Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
08c1327d228a04ee1cb0eb9b84b4813d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
08c1327d228a04ee1cb0eb9b84b4813d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08c1327d228a04ee1cb0eb9b84b4813d_JaffaCakes118.html
-
Size
461KB
-
MD5
08c1327d228a04ee1cb0eb9b84b4813d
-
SHA1
f644a7d52c636090550efd310831d9aaf4a50fc6
-
SHA256
03d6ac8f912c731c42f326a82376a9495e5fc9b1f9ecff47ea4d78da0419241c
-
SHA512
7fdad6bed6cbbf14021f2a9cfa7b5bdefea3a35cde889e00eb789f2c563079b3aaf5de702a80f7a11e6ec209cff51e8df2bf951e5485e310aa2f175e048103e1
-
SSDEEP
6144:SkesMYod+X3oI+YusMYod+X3oI+YmsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3G5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000126cd0a999c8ea5df40bbbc270793cfdbb475db137b53365a1f75e974d7132bd000000000e80000000020000200000001aabad8e767962c22eb5d4da2d47d3eb7797ee306018f30a5b91920b8d426cc6200000005e8156387aea6037ec60d6f527c48b15408ecd380a706dea8d0f37ad3df1bae740000000c32e972887e1cbb0be99387d06f5ae3300e1fc7207857c36c8d34e20209fdf2b49ed1b7b4acab01c5c02b0a335a6c3504794364d7d80b42082a46c05a2b7841c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420603762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3096a305a19ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D081E81-0694-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2540 2092 iexplore.exe 28 PID 2092 wrote to memory of 2540 2092 iexplore.exe 28 PID 2092 wrote to memory of 2540 2092 iexplore.exe 28 PID 2092 wrote to memory of 2540 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08c1327d228a04ee1cb0eb9b84b4813d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e287686bd58963b7efbf76232d0b02bb
SHA13ecdb7505d2894e411215a78b55c10070cc927ff
SHA2569462739b53bb7a177773359caf9ad7795ce819bb1e4da4772680a5b0f175573c
SHA5129099890e76f6ab5a645743e1cfb5a21241c74b9b28be1ebd3f9db3ddb9e6c6b2ba03ac24304a4ec987496d179e81eb0322002b822bf2dcfbc6924771cc1558aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d1b7d74d7dd393ff14d1360ab4c9cf
SHA17c84d53250c1ab14473ecec4da5f658390344576
SHA256cfaf88bb04ba1863a41950fa3d001b5dbf6b71056403178ad29da23160e3e050
SHA512fc5b629abb41d880daff02085784cccddd115fa0874d7609be7393704ba3a7de3b6484ea0132e3a00698a76734e9308871e68af86b931b86096adcf3c59f5f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d3164c5ba3c7a87325cba5c3f25caf
SHA126fa1af81ac02b16ce1a219f9bdbc40d1e84eeaa
SHA25618a67823862004c90fb130784c079c235d6ff3d8878165f35f248d817b198180
SHA5123630923ebb9a77ccfb4dc3efa36cba8ba96e7d17ab05a0c677d7ed10e1c77503217d016c728aedb107491e1ba1cd9d85a2a5bad629906609e084377ab2cc154d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a4a1bd6f059a4fadc98e5d1e762a60
SHA1318ff77dc438c15b3355f34c85c052730d2a5b12
SHA2567f831e95b374c10fb9b8ad73e2c48884007251dfbce0061a0b0eedee1e804f26
SHA5127ae37706391593535cc83813c690369b84d935d4194f089f3aa3a49a1d49b5165389132c127e28f47b8de63166d10144645431f242764fc5a939e179f2654029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4e7360e733c8a2666e12a23634b725
SHA13df62a8e6800dd441f442ba07a6bfb44dd7aad78
SHA2562d727d6cb2cb38fea2fe7b334c7bf6e5cb59d7e318f3a54307e054f3ea9c155a
SHA5128dfe2b3871c5b3202bf222f9c38b4c75081c93ab5776066c0a6031ab812450886dc5773ba2367388b795f524f570b6d0c904d9d042f82e4930f1175230ebd915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2dadd8c3d55a7032e76c57231049759
SHA175ada25cef0fc38f1a63e6c52adf1cf67e822f6d
SHA25699608e66cdcc51386a637267a9553b521ff677446715e5f1f1fef2327661e277
SHA51224acd6c85d0a092ec40c00b446268a7c3ea43675c03d1231da28c7a392a8b011b03768cfdce741d3078b6cfcb1caf9483928f990102837ce5b81d81061ed96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca54efd0025db3b04df670359b4bf555
SHA17b2ff955e0f421cd489209713ca8482deeb48f94
SHA25605ceec8381b5cab4681f791c66d566dedb023e3814e52fdd9863d854de012c42
