Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
1ecf73b64a3f1705394855112951a112_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1ecf73b64a3f1705394855112951a112_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1ecf73b64a3f1705394855112951a112_JaffaCakes118.html
-
Size
2KB
-
MD5
1ecf73b64a3f1705394855112951a112
-
SHA1
69ee38acc4e01a17c3288cd1cecf661e2dd06ff2
-
SHA256
7261c702eda0d6210b730303eb5ccbd3ab9b69e50fc5c18af2e63530521136df
-
SHA512
68f18d93735d59ee5d4a78e58859d696b37bbbcac44876e98400ac80af4e5de5a65d09717b72f4be17a3e3b1f21eeb3d22d126f5450c484a5475d425cf741615
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421202910" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C840281-0C07-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1032360114a0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000cf10e10e69dc58b923666ce45adaa6b3a5ecd1bacaa59de7bdccba38ac135ef3000000000e8000000002000020000000dd09e05d1ae4adac72402bad5505d72aae828245e47ddad80e304f1717cb6d4a200000000b9b8a73a838f60a81930ec5d6bdee12cd7999b32b0dbbd722b3f6bfa1c3155940000000179e0d8c67b369c4c4ae3457bd9ca44cd480958e7dd86cfd8193654c4a3cb9b7414c528a988a92ae2b7321f1ebb9668c0213de02515fb6949cf8f7222592582e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2648 2388 iexplore.exe 28 PID 2388 wrote to memory of 2648 2388 iexplore.exe 28 PID 2388 wrote to memory of 2648 2388 iexplore.exe 28 PID 2388 wrote to memory of 2648 2388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ecf73b64a3f1705394855112951a112_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b613f9fc62911cf54066c81ce577202
SHA13a4103c7c06060ca42ea491d5317732f8821e09a
SHA2567e2171be45acc1eb1cd8df771d36299cb102e1c6e3f8ea19dbf51b72a86edad4
SHA5126e0c5c2fda4a0b7d9e28ed257677a09629bacca5a5195cd832369a9d04c494298fb7ac749e474cc31448e2a989043c33d0b7c8ca4cf0f896a5af509862e83f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d9dca5e83b4156fafee1345d6eca46
SHA1ac8edcbecbe1a3a75b41072189bd4c02fe4cd11a
SHA25675df7a1a26ec410b8933949be6f733aedb8b01b716bf7dce2f2e0ecf579773bc
SHA512abdbfd9af2906d2252cee5c509009c8308b2f8e50800391b663e6f0535f25c15696088da54b90f6c712d96f19d507e137a301eda73a42c956d5e30e3b6cb0333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958cf0446d1b2016a8e1e5f133589c12
SHA1b99d965235d1edfddea74fd85e17dfd09970a91f
SHA256fc31ec4c6d5346d2f9fbb3eb54318bcb985cddf5fc2b528c19427fd8b245577e
SHA51276d9d4fadbd23c69c41ddc6e12930fde80169159714479d09a4288fd9e5bbdd3aad0a0d6fc72ae1f5c02faceca29bd1822c667f6811cbcf6499c8b23288fd1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c4e367a1379dbbbba61278f6fc532d5
SHA181af5b0fe7979dd014a9b1a6d5d84823534ec6b4
SHA25679f8ac63c8d1e01e6c811de60578753f946a01cd8840a5ae26273dea98b0a239
SHA512a60421e2f79bba52ad54df777bc937ecfda94be686618b078331e3088af5e8029e77b913dcdbbadbf58a113ce3c1c929e17e68a098eac5073204edf06a93a6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36c02e0bf81397d4b6ba23b6398bcf0
SHA10ce26ced4025535fa644cf10336178b0ce928769
SHA256e4ede9e94aa5574bc4595a2c3d0cf0776c6e103388ef01666644d45bf980fdf7
SHA51279deeff096c8f7be80490876d65f4aa5f116ad2c6c7087e2e58a263b92d8a6f155e5fdeb87200c3e231dbff7eb30f6728564556690bcb1252ef9a39605f5d3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb93b9d223c905cd347e8aa4afa934c
SHA1c740eba092d03574907d1e72ef228b6a40cc6504
SHA25682a7d9b67d0e502d870a58460dabda96651f884e3a503f8dc732c491207ca41f
SHA512ca8f45fd35040dca5f256532f420c0417ff9731fc9d6a8cff02aa113870798f4e283c726362fd9362e239dd73c091ac0d0499c488b96b6340be606ec762f6623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd08f31d61157438bacbb4ee1477d3ce
SHA1e0a02d936eb8d6b93acc63185d96ba30d9917e59
SHA2567f48f5d5cfa86f735bb3103b521039f20e4a30e72d490399d415b877837ef69b
SHA512191072da7da591c8d894f0bfb09b736a7bbd1c6c264a36f7c2d50922d28248785a361dd63561087bef19ec4e7e17e7df14fbe1dca6eb09a1ebdd3f8689f1da5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2181a9a94ee72346659cce3453ce03f
