Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
10d8e2574098595ca21b2c912a6c0225_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10d8e2574098595ca21b2c912a6c0225_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
10d8e2574098595ca21b2c912a6c0225_JaffaCakes118.html
-
Size
68KB
-
MD5
10d8e2574098595ca21b2c912a6c0225
-
SHA1
d8219231f914f2475c4fa19d8d2a5966bc1578f0
-
SHA256
1113ef2ae87796bb81f0d05ccda5624c3e7ec69c9613750510a5ac5fda6d3106
-
SHA512
37cc28b8ca5a72cdcd1e59709aefdf2004b5adb5f85ea6b3ca03e5e4d30cb80f5c7d14df62c93e43eb3406aea9fc16db0a8617b9e6d7f3939b78076d19ab8032
-
SSDEEP
768:JiagcMiR3sI2PDDnX0g6M/814oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JyU11TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06932516f9dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420912274" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009823c17742c67f6a5814a081369ee5663ba8f6b4079cbc7f67243c262072ae8f000000000e800000000200002000000095e1366f9c92826c5e6213065db7cae948bd3f77fd6b261a507897bc9249618f20000000bef0a5a20aad15ef0de00199e7513f96895d958d071d4fb026dc08a31287facc400000008c634e6e3e87f4dfa5a276acf84f794da6fe14e6af0c843c37ef75dcb561a819cd465fc77f5dc511758fecd0cadc61d9d2b641577995dc6fd546a76767c41815 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C91B6C1-0962-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2796 2864 iexplore.exe 28 PID 2864 wrote to memory of 2796 2864 iexplore.exe 28 PID 2864 wrote to memory of 2796 2864 iexplore.exe 28 PID 2864 wrote to memory of 2796 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10d8e2574098595ca21b2c912a6c0225_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aab5575476d0445d5ff09be5b2754f69
SHA1a74988ac747ef8e1e708b5559cf5cfe8ca53f1b7
SHA256c57aa15f7737447c3b9195aed03522cb5f9b2a5f1b304b7b7e764893fbbab4f8
SHA5121f462d146bb7021d7ff79c7247a5618ee3310a5315a0bd776cdaeba329dd0dfad166818cc6d1d39a9f12fb46a47b7e26a335af766abdae849cc9a0f92de90318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23f8d7a7b0f7e9b0991b4481d658f2f
SHA19898042ef637dc69d04dab717f8fc4e8dfa80faf
SHA2567730943e898b33bfd74a2d0e086ff21507dba4b9a1ba8b53541a24aacee24137
SHA512bc4b041bf88b774f99094b479aaa8f0bd95b3c2a7b118db411d34a068e0107b9ba1ddd22e35bbcad64fb6d7976a27d5c41276ac1f787560c5d512d4b93e9c473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aebfa3a46133bd8aa75e0e6ab39ef764
SHA1db45dff04cc9730607e0d09f9a978b7163d6cb7c
SHA25649283aeb1175074133dfed20ee74f7e15a1a35a0fe8a6e63d10f5ba314f5fd0b
SHA512a255738a5f5ac84333bb697b69a85b74d43119823cee67bbc002eb2396c406c08874fa77ae202c73d3233e8e4f8d62d4ed0da462ac7cf13b1085185f4e2718a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959442ab63e39210ab09507b55352d7d
SHA13c102aaf1f7192dcf6ff47beee52d428fbc2af9a
SHA256d648fefbfcccf871ce9635a6d6be7d69a32d041e6eaa6a7f3a64f1c6f4b4f45a
SHA5124de44430234cbaf907be8ad08441c662c0c863ff8bb745ec6d18d0320f04b841180e075a97ca8baee5e18a1e1bcccd4f0cf82f41676d529820194dfd42f36cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c56f6d8934e03aaad64924b22546375
SHA14ef3f7ecfdc88fb481f01c1697636e6928a1e326
SHA2563c9502ca53fe47a650e68d601cd28a9b31fcfa96e70456fe5ed1e3a69f0392a6
SHA512655bb936380f1427be346e2d89b1b6b31270a7eb7b9aeca7fecb9a90826aef50e58a1f4c6ac63333e7cddb5c1005c28e6238d75b23ce3cd84a29342bcecad375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48921ac6005af4864e1d75a8255c0e7
SHA10b56eaabb09f7a8cc52ee4e94fb31f74b5648538
SHA256e14b443092dea12468373f8dd3f03c799fa6575e327e9e980e3ca954ca8f71db
SHA5128f211c4cb06af793414035cef98c1c5ccdd2622a480338dfae17d55141bcc57e43087c8d4b7b69d485f8ccd7053ffee78b7342cbab14b7b34ad3397ad38c30b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55559117a5404b05c4d0edec1df2b2f5e
SHA15e6142ab2de4e3d92b22f152b9bed02b4a8281a5
SHA256b843f160537be2ef99914f21e0c1c1b5fbe65433e2b92757ae0b5de7826931d8
SHA512733ce610080784894dbd6a008b762d734762b788a92e73db1ab9f9e873854901831b13f5e6fecb75cb726a0954f81d09eab4c5e02b9e8ba95d21bc57412ab76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbc19a09af6b64ff23237d967c9f3252
