Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
1429bf81c5720a9d5b569884aceb077a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1429bf81c5720a9d5b569884aceb077a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1429bf81c5720a9d5b569884aceb077a_JaffaCakes118.html
-
Size
23KB
-
MD5
1429bf81c5720a9d5b569884aceb077a
-
SHA1
1cf41481a99e07d955ae70222a583699c3ba93c6
-
SHA256
5be19fd7e728dfd15794f95ac0f6fa356fc85e7024248aa3b7686bbee11ea697
-
SHA512
f488d4ef77526efaa522cf254311213d6a202b5fee6f7a60a025e17b33b7d8db09187a7892c6649bf40ca33c83f72121a901a421aa506c56edf8e2bfce9a4b60
-
SSDEEP
192:gGTxl7vFZ7vky9TsVi7NaNe9vbfKBiapLaWf/Oe74tWfkqBdWfhcQWfgdTnLsRWH:gGT3fsy9lp2iaF7XPBIxLs/WdLcPFM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97E1E9A1-0A4C-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f38b6c599eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000699f031be8bc8ec5fb496201e9e0812854e5387d2d2a489b4252e12bf4f7cd41000000000e8000000002000020000000cde286eccc6c923a9c18d54b1e5b8778b73be813b50be401b1694b4e5708599020000000103f988a9fac75aa55ee86c9b2851f78a8257cbed7e8dd549bfab3316c75380a400000005b71009b423bc0d7faa3e4bf60fefbffd1f2ab37cae31fc745600aa95875cf58ed2d9165199b51c02f9a264ecc5c3c36f462304ad7b412ebba41f7d95f1073fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421012826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1429bf81c5720a9d5b569884aceb077a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59532f17a4d07cd4dff05bf1c682b462e
SHA1e7c48cd1bcdd18f739674b7b2b25593cb79eafd2
SHA256cb9c4877a5908b7bcb327ae11f4a32e5d7bcb9c5e72799f2aa8187dc47b8339f
SHA51263eec5f309a0d559b27c647ec9b85d5f7ce37f0ddfcd81b576c5c8678f696be14c824f49a8c11f3a40b08c81cfa3fca02c1627efa5d0ea9bea3b4031df2581b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b2b219e1b3b057f293947e921ae44d4
SHA1e26243d4082cd6e123fe41113de392603671a3a2
SHA256f5c447a49a1e577e6904e6edd812a90d0b7f998faeed60bba93702a82c29c0a8
SHA512a5f1943f0c883aa242c37c137bad1f75909ba9150789e48a457e2921fbb3bd43ae38e01a8ac46d387f431d84867263f0d9371287183eec570e3709ba17c630b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c50eeb633ff4a53a718f56740dad684
SHA11d7be0af7981b6f36dbb93c083ef593d5c1d98e7
SHA256da8bd47f7885a32d8301025139357d0d9c110633b66637c0deae0d546b359898
SHA5128d0f6dfd5ff1cb5b5dcfd822f268ee93270952ce5bc12fe6b9ad1af55ba327f66690ef81d796a333741f56bad83b23d2cde4d2a154ec0e43f4670adeafc93eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572344256816b022aed5c5777cdfa653f
SHA172d7b8187163e9cac2ceb317de3d0f810bc0fba7
SHA2567dcb57449846213d00790d94c6b96ad23741115c758e0a11fa7e385ba137e130
SHA51281c76a11626b90946080ea27f0f11b0735f5aa8384f242bcceba395e93466b0046990cb5b60e27fefe6019f1ecb613f6a4e3c57e6eb4a8360629ab2d85e9b951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac8fe72cb5d1ab7671bb87d3f672ee17
SHA12c9a36843a475c3da6062470565d82bef0853576
SHA2562c29b219e55dd4380835007bc53932531d4dc8628d72681892cb951fddeab456
SHA512c10c370e5d9cb0325258d302ccf67d65501d373abf42f06b292eb7ef177b5f47862f8bc99f0aa9cfddabcf1e5c3dac44ce402ca64bc0211d228b4e33eb9a30fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32e5392187c73b1248490689eb48be1
SHA15705fc8c27e8fbd8216756551a832b1a8ae2012f
SHA25676f8f5000dd408032882beea2be24bdb793bb6b979227b80647ce982a245d488
SHA51268010887aca15c20f437f5d2352b2b1ab48f4d7fd3bc45db5b2d93f95143330f3bfd29011d90b757389f1e117788b473006dceda202a6dcfb22cd48c924c6111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b0531e4e48d0b2608ae9721673153a
SHA16ac5374af504c7841d56839aed48e2f84bc92c35
SHA2568349ebb04ee831fae7eacb2a93d43ba3715bd996afecd56fdd9894287a2b54dd
SHA512c9015dc5bedde66ab8b853749e98700e83bc690b5be520942831c4178955c81600bd4aa1d8cfa87742d164e8d7b2243f35b3f24beae617264326f43f8231dad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca7c55cc290feac6549394bbd66286e
SHA1d562cbf741aeb76c3d20bcd45e887c57b110f355
SHA256dbb91e506ce74bb838fd7394375c26359f5ddeda53e573e946c8a6cf86a51b98
