Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
11166643a52b344f92bd7b654ecab0e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11166643a52b344f92bd7b654ecab0e2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11166643a52b344f92bd7b654ecab0e2_JaffaCakes118.html
-
Size
13KB
-
MD5
11166643a52b344f92bd7b654ecab0e2
-
SHA1
41980d9a5d4f0c12197b3ffd13a936ce39a46538
-
SHA256
30182b4421ed0c0ec75c858904b3ffd07650d717c9caa853a99522beebf8ca06
-
SHA512
10f110bd5b06d2a56c6f6b134093aedeb605067dfb77e20bfcaba86e22d0d8c0b5339c1b4f9c0a2e2eed5f15eedb437fd9d3d974436588b93a3da241d48635e2
-
SSDEEP
192:ITRFDyQn2IjVUgP8XIMWaU10N7VmCAwHQ9tBxxZMO5COwOG8fX9smvY:QRFDyE2IjVUU8YM3UOV4wcBxxKszwQK7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000626c22d75252f5daa23d17f3f9dfb07a9f341f978b016489776238310e135349000000000e80000000020000200000003e9bb3a0986343fb5c8b8a2be583214acf1011ac95d252df2a14561451b13e57200000004e18684a994358cf7666356be10e1c528b06e802daa16f092566d9bc33a7646e40000000258dc73d06b56e9729a18a94ddc1de2cf18672335d7b2491467c622a6e2f61fa9c7e2505a3da9ddbf924ecb9084504ca248d513bda7ddfe70ab4ff49815a9e35 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6042205e839dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{891D81D1-0976-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420920885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1672 2144 iexplore.exe 28 PID 2144 wrote to memory of 1672 2144 iexplore.exe 28 PID 2144 wrote to memory of 1672 2144 iexplore.exe 28 PID 2144 wrote to memory of 1672 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11166643a52b344f92bd7b654ecab0e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d402cbf433aedb62f9b8889e72eb57a0
SHA13c425422ade6cf1a29efd99a1c1966e2d605aec0
SHA256037b75097d84c1a98658edecffe5dfbb35f2fd350ef1ed577ed6e07c95ed8606
SHA5128d08babd9e86ad6bad3c9a02e9d36b632fa884e79ce6b9b990ddf517d16714cd08f277680c459b9d5cc81d16ba52338be706125416253c9b178ff228012b8d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0601027beed9a3521d151bb8a8714e
SHA18ff2602d3f7be193c0bea55b53fb8c27cf300ad8
SHA25629cf95a9ac55f8246ca3a95e008367dd44235ede22cb0f41f05f8770d1a83852
SHA512a63b3dac8522298a67e155bffc80a1b275b5a85647457afa973defeb4d5187b5dd3111c7839aab8cd867984b679633ab78f4c2c0c159117b60eac1d918702a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535799e364f25d3a4512180a778c06eb0
SHA1ab407beeb38e97ef4d629cc069781e3760048d57
SHA2563c9e42953ef306706e858d4fba89edb30304a9f2f5cd538ac04b4e79268a017c
SHA51235b893b7a1dfb4800447fbc9685a3f3d9679a3ae9205b2ac24377507a08439468433e83238594c94b9264a4267805767a5399602a0ebdd83c62f67c44a97ddbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120dd77eb46f577fd968bf04a3614655
SHA1a9b731da00c15b1c1757b7f64d877595b2d860f7
SHA2566057b031f52ec2462ae9cd088a43caf4843b44f48ccf1ed1cc9d0c5823fd983f
SHA5127f4befa26a6dac34827753ef0107f450c132a778eedfbe578666fab2b52c53d531b5e75f741bffb2c96701d9a0e62c6f88fc6acb5a73941f0abc2064b69afff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036af87eda41a76f586273377ba1a96b
SHA1a302b6e99306c1fca0f74f785e2685d12e86f2c8
SHA2560a49c8a3593f26a606b782963dccf68e79721e0758353cee4cb4a457ad80fe01
SHA51222426bdb05e856408b92acb4cf520e2cb43467ee89aaa84180c61dfdb688d243b5fb216fc2d94b43abcb11c5634e4bad854a9f4ce54bfa6b50c296e7a5b0756a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f80ae78fe323288d1f7ce82ddec9726b
SHA1178150db46d23eab8bb73aae4394dbf77d9fbe0c
SHA256eb42717431e3e7e5ee7f76defc86f66e1f11e96f78470c4070cfa6dd49c187ff
SHA5128489013499dc248f2d55cb885085fd18452befed54b3c509a2001cd5834bbdca080de5767ad0e04617a49e78581054d378076b3b8031b030086da80758df2adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8cf1fefc54c615912c26dd9c7d2513c
SHA10834e9d941dd4bc1e2ad21e9feab1b346470d36f
SHA25659a539fc9594590ed31535e89ff4a233790973e8a3fe4ef052e250e91c7b81dd
SHA51212be04a9df9d1e40d7c65a161fbab22a22b58614bdeea8859e45029993c44cfbd77d52136f08e15a2e5bd2b7472fd9cc671aeee5349c3d3921c36323bb0f0316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f852e9254a6063927fab18092ece9c
