Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
07e9037b466b1a95ae4abccef6b7e894_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07e9037b466b1a95ae4abccef6b7e894_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
07e9037b466b1a95ae4abccef6b7e894_JaffaCakes118.html
-
Size
4KB
-
MD5
07e9037b466b1a95ae4abccef6b7e894
-
SHA1
a564994ffe30e3ec3e0aafad4ba52cca508297a2
-
SHA256
51f54b6089b0045ce626e8971c5584c7cc0d4b37c0560a6c5862eb951ac22ad8
-
SHA512
3efe9724f043308567ab9f4051680d865858871831aba08f2c04be0d6a13069f3bb2bc776c7535fed1dfe18031f7493b118e6880d3c3ab97dab8744f1f46704d
-
SSDEEP
96:9CZd+7NXr5k9ZBDZU4ea7cMrieLSW8uATkqO+uylo9DoZFRKyT2eVTVRQesLKQeB:0Zd+7PSea7bNIo5VylA0ssQ3JFe
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c328fb439ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420563808" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002ee1fa7bde06839fc0ef5428010602ad576b5d932b143490cd98d0aaf209a8e5000000000e800000000200002000000033bdce87187715fa3a4d7ba1b323f1f3bc613c48e65c1c425e7f8207cb76e41c20000000d695c1ab86c9a9aebccd42a6098668a2fd93d5945e4233446fdb7fbf998d453f400000001219a870ee2ead777610aa0a76a3d8d2298469851ef0389fdc5b4c3cd159e0b037e961b57673a9c8f6e1c303d5dd39a10e7d14f3bce3cb8c0098dd006bda1e63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26A92D21-0637-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28 PID 2100 wrote to memory of 1720 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07e9037b466b1a95ae4abccef6b7e894_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa0e4dfe01a06ff707b9e65249441d41
SHA1200b110082935477413b352018d29fb8dbbc1d2d
SHA2565107fbfb31663b9702c6e0f4ec46c00b66a75d91f242991d218735bf7e94f323
SHA512cd48dce6772509cea4cbdb3eeef2abe13a7acd1808aea901bea58c0ca92bb30adfef733fa98815fc85d401039d369ad55ceb7ff1c9bd9ba6aa1c518562d22133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f90b80f1eece26011004eeb03175c15
SHA1e6025e1cfd8d4e98a2e6acd47458c52a3d0f47c2
SHA25621b24a4ffccfa737688e82a51bfb307ceeadb914c06e56369aa74146f4074af0
SHA512c6f6895a1b8f7093e07b38c39fb0eb100a1326ba040eb5604ebfc2f2d9fad67eacd80b3fb2f7c828670c19452a7e300c9b33239f7ab1ce833a5e4b672e4b51c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ebdf7431fa184104287e3cd4721293
SHA1f8c79324a05f8a77d9447d62b77e1c8621de3db7
SHA2569f8309d64d3abb541c145f50448395d18cc66f4505bc4dff9b2bd3edaef713de
SHA5123583ba81fca18ddf8902e71527b6c87d918b3e3abac55b40798e6c500bd8af9b45d1104000d181f184cabed6612b307d7a6a1ca0d074f5537798861ad563ce16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ce40f85ad8c35e940e588bcbbc5d20
SHA105fde08ab7ea7bed0b7827a5cf6c8723aec25654
SHA256414c9fe1aaceb2a35c11fd85aa20869cc88235b0917bce5a76ea05b218af20ff
SHA51234b4f8b4329b4ced6f7e7ba5663a46175738828a68957b122c801ab5b189e3b0190c35974e8edafa8b170a18d2c7b6536110ab45ef81885c0f9d4022a8ed24b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522b069f474c7c6d57c6f03d68a2d8981
SHA1048e003c83beefb2e2f8933a00eb11a0c8e9da22
SHA2564d6d17d976aea1c77ca48ebc5444d9022f1fc927f5cd62170d755367e229079d
SHA512b50858139895cabdc1d4c38806746ec6f6a878454d50f0fe67442bc3638d6cd780c68ebf05372984bcdbd66f337f8e9c8b4646e0807f610a075eb39903a80bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5618226b9578f5d0fc28d8e975aa9c
SHA14bf7fc71876ba156e43321005f58f92435cf828b
SHA2560bf3f6925ef18d252fa0a7b02d290ba310b23feec25cbf767f964771f7dd2fbb
SHA512fe5d411b2b523eb2c25732799449375af758511fa2a1856a8319f0f03b4a4b3421735b9f57b8e1547280b5073254c9cfc205403e1b4523fa0e46aee6bbfba1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0f6a958c374acb33f30cdbb7aebead
SHA14ec3cdf7a4066e8d3afeded09ea445ddfe1f43be
SHA256e8473c7b30c95678b9a644bb3360a82ad8c013b4144e00f45fe6f498184810fe
SHA512d80664c756da25124f44d6b343ed81fa267802909de88ccd8d86769dc4955eb481770c1a330cce25b199e640b834f8b9888950ada7dd46dc3ffd3688aa9592b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac55c66613fbe09462fb76e923e14b64
SHA1b7ac5fbf7f19ec1708736b566fef9ac17c576a9a
