Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
162baf0194414cc5d438ba2bfa7fa0b0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
162baf0194414cc5d438ba2bfa7fa0b0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
162baf0194414cc5d438ba2bfa7fa0b0_JaffaCakes118.html
-
Size
25KB
-
MD5
162baf0194414cc5d438ba2bfa7fa0b0
-
SHA1
9aaa897cc90d2538514f0e4ec19e3de0ed15b661
-
SHA256
075e74a53294e095f62d834605ac50936cd511c52a72d3ca5af3adb53c3dde3c
-
SHA512
55f3f30f7b29a3ff7899448cc9c25fce554212c0966743f22ac307dfbb1a31ea28c5efdfbfa556339e852d1d9ac423a53036b0b104cfc958aafc8d6ca3ca48e2
-
SSDEEP
192:N2Go28Hb5n4knQjLntQ/3nQiePn8nQOkrntxqnQTbnmnQKXCWA3pdEbwuXMpnFnd:8GonCPQ/S2rUF7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000036b3735e15ec373f4c26396c0c122fb51a257ba95a4c60531e4f1d7c558caea2000000000e8000000002000020000000268d8b942919ce6ecf8b7d1e719d325cffb10114abbd1a4304e88f9b8e89566720000000dcc1fb2d3bab45e5fc6f4097df89b3eefe39fc232edc25f4fe599c743c132e50400000009c4a70fff8547153ffd2038a7220bbcd6b2f72daa7eca137f581326a085adc8ccecee94a82826ec97c5257877dbb177fe3e6ee480b017df8a2eec5da83a8319f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421048578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D81102B1-0A9F-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b2b8acac9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2124 1924 iexplore.exe 28 PID 1924 wrote to memory of 2124 1924 iexplore.exe 28 PID 1924 wrote to memory of 2124 1924 iexplore.exe 28 PID 1924 wrote to memory of 2124 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\162baf0194414cc5d438ba2bfa7fa0b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b864fe9d4b9140fbde3af74ee7affe23
SHA10ada6d43feca56b1a33c020584e88e22f421cf19
SHA256145f4f6e34b998cf2e11e918f43537201e803f228756bd9ea6d2de784f258a78
SHA512f0e4127fe0efa2c65a252eab291e87f421e13a1b0913eb5a1a74e9619cc22c904e999212dae29bb38c7267772515f3f3c4dd7251e74d3ded56828ffae19b4d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c7f261eb5720b94abcbcb4b38ce7a3
SHA14f43a5d4193da43b0033471bd9c58cc0b1cf1336
SHA2564f6cfafec9cf5c53d5d61fa8cd2116a4af05208c8320bc10e2fec54eb6db6051
SHA5123c2776e375eb6e7ccd30951b7086987698c5f8c2323a6d6d8bcec758e88ce976f51e48ca974d0414495d12e9d12c10c5a14dbc481b5b7d9bb5eeced47231eb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ab6a69d6a26732a77758d1aa3c41200
SHA1ed5c9d38dccaa2966d66eb1fd4c0dc9736bb79ea
SHA256153c0018d6a396642df57c8c5eafe9892fe807dbf81ad401025c53b2bfb1e7a2
SHA51252fe0962dd8684d960193db704d38a39b77b085aad09a09487c789dc0fd86ed9882c39ca6514c1b7b4cd02fbf2f8090d993b126373039f905e2e9e568d5ed1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0bbad2ec7b7d1c048e920143b658227
SHA1a7176b5b4a6b7300219e46ca9206be7f5995ebda
SHA2561bc6c6a3c9b40d083a928fd2f17c30d483f3b4356a200238e787db92e4ee185f
SHA5121ad68d60f191facc3f004e0f57618523aea2e4d65c011c76c62f98a5c12bbe63b516003aba5c7879b8c2b798db23917b2e0f71c9c21ec5e1ac9be230d22522a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec5021e99a907e2d1e9fd999664c207
SHA180fe9a4e1169509941a6056ccf7b136396a63316
SHA2560cd90086356341c487518dd5edd6bcca18d78fed1feda53b427a8ae20cb987b6
SHA51269c8736d81a37c8619b66f3eb4cad9efdf37c8105a3edb99928b1bf743cfe408acc923ba423e9b47bf10beb9403a0733bbf76cbdb241710a2766ef80527cf6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc34b194b9284fd9c602675f8df747c1
SHA1b8f1fc2e9ed51202d77fb086ef322d8c5e1ecbfb
SHA2568d6957e28ccd45e42a120a9ba434bc3ccc9847c1fc5ab7dee7df3ed23440f88e
SHA51276cafe0c02bb3bdcfb59d69a72cd95779b763fec3d1495c05e7bc91a35eeecb9f9fed503a3eb58056775918ff18b75791c2eaf35f0f3490d6b422a0a393edca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81b74c24db6fe068154ea957c49a535
SHA10eb598a25454ffc978b1a8224b66f015df68dc3f
SHA256d49e2c412561d89b1662289c70f2c132ce8cb801b170df1f8b77d558ef43e2bf
SHA512d742e05d26b0f9ce8301bf2f89fced66d3933fb2a3973b0825d2fe7b5afa785203b00ae3d476eed34a7f043c96ee29b356c569e98837b2a61e6eedb10269bfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b573970f6402daef763f394593eb2873