SHA1254462c40ab6804153dc0c4f562b0d1acbef765c
SHA2562b6692aed1ff4c5db5dc3e5f337daa7bdb37b50c21696e5b04df7ca1a592e5b8
SHA512d4b54d786d04c6af0b278c27b94ae5b312453a3f99ee5f491eefe824c57dc71e95333094ad08edcc0a02a745906a3480f190c4039cc26ab9167c3c9bff126d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53133afa31e12320f3d4921a7323ffe81
SHA13e8e32015661098b938d4c9885028facf3c1c12d
SHA256e1bcaa13337242c7a988d513afe4715a99f175994df4f0737456e904e6920032
SHA5127d97529782ed639955d9ee2e46a4bf5a7e4b9a7002b77768959bb6d57a9451a49806d6633566db8821b1bc906b35cacb57df6424b1d7802d17b4a7571bb61316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e473fa1929132aa385ef4a75e9c448fe
SHA176dcde6576056bbbb2d00ff75409c091c5e7451b
SHA25665c5fe15933a6d7f4c6ffc56f8cfa51a4f792a0a01f09c38e25d12061cde94db
SHA512546777a0ab416b6dfc2563c863dfd9899e60b49489b7aeecb3685252512905ec86a1ee04f8d94b8271d7dcafe5bcc5863231d28eebd0a75fdd204de5205600c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c50cf0ba09755b26b318535ceccf0f7
SHA16bc3af35fa74caac8e64b7bc49652ec11363d08f
SHA25663824c0839c66220531aed9db401199a0ba2dac30e2b8d66bc168f121f768c31
SHA512ddb9f8142756b3e6314f8a039ff5218e45da5f9c317391c69e4146cd103bdc9270e669b56a5207c0c443b263f4d454c36a87683984cf9150e6dc26f2f1c26e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50993fef377b07d6f8c79748ab65c7022
SHA18f784c751185936b5c290843be7d63d43664cf5b
SHA2563f8d4beb84e6dc086108f979b85f825942851195279ad278e4598fbbe181a96e
SHA512a9146cf658a1bffbde49432446c7681316f55564486a9bf30fcb244c223146dde931e360f8e9332c4d272c44c378d9e16b353e1edd15a8eaebd2836061961f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115f6267659e6df66be104fc421e97b8
SHA18dc640f674ac77d3bf1fd409711d771b0538e4cf
SHA2560ed0d0e79811bb2191e491e479eaf2b2d839374cde889f72689c7f79ba2a2dd1
SHA512e7d2552d77df78715185005eecef0d3ce094fa55f450afbc3fed00dce7663ab0e63c3790b46a2d2f46887d47ea6071c7c3860139732357b84ba67ee49d508702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5565af5678af667a9141caf2211db1be1
SHA1a4d18b9c456cb4dd792747d41832dffb0138666c
SHA2562feb23a7bc35b0819f291ac8772640d6623a5a5f7976179d96813cdc683c1337
SHA51214e7c01f1c5e82c51bce418eebda78b482bcb5dca4073d4509cd8b8fbaa9b1e5dae5ca41c7175beb04149627abe39127313551c61204608d6001e933c5358624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b072a16043ed3e2d195ce4d7b65b18d
SHA1148c2f18bff741f47e1da2de89800e947f504152
SHA256291bf72b3453b2fac1928b24346c39b04d67fff94bc55b3ec06d009646d97032
SHA512f6aa32f4419e34db3df96526203866f3125223315e09823e9b458eb85a2155480258667220d09fa09cfbb1529c5872ee9dd6f1a57f2a2844450bc0b22a220c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1cc230dfd156e035f9bc4f4247f7a5f
SHA170589e3845cc934ab6b7b0d26c7148c905ec6d01
SHA256f807697be31c187f3fed24bf45d0bd659c2602efa5602c035e3678691df91c91
SHA51232cff7057d2bbd8818529948de63027ea9abf12e82312a2efcb9aca695597587b14a715157bffad5ecab33138ddf9c0965f1ddccd1a25887ee39d6bdf82e27f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4ea0c23b69dbd0bd32fbba8dbc3e934
SHA154117ede2c9047096d9433f9113a97def3836656
SHA2567748a5b22214c84a9b35d6035aa2a87322caa7104b34d8f200e654ada53d37d8
SHA5129b1ec6c0b3d4b3eb69415019855a33ab82e0d740c1ab27ef95438f834999bf97f4b870cfd37da075540c5c867291e9ff71dd16359a290655c1e28f67c26e6d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f415fb50fc8e497fdbe8591fc9c571b
SHA12b44da6cb2a67b515aa1ba061e372afa78c6950a
SHA2562ba95e197869550524f3391c50d4034378cca48497e14ff61ddfa9b1dcb673c3
SHA51279f4f3851635d4a45a0c81ee2b265ef13f68e5b9f0175c0f4335ed6db8b64c3efda6c2a54866f45b7997868067c222512845b9a0dbdd3e011a728130f3f8235a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667d054bf229b305a38037e8ad237502
SHA1ab1d6956bc4e86a9c6b171a44b2d798e10b33305
SHA2565479b4f70018b5ee5deda824a1ff9d69f00b903ded9cf421acb94da1b4e33bf7
SHA512ddac7e4ef0a41847120449c1c17dcdcbad7c631fa391e0bac8639542429ed7d48be695a55fa8269187708a372a4de73ea242cbd9c2fc3fce35fb58c9c0de98c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a