Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
0b146d224551c7a98bdc777eb44c5ca1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b146d224551c7a98bdc777eb44c5ca1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0b146d224551c7a98bdc777eb44c5ca1_JaffaCakes118.html
-
Size
1KB
-
MD5
0b146d224551c7a98bdc777eb44c5ca1
-
SHA1
67400cb94b7e0423649e99216aff8a9b58fa8551
-
SHA256
936e96044c311bd28ee72d36fa1f8dc34c47a77afff6b8f667dfe2109e944fdb
-
SHA512
e71d7b99c15dbf65fadd1afd3c2dd43712775ab4feca75bd9571379a43d85be1e1dfa9219be70990c49cf22b5fd2c4e01e49f4a6aceff085caa0f1f34a7966d7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60505a1e829bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46BAF3C1-0775-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b3265acec3aa218d371146e99c304edf862185970a098a7bd813d8be1636f675000000000e80000000020000200000007edaff3258af40c6e53303f89c78e716aa9b171e81d3f02e3662f6d9ae92da6420000000a4df50122b9e662e5f0eecce0b305818d1f3c3402a1c5021350b09fa8fa9cbd6400000007f63b1f4b943fb624bae6a1a9910004cfeaace53f7138a51a4103936e6ea4af9e90ee14d7cecd72337ce0c53b87bb3747ce215d7259ad9e7f4597a62180045b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420700445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28 PID 2304 wrote to memory of 2688 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b146d224551c7a98bdc777eb44c5ca1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5934c223e3bdde6c01c2b877c8f7b69b5
SHA14fc15b42e52978aafc0e8550612b8d5315a1e8cc
SHA2562a4aec80d2c1c55c8ab6017c27a7521c913dc765f344eff2e2cda2d0288705d4
SHA51282b5691ccfae6505ca320511a52253e3d37afe6478ca263c796d77df2c3041ee8724dce0eb11f624470649c0beeac3118e69cd503c7508fc80542d8f49333e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a4900b9ffc43411f78fc795f09c46bd
SHA16f2b3e17c707843c1e303a856a6abdf5bddc320a
SHA256f36b825bb141b93fc21b7c0da79ed11bae9ec4d88e1d357519ffe5e594018726
SHA512e0fe62f5b854dc563f2ad79ab6ce25313ae56f8f41f8b934c44c03c8b1b986ed80fa9cfe26a953d39dc05a4cc92b0f0ec048ea1a22874f762dedb3ec23cb2ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a605d61ac3dc46be653b5da00f3709a2
SHA1b7203f6c186919929bcab5c0fc2836b82f1bc503
SHA2565a9b57d92c20aad978c685c607d0ef895d5905b0f9d0fdba3c9c87746c425c46
SHA51238f4cdca050eec323da122ef37e11e1fce82718a5ba09fc9369ea8acbe07a6cbbe72d01aecdb4f264953f12d4545b8e040d4eb20254a30c1e307dc81caf00c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7ffa581f26af21f5d9ecd8f43042c51
SHA10e152355380dbae67163979ff2b8672c9ec9c2da
SHA256402c1a05e7e5987a8122628e98c89e360a1e8b0a984612be19fc4c515c93f817
SHA5122b50ed822b3bb5321c42144a1a1926355c7233e1029c49d401967626e9ffa96e9eff66ac7d920bda796a567d9be67556890f9fd4a1c83c73982dbfc8b8662c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28c8b5ea57fbe4646b10e648020b7a8
SHA1d2d3ba9c4a03ffac3efb55a4492100f514e33943
SHA2561bb22838e0897345c443b5b71f92939fdbd1d83e3b0b28f75714e6c4f36613e9
SHA512bb6763dc247ce2602e3fea544d0e7dcf1204256021ffc010d8d4687b3cca0e829136bc589531c4422cb49aba943ea84613e3e8fec287c2ba8d84b77fbf01861a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb75adb05f116f64eab8139993037c1c
SHA1c6c2b57a95eea86872ae83d01407f794877d3d3b
SHA256407f1e2d6bc7b0357e297e964f86f7448ba453d20029c836cd95c19161b36d8a
SHA512c173f52042b037a2389a93afba88dcf82c2f82d9a3ea95da099856bea9370b3524498b8d4050322d9907bfef1faac3459e0da8ce51dcca5f2ceeb30b8ee03d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613b66017711040adfffb9ef8f3fca4d
SHA1721edfa6110ef0387b69b87df103931ed4ddb9f2
SHA2568527a47f2e2c01d62f699405ee8c936bca74ff665c4944f1473441053913d99a
SHA512a77da6eb8fbe128812b2575c96c3ebb6921e53e48e95f34a132e630570d8ad61f8ce851815e185d6cac16c8f4b5aa56288e944101a0977fa7f9f1a242e9005b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16ead07834c00aa8c050eedbd7fc753
SHA127ccd8ad7730c209032ad08a3f0cc10f390c074c
SHA25659713459c6cee38578344d1f9f5467ede15433492035e265bc4c3f66dd47c205
