Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
06ee42afc65331111aeb0d7c2896e999_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06ee42afc65331111aeb0d7c2896e999_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
06ee42afc65331111aeb0d7c2896e999_JaffaCakes118.html
-
Size
4KB
-
MD5
06ee42afc65331111aeb0d7c2896e999
-
SHA1
fe16c3ac606b4fe8fdc6cead77b889e6ec0ffc52
-
SHA256
94d1d3765d1d9ad15275b7abca3d44732a53849cd856024e76e7eac56ee98c66
-
SHA512
12e945248d88a87c41b85f4d3121a3b90d41c578b85cef69a598ee38833555c9a69156a45d184f3e8c697ff279a09a9682587adab0683e086b00e94b3d80d65b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oDpuRfBE:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e038c3f699da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420530643" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEC15831-05E9-11EF-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000488afb3fff807bbf79f8e08df74f2fbc8724bf828ea4a748f8321037a45497dd000000000e8000000002000020000000933ffd6bd6ba2cee1999a071e3053d64a8eec5d47a97f4a468a90710968db70120000000f5546239987b4ffe9ce85d35cee050711df13974c82d4e6deedeeb43254d10cb40000000dc49dbb708719f5581d1696d13edc16ba9cf8ce867868516c02abafceb5e6d366930fcd50fee56d9845ac773bde317ba2156303fa5568e785e5386eaa005f355 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3008 2492 iexplore.exe 28 PID 2492 wrote to memory of 3008 2492 iexplore.exe 28 PID 2492 wrote to memory of 3008 2492 iexplore.exe 28 PID 2492 wrote to memory of 3008 2492 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06ee42afc65331111aeb0d7c2896e999_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3309c42cfb34479ef05b20f875c4584
SHA1d43f0de550d37d2ddd0030b675abe8c1333cebd9
SHA2564386bb21467390309191e9c2e21bd413bfd37310f89c4547f798db1d54ad440a
SHA5125243bb1be00b1209a286bbe42ebcb5915ba18b3c36b11ea09d210bbd0baff76d1b598e5d89a1511e21546b7bc261075df7e00bd867d357423b574c0a64b1cf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca363fe7af8b44da7a594e0d6b7c4fc
SHA1b83f02a435eecf7517388b25ceb2c981651517e9
SHA256f4076963009ec1d2bf6415b6d85c5e5043e91477804c87678d77b0d214dfe39c
SHA512417923c97b1e9b4beb8d29da14af6204efb9d2bc6e53e6e26131da63edca54578d37d954ee42b2e526a1f05e775e335d90af13aa9c24cb3857d6336038995f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56510c76cf6cd8025ca726a9110518aa4
SHA1acd192120148949f8c4c49f612b860999b386f06
SHA256f53315b30ebc702f2d9be0f4811a93c2d9e79f4c9ce7f4cb4a981fdbd9a6efcd
SHA512b1c52b4db48fbf0ea1bff74ab05cfbed9d0dd3a635b41eb2948e26b1bc4ba335a17e49f269b9786da4ea5364179bf4a66048e9acd40d67e9a85bc6ab2d47fec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270ccc0162b580b01a5fc8a84481941c
SHA1f5f2e8098a354331c06d9654305f91e3591a47ab
SHA256034ca78e903d0b5eb16f87115bf811865a536db0eeb04c844b52f62d34977d5b
SHA5128660509e7a7f4bf860049659d35b1625cae52a054fb89d1f09aa58e29c0506c3c5795e7e56e410aee4092b06a56dc14eeac3a991ca2c30dac34b10322b3740e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a10bf416998adadce3e864f1d4e98d8
SHA1589f52afa4d1074f5008b7d5efae7af8abb1c657
SHA25677b9610a5d6a8ed09bfa3227d10e2bcad81c0287cdb9fafc7087ca88bb59e83e
SHA5124a98f683e1ac7b2a52d060690c0f43633e7218c19e61274e2a41820a20313c6cc848eb2628e05aad1181321f60d28b7c452831a681047a9a8a919dd8716e98ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba33eba24de61782d15df618953f025
SHA11e42bb37f6f640d3bc389ce90582dc5099411bbe
SHA256ca3acdc5a5889a3c6f4b460d3e5ce65cf239cb8edb4a5ba350e6acf31e8f119b
SHA512d215b02ba7591de3ae0f2709943a41a40af0db669df2738a47e619b513d852c4bc97796f34a30d0d1a93d59f6755d32772dc5d56d8a71f5809f6137ff61a7ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e470c612e553ffdaa446cc43d155f1b2
SHA18d343f3322a9d0a5431b4987f7449402dd0bec21
SHA256f882c46d75c93a23e61f60cb87ad45bff873333e577fe6570d9810be183c9100
SHA51290561fb39a574cff1763c3df26e2364a7abd5862c48bcf4790679399434c190f3612a961b79d3725895feeaf3919f93c2e83aa5c69b10d5eb46567aa0121fe31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0b7383f08f28b1d014ce1373189df2
