Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
1111d9d9ab3a9760377fb592798fcde9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1111d9d9ab3a9760377fb592798fcde9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1111d9d9ab3a9760377fb592798fcde9_JaffaCakes118.html
-
Size
15KB
-
MD5
1111d9d9ab3a9760377fb592798fcde9
-
SHA1
63454b8eb4de8458b54e855bf2781428bc99eff7
-
SHA256
c176e6259b5fd64b50dbf0fa2a445862ad44b78b7d8da77944510ca7c98ba35b
-
SHA512
3e095f08ff0cf70a0b05f684b2b77689b43364c4702133e5b07459aef7affca2cec6e1d20e7637f4e340a33e9c4c20a07eca161c5a5db0db83095f856820918a
-
SSDEEP
384:Sgwn1PeDLpZvmDX+9KgXIlSISUyHfl9RTti/TU:knJgpRo+rYZly/l9RTtqTU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFA5D671-0974-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420920198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000f989dce685c51d78136968f82e60db4ba653a64a5b3f8caffeda8153177f111c000000000e800000000200002000000033b48c897f44b16c6fa83e5cb351bb2df607b2240efde94dc0db6f5eec1dba8b20000000db787e23708cbfde0cfa103a8a5202f6729743708b1b78a4b7db1d2abdeecf5c40000000a5d4033df5098bea1f4e238df81a1391542d6786aea70670cbc21750cf3437e5077011f8a93ca26467ebf79e468e4040e1e78836cdc51daeef5e495a58699672 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003c4fc4819dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1111d9d9ab3a9760377fb592798fcde9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d9b22564c3807fae8d1a8886264d3c
SHA1891ac2bae962ae412264edbe306fed7b99d7aba2
SHA256de9ea6f2235a72a17199a56baa336c878c872a6bad69fb9b7eef1418e12da580
SHA512234da96ac5209453d3c591a79973f05ac6c6a2d12d35e02f2e1781cad5318cfa45464faaccacbb5eefae7768f95fff4ae9c9b377a852b4cab792071e06e7459a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b212ae6dfd155f97ed137dbdf12b4c0
SHA1e139735d0fa1dfe687591338fcb0ab0f1db32f69
SHA256f6acde01d2460e6c3ac563fc8b6e2491de1cfc959f2de263a3dfff1e1e8ce85c
SHA51268a2fc11a87e8c7a14ac1753ba46eebeb18c238100aa1c36d6105ed40d1d141c7f65ce017c56f35024647702b6ecf38f7816a7d2894df39b21849c06607424de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142f4fc724dc3c035c070380b6ac160d
SHA1d352c10c8349fc939d5c548d41bb8c0835f3f737
SHA2566bd507849fb1164a18288e97439798f27a216f0ceeec91d47aaa9d8eeec38e6e
SHA512fc4ec5a9234caf0c02442c54079e3f9b7a3b3c60ae5b2f2b6b6ccabc6477b3c2cfc2d86da2f010fe224240747b7f5a55478e6fb4fda44a226eaa852b863a73b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a2db2c53f6c0e8216caa1349cb183a
SHA182b445740be25e6a5b385abb859a93598d3fdbff
SHA256335ef937a6a1c963537b4a3d38ed3a9b7b9d6a21f51140811f90341aaf721a7e
SHA5126e5d43794f3798f289930858afbd1778c7d467e9480c26565f954924c390ef867ee4b6d57d7a1fee16c813ac4457a791e6c5bb0f6b2e20dcf5f9863a0ecd1b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a2ca663ff7fe84e39e7b906920d5d7
SHA1a86b64b0d7ae7ab503be846aaffab0ba6c266c67
SHA25641f6d4b3e47d81606337ce6c465a07f94f84f48115e6172a5e06036704606e72
SHA512e4e09a7f63c43935f5d1a4f54543c50da3ca77c2ccc09e0a246e8dff2f1a93d187e573c4f5ab5b44ca74af7586de8cd42eadc1768749f9df762613bcf61927ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47df0775e729763a046332ec747ddb5
SHA1bfaf4cce13426ee0b3f0ed81d6e159ee8c5d02a4
SHA256ce828755ea2e38613b3c1d09f4ed4dda8a9c466197c8e0f4c36e136bbefa960b
SHA51290fa741589b91989755723ebd0a42a9108462c1ed36a049695a7108886a4b58c675bf4d9b4f647415f684d51a33feab5d981ead70d7d7bd23295d8cfe126cb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ab5c5468723ba2505a3d171858afaa
SHA18ef6edbf1ceff7edfaa900bbba5c2255803a4063
SHA256eba216aafb5e4d65be9db4319919c10f43db6ef752958f6c044cf335b098e99d
SHA5124f25906cd76c1e0b7037f844ec47c248efe77066649f45d861d654c92b3d7889a17425aab422d811c618aec967aecd5d7a3f47855d9f798fdf59bb13a368abff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13b6f06cc7c33418570659ad0026bbf
SHA1e14957ff8f6872be1401f2a39e12442d6fadf6f0
SHA256b0f38db6525ffe2ecc7cd59239b2ada773efce7658ca93bde54609fcb3cb7b69
