Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
084b5699d718f68dc8297a6bd8d7c3ce_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
084b5699d718f68dc8297a6bd8d7c3ce_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
084b5699d718f68dc8297a6bd8d7c3ce_JaffaCakes118.html
-
Size
456KB
-
MD5
084b5699d718f68dc8297a6bd8d7c3ce
-
SHA1
baeedebc24000977e2e754b6de91d3bfa48e1373
-
SHA256
1f198f772c8e8484f0955c8ca9370b839edd1e75e82ea2f9295ebeae3d136411
-
SHA512
cf68988933997c54bde118d198e15424ee55b1f8944a9be196e7ecf7d81e5b5d1addbcd1b8679e0f23ebc6a5b9cf9c13ae8a8ba20255a851f319d5eb0c8e40ce
-
SSDEEP
6144:ksMYod+X3oI+YOsMYod+X3oI+YqFBsMYod+X3oI+Y6sMYod+X3oI+YQ:y5d+X3K5d+X3UFN5d+X3u5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000026482d91bb77acd1147bbc06e17dd61a9fe4b8769734518b0bd0c76b5b0b6f6d000000000e800000000200002000000060e8e31e9cd62ffd0d8d4757c5af875d2b134446658150e60acd061bd903ff242000000092cfe13306e10e6c9d377cb7483d397b1c426aa7bc3940678ddea1f35367af2440000000df1cb0be73df59b5df4dacc27ca378b4dbc9856ac7f06c91ebe355fba042e1e8ad0de51e16504e8fd82a2a83d920feaff330159b86136d7e3e99a3a4df95e8eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420575924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BB75B11-0653-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e55f30609ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2536 2172 iexplore.exe 28 PID 2172 wrote to memory of 2536 2172 iexplore.exe 28 PID 2172 wrote to memory of 2536 2172 iexplore.exe 28 PID 2172 wrote to memory of 2536 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084b5699d718f68dc8297a6bd8d7c3ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506758f3a936f04f35d2dc0b0172618e2
SHA17fbafc761c7d16a3ccc7137a9e0a1982f27a0677
SHA256190bda306689ef0e05dbc3a5d54975057f90a645d0483e3d6f3d6b14fcfccbf0
SHA512cb40cfd30d6bd1b0cd2acb797b5f5c95e9219d4a44dcdcbc9a2c30f3908b2361aa9176e38046a41ba0c9c78a8a59464a0268e91eb4f55c143ba398dbde91b31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef7ead71ab958e332e41d6a47be98a8
SHA11b104913f46e5726b7d52ec7f80bb1f9b2b1ccfb
SHA256b49fa4d432673d18cab0973bb9f0e9be83ddfafdc163dc7d5f6ed3fd8df97403
SHA5121253cd01e32be2d22990b12df7a5117e4a169d316c8f0d4c2d8c7aa7a597efaa4005a8ef16c3544004dbeb9e6a5981c1f5b4211c6968ded678904c0557d93e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd7fde78aad1b9380e2218dc22684f9
SHA16c72432e25042df50edb7f67596749ee431c5d78
SHA25626fb95bacf5aa01c41d84e52a146a8f3ebb4fc4e9731eadbb55a37e939a85cf9
SHA51206d8fa2b00052c21807341101e8fb942f6514f25ca2b6b37e530d9fef0d627c5e72611b45676bc92952c4b47e6bd68c2ad7e838663330caac0bfce88a2428a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d102f6b32b77414ee1b24af71dab59f
SHA10cd929ae292687d5c8baf36b98e5a6f04ec2cf0c
SHA2569285320e09d4303dac962954ea60445bd4112db1d9653dd8501c3241b555f606
SHA5125f88cd7dc118a1c6949ee4451694f491577ea9ec4ec078a8780c5134d96aa111acf29155d2bdc6e04c611c06fb32fb77ac1834db68fe4801a1d8ff8b9ffb787a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6645057a3860f2ee5940fba312ae2a3
SHA13f64a49c36baefc1304c8d811a5c5a9d9d2b3262
SHA2568474343c5b887751dba5f41fea078d5493746e42aee2fa5ff55d0b89de4e5bf3
SHA51232f066b370e8261049df89c269f887d46ec918db35777f180e9a4049a782892f5fc49dd633a39744f3d8c6a42db1ec89ba3c8b5dd50f813ce278658bf01d9379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515e45cd8294ade867f3c029fd6537656
SHA13928094ad907de6feb3cd55c395a22bcdea6ca28
SHA2565161ea8cde1cbeef0a82335ef5ae6cce69240e1c1289f67331e535b1784f5108
SHA5129e935dee312d799c3e604becfc89e079730edbfc58a2ec2b465b8f8a726a90a1f20e2e9e162b8f687c3961c90a80dade29c11cace57145941a56b7be376fc4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577937bae3968763ee888a9c12b277937
SHA111aaec7960c8524523ba5f2847902613f41f8424
SHA25649e64c7270b300ed8fb700d82560112fe80c7bfbae2013edba09e8d9fa1dcbb3
SHA512c62549352f76a444d7d8540fee41d6fc824c0db3b7265ed3a397ffe47b4ccd3e1424e5d33fdd5135e458ca8223868aab975a35a4dd3d7b595fc264598deadf64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5555d3decdbd52aef2bae6735a7d69c2a
