Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html
-
Size
460KB
-
MD5
202e56864a0ad1f6b020023fd8fb0812
-
SHA1
2796645a9dcada41b76f8caa94112d3dccea17ba
-
SHA256
c09ae9a86319b3e3ef58a4650749f225f27e260de3c5c451045d3f402beec9f7
-
SHA512
9249ec1e41fcfdb377819c8502f4b4c1667766e84d0a59a160bddfe6ac66909784d952e49c18482faa1f3a91e54226a0473cb71270f95ad8d98e8d4c212dca9b
-
SSDEEP
6144:SCsMYod+X3oI+YisMYod+X3oI+Y8sMYod+X3oI+YLsMYod+X3oI+YQ:75d+X365d+X385d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000009ae3ce52921a9ff5574730b4e82e00997247172c3f6062ea437ff5e18cf18610000000000e8000000002000020000000383a1a3a3dfb9ecaf243d4a006348711a3ae4a1695b9955ae65d53c91585de17200000000d45f066a71102b125f00911171b5ee151fe296c118a5a1771a8520b004d20154000000083741c3bb9edfdaaf310a3b67f88f52112848224882e6fc2d4c67131b610a9c66275ccc15a9e940e0cb337a78571e7aa9b9a65f638818ac50d48462404501fc0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421235963" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{223CAA51-0C54-11EF-9034-729E5AF85804} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70edbafa60a0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28 PID 2420 wrote to memory of 3060 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\202e56864a0ad1f6b020023fd8fb0812_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415707f9a9a48b54cc9108d01cfdd395
SHA18d30a96b8bbdc4f2f3546329841fd3da61c5b4a6
SHA2566260982d19c7592fc3be7aa462a95524d1b7c128094a577f0d78f3b898282bcc
SHA5120b699fb07ded1ec479825db751e3661cf20a1ebb1eed6ca0d593f82cb0cbeb6d59f7f856cf54785243c062362af97d1c4f8d69ebaa86f150da7aef16d9d8281a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b119f69c3fffa4eeb87db56db58c5be
SHA12f7448d63fbf45e3f9d9a95045c77ee192127ce1
SHA256805cef7d5be5cebf3070777f1ddddf5f464549b7d8d4208485459b9fe0ae3424
SHA5122327aa649a20b26a8aff8824731ee4c750e7eaee9caa8c1cc1cfff3f3ba9d0837cbc13f30ec28ad7d408b85980491c52e90d4448dbb05e57c1e3c3860af81d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577ea2892ccf6a1ed1c79aa13df561713
SHA184eba20c279946483c3e8a5fcc8c3aebc7e4c08c
SHA2567e5691594ffe7b14f1dbe7351001bcc14c5592792d2c9155417230f84d8a5b83
SHA512c77b4e39514471b3ac17253026980ee5f1a403bf25427f82f20fc9fab43fabad4baa73b69412c5514353a921d19e0a624449c72578f45181f0032493b519bd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac91553b33eb3b5240d794faec03f559
SHA1c4656a1c025d93c6c4b7f718061f241df1c05171
SHA256f8ca1b9e8cb1082ee095fd84239def7a70cea01ce780f9760651149af39dc01e
SHA5121e38872d43dfd01db29e2d3ac5c0466459e8e8ca2976c2a8c64aa9cc4e077b3b535c5ccae4e142c58cf6c396b0c7ea88834bfdf6e38831b8195ff12642ecd948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3158cd15ad1c0b13ddc7a38392310ff
SHA1a6ff363a7a20105bf14661c2289fb58eb5d44d20
SHA25657c82f3a7e134fb63ffed0056f4eea39498613a4fa750fd60910832378b017ae
SHA5120b3e46012f9540237b5f6bc519946c1765b00cbff97fe17c722efb4e2eaf85e8567696c23ffbd28a7b7bbb93395262c5125b48716040dbcdfcccb1e346231246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9bc8418905b67ec24b022ea55ac9230
SHA1f7fe0f3f807485983e335c89ab63c2269cb48b17
SHA2564cebe477c2778dcea43943b27b0de054583248cdd49e086da4374efba56369fa
SHA5126ab4bb7ebd11d0922da4f98b8322da3509c968177cf25ce032aebf9404af9aca31ac5f77aa69d52ca086811373c43435014be795f1f4924f61cfc719d9d73809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b164dc06ae6a79cbc4a0b7c242dc74
SHA1f975246bc9acc7b75906add98ae248edabb105b5
SHA256344d637f6dbe57e9f04c14b85eb0fc082323848b594863ea9e1524423bf9b99c
SHA512f3f85952d3bc1104f153e1d7470361f4088a1d90436e7c49c02c5ea17301aca3e31a723aac45212f11c741048840f264e36528821ae33239e0eaf8ef355bbbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097aaa4afddacb5a8dabc89cd9d61e46
SHA1ce79855924f64fc22cd6c71145121735723bfa88
SHA2560daedaffacde6890066c7784160026f163919d1faa20faf4518f06d693924065