SHA512648e3284aec6c1f5e70f7db8a6ccbb6b7e4bbd40933111a5daa42156afd3c843849d34b04e622ed4bd38d21cfdd40cb84dd2f4048ac48a0ab286a302e8b059db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58942e82548f9a3b5a8402fda88c2b97b
SHA13064d6dc0068008a01dcf83f65c3af4169e6a0d8
SHA2562c92de0772b6a20d5e91caba2bdd9b7656b1535258c589ffc68154d82de320e8
SHA5121c2b3df79acfd420f32b2544d6e7b0eb9eecea641e262a3649b2624be634730c6a1f3662c1f7cfd8d89ebf9112a7f5a6de7089d643267fd6bf116e3db5dd56c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525cd1f464cce6d6baa8ac9049cde32e2
SHA157fc24da0b370a17865c996fc6c60f7f8b109a63
SHA2561f14aa815127a3d7ea1fd49360a2348b497d6219ff7718541002ea4045f10fc9
SHA51211f9345e30e7daf10ab15e0f9093ad5cc8dc9a9d6a5adf2c324a1bde7d171bf782dd1bdc1c7f9c023bd97b30ac0076caa64e34bcbdda27b136a34788869c8f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ccde4e6dc79f6f66c28925af6e65ead
SHA1d63acee795bf2c31c33ee3e2d6d5ff39720bd710
SHA2560c0dfd6ee0bba8e36ff4fbe729d1ac8afc19574cdcad52e365c8efbfca253b83
SHA512b54cdef84a77dd712ba78dd469cf691fc7baf5332f4c914e57ce6c64decfd6dc061068ad214847eba3de9791d794c0c4d4b399335809f88d9dcabdc8d3272933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da17f92619441161c53305d4e2c301d
SHA1743c5f765420fffed2c6fc476e2b3c7f247d3f3f
SHA256dd2a9c911ed77adeff656bf5a9eb525db0a02c4e0e9a7ff63172295c56507cd2
SHA512d1977e988fa2201e11f64c65099f61117d51ed22b1f5cb6d9f971574568eb7ff4e48b66bcbf3032327dce8957a0ce0bcf419f05010c2d0f68ac8205be351807d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df1fc6a5ec71328494e618e4482240e6
SHA1fd299d08032154bc29424dbed9af3653ff7f69e4
SHA25668d802f48a68117e4effbaa64c50ba410698f12d9e36a0d5ec51443153344f4e
SHA512d53bb02000efec3ee567053bd4bcbf8eb1167d7fb7bd7811b8eb8b99e1a5179932ef06c84b84ef98b1b6a0b131d699539c35bb7aa4f8b20fb43778a535d26c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f89f1a2b3da7318bb5a126ce53274756
SHA11242ec0a972a54042b9512aaffb3f9cc093335fc
SHA256991120b1b9584c3ea8f2a0c199f10912b1b2029fda080290607f484db7cbae4c
SHA512b30069f750a0b71d85bc0686c27a3ed3bc61b77eb0edfa268e8874f95c37006a9acc76a173f06c6ad745e8deb7cead2334c0925af77682fca7198fb6d76296a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890730c1b0ad4c0a070e5506c0c760a5
SHA18e448893c86008e135aae6c3c5536e4a352fe07c
SHA256f89c91c58a3a36f2821ff409e09ae360e98a186bb99b9c35039815ffdead31c1
SHA51296b7d6ebefd57ef03a9ef78cf33457c579343b2096a805c00a403d85c03192a1f4ef09696b77c0f99d511e6a673edea5496cf8096c752de95826752a21263d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d9bdfd275e05c9c7e228b0f09dc79c
SHA11e91eec03a67781811b42805cd424cbeca4f061a
SHA25613ef118674713d1e714447467f12e64e463a34ff28128f929504c19dd024c0b0
SHA5127866ec842e24e74c59c6ea25a2f0351d65a986bb68e588807fc113ab144363c9bfeccaa7a75b57b566aa70fee1550508e823b31a801488252e7636f6beac41be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54257f83de712d2934efa8eca3da72819
SHA1196f81a7355cc5b3a26b8d0d60f84cc2632301ab
SHA256a29e57d0b71056479dc443f872c5316d01d238cc1081a99810086f6de4a5ecdd
SHA512939d3bcca0bce031a1fa9f90b4101beeea876f106824d6438afdb02d4405cbfc3d289edb37244b9092437f95185261134c785ddb7d11f7e54d604f1fec8dc67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0621b663b372d88129efdd121f23217
SHA16b980e51e15844f414fd0fcb21b3c7fe2668c4a7
SHA256ecefd9d8ec4d8172dfa1bb4c464618a7c1435f6615d7a5cad404888dbc1b96f6
SHA512fa6fbbf484fda85c81ad23ca895f2dc29993ac321516d8318e0e63175a01f3545da03b3bf88a245727e611df222abae6fd07629f62b933f50a76ca9097c2ab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc3ed73ff8c35aa76ab92a42469910f
SHA1d04d30c61f6a0ebf9b44a6e1b9577fee6fdea8ca
SHA2560e7a8879e146dc0e9db7d2e63f85b59b0d4970f9f1bfced1a362d0efbe3d37af
SHA512f97dd9d827214a9e48ef42a4c314d29c455e181f846f39e0411fa9110eef096101552242284c23ab4d123bff5a9eed313d81967153d135143560580555bf99aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a