SHA100cfc6e4475830d3920e6e23f4305fa7921a7066
SHA256042c4ff1d4fdefbfccfbc33907c2d7d85f17bd9a6e74aa81eda979cb994551ca
SHA512684d5bb423ff9b7aac41365fed17c93991c9504256e406a09d9422f7b6e7e93af410ff349087f969839cd38a3bcb8cb51d7b625d23a2c1109917d3b2f7abdf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b02aa0448880cd58156c8c98b61d1a
SHA13cc82f8ec492c01756508fe63e49ecf4094c875f
SHA25627120e0c6ebd7f84ccd53f5787b5b78967bf45fcb39b46f46fbabd54b14b63db
SHA51243bb055f1f74f6cafae963acb653e4204ceedf18360a5786abc898e1fa0712d9bef59d842de11a3e3b0e0425b92d4e7443cb111ca2e432b23a9134bbe9034dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa9a29193a00c4d1d6837055c69acae
SHA1da7f5d33faf862717901f9668c8407e70db9602a
SHA2563d7f7156f6a404213d7485ccb02ec13c7468b6b14b779ffeb876cec6763cbb80
SHA51209a24b6b43252e733b2b474c194300372889e27328b19afcbabdae09ef9d2a317469264894d4d0961e88b053b348a64da524598b6960019ec4ddb5ebb2868445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b94281ebd6501f0d167459a3056bbc02
SHA1b7078d00f2313d97675896712cc0af1d8593f80f
SHA2563f9b3278f00b4d983e508103c3f242195eff7cd96327377860190892bf164385
SHA512102d35a72e0ddbfcbcc28105b58d3423bd9f8185bff748062aca1e2f65b635465b72d905a2238d6eafcbbdcdb603565d13f75db824f4caa1c86e9631e4936746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a515d553e3278548fff131832a4060b8
SHA13056b87d34f34e1bbb28f3af6f55dc868c56d328
SHA256e1ee65db11771bfaa8591f8eb9ff57f68b38ae10d94dcc383e76ae3baf8d5827
SHA51262fa75c74d142de95458948c57ffd6ad725a71929462d5d1ff902a7edef824e5ad2c39efae86bc2d2b622d23b0742f5d95c039ce4f0468b3aa6dc80062088cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7cab30490f7f5d105a649c6653f7fff
SHA1f7a21c3bf9518645ef0055fc7a665360efe87be8
SHA2565e05aa2e647e423aca760f2f75137a54cd566c19ad8060bd61ab9fde9b105f52
SHA5129cd897504fb3802697bce8b8633b99911623391d7ab9dcfd625de8a7ebb10e41594d1c7e8bb44b037cdc7bdcf300eebd9d3051ea7d616cf919cb4481f0489d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c68db5659c313cafcc2b36a64175cb63
SHA105ea9296d4061792ac123064c93ffbf61b7d58a3
SHA256e556807743333585b1eb0d6c95a212246f4128e7fa4f70c4455bd07b0ae31a8f
SHA51249654229e4ef5de76f911d994ff82b3a4788105e715ddb625962b7cb3daee474e557cdb4512539026b82041b830c3fad3fcb78e6081327751e719b275b7a7dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ff873ce055807f10bd9f65d9d9a9c8
SHA1d56db85c7a92e228d5d272c188c06c4f3fc1e250
SHA256ad8862f211303e578aeb8388319367ddec8f7f7bc01f2d89803822e3a92db7c3
SHA512ce944c47527719072ddb2f36392a0edb5adaf789381c83644f40f3aebd452e387746a382acf07b61d424649d4e41dc5f17453de34736a6c856c0a302cfbf5f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541924d46221bc1a1d4d7ea454ce75227
SHA1cb77154d9e44e77ff421be7f8f023ca1a8d1c0d3
SHA256ef8f889a4a1c9f1fba22e13dfd8e9e7a711b3077abdc8aa083c5f0db5c3bba8c
SHA512b8fd74b1b564d506771b1c81301bf3f2f847f7349829b45d032da9d62ca0fa9f6f2057ca752dbe8f43e848806a8391acf00340211cac043bebc49ebd4c88e8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d971fef3b6310efb5ba9bbb03ed176b3
SHA10c132baf91e6d565314465f7df9acffd7f4d80d4
SHA2565d53080176307c0299a832c4b8c08168b4f0454a8dc15ac7f85e6a995bc094f6
SHA5123861b8fb7b08b03aea556b4803da2c3df13a950f484c59ff34038eac8b70ab7ecbeaea1ca7e0118bfb56937aa3c37e442a061777ab2b9256193754aacfefe33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3885fec3fd05f239382c0b5d75a493
SHA1bd950e568bdb89cb7ce2b775733b38774e4b7ba8
SHA25600fce4b12fe2647f105fa02ab2773dd747b4d4d446845bb9537fd93a2aee9343
SHA512c89001a5fb3225cf687ace3c8ef1067ca2f54a6fa11d86b63370ee5b99629e99414fb67145bffee64b4072104407fd8e0e6c4dae5ef8385f174e87611f0db8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50603cfc5909aa58cffebd126c11ada8b
SHA1ec4786ff44fa7ff6cd8ddbe4b6577623b420c704
SHA256b5cf942ecc5edda880aff78f24fc5c63c40f41f5287d96daca307b1ff2832ddb
SHA51276abb97b665128a739cf6ffed8e93b9fc87f36f9fec7ff55b6cbd47164ebe41dfcd25c38a74242d4141c518585c93d9ba429c8fa0a06f583aac8ac194d23457c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a