Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
0d93f57766525e73fff21814cb65da26_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0d93f57766525e73fff21814cb65da26_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d93f57766525e73fff21814cb65da26_JaffaCakes118.html
-
Size
23KB
-
MD5
0d93f57766525e73fff21814cb65da26
-
SHA1
48ac3ce328ae102cd9b8bdd1b2475a517ce4b2ab
-
SHA256
aac84d5d1cffe0437236bad87163c0bd37f7b5c256c14df9c13ae3ab46c94ea0
-
SHA512
03c2574f2cb317400332b28872dd9ac173d197f13cd53d77fd7ab0d411a8b35988db70aeccd54429c4dc848411eb276161cb0a2d526bc96e24769c64affc93ca
-
SSDEEP
192:Vxul7vFZ7vSy9TsVi7NaNe9vbfKBiapLaWf/Oe74tWfkqBdWfhcQWfgdTnLsRWff:XofKy9lp2iaF7XPBIxLs/WdLcPFM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420788154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E205F91-0841-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000eb18810f5ee23a42e62a2167438fa593d995ae7152841f7c2ca92ab09b129ded000000000e80000000020000200000007b601227c8dd3c8a020af5bf47bf42305e0a13827a6888562fa1192c00492f38200000005fff1a67848a42a487b763b3aaa90f8b460c5f594b7a63bbbc16f55fdbf243104000000000d9fe51c277a124a7cb3ba9bb30aeba1096a1977222437ffcf6c275c35bdf9ef351311d8110bbbcb5a199c0e2908b6557f97fecc09d31b987d726b3aff93fcd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06cbf524e9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2712 1728 iexplore.exe 28 PID 1728 wrote to memory of 2712 1728 iexplore.exe 28 PID 1728 wrote to memory of 2712 1728 iexplore.exe 28 PID 1728 wrote to memory of 2712 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d93f57766525e73fff21814cb65da26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0d7e795cd2c640dbd05533e411c417
SHA196eb581da28370d518496c6c0bca72044a454573
SHA256fd67fe5ecb6b3c3d8b434d3bb003fa8214e0c5002dcfd5f7c91d742b8e2884ee
SHA512e0378f3f04bb0d678577ca49d0a8e035b0fcc520d16deb6d5ea27b7d6c8cacc71991dbaeb4e2f5622476cf9aa319ca533b36a6d00b2687432c2b9f2ea36f9d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690838fd79b755e6868bc4757b1f22fc
SHA1839202b8296c2ffab64a0dbeed1064a3697bb522
SHA25669625e0b99da917d28d59c4b49aa9cefdd8eaf95a2f29eeaef3fe6608d0c9d7e
SHA512884f19c67789e5aa04a23d34ef7e8386eb85c60fffbb2795bfe582aa30342bc0011299dccf7959fdc8e4708c8a682a8c3c0ae51aec7a069d9e08bce38c7e2ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce071f832dfd67ee91ff7f735d1cdee
SHA1b7530e15475e442fc186dbaa9e2c4678ddc964fd
SHA2560b4662f32470cfa011acfac92fa7c7a423516da5b24db905696e565e1adf0d47
SHA51279f1be36383e7dcb0040ff67865bb4768b3e0d8ae0905c364a7755bca1e54ebe72687864266be358abe10519e4d78b5a30c460d39bdb93fbf99e7c7f627a627f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3a80c9df74c90dc8bd411f5f872f00
SHA1b4e08311cf221ce6d2c8eeec241257d53f46aa1a
SHA256ad5b32b2a3faf3158de8e66a6a7978fd6e065d1ea18e55ddf5184410f7b9160e
SHA512029444b1ae2434cf9a3ac62000c2293fb3caacc70c77b95b882600c2a948a4b4c47f89627f4e7aa32b3a63522afcc8a0d5dbc1f051ae6725cbae730292a6a009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57268c6c0917eb74575e89c1cecd19383
SHA1e6e66cd7b52242bb4d0b1b56ff0d78c8a898643b
SHA2569aad407ce8a6f382011140c7ab9377a27be5c18b4598a8251f63dcec385dd7dd
SHA5129ffe7cbd2d913d09a7428331b3aa237a1083f9b6845c29fe9c41485e11771162fabcd353c5f7a4d49bcfb61ae53204be0ec3131b388aef8a6b773724eb72955a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8d7b76fa4af5763775a4bb145c6f8c
SHA152e58752493e615696c0e6f5529742a7fd4539e9
SHA25686ccdbab56883ca3e4584e90061e10323e59e05b8b964bf649edaffed7a55287
SHA5126b0fa1e88c51ab3d990499bf1f4feb3ac78bbea0f3cfb24a68ef39c0def0589b188e0bb15182193c2ce96cca1bf2929bd2f21050017db7313f0929381ceaa4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c685b4be49242170e22de8910443d53
SHA1cf26af57efcea1d5aeac873667c8447fbfa9ad41
SHA256d5c78350d1884990ec476d9c031318b8ef4866e001dfb57692134d00a57b67a7
SHA5129329e03aabe38806b1d21c79f355a7e5944a14856af613afb92cce12ef3f2cc7dfea9005efc36846d5be6adc7dbd1f81f75cb9d605b9ecbaaadca584bdd981da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b716562b959918aa1f1a19001440ef