SHA1ffb73f2c96cb46d4f8172667d3991e184afa601e
SHA256dde1a008a0023f6d435195830a833958c716f04fd725340011d79f9b9cde2fd0
SHA51244660671a1db26277893ba892765fe1d40fe27ad25c85781c9578821da41ef869cf77976b77e77b2bedac0226015d98d569db9499cb920d29e701a2196f82cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006f3f2a3d1b5ae5e0b25a0b4f4dc052
SHA1db070690a12106f4a52c13232d7e4e3e003a3864
SHA256f3921f034249b46ff67858087dd8ca9eddc4a7f64c63a635017ab52179dd42b7
SHA512c14257896cebf37a1148cd11eb39835f02e116ea2184217a83374d896082f0bdcd385f263194327cf557455a952777c85d0fd3861dbc66d96717b8af5b961dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d8f1a3d3820aa16759cc350e06ec77
SHA1edb6697804689a2e232ae92b84b7585c48748358
SHA25656345ad2f23ad2c84369058053610990bd0e59872a247e42bff095a28cb79ec1
SHA512fbf281104e4f1330c8b9112e99714362789c5833faf867ca79ddfc7fc415258afe518b24de07cf069777beae8a90b8e44a464492636d3e16b6e6f7b9c364299c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55688585337a046db86b164886041ec94
SHA1f4df1aeb476bf66b7d070e6531a5194b5d5774ac
SHA256deabc0ec2549e8238c4256f3ae1d6f6234bd4dbf355f9dff4e1d09051811e2e0
SHA51227076d628ad0d299fd970ab2231a4b6e791f0f3db1c217ee4b52cd1a14f0fbad5c294e7f103fd5040fa74d9e2fd284a8f58c9cc45558bbff0d38d6606207d9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52816872d0c10e85989cb5aae23b65bb4
SHA144989e44d3bb177cafc336c3cb6bf3588d9216d1
SHA256896a225aff724f82aaf67b16b94d7a88a48938dae634145e661cc20edf83d4cd
SHA51220455d9adf428c281b6097f19264db44d53eeacb34eb77b4e860f35fce99878529a53323cace0c22a3f5fb89393e98b0671a2c89e9b2d55e99369cab2b5c7cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521376e1e2966a7f5c2d5c945eab99d03
SHA158cbbd34ab39bacb661190a32a8f85eec0693540
SHA2567ff22d2be6e3b2ce3cae6471dca6c16f6ae0a53993012b41f843bb36c07406f9
SHA5126f3ac6479da36a31f52eb48dad3b6064afeb42da06b2f69f5a5f6bd11d166dd906f783fe152ee3c394721a38fea581ffa96e755bf2e509ea53c8bd4de884e262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c388a884d4ded4d8c05cdb309de52bca
SHA1e61b566cc6845ae30eb38fd7b83938fb42a87144
SHA25608898169e03c9448933363c13e16ad164f3b670e2c0d73d66ed5176511af74e4
SHA5126bbdd53ae0643d5ce3e52bd62ad3f19ba941c92ec3a925a4f92ba352b6248c540b01804881e3b3193773c046d98d758600911e879cc4d31ba134ce81e04f12d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629aa901814e3d5aa88d391528bd6143
SHA18c3f289aabb941284d163526713c9dfa0ec86578
SHA256d20199797433b28056a445357bed383770a934446081a7bffa9ee1a549f515b9
SHA512336f29a694cedc69d430c6c8cb5eb96584a78ab1865be39cb4baabd7933bebf9d8abd57cf0d3b26f9980c0c96ef4ac929b3724f766fc3cf19349f5b19423cf4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff3d6680c01c5e573e6805fa229b3dc0
SHA110060136500d61e0787ad7cc988206edfbf69550
SHA256be5b4b187028a752e5628c670dc6fc28fe10775199731dc593bdb9b036a48a3b
SHA5121d5b039175227c4f5ee90f24a5d8288a026d3eb0520764cdd6235404e62fb5872b5983388e1c9dd0487114b3fdfcb842b2a3e5eed49844c09e6dbcf5447d6f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd11feeefcc5dc586e7b35b13f5fe176
SHA1adc91ed2305860f24ac0167d0637a4d0e0de269e
SHA256540404e3b9e5082a23288277efc6c11f5d840c10f0a6360c78a698d6f3aec5a5
SHA5121a28e24540cc5346410cae221b0cbb7f2b1dbb283ef31f378bccc800069c251ff71e378384582d55734fa3644050d6fb50a5708c63b9a39d2b2a1575ad36bd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b547e1f7e03c84e2d60a9a15a2cc8ea
SHA1bf107176d582bb11e192c72021f68569e43a532c
SHA25606777d98bb99202d89439a5553b4e1dd78799fd60796d3c6b31147ab0e63b85a
SHA51267b75065f7251163ad98d357057e0cfb6c52fc23f00593e37a2dd4793ab172471931f74faaaecca82e4909ce141fa1e70d669bd6fdc966b860d1944409d05cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a336133f42bdc5de3e3637ae9e459837
SHA14befcee6ae7f9e9472907178ac7a57176231f9e5
SHA2561d8687d4c6b8f03bbf8d405d7cc13c9cd42386f5d7ba1ddf51cabd306aa99b05
SHA512ff6e66b8b1afdff17b0e3d45e15dfdb64b91722709d90fddeec4f3362391006ff421ea843103325c6298f71e72ba17786e5cd43926584afe817e3c5f22033777
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a