d42a46b536b5d5204f21412353d1fa6c8bb495cae450e137d378cd5c8f6f0d35c9badc96a67b0f93d8e08a4af0680e898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e8c4d6841e910f1f05c738a6e40517
SHA1cb28eafca1c19975ecca8f405c5da2bd2fd7ce27
SHA2565784bf022fb9b86d1335cd91ed4bf2698310f2b90eed6f270af8b51c6264bf7a
SHA5125e1f9bdd2657548285d3f609be893456401d30f0e741657d18e3c47fdd738de98bc2017c66089c6dd764c8068ad93c1092bb689160c44c06e696e6eca7ba5902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc30fafca5148a05fa791483a629c1c6
SHA1ed43e5aa2d0fb295067b8d717bae09c19616783c
SHA256b77007a11f5f1d0c2c0c11a545e5118d499b27c62ad0a49bd7d5c193aa53f41e
SHA512cc67493e2c22013d10c3286424bbf4b3019e62fd919f5023cba3be9d32253fbd2b42ca39b6b1f0f250f85e421a307599f39a02c5a57ee8ca5132cd9b210830b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55000986be2474213bee21f747bec57f6
SHA1a2d45bd670aa0f2a25a38b2558754152f053381d
SHA2561270b24aa3e4c5d728c53d4634faf84bef18bac57c48a6a9eabf37b019a3edc1
SHA5122e5a3dac2f121e2be2895b001f65afc9b3d3c2afcf2b7980ba6e2af5a53eb1db2c25efecda1b492dba7c1828ff0361ad3fb1812e24c3ccc155f73919de21c6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589cfd5ca82ead97a213086b710bdaf7
SHA10cd5e7028f96f0a78da732e8a56507d65d82a515
SHA25628722b3c71efb1c27d208144bac025315c292791061e18136a205c98b8d0210d
SHA51249a0333b51e35bd0e933765cabab3a1e52f6fe2b1dd47cfab44283df5fbe12ff26eb7114cf2e5654087daf1115bebecbd848f672c3fa92db1eb6f066e82d37d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a