SHA1228de8c18df2c9dd5aaaff25cb0dc4ae5de1f96a
SHA256b65ff69b9f792669580cad65e2a4751b31301ef027e18c1e2a1a32b836f4a3a6
SHA5123716717e59c44c1c9d104dd6afa246e92ebcea8f47d16952ab18cbec3ac2df0665380d48a27d18ebec2246f21f5904a98b6f79563fe81093058c98164f7c7d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5aa3b45ca19bd26b7a316ff6c16475
SHA1a18da41a5d761042ef76a1fd921d06316ab78176
SHA25635cad71b43a6e5e23158dd9cb11df5cd5775d64f38d1bd9ff7c67f8011e90044
SHA512153eaef493b063664826d3c8ee053d695fe5923d356976c93f49a1ebb9c5e68cd88d73eeeecd13ff87339ae005936b6fe5a4530170e413c343bc8a9c9e366e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f96da8e70440535b0b9a0e9681b9c990
SHA1b79600b3ee38f0e51deb20c04e445bc405ea22ea
SHA256b4dc9bcdd62e99f096e022eeb15b4021bc811b48c90bed39f08e9a1f81f84771
SHA5120c61adf10926d834b2e346679dd31edeb72c006a87cbb420654997fc6c79a147f974bc1f51ac6f2a41fee3135cbd42d90cee04b0d5e265f52b6a8816ab356040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afab60437c93ef0065fb6888d7b3ef3
SHA1c2e388947da8ac0cfe97b36b46ef238178629721
SHA256dbbabad6954709d2ad5f36f3403bb18138f1970d80396a66456e089aa86d46b6
SHA512800ee92e27e023f9c63e55a0a8a504006f806bc678ab2260e89b113c225946faf2d4596e3f11e649650ae0b49875ed497b45971553261fca1b991a298c53456a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569302fe72b373f8d4af8216cdf98c187
SHA14ca1ec908e6399dbe3d7c5dd33c5865e2da4d8e1
SHA256e0e960b29c418a8a5603e432736204b781d11aa9b9e2d9342d152bbae6b87fa1
SHA5129b15ee49dd4170e0a5938f2eeafc85c839b386f10f15ea31abd56e3e9b7602bc6c707e0f7ad0f6b1c0f79fb57a094b11149ecf0192b12e05595d5cb485ac7991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c114d005ad83c387698e6c1cffa176a9
SHA1469bf88cea213449984b39f0852abc6b456b8c43
SHA256a99d278da6f0a849176a4bb31aa3a9a29c912f3f6cc21c259ed92303004fe55d
SHA51297e03adad7f73f3e8930e119cc7ed5d2c198fa9f59510052ca25f8952cf2449026ea0d2b32d40837eca9b41bed91dfb17d9be073d25678fe325a17ca7a1ba55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510864aebf10215a3fa1e2d5b77cd1bff
SHA182098270a7995b9dee15e7470fe48febbffb09c9
SHA256c408f2b896e5b9ec43a6a93525ed1c403543ae2624b97692811b4bb5bf320cae
SHA51210f02361f002e83ac728045a0d577b8413bb427c4e78766097020bca39f553f834dcbfa85bc6992213c75e948c0c61ca5f407aa4ee0106505cbcfc429e3d36b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521fcfe89d7c17e269c9d339dc09c53d
SHA13beaa6ece68aefade2e494c72c762a78b31d9547
SHA256a392808dd2546f851350ee42551e0e546c122e7e17f55f21e7529c7754a53e0d
SHA51219537321975968939bbbe310f64cc138e01f14c7913539fe2c2b222dc1c7317721efff216acde9b34c4d9812484f5a53baf46814179cd50fe365d727526a7cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1ff6bec22b563f08b2371c0411a1ea
SHA1ae64096fbbdc587287a612a440a203be262e10f1
SHA256972236ede4b2c1d63d71504532b35c66f6b8ff3ab3abbc3b29ee7bbd5856ad17
SHA51285d046a2070359428f18a3303812b3043a2025e93979cdc81c6651ba1628ee3cb54c3da53f67a1fde5bb18152dd487dccf213fb141af949dabd6f9380b1ab665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5d85bddbcfd83693154103e5566ff2
SHA18ece005488eb05e72c2d932626234c4a553dcade
SHA2569a204559f268c498b92b5bbb060c856a9ceefd6443ed583c1bb381e4c28c7b3e
SHA51227e0c8c60b430c3b0629d98464bd4ab61a6b4ccc6089b50d8346a5066efec12a6dd3a0f384c495ce69d3e9e134259172ad5af5bb224451a402f17a289b552262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c759d8601716af4e9f4226a5600dbacd
SHA105d993ca796c9c1b1f3484086036b3a00a321a1c
SHA25620a890edf8b29148f791441240e3f991c72b7d97bb7c92d6fc2c4953edb8383e
SHA51220b877892a56fddbb7a1b3549bd1598569e003fa563b2ac7bbb451f4b0496a5a8efdc3feddd04933c640c919b5b7bb6703e812d7aab1809756bc201dff91063e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55caf8dfa67e19e97a33c19586c031f0d
SHA1fa72cbe59c1fbdd14ff6192b2e7f9113b3af281a
SHA25604e5d4757bee10b2b77f5b6ea9676fc07ced214f0fc67ed24aee11b6355d7278
SHA51229fcf1a888f0ba787d68a3255565c6a56cacd33078c46170fa36b373b737615eadfbe71d38acf75925312367612772aa36d01eaef99d15fbbdcdbc3440c8621f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a