Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
1819c570bca7222c873f9756c668afa5_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1819c570bca7222c873f9756c668afa5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1819c570bca7222c873f9756c668afa5_JaffaCakes118.html
-
Size
461KB
-
MD5
1819c570bca7222c873f9756c668afa5
-
SHA1
8a34ae8d184a933ecb0cd0fd6e84460f44ff7205
-
SHA256
f464c5233fc6e769db484124a00c9e9ce3fc0ea886d4cbeb939c09617f2cc081
-
SHA512
a02c2eee288b4afb23f13bbdbb1cf0b43afeaadc3b045c7bbcacde4d2d57eb46ec97bbb089a8ed0b584da960cb32f7b33c12151fe896ce9677e20d33aa72e324
-
SSDEEP
6144:SRsMYod+X3oI+YhsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3X5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5A74F81-0AEB-11EF-B20D-42D1C15895C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421081162" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0df2d8ef89eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a6be25c9be0204ddb5d7c7185c4eb86cc73e56fda8929be07f037401695c1f29000000000e8000000002000020000000e083fab10f0d9a3945c8486fbc0050c7b86f9f3a10e1ea8b65f01a2cca0cfaff200000005f241dc96a0a61436a447e048e8bd3f4b048884d7ecd8346a46b28660219f27840000000fa2da94e00e602aad75fd32ad43494c19829a24fa74da67cac2704655eabb4848bd0e57b2c35a0c5d146d5e232630257f26d1db6fd0d07359884dd8bfdb4562c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28 PID 2220 wrote to memory of 2216 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1819c570bca7222c873f9756c668afa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbd8b555f5451d04015c615bccbd806
SHA18798dac2ea20ec095907057970ea440986894759
SHA2567453d6f3f6e49d3ebb4b4bdd95b2c560f4f61f60c304b44a2a401087bf65fa43
SHA5126179a38564b4e33a31b11e2117c451b45b3d8b3ca32a6115acd0f0066f07dd8f7f758b9fa4858c0e7318f48f64e2795226fc8ccf0535a238b468f4245a80b906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ffd62c42742ce076cd01a2212aeca6
SHA1bd2eadc92a89364099795a94c1a812f79db5dbf2
SHA25640bd68e265e7fb9524364b91902475fb7fa066f8a53b52dc499acd5ae7cba6d6
SHA5126a7e77d516d04b7afa0ccf5946b4a5256469c9ec8c61fea1a350abb75643462e21b52b05d1fac87c5b2b34e2db760865e90e7c370007d6c05325d6b6e961f525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffebf06a3f84a86c17c728cef432f33
SHA1431abbb179b891c20e53a75ea37b78878c3a3379
SHA2560605e3561613e16aa74aff228f373d3a5651f629ee90db6519bfacbf19247cc3
SHA5122bdef63a6ccaf434333e90364e3e3888486548f60fb500703cff31a51e1873f423c1817c3c4e6faf409d09ba0f4e4c7f02f661c059e92cecab8d2ce4b74a4827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf30a99d8efe3c74426415f2c48ae978
SHA101be04fa8c7314cec3b8e1c114bf872cdbb19696
SHA256c7cf8b8b6cfebc3d2a6bf7403a998dacdaefdf26ac8a2b1bd24a7a9f1e859d3a
SHA5120addcfd098b9fba06a83ba2f0217e8af1312b08a5a8aa522b72eeff46fcfd75f0422ba9d8e3e114bb9704349c1d85f139b4591c4cbf66d99c09a35bc17fd0237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4cb19fb203ad08d501e7f00dc8458b
SHA145e406bd033094e3171fc542b292fd39fc354c3d
SHA256d2b348f9bc7a65c8ee4a2df3421a38e7eb58e29787c89478f13a2526c3c5a62e
SHA512dcb23e75f840b85b0d72ef37ff4baefa8ceb7f16dd61873f459fe89bf2b5a58fd821e2598d3aa251bc0829c1ebdeae50b0906dc5234ab0c6be8884cbe6e56a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d80752ef59e74ad8d17c3a4d53fe9b1c
SHA1ce3238b04af0d577b0b9b14a7a82778ead7b9b1a
SHA2564fa3955edf5e820916883178eae3cf615f6ba0c13060c15fd9a9450a86db642b
SHA512f47e13b13658d02e2c7d65544ffb5784cdcf2c59399a4fa89338e492ec95b473c63c1d7cf51c5d85f9e6b349b7d04357414137633a17dd68cb9b98e9c30e0b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb2e1aab27582b9df17f9b0cda3a9392
SHA1c872b93ec4f37609007917fa670f3f4648712563
SHA2563be438810bf7edac04268dc31cf3d58757a9007c6d3647ddfaf5d6491db835e2
SHA5120f9edaef9c037dbde83966d3383c3278e4d69f10036a3aa56e023ecc7d7175622b2329f225b30f14ad159719489bcf53b93ccdb6b5358b4caa3dd0caa309c7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a2623ed80dfce64291c5ad9573086f
SHA112167be066bb91447485e986e8f1226a89b69753