SHA195ef0ef94aee74960d8626d0e14dafe21b37dfb4
SHA256dfa16bff45ad03f5269bad0e7306416cde20eaec25664a56c0439f4c3379c5ba
SHA51259f60579d90b38a8318aa44341d40a80a807c6e6dc573b62ced7ceeb64ac708bef2648f64692db325571279b18169b25a42a7bdd41b61d25e22f0fff8ea19ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd4756c7f69cda9e42f1cda8e81fc1f
SHA1e6deec1f84aa6c60fcb0a53965e1547a5f1e9b1a
SHA2560b4f2de7d24126ff0f7020e4648e8a645b19f3733ef0407fbbce3fdd1157e5fb
SHA512190efceb1646b50fce55038b6e277616289cbfc8313df70d051d1d37f77d2634928d10b8601da4d99a2a363fe6a7c81f8a42ccb78790838b5acc21ee22aa7b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef42ed196ea31619e231ed3f69e2c64
SHA1807136028fa2e6418443e4fb80575374d8496edd
SHA256541f643cecfaae91a847bd0cfa36c8cb635a3f9b7d74f580635d5439642ce259
SHA512dc8f0376cafc895029e7e5d8cac40af1613db640717a90e25580815812b9b3ebf70438d29b2a05120a5acd7b9ce23eb418e86d7ba1b04bbd72bc3651f9e34b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597989bf54747123f820e6150cb3b0986
SHA1c52f883f1e8bda74903ee4a34c036b2e182108cf
SHA25638a9e2fdd324a49a8d8907ddbe93cffed874d7a21d0360cc7b135acbd48da007
SHA51212a7317c3948cb98ce4c0daac7fc2beb8208cad58b2a090c8717fff9845d1eb9949a5a8b9265fcc36be9541d68624201960d6760499108b533b3867ad92311e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae6196de3ecb79fd7428d312d189cad5
SHA1b338ad4d43c7806b9d0651b977a1beaa7b62ff09
SHA256b99ea06141d9b1de6fe45ea6bdb0d5d684899800e4b0a2ef7e661d5c9a25ad10
SHA5121723d01a4c35b59054632ed408868151c985f6fb668642a5916eb2f5ef9879f73f23f94328effaf2744bb0188dd7c348c9edd55838c2028fe36ac24394c1e448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d960f27726f4e09794ee533ffb8d1c76
SHA1eefb28eb56b26d63699fdc0408135460f4fefd1e
SHA256e1bb9a5bdbe0a69353e12cc6628f06d1057076682a38adc349d8d7b95fc93c96
SHA5127df49549f440c86d4ed77e0175a19faae690ae421901c2e8a9ed70f624f6e0be99f43a049aff3bddf678a932aa785bf3b24fe66dd5ba67b7aa3b07c30ae07610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af3d5bea644729c930f87b936ac1745
SHA194e2fb78381f50c089721f4c81518044033aec1c
SHA256a849f9af61a9eb992daf01f58c5ed35b99524dae4707cad65073ccab54349799
SHA512927318ffe88ffcf2fe43faa6d10896ed5f69a605ae83dcbfe87920952ad1ad794ef6c36ec8b0387dcdb344d4c44d186bc09c735a224ef17655ea98a55b5ec9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb8ce966ec29b09c3263832ad0842e43
SHA1dc24286f6a3c39b2efc02b50f3f7571bbc13022e
SHA256a3a8ee11cf3ef777b7a410f5137756258c6bd09f3df2c57a5615bb72502a0d87
SHA51256ea9206fcf6b913f9e3fe3f454c6d15062b6e276ed5ea288884f0ceff2b98461f4fd0fd8e6fbad75a044a74ecd9ff733108ef0064e7c1d5ac5f82bf98a92859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f244cbb7a66070a7677b71316c4ecd71
SHA16487817dc84bb50a78adc93776286c3349858c90
SHA256a580d29df6a984da3acdf9233a374bb52040b578f2b82354cdd638df6eec025d
SHA512291aa2f2502e7eb724bb163ecf7ef6cac74b4d32372b6d7cfaab8d93d65b7ea21263a80541b41284c6527a1781b98c77aedd9b4750ff445ebf587b90aaa4cb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac659618b0cdf3e7e8cd26df9a18af6
SHA12ff144843d0a6225c6462e43925c6f171ec84dea
SHA256205074334a24ce83f53452d43304afd8588e42e1ef0d3415fbdf867132bbd045
SHA5124a14c8db420e0af75ab11bee3b3bc9752ae8d2ce7052ad416fc59621239d3464a1a4dbd33be178178c62ec8f456bf2c462b0d498e4c99e98ce587c36485e9390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce63a66df0084f82c0f37030b188807
SHA148032d36b730546d9955899434cfbff4ec2b39f7
SHA256fb41ea16ea4e48bafb44dfd273f5219dff254dc4156f9ffaeb881eb792da0f04
SHA512121b14b9fa751b2663db063a6413ef1ea4f90f8376f8a3c5ed58f885edc1cbe1929a173aff6134e4b547503c922fec45f59ee597abe903883b52d81c839492b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c35debf806f7e03ca0edc640b17662e
SHA1d432f5d9bf044ae001236651a4a4c304e515421c
SHA256c4e5da324694273045ce0b47974144871ac90e3b1440bbc688038d1a7086c2da
SHA512ae642eaced170cd146a70d8b53f972446a6e9c90bc774ed2e572be9e1cd4c43b06ae788d30f9e80fdf391b47339d9f3d571ee990e58f7d3265ab51f4aa155db0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a