SHA16301c61e821a6bca17a77a495402b0ed365b32b3
SHA256b66891e10c46ca2d4521a901b546b60c928d04b96f8f35d9e4d67f3f7c41f169
SHA5122c02987ec817f29ecd04b725d1e9edb6917d6fc34fba0bd301f7329260def4c1f48e05072b094b852bfd6f29a442c28d567e99fe9d31279bfe65a6b644de970e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4149a7dd66f13757ac6f9e9b0d2853e
SHA152baf71fd67a435eaf265d503f909fa5dadbfcba
SHA256f65010beb090a8afc323666e29db9661e2e708277e1b1637adedc30d28a7696d
SHA512f116d2a85afe74f2a55cd7725083d840f5734ffe295cd255494844c21254b32dc303158ae7ff5ddf79380a2afe7615733568dd013ac4859f234caf75ce2fa46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ea86d4756b7ac90f201ea1c425afed
SHA197e2f9f46895bcf3b4b42f98619d98bc0d091c07
SHA2560ee5d69c59d002dd067fabcac3935650d09b87005f45aa522f2654f432dee2e9
SHA5128a99fe1e3752a0b5770a25aeb3fd7e029542b118b37add2588c7318ef8ca62ae38780ee38863375e62de420886e4d7d08a76daff911bc3c58b272d47b4967336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0d030c8b00a03d5d9fd9ab5945377f
SHA1837898511869dd17b103ee90f8332fe0a4bbd2d6
SHA2567f721b82df5f4516891e45fdb6a39137540b0d3993b123313809073781e497df
SHA512b175fc826e5f9d36e01863bea5af0aa53b6d5933b5c4060665c7786cf1ea6cc4706dd728ce88fb6c5a3955c82a32687dd5fa8492cfb77bc0e354ca3993c7c654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594e70ca3e0b61f9e246b9055f4841b91
SHA1f4c76e33301f42790975cc1ccb57e69684034796
SHA2569211f53b11d799800f94fbc99856afb3ceba0a076aecd835cca45dc55840c6d1
SHA51226668ed171693ddb7c5b019100c3f65a83c9004bfc859e8dec1572a7166caf4ede867218872dba4ed4360707a53149fcdfbfb6d144293bb51abfb125c12e0288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a864122a52176ff74f056cfb3330d304
SHA1531dc589f6148aa8c238ed7497926ffd91b46b3c
SHA256a338ee0d6e8827e76d43bf8dedd1ef75399be8bc545b5ca5d7a6a0a34d8a7ada
SHA512d2006c9c21515ff5373854f90defc563ab3e7a606faf26fa28501803bf3ce3d47b23933d4e539819bc7a8dfea204a006340972ec525d833e96bf45280919f810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422a632b3a0c50a4a40a1354b3eb7310
SHA1a310236943ed9211637d2884ec945edf53610b69
SHA25635c7df2d7bfcf98ba6b77db2472d430f55d2b3d0156dd1005de394de2264575c
SHA512cc770c1acfe10908908bcdf81d3ab1a2e258070d0bd70fb9c21783c6be75dd7b5034c6280655b1a3519056547c8db8a83d7f1ae865450355b15e11043a5fd684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531baaf3f5f4769de04abd2b110697659
SHA13eedc427f348d478d79024bbc437400787aba8a4
SHA256138258908ff4244d51a4f47528c4c2a4c43b0ef40216cd6d617ba0f15be1b9d4
SHA5122ee9b4362522d3c4f15e2a715beb6fc1df1f87c00aa468d8619b6728778066a05dce450349905ee270cde6cbb7fcb84ff633feac7d6e2676b9c09d03e00c1ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e66dc613f8f323ef0ffc51f5df209f
SHA106debfa8af9e5ff3d6814fe1a1162ff0f7f2e593
SHA256b794142ddfc4b4ef4e5c43fe997053cac8861422cf04ed25ee6d67a59c50d6f1
SHA512dc173e6e55143a836e7e0bde87e5f8e2a6d9dfd9495c511e11fd8ef14294d952662e6217d64f912b77a7818538c2ba384197f1ce1ff625c992829670c1f65269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5c6b4fb1b6f1d4285d64c57257dec3
SHA13d83798c308f5e80332f589218b720d084891aca
SHA2562f114afd7e38091a52c435d0302a716784101f7fd08464694b8b538bf6fc2d3e
SHA5126df1474133cfb50b545ef932c5fc6c206bc40c2d825e8262509d04acba13087d1a73ad0623920086f89ff89d523ca192da083b87cd3ca31b061087b12849147c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a7502c880d5dd7b4258844d6d9fc4d
SHA111dbb99ead7564bb3de903b87cb5140453580eea
SHA256566eaf2224d829880a4e30d00c5074c966c13f70a1e48aeb3d59a25b55414d4c
SHA512121ef16e9a3731582dd38dfb715cfd09bf5b8a1aa5a69b3096f7278583131ebde3761998f07302b3e85bd0f71dcd2b4088eb88a83f08148cf4f090bfc53845e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e6e2a431c8c9b411321effa74eea8de
SHA1b1ab59447c5fc8c0413eccb6ef1e15b358641374
SHA2563b8cfd4d5a66c004cb13e86de95d950016a6eab932b60b4deddf34a447a16d6b
SHA5129e3916874618aca4f44d0d745b1336f3d276a282e7f51e6f4c94a99a8f510cf44ca9038e771809b24ff1717640feaf29754d1b76a3dcdcaa432074b05a2a8092
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a