SHA25643703b12a7d62bd504b92bc3a3f763026b70edc15cef220a1efb5ddf02d13544
SHA512fe29fe18e07d68cb326313c9f299219b178760cb263f71b2f722886b46b78f5f07033d33fd7f28be8656d3eb73e1a7c576e23f3b851b323941101e3cb3282568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b3365957638caf7d052bfd1dea5501
SHA15fb50f14441a828079517cbf6877de4da1dc3a77
SHA25693df0c544ed6ab38ecd22f75a4e78b3d82edde871faba2aecf0f23e7daf9a0c6
SHA51276af7ce2116667beddcd8c58c6046e85f5ae06476dd1abd443792411448bda9913cd41a330e4482470d64a79ab45c8dc40cab71be9dc8f4ce2243e1dccb0f12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44f9a711dd648e638f908fcc2d480c7
SHA135b09e43d71ed38e142dcc31263c7bf52f126a47
SHA2561bd0fffe5b0a4dac06e2d837b0c242b8fefbd0e0fdafdad03676d4545d8d3225
SHA51240ac0b91c703652d1aaec3abfbd2ef0fd4fc757781f2f5a5c626191925b8046197a293ed396dafc048c16adf41ec51f6d44dc1360020e6485f97026fbefaca84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbcb12ac7f8bab8b41902bf79d938de
SHA1cbe7db4f290c30cba801886ae6ea2bc33cc28384
SHA256e353115c9ba8b82c934a811f738e55f12cca82a8122e044b2799a7c95266f665
SHA512e08bc8310bedc2291ef0c5c00c94a83f01bd83d8ef6e29222c0e6afe8d932b090f07b64fc76d35e7ebb411357a676cce44353fe56dc5ff30f105fc3adc305efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceca32826bd8c318efff8017fbef1a3d
SHA152d0a0558c1927369cd7d899adc7b1e4ca352ccf
SHA256977a867171904a944fb0947a07f4e0eb4a363d642113779aa6773489a916c03f
SHA512a9365ac002de104a622ea4d427d9718867c229dc52b224572eefd46e8b264d456a664357fd26caa1a99fc096f212e060947f817cba87d61f64f1671e4842bcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5310712f158ef2844611a94698db25ac9
SHA150d9ead77cad7ec44b9b918dee6ae97e2c11ffdc
SHA2569191315d62727265652657ecdc048cab46fd20b651b82cc1a31684c4ee9d6e61
SHA512b48a81cc01d67d969b4d1f2d0664cbc2174708a25d91aa9087ce019a77634a981c771d9731c5de7c1181df8ab424e356524c93ecea4509ecea885876772b3474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a2c81f69bbe23266fda6a03a923adc
SHA118d5a4e988c5ad7d0f3d919cc81cbc07933223e7
SHA256f8782adc105a3158d019045b1b45eeadbdb3374cc61e374f5acf651af8d4d6dd
SHA5126c78ec17a38e39b1a2411d55bf56762b9307f0d66acd4f414def9e18264013f51f9286bbcb5d625bd24e3576c0a6268725a3bdc4063522c42527d26be982af4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bca226131c267670b0211e0652dfe5d
SHA175e70b9cf23af30074dc45aca1335a09490f274f
SHA256b2b921294e2159a4347ede979f5ae883e3a7e43b933d7a60f917d140fcc88cc4
SHA512aa6018ef372561a1a841270f0d16726f682ede7c56d9f906e5bbb6aa4e24bfe2428d7511ca1c7787488c710a7dfd1e961ef2a88898e9ef69eb53c4b2b320cc8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5082b21a4d17761a6dd70eb93208224c7
SHA1fba2839c0b6f1cbec9ce353569f804d8cd50d21d
SHA256dfcb3a8d6448fe13c370cf8eba2dec6240bc862a3959180942c60593f105e81e
SHA512db2c5702e623e325f315b1bbe0ccd77868f6a6afb2b3b87b07d5e791b037da1d07b2fd38a0afd89a1230fad2581668f36729711cf663269bfb7431874f8b7adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5372de5d9f2b9ca6172e38eb4247a1344
SHA1ab2bb09cea634ae5a93c4c9086450c20d28ca937
SHA2560c431067da01ac1e4f424ffd1e8f431fbdee258e8876e5ef246d54e492c914bd
SHA51266a5f03394d7ba8a648709477839cba5eb50253718c967d8ae22cbf3c0d87bff950de6b5e3c4c4b00e7f7bd2ff471d3e7efc08004367e1f7d7653a20518deadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588781448a8256aa540cb037cba0cd4a7
SHA12d5f49468bb273391b14d51f268e8681718e38aa
SHA256b86f18831cb4342a5b66f269462e3b953d894c26903a47c6e815392bb5d0e29b
SHA512c229f42ec5f7424247bc557e646904b94b2c86116d6bde844dcc9dd63e2a585e7018fc507647707224cc40402b9223d02f7ae6cd6baaed47f37a5a5aff038837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea9d88573f8914984bae9f319c14cad
SHA1ad9edee9a20c30fd0a2e19f95f9f1f2e805eda41
SHA256e989c89423f75260248406327587d8d2ac2f4b225feac68a07c14ba33e4d4b01
SHA512a849e42e04eee7bdad70ac58a22193d36263d162c1d6ba19a7c69266ff8f65dba8b513aa55c3cfd2b8818cd1dd811473757418ab3aac45c3c2e142cd2af47626
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a