SHA51210b0bb69b7df76328e1b3882bc901a97eee1c91dd790051272113e93aafe7f7c63d24524eb633b667aa96e07af92c04b85f5f2c15b14342531b4c0b778b70e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5968197607902301668e2797bf4eb1e06
SHA1e02650258e4fbc3559903773b9a42a1636d91bf1
SHA256c3fc055c357a047d25c5b4cdbc7852adf239f7f492239059d249d19e93a9ed45
SHA512870dc73c98ca21ed77d56dd20f1fa2c43c885fa904ee369abeae9af5abb9cfca41a24ee63557ffd8075f8571904f7bb53724c8d6711b8211d9d8ab05147180e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a59d799902021860b410dbb02c656d
SHA14f0b7b160538f2d537c9f9c17e9c507f31c95b90
SHA256ac86c6cc9691312c141e25559507b1b747b8ecb165c4cbbcf690596d4e4bebf7
SHA51229230f057031791acaf3454d1332e18930c55ff43b0193fc77844053f80a481c0e426126cc14429d9b9168fdb0557cd3c6610336cfc75018a5d6f791f6c54436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f842760f8a7ba499c3138596316ba78
SHA1d66467fe61b126d0393fe7ee79847820dad03d3e
SHA256b18dd40ce7265e7d7534ff2e86f3f303f5968fa2bdbe073ed604e50653f32d04
SHA512ce48b7e7beb64e9fa696e3ed444fac8a42ce18a4a1adaac1982bf391e85a3703a8234c72a5d62b92d51e401924e3a760aac81760b4ea55b64f51899607fbf85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59343a62c108c852f4fe2b1eee3e0dc73
SHA1fbfc3baafe0e4772a2d112c0fa2fd963e564a28b
SHA25643abffa796dd730192b58832d44173d208eaaf96d67059c69a1e40a9a7ba9389
SHA512a624123a1d9f062acd3ca2c5d7381550b1ce4bbca94ef26dc0c85da9734cabd48cc6933752f8ae3ff28f4576d5ccaa4afa8696462b3fcb843527904f85dfe3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5bc3fc5b6bd56030b231d5c02d6349
SHA1d4ea5cc3eacaecbff976c677bbf3fe69e0979d0c
SHA25697ee1448767fc1b9c01185c9b343d3848a2b2bd7e3b3dae90b8ed58f6cf69e60
SHA512b51fecb6b5dd8cfbe0e46c43f95c245830ff9dabb7c25dafcc0f4bc6b1587d9d8cffd4d5461367a8ce17c69ac54461f3077d264a75cc7fe188810e741a93a76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5076fda65ad616bf13f44dee4c9e61813
SHA165720b9e256ba459e4b81481fda4df61d1ba347d
SHA2569d7ae26d1c51750e27318c4d72f6b5c34f15a2035bc94bb8b2c4d355af0e86d6
SHA5123ebe9202d81c649796077a5a4a13bc830b13c093f85745e70f5725bd38b2c8bc2159fb8fe4fd0437adfb6f405178a7a5e020ceeaa972416364b8ddc5751a24e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a82b9c470bcedad9cea29206432c074
SHA1661f95b136597c5b18c0ce50f8e53205f9549008
SHA256a2c77c6aa8051bfd41455e22c3e4ed8300679146407075921974c5a46a27d2f2
SHA51253547ae0bacc022a49dd4162b2fda2007296d49cca7da692088c4f618e4267ea67b93ff82a8ece2e5854c62e9b16fe8f9e9b2793ed13a2d2e0f2edb5db4ad7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f628b4bca44b4208e0a2a107685a2d
SHA16cfe2a07dc57e0ef2d0f48e4d4fa2b2b986d83ce
SHA2565318cebeda522f5b7003217142e612476fff0ff01434d59cc4f409756553788d
SHA51287122cb1dd2f41f8bcc8cfc534d4f2091e38b8aeac4f1120e45551e73980785712e938f4a03bc2fbefa16acc1b6ddcbd26dfc27f92910fa5c38032d2bb64cf88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a5fb59c6e9510d48eab37a06e3e9cc1
SHA16417183c2cfbeb379f2f3aaf6af85e7952db9353
SHA2566f4cb8343cf86cafdfb801e403aaea983cd240bac2ed119fd9860d03acc7c27e
SHA512ac6fb084278538e21b6e1feb85e7aa7902cdc51302f9c21c6ea7a95657cf05f22ab6764a928a72dd1879e8c7edf091822f9ff82662f27bdd4c062c42d3429e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e9e7a391aab0b77c7ad7b4a86d6256
SHA15a57a1b07bd9ddbfdadaf39ccb7dc98150d51f81
SHA25642a60a3e824d7d157f7b5b2ba0464ee53df757b740dbde4deb5741736d40dbcd
SHA512d7eddf19289b2e1b25b3215f9b1b00c54c664000575258a4781f4556c002488d83cfe3cb6e1b8f754f18e7d40c924761efd998c7acf8c110022e0d08c1765dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aad93a287b619fa8506da95c3e03daa9
SHA1a2f0714ace8df694bb76b0f0da2938158218380c
SHA256f02996fd1b5afe6e5f92e18a7e8f6e7c9e6584ceffa773b4ae3ae80690a2a1a6
SHA512314f3d83bb21980ea85e90e76b9d26f693478c4e43e611fa34aac14e079a398e0c1482901095ca5a874c102c91dbfb9a6783066b943140421f9ac69b88d391ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a