Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
1573faec58ad78e70cba216b399ad64a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1573faec58ad78e70cba216b399ad64a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1573faec58ad78e70cba216b399ad64a_JaffaCakes118.html
-
Size
4KB
-
MD5
1573faec58ad78e70cba216b399ad64a
-
SHA1
c2182215fa885396ce1f26bae81b64b58028ae3d
-
SHA256
cc46ca943cb254c1ab90faff4a493f362e5444f4701973ffc333b227b7adee3c
-
SHA512
3fe4b40a8233056b610030d205b29d7796de264bca17cfc18ba3c02b70f420ec6b4491541093ee21099f593920f6c8c9c3e709997d2547c8949f882be9a1f710
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oefKjXAD:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000608407eeb7d0b3b87c09e316a4e37b9bf0faefc9d0383ab1662323dc6aac507a000000000e80000000020000200000003185c8af6c24dfb058d052e2266aa6265e2d32322104f6c6b247eb50727e055f20000000196468639add9535d4ad065b17a79c065db38a6367a90987a98b140be1901ab440000000b3e3c9ffa0fbedc4b8c667fa6c83f18c8f64ac9f6ac4dcc346f852b4a7dab29420eb2817e9e5dc7ebca587bd8fe5072e0d92fe228f5daee69f2cd42db8a0e5f8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03b1a458f9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7095CB11-0A82-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421035949" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1573faec58ad78e70cba216b399ad64a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c79e7e77551b8e26ad46c5e0a1466d1c
SHA1bd9805ba9c807b26e9176e49e9c968aa1292cc79
SHA256fcf280297a7878b278c9dd958f28d8f437d4d7b10827c6c043d2c8edd66d4325
SHA512e02b4e379071f2cb8c2ecd3458b0876a6077c68c429c9a7f9a5da0a7c2525b2407ccc93b53004259fc20c41cf8d96a61473b06d6e35ca4e12771ef92bb464295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59401e01a3549b5b8d993a746aec89d93
SHA1dc5e6c6c697894fd7e27886d2ea3a17d1b34c805
SHA256b1414d5c119bc3983f7d12d193f3e8f12125836f0eb0aee0e9d9a44cd8069070
SHA512a66788cf5b333f8ccb87aad15fd1461e42be797395e7a432194a71e85d00be156f3755bfc627e56616e10a54b26bd12f01fd1720dda49ccd5a525028f83f638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5722add00ebca55fafe52661f39861a56
SHA1fbef7e47988315aa13935155743ea537b735cd65
SHA256db97de63dd897200e6ef0e6c010abf1985adbd1fcd3866f9c90986df53ba4fa2
SHA51274384d324c79e2ed1997f548c653fd2d0aa7ef4de7a03f16316999f6eae9d5f9b88340cfa0bcaf38861ff73f50bd309a12233a5f8e54eaf484d14819d435f9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bcf9938bd1473711d62405c8d0a91e14
SHA1dd75829d2dd7fecc38a104389b8314c9cdf23c77
SHA25655e28f7d325b6e53f8a441c32b4bea790f958cb49ff178af9a98ca8f12758017
SHA512f79ee71b2e87b8c19ceaeb7eb0efc775efe535e415e96881ecd20f6e1cb848fe84cc462ff60f99be34408c53bca1d789320cd4d7e7198df1e9bf54db4a56453e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e505786006a99bc0a0a3e3a929390c24
SHA1f8152e3daf7ff841972c7990a758ab2da7b8ae91
SHA256997e35cf3c40dfe942cf91e3e88f49d1b3c798941fdec6813f3100ee3c202feb
SHA512d9dbf927e8f941fdff8dfca46d7aed1d3237193af128d4b3bf2699df80e264d272d0f263cac4ce04adeef3898fc1d57c97a13e041f5d30edf2983e08f9805d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1b346a7c811c026c2a1a88708b91b77
SHA1c9f4ebaece5d99dde5c636e73c866af40ffe2018
SHA25697d137c6f6e371f099caf7d8ff2e75e3e7bda998a4462742f5565d7fbb594535
SHA51205394be4027fefe2b498f554dccc5539c9dc354871a3ca36296a28732cfde17ad02312b54cfcdafb0e5419d161984e0c58deae02856a133b973890575e53ea5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594f4819e35431f71d09f1a9cdd1a149c
SHA101fa9ad2ab044d3de3178840a4814f2aca70da9a
SHA256445d7912e20b37c8691cae16962652e7235683eb80db1b1fb9d54918e91dfde9
SHA512b21bec6ab53b5b9a2b81287d7902f4cb3f7fb3675b368561505e65aadbad9b661bbfae6d32ccda4ffa3ddd107784e43d7a4e7361bd2e80fdf5a3f1d68222f378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566fcc4444a7ef28f95bbfbc9ea3b88e9
SHA1a1a534c8bdefce06a13854a5494fa2658f0dfdc2
SHA256b4e679814b118174504e7928c5af1f1ff33c1ec7eed7827946f1746b19bf8c51