SHA12c4dae89ed78b0b85aa0e81b362b60c29e0411b4
SHA2563faa3e81387bfd9fb90e3f8f6ec1849579a3517ed6a0106c4b3d473cc3fe0fb7
SHA512fb6b8f7d9608cdc4059cf24c1fe5ba80328b336bd9dd17a99fe45cbddbef5967a1217cc112c90063d90468c65c2c1eef7c02fe421e5a070d11b207d71a9ea9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000c17989488b5787a07feef9b9a8964
SHA1a3e742df5345006c04bf96cbdef915eb8adf44ba
SHA2569c006f3069010047029cc400bf8ab6240dd6019f5d1c7627a2b9d90f64570c72
SHA5125c73fa1e1cd4979fc1b2a0e4a167e159ae75c1b106dd58e9f708dad7ce29a87930b380f715ba596cb1f846c66e02c6b4b1a0dbaece11a44242f97ef8c42e5759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b47df6fbfebc18a5091934973ba90fd
SHA121901aec9eca37491cc4ebdfa914e56f8ef04d24
SHA256975397633633cd19fd48d48d2e8a051fe8f081724af87871e077142ac2835365
SHA512c88cbe83ce33747ac07c058cb98e8f790e6862f3a2117511cde1630c177d9322c20da3493db383bba4cf9c6c2be77717f4e7f67197118d4663522d0044cd30f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5567d149f7c19ead7d6124f23bf421d3a
SHA1f0c18c6c26e1dbadb58218f80f0b2d4e8de1482e
SHA256882bc0819d3a9a6f5979c30499891a0754c5f11b012196007ca3e2bef9f90752
SHA5120afee78fc4ea74817c9aacf5929851140793b13be61a429bda463cae327bfdeec4a11bd041871a68e6c3ba29eea157356efb51010046e6c8d08606c8ffaae05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043eb31051f6d4d7ddff8153b0b03282
SHA159d4678c572a76be067ffa6ce05bfd2fed63f6ed
SHA256a919c1fb778c858831121c1980beab18c0970fe9d410b3ac9fd1245e27795f20
SHA5125212546cf31d82def2663718447cbc5aecefec50bf6f378f3a5201bdb7c66c5789153d433daee2aeafbae493a01a7b56a2c0a5085c332991aa2fb6dfd3a24fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f4e81e6cbf7a0ca52d5ca0d4f562c9
SHA156eb798093991bddd2706fb409f78b934cde55bd
SHA25653b4cf14b8e976676d7441bde38315f186720f1a64cb75d5221150535c23c9c4
SHA512d7ef9f48df86a2a36579ed7074b8827c8b78fee93062c1d8df154f82d793e376d1bcfd0ee2b2049fb4b1974ffbcdceb72847d2f59332eeb05a3ac69b7483a9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf4f3778087cb9ac2386e2d528e91bb
SHA12cc7cc62fa82952fea5dd2c8f82ce3d6635206af
SHA256b6ac0064863be22b1d212569c92a57aa430a3f9261f67ec552ef486009c70bce
SHA512390f67efbfcb822626112a38fd9e32d8c492d5f139abaf13aa6488e4b5f8a14473994d979bb9b22526d1434c7e897285e3dad04be74cdb0e54b4b35082d22053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d955cb40aff352dcfa52b44c8b240046
SHA1f4df574e2d8225007fa747ce6b05e9b260eec8cc
SHA256e22b18f67131c79d8faa36db5945a084cbd7991304e95f1175a65904c185f09c
SHA512743fb139bb8839b2eba195ea9b6c7aa51e7490f0f50a462d67a6bdb2d7d1d7036eb53c50783d6b09cf51a241eeaa45e1bff93036bd5f5abaacd0d2fd8329b7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a811507fabe102b9d00ac54ee33d2842
SHA1eb1c9867272ed2bbba03e10480424227ffc34f6d
SHA256adc03ab044c166d5aef460e7e5213ecf9af696bb587aaccec5ee041970695506
SHA512182ab479a889a6c49b916607eabf519ec9876e93b9b8f03a34b7eb226775b64ea5278a1b29d49fca432c56556a1e57c269fdb6a1ba6f3d08a01704fd17ecf01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f0d6f0ccf4bd6f13c1e51e24359593
SHA168e2430c19fd41c0a203f026de6d901d6505b0bd
SHA256dac5e7069d8d0ec70f1e368b4db990fd23eda052fc1aa11df97053074c263a0b
SHA512e42fb397c8f37b00d2edcb1da05c054a28ce53d7d81bfd88e27013689bdc732da5f77bb5188ca4ed8a17575435662873de14bbb1b1dd47655ad79036c6e68eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567929e51cc16e33b94ed91b8ad727291
SHA10717cdf10386bb87735cc975ac3a5c001a5907b9
SHA2562abb381d601eac7007b719476830ecd5495da1d1d4624a81449f74e66b007c5f
SHA512613bceb62a8fa67c68182bfe1d53c355b22ce8113a0acbe613dcfa6a0b186e7861c47806744bac4e970e972a0a1ffaa880b8e07fc2084acd1cf39199deade624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57969978f7817ee62e50f483d2d43ffe4
SHA139de67ad9f2d55e2663184da343e813a3a8c355f
SHA2563f9dae7d5f601a3f87d26f30f94386ce91ce7f94d55f930a0209141da383b897
SHA512ff77c403659be40f3e9f696fdafbc919367f2886063059e85c9aad824eb754f175d82f3e5ce834458130f20ed416c15169b107ae64bdb1dca9f8607d45c79643
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a