SHA512b5a4ad15d8d86ceeff3812799dfff493aab28b7c1ef8a82dac932cb2d91de80a584c5fae506c8db43f7331199ee666c437357d51887b74dda80edbd326801f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a78b8cf0ffc881d128159c2ee55fbb6
SHA121768dcba5d1bc055f5ffebc206884030fc50678
SHA2560e68caa6321c9f3433c6e0b724d14e8adc89b31fa2286721d721e3e8c803466a
SHA5129c73d10f1c1f2c17af3875cc83905695cc1f33e04e9ba2f6f68a1f0029ace4e90fdc93be58a5def6788c430a92ad23c6e3ffaf1431dfd74315148b1e826b881c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b740776290686f6a3a79f43ec1d1999
SHA12e4a79e9117a874c787f206c87c1094d1aa9be83
SHA25638c629d8b50df8e1923cd13c9719390b3f615732f9ff9853fe5bacf14825cc66
SHA512040d54df95d4c4b4fc3dbac26aa2fd83b0a1f31668877adeb5b34cca575df34c7d588b2cb2dcc2ededa89b8fb2155fd9bb86fc6afb2fd8853f498ead21e91f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508850651f89c7d40c3840f55fadd1eac
SHA1fce91ad26c685a71bf9a7f5a614f1ac75e7ae95c
SHA2560ff661a84c1a3a0682325eaaae8fd500917c1df50dd1cd555c7c30d4b6b43604
SHA512d129e56eebfeb3395bf3897b886b082e839f24a2c5498d6f998578360a4e6bdbc866f910295076699586f0e7352e853a4bd42cfc4836d558005503057a57692b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e544d95069c094fdf002cb7ba4181125
SHA159a49f015f2d17b9e5559c687b66451c1b73040e
SHA2568854b923303d54cdf4614b115e47e6097ea1728afa1040a3aad20e36d3481d80
SHA51286bad435744d4579b1f77c1424097f96ade1b9ae34dfd1c53822ee74e211bd99820d4eee50162723ab8f989df6c544873af221b5e6e885faf66bfac0ec5c76ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b88f60887bd72ea477d75b862abb8e0
SHA1994121186f149ed8df344259fe3cff65f167d4e5
SHA2565ab03c43c984cf7adc9af3fe7a201cb8a759b777992c29417550b03553d74961
SHA512caedd0e58566d7fe9067414bf4d45a56c104efe32dd4b21b75ac6cd90e4cfe5a5432569a81ec7a1c0b52277bdfa3577385351c0f59b20b1769c7189a24f0f85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a32446f3b0404d926fc7667c430a23e
SHA11bb73bf0e084ceae6cfad96daee7de01f7507cd3
SHA25605f7d61abe83c2ac091001d51c893463be522706c9eefb9f30eb6d34bf740478
SHA512de09d4bce7e4a7bdf14417b126e56e7b80a47c5dc06fc733661de18390d381d3a0d7bd43117577f19ce1730b4bcb8a86f4c9b1e37044c4007fda30dd5ecd2716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e7fdf6e842d41a7b04000e80c66001b
SHA1616df808927396fb511cf2a4d883fa0225da4115
SHA256ea1956e90a0b92476e6f5eb27d3fff22430916012e577bad8e38050d55d6bdc9
SHA5129d86786889d5113eb3627f921a447132479d04d19b5cb6162ca8ad9e9713885fca4a2eec0211c3dba65d401dbd9ee3e36b2036d47fe32cea5e39b98ade2a7714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53097097f071bd20268ec0c4148fd267f
SHA1aafe4995c02083976146eda734a7ccba47c7ea09
SHA2566a06d5c129e309ec2c408b5e4edb28eba224cd4b2442bff89f6c8d2817e0996f
SHA512b752521434129a0680be5331381e2589c0cb06c59c270b7018a7fa4180229c424331eaf67207622087f92936a32415d68b3e165c0ffdb7f5adaad4edc202392b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37bde457052b930ec3ce3017ae67237
SHA1c4b6c710acb0d04bd2dd676dae6781aa28177b97
SHA2566aa062b01d9082ffd85e07976923f5042dfc9529272ec9e0cb0a32fbfb512ca1
SHA51297cc194eaf6f8b6a1fc74ea73ac446530e98cf4f8b0cc2041f034dc78e7b24b7a16ddd469c0508b368f00084c91b56fd1a514df45f9bf19399fdd41dc1ee27e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58221191049fa93db6f62728aa94e55e3
SHA143426519b90ae3f4362b2bc59ad3a363296a8a84
SHA256b0f36f4fd16cc169e8a58dc2e2bdbe1c8f32e6c962f70ce2e201ebf1d1dcefb9
SHA512ea8f5f343dfe8bf812742b8bb0bb3c9718dd6165b786ce1356b617527e48d0bbbfb0183697f2a2898548fd90a2b1e0813263b4e0592f1386c3d02cdc973bee94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9bb2cfdda7da178d48f0dbfc7a8e523
SHA19be60770d2f96239d1ad3679b21b1e07a45c62ca
SHA2564e52f9d97381866e86e09bd06ed6fc143a7cf2cc0cddc6eaece8fde8c16d2381
SHA512a7991e8ee7a917e80ab2923ec8a193a728959346459a31811b5d643b498e6d513f92e2593df936386f722107dc29fb97d678603e6afa70314ee36fccc86568b4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a