SHA512282ba386037b1e3a0176df4b5fdd71bc3e40c5ebf34f08c6e42e54c2688c089d5c78abdd6eb3f9e599b251382392561146f49c4a3d321c9e3d451854f17d016e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a78093a1c05c38a9cb169ac87afff7ed
SHA15a0767d8b6291f3d54c8558f656b3d03fcd47a1e
SHA256727576b178a8ed1d6fc4f59f18574c9bc4ef67e761c038980cd9c164b41d004e
SHA512ec979862f6f80c64ce265710cc339b27a150fc78500578d607ef84119473f53c8d44464e148e2aecced9227b7fccdb3a45cbd58229589af248337bef61bf6067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521d7f1c1bcfa27a2fc1fa776484058c0
SHA159131193460d163760f8dd4813849379b26575be
SHA256dfc537495f9b7aa915cbba28b35d48def65e06071850cb7804e2ff6ed81402d8
SHA512654b9e8c40fec346818664956d4b6b55557668c8572d535c60d3642d273a95210692ff4d3ed9cfe755739e3399d42d032ff41f700d6ad9f994031df03f650e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52fc1910f4ac1ec43b8381c9fca9100f4
SHA12fcd2c59af6e2d44f364690c879a49cb07b8b8cf
SHA2561ab26b3338c7f29925b3708e6d9d2fd0c5c8f4142709dd776d34d95f992c7851
SHA512e979d23368b5f289e6730b05116ae1215d0ab2b6b1621b29dda9e9920b5e17948e740058bb2045ee97c1e2bf39d3def40cf522a2f1d0bdfca4531a245205286a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c9c9b19d8c198e1cb73447a258d397c
SHA1ab91352445618882f183bb45c0d54023edb97a8c
SHA25605ff9cf5f84ee8aff64175fe2917b3505a1530d6b3afb66cf433df3c89446cc5
SHA5124f1dee55df44df597ad24411f36d618c68a46c3e02d3fd12a1a8150307d72504192c1e6aa592beb1000a2ef19f9018f2bff798fc085625bdf1e12fd04d09c6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593d3095f5f1028d6c5a59920f473d219
SHA14b938996564cc80e023a39b4fc491b7f2ad3ad0f
SHA256f7aea0000bf0e18d56dc20bc6a5f1b05b8102f449d4266a98ab5f8fce283cbbf
SHA512646aedb36ef624ee771cec6541e60bbdbc0b431644d0fc46ddf94dc86b96aed076b844e22380282f79e4e4d4a6bae1155a02f8684681a4cb7bc5a7c573df99fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ef9c92df997970482ebd72270e5c4e1
SHA19caf8fa93fa3d96b7608ff70288b821d4cb3e01a
SHA25660d2738095cb144afcf6028ea0418c371120c5e1f8de4b2bfeeed5f4e18597de
SHA51289e0bc49eecd3184f36a61af26174378f0c70a13a814f64a486f5dda489b8f4a69bf2d65b487d903af0a4242c0ec9a605398f01569e9315db02f7d8dad01f0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53db0dbef419a5cff61b56e48d361bc92
SHA198a6f6a3a9885d6699d3db88f752efd8858e058a
SHA256e976f8ef847d23f1cab3f6aff84a63df6df587073ffba0dcc3ae6e3097eeacc0
SHA5122d7a6a2f659141b8a3651a2d5a9eba06ad496d5f1f3a78cd9a6b1d07d00d1142f770ecc4cae6f4b2581b6c9129cd2caa874bc226aa128fc8362a6a97f2e4cdc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526438aa3461cd3ceb626a574750717ed
SHA13570f9a482c63ea90c67814c099442ea874928fd
SHA2569a207b1a74dde005b578daca38ae1a07e4b70cacb53d216de587f9a4104c79c0
SHA5122632a7a6361ef74706c16d180a4f1fce500ed6db724314b7daa1f86560b1a796426133195c66c67268b0d199ae1b9c8a8b3fc87766f1c6d0618bc22de3f1527f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fcce4864728690053af0f377668c0b3
SHA127c7e773a4aea61efecbae8ed59700780d2eae4b
SHA256b7e76b5b2fd2098c09c3c4bbcc1f9f04dda7357ded1f26ed0c5244eba77a3abb
SHA512d5401d8798eb08672bf9b6ef9315b2060e5cdeed973a66ffa244fa5ee93dfc566aaff608378b85d6ab9ca47cb15fabe37005097f17613875ec34558b3330aeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee93ea915250972b4fa3a7bddf1c9a01
SHA104b9bcb291aca92d3571995a25f04554cca46c1f
SHA2560454af891cb1662a98d62eda8dc0b35440cd8000a8d5c0309a6aae60b894e2d6
SHA51229028569d0ff336e001f837bf3e25ed53e54c85c4b9ad16b3a2b060dfaa3768b3e5e8b540e3e7308e30a5a2427237f44549a2e7f87fd9c64ea7c00496743d461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD571c5ffef7065512e770a7c19863b6fc8
SHA14857d032f37d3f288a52afa4fa2f0f8bd5bfd5aa
SHA25600676889581fbc665b03ed18745aa15613bf88fe23cc37eb9daa5c69dbb29528
SHA51222b16cdb3b9f03f8eec770581111e6ac88274ae70e2b5ed166ae26f9af6011ab8c98a83b3de569d3b0a12b0ff66bc4ff57356522cb738127036203fbe745dd4a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a