SHA51269a2d4aca9d7c8833cad1a8b5b9d15cc3b29cf1f785b4b2127c5a40394527c188bf1051e352d709b11cc544c14a8d55ae0f6eedfbe0843e50cccaa3d94f812a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6940960af61539ec35a243c21b6abb9
SHA119b48015d7c016e6ec2fa21666a8e463568dc091
SHA2562349b83100f7e0b77341321a109a46c33ca4b1416c60553e58c4f28c18a4f266
SHA512af5178116612d85d9655576f5b75c66cc4b8b4f1aa6c0ddc2010693939a684832a8e3905d12c33e661349ed7896d889457c193e028bfb898cf4bb01582639d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b0d9f772609254d4e1a78b4ac79a0e8
SHA185438b44d24f6e5382bd88c47d77a00c9efa7161
SHA256770dd887971a7c211119b0c4f48863dd23bb4361c4154dcd1d29996b537607ea
SHA5122515ace76fc137457c3824dccb73ee79e16c6e86c3f6dc9f782dab2b57aeddf007629205781fc36c27b68640ac76998cd60a615a43d58dbc70d0109af163d24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c580c172fa30818c495d64297c9d0102
SHA149b2c11789372113deaeb146303d11ac0a4e4904
SHA256fe78978987c3f90635afefee32eb104ec2d0b48dc3a77db67610bdc75d52bcc2
SHA5125fa0aaa2e21e65782fda701b3bac564967379c487ac1848d1b5e161b0abdbe5f3ab6798b3ba1f95c0ea37fe6f68e1d0d05af781ff1076ca16644f7bab268ecaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa555b724bb53f0c7e3212b72337d696
SHA148984120a2fc63d653e652d49f392fdd75708593
SHA2565421e7e22673dc1c1e11dd84b3562afa582cc07c05c3a97cd80107a1d7009959
SHA51205cb07571408fa2c3710aa5b98d8e882364dca8d752e6079c8323829abc874c49091a2cbd622a2a20e984aaa689faf417108b2edd75e9ad2cdfd8bd4525958ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5179ab89c00f8cab857526e6666594432
SHA1cae8da1ec3770e133a2cb7c10d1d62565985cfce
SHA256c53a63ac28f807be3a1b43fd87a7265f1fe8f1450c935d2646d6bc03c82de83c
SHA512a2c593f526587d24564a2286239c79f8386900001ca68a1369b36cf154f243011cb6baaf3fe041417bd791ce1bf93c47625a30d84de4398078905f3968ba66b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acdb7d48ee67f9bd947f505a07ce71c
SHA1d7d9ffabc089c209e2308c84bd0c088004846322
SHA2567d8cf71ecc906010f1b1554920900d65e9937a8e26a975b62efcd42de424a5ca
SHA512f98b047478467c81c9d7be3206e28271fbb9a4aabcafc4e346dd10fb87830e8e3015732a35c0f3b797b2af9d6b927ff9f2e8afa4f336cd61c18cdf958830ddf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37df86e69f401cab7fe601735662137
SHA1a567acd2e843e0a7e8738466b338b9c9763b4fe1
SHA2566202346c390fc2e932152ac7939775023d4729936ac1982d1a7967881c23fe28
SHA51283877cf6606e0db40e9aded342f300ebeb6538aa1d1eb80fd8e93f5d25479c3a46294661125f658d3f5bdf733087866e9f241211ff24012c55452787f88b8dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19d6bbfaa3e7149bdc5ad51a32351b4
SHA1605f4a729b07a1e86363124c3b99bc3d4f8086b9
SHA2561e952ec33bc5a38a892193f3d0827e0547d72887e8c208e9a3b518af667f0c75
SHA51237288cec3ac904655e6392c01f0977f60cf045f2c4714fe533b70a67cc22ded273f9a2950a7452e9a2a1e18120b9feb5f0c42f51cafebfe42a79d93431d0b6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705bc47cf793b8272259b9f1dbe3f654
SHA13ab8deae8c69a7c590a5a76cb6e87e46389ba6fd
SHA2569edc79b689d8db8a506e4672265ccd3e300e3c2c1ec039c81df5ba7dfebde060
SHA5128de8694008684ab7f2324e2b526be51cbf7ab4e2bf0154492670a016ecbe18a4266deb3f704dd86c23474df097928038885cb53c59f27e3b352f8f184e5b1fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf779e327d209ef02449822f9d491e5
SHA19aed13213feb1e96ef93414473a27a89505b6be2
SHA256aab219e70d5e8a7243d45ecdb5561999d778f8541a1bef7445eb8053fc70c9b9
SHA5122583bece12099547039f437dc9294c3cfbbeaa8aba839b14b1fa3ee06ecbee0f0294ca86e3dca69aab9517f3df8115aac22d332317e7ace59e70719eb8f2c24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9fcdc5f4fbf66ecdd8f7356a04ee48c
SHA139b66e25d84f325a040cae76bde180d05c5761eb
SHA2566f9ba98a4a82d3b0388b5ce4989a050ea9f705e595d40b780a903259fee8b0a3
SHA51295cdba9d33fc45859e38111857ad4458f4218eb50422175067ed961799e61eafce3253a3c3248d9e74c261c5680e880e522f689cbb4493514ccbef9bfeb4c06f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a