SHA51292d2a6e17742ed6c9dec3d7559c82c791bd40d2f810c458d62ff5745947d3f70b6b115050af735453662333459a2fa2448e94c77cd435a2c508f364302be34a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582198cef1c75ffea47e6adb35fd17744
SHA1fcbb0c12c1912ea353aba847e54496fabf6f08df
SHA2564ffb8413ed0cfc31efcc30162821ac5f413cdbe2db8c0181c54f7b2aaab3e9dd
SHA51204d47ab2880b4f4106ce974282f35d7c8a6ec80ec7d431ce090539028705890b3b9fd497fc3495cc009eedc1fcc4cbb602e6c0fc5cab4cf05037c1969db0de61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d68ba1469ec294b58cc97bb1d704bf
SHA131c33f8b044d56e8025f36ff5faa7ce83c5d02c8
SHA256496daa3528d8daef91bfdc1cf5f0f99f9175ac77935f093fca00b5affb733b83
SHA5126bbb16d8987cf03a7d9ddf3d2ca29d3194bce525c6be97ca5c058e9d1131a80068cf5a68ce0eaf8c9ace6b22db7384c8f3eb7ae4fa6e5b6a5678a255671862ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c3f7b1cc49cfb579b547c5a5fd2ee4
SHA13fe2bdfae1a4148d100b5b185a6599d2171ca349
SHA256086a47f122bd67c2bacabfcc9748bfad0f449c2ea6d58a85598a7346afc15271
SHA51274bb2198ab99ddfad3614a22d33ec387a42c7f3e3d69b8213c90db0d9e18c4fa77c3188fcd0bb44742bf00903f8ab7cc13b695a6988196b64ee5724086b4b682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fefa1e8e8ecc53eeb2b1efcd64ed543
SHA1564c405e8cad32c8511f780562593ef77274f622
SHA2562ae047e7c865ddd9de2c4fe239452cf1983732ebde5b6a954dbfdc0708b08c1f
SHA512682efb0f7fafbdc2c7833e5f07cfc301387aa31790c4c6cb1e59ac5d1a08d2db4fc424ea9bef96ff5ca7baf081cc09c48776ee923b3cb149efc0b66c50a13cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67b10ccf54b7ce9a612d3b8dc21bf7d
SHA1ff10f07dae507552fe0fd3c5416f67361afeec82
SHA256c9d70872a9c83311e57302ab882a9cdb706f1cbf8ab5a7ff13ebaba48a6bcc0d
SHA51215e4ddaea570b8dc1838f038b57a9c6559561898cf143b95dbde9f5e3be513866d4cb4b54011e77a95d896377a205c3079297e9292f8ee089358d14dc6414f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590650c0280c1d2543dfcf5a44759b68a
SHA19653c014c4a61bd717bf72790d073c45ba0935d6
SHA256cec0cdd3e72a2600cd03d0df86b820733c8bbf77ddc303ef3d01508bf499afea
SHA512c7bac598b62e348d70d263779eb2ac45beae804ede81267705a50ec67d2c46ed16e982fba4bcdd346c470625a5e898a169b118289a1ea6cf1f269a0f977e45ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e6bf212108520ceeb72646e7c381db
SHA17f0008f056e1ee10156f18bc0630d8cd43b6215f
SHA256161e18826cb39697d1b66edac67d5da7f1271f5bb77b9883ded003208d4c729b
SHA512fc3224f3b2e4a627204d154ee08e3dac87e7d8b9f42affa861d56550861a2d13cd771e3e26575a635c487bd6d11be48bd52eae4f7794698615c9055df98037db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ff4972519e2131893cc0495ec4255b
SHA198d1bc52c0cdc1b8e02934b43d2070e756b1798c
SHA256dd16c48583eca902e311336dd932124935abd9bc147244007bffccfd5d974ae2
SHA51287273a5e4f14d3b2b3a1d2135295fd72b0e3570a5ba704d004adbf25990aca7cd719053a9b23fc363257bc95ddf662a811d5ea72103ceb55e605014e6969a613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567dc00b5292722aa38ad563ed35bf04f
SHA15887d58e1d4117d818ad6dce98f6de4f778fac58
SHA256d73088d0eda2f73fa081ef46b8a31187211272c39fd5e30c5942ffa02a410032
SHA51277b975b0bd803f8b41f85b4442b7fc90f51b43365695b3463c16b5545125d28037fcd542e975efa934d02f7d0f74983d88de6842f7942c8adae2747564078c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb2529ccca0f6813cc1baefb126a6ea
SHA19ab9541d98d14c12a37551e58561e92a5760b2b9
SHA2566c3dd39f588498db6f67617ad89236d6b93f4d5a70d1e02b3c0fdc43d0030c88
SHA51290b67a5abf8e938e3a41006c700016f405dda9fa16adb494fdc9129c7d7b81bdc8aade18e070e44a4dc5da8c31b70e1690650878d4a96cfd227855870449a41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d96642d75771f445d3136dc7f0d5eb7
SHA1739d4904a7fa67e70edcd15ec4a432bbc1e94e0b
SHA2561f94c7cdda4b7a1c7ebb770ac7ca6328d41a1fa76bfc2155f2c8e7242180f768
SHA51245c05616301c9e561282cf838b8d29c9292ff510675dc260d6ac811ba5f3fec173879180bffb6932df17c5bdfce678bce6f0518b94aa88c204f67fa6983f3878
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a