SHA256c373d55c1cf7bc9d29b7ee1e43bcc25be4b474754e78622cccfc4840ffeab0ab
SHA51264b07c01c6a2024dd3936fe5c73b599ba3e51cdc5c5b80552d8406c06f203cbd46b27d547875139c41d41f220ab129ce2673c38ba27f5b812623476f2674f14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596e275dd3e71ded02f9c9fe44920d2e1
SHA12c1a466b2e3f5cb193cbd3f9a2be65ef1be0a014
SHA25658cfc3ef2d7011b8dff016f028700272a90ccd7ca115c45af8a42963467a6854
SHA51235f8beab2cbd6d4862891a406b29b992d9662fb688f8cd5b19a06c43f7c2686766b3067321fc9223c9e2924e22dc3417fe0a335d03fefdc48f4f990aaf1596d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4e0855c191606b2d0b006dfe7bb932
SHA147ae6b7688385f23b5e01c5638bd88fc8a6629d3
SHA256c78a956ce148b26f90caba2452455ef2322cec2949cc08e34723df65acdce76d
SHA512be3809c39f0279183a0939f2398e4c1e4e5d9a2a6829769f89fe96a1605f8be61275bd0fc9aea35a720f53352d3e89651063b21e40883b50fd36eb80ecb33711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a6f5853acf929b8b98a65b7056ae245
SHA1b2a6983afc1f64195d1fe9649f9ec499c83f728a
SHA2563344dedf838cad5ea5c85cc03c2e4b4291c5c5414cd1593ae8190e50b385621b
SHA512397193d932056bcaffe77a72c10b581b200d3ec0ec84f1e1f833241e8c46abf0c8f37cc8d8b5997bb7a6592672b22a1c8d4a876af4c1cbf7f471f8af9541d856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51540b8a5c1735ad0a50050d10ffb2a6a
SHA1a040d90dcd82595b18f2eb0d137d69dc29ed2499
SHA256ad2f35734c9cddf49b7664cd19c6c254b70768131318494650ce5fefff0d6ccd
SHA512ed862d23596685411df24360bc07d6a8813156ca39a6ac00fe07dc42edc1b3a112f0100b4f80a40e2d1ce6046b644d27795aef8bdbf5f51c0ef6df2d5bb915a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c887e7c8ed2408477480a7ff66dec0
SHA1217e5cd30c5cef84cde2f70f39dfc3fa9167c5d8
SHA25615f91e8d8cc28f94c496b1424eadd9f13f48fa0f213925b893cfc37fff9e2f0b
SHA512f14ec3acc1bd98ed85702cb2b2a8875547be333760003d1259e5e0c43bf87b77be0e4f5955ff48ce41276911978fe3ea2240edc4bbc365e751b2720ba982d182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e4b41d64e4f74baee9b837dde75e70
SHA13b47db6dac2bff9741876aa7e3bdc2ccb9db72db
SHA25625dc460429d161d5201bc55c6aaad88020fe5a5769910962afc5b07c386d14be
SHA512978a467e426aac36116b607bf62c7b0e321783c3923af94fa44ec76e64f5ac50a7293bd7fd04df9dd2cfad121aedb500e8dc5d1b987a3174ef6b8a542f98e7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fee67e22da12b934ebf658895be42d7d
SHA10bd5823d6dce4a8b5284b76befb366f51fc374a8
SHA256cfa0cce97896c054f6a7205adfb874097067f0315bad87d9e535356653a70c4a
SHA5120f2f6d1f0551284b41156db7cf717e5a66b7a52fadb0ab7acd2338f6d8c306a0b356d4b302ff21ab30cb27fba165cb078e710ec63d9f84a4ee7824f6599e9577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a1bde15e07680e9c4a9698c30f110ba
SHA1c5a402a1b9af273c4de78c02fd6fca241db30048
SHA256c830f57697539f2947549e2eb36550a54d76745e2fa32fe373d419116b0909e4
SHA512026204bf84eea8038ec1cdd830b3c1eacc2e6cafe92a4980ae861c446dbe4b63f8a57ae3be477d4bfdcdec90f570074004f32f110decb7ecb4afda23cd6f1dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1469805ea2d8c7567fe55498e686a4
SHA1c0c67c353df400b5560ebfa4381fcbe14460355c
SHA25674dbca2a529f84d1c593db3ab8f27a74e4451ef4b014579f700fe66442004682
SHA512c9ab160b8c3a1806731e105192a23d3983d958e8cfbdf914fc84f84624e80a1aec8e6d0a95fdd639deff8fadca7211748c488837a097180c3b9ae1973a7b9ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ecba5abb166d162753e2593a5ec554
SHA17ff391b4221cf6537857efc34e143be405dd9e9e
SHA25673be4152d4a04f26fb935c778f4251fdc45b7e8f2ee87ac76dd3c929022faf7d
SHA512e61e5c7c7888489468649f141c45d17c847d3f7cc0a2cc1192bd6f8df93420b30ff709a7311a032eb6a740017156b7ac7210e3de708ebb38d3737e062fdb4d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4994f02ee423c9fd80d8bce022cb60b
SHA1b8569b5c4a4628842778c33cc01bd326f9c572e2
SHA256ea17ab5ae5da317c2b667dce66ea620550e5eea0cd52a779eb263206ec439384
SHA512c5a28620911556611831a190385300d31b4c64464ad79e80beeebcdbe782af60744f5e9ec12394d9e91b02c88e35419ccecb8f03fff78d6fbc7b0d518361f6de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a