Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
20978b240263be947cd1d4276737d40d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20978b240263be947cd1d4276737d40d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20978b240263be947cd1d4276737d40d_JaffaCakes118.html
-
Size
4KB
-
MD5
20978b240263be947cd1d4276737d40d
-
SHA1
ffe23e2cb232a984d1cef417fc47c4d4f83c3c0e
-
SHA256
1faad806696a672768d75feff7b203bdbfad0255ebd80836005ba278d66f40d4
-
SHA512
fef8019cbca8f72ef56a3f38bed65ea153a549585035f99ed41d6e38ce44c5fa93aa37b61d407df4e2fe99012cd203759c9cf278ded265a638960614ed445c87
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oK46lsd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDe
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421247568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{275B6151-0C6F-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000262260c10694f8bfa87825388c14d4fa952bdb5906d9b149616bd6ee1dbbc728000000000e800000000200002000000092adb02957aa749ffe101813a518473a35b9a9730fe7ebc03bc1eb686cb9be60200000004acbb6f58a5362256a15df94d80bb5c07878f2727627daf7f5b65eeb2ab43630400000001b37aafb28e1af99ca30d414e1f392f87c02bbf5acd186507974bca54d8d89023ed2375f5f19fbb6a04c16a1b743d296d8b4524efd106fd3e9825dd0534bb8a3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8086befb7ba0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1948 2276 iexplore.exe 28 PID 2276 wrote to memory of 1948 2276 iexplore.exe 28 PID 2276 wrote to memory of 1948 2276 iexplore.exe 28 PID 2276 wrote to memory of 1948 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20978b240263be947cd1d4276737d40d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54104293fcc63e12c2e6ea981da182de2
SHA1bde0a3be9c42ecd8e758a66f68741ababa51e5be
SHA256cf7c99c4e1739ebc58ccc9f4ef0fe646f2179136f92d7f4d9481bf4bf42a6a2b
SHA51289ba5fb049542cd8114cb4b005d57e6610b36e77c3bf5cba6eceae39a363be65ff367e6a932cd8a1fe76d741f873584672b96b27fee3cd9eac01becb8bd2cd5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56098e72e4b674c223ce9dffffd40cfae
SHA1fa92f4eca41c32a63fc0efbadc9bd0184b3c55b5
SHA256042e566b60557830ecb357d57866599b95e50ddb4cdcc9c18bb0f65e77cec0b8
SHA51278fcf148df7713ed19e2bb8c56fa481803681a3911278c1f667e22f4323bedf2be6a876f7dd3af55fe5208da1c92acab57c61af4e3d8e6bcb4206822afce95cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599322a2b252448a1eae8cf9be34f921b
SHA11e2cd7139ec4f1bdf91f25deec38bbf2e0c1b612
SHA256f6dd5309dd554bf22fbe316746182ebaec1ed37ad0ff68ac82c7cb81c383cab7
SHA5128baa74f7cb5566f4cd330b3173011bdb8d3f882f3e42af5be59535610a14848a6ba87b033f85ea6449659e3ff01e0c36be540e0dde64e1b5e60946ab09e9ac4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b35b68d489704f352bd4657bee084b11
SHA15169cf087b21d86cad8bfbe47ed68dc32b7f271d
SHA256839f52543b651d1cd155dbb1c5b7eb63727dbfe607f0eb399cd9ba73d837adc2
SHA512a5db3ac3c09319d4a7d5d4bb323ca609f7d75ccc416b16b82c1676b55bb6a2ba478c27e237cc8882aa10dc719be20a33ed9d10970ad1354596b6e56a809edf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa914a7e1a6ba0e7ee4e6b358fa4f47
SHA1624504e3e50613a6be9cd3313d38c866e45c1aaf
SHA256622c465f0bc81907919a59d8553304e8679c1c4db7dea91b8054bcb9c3b7a94c
SHA512323c20db8ddf31a40a4cd1f048af884f9e61a7b24dd46f8b5355ef4361cecf57831fd7af6fa6f859d1816b6fa0650382890ada02f0c34cb6064d60c1f6340486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525e5cec20ef2e4eda5b94c1f59fdb632
SHA11204e94ce22e31dd9255a51997645a3310781ab8
SHA2561be5ef3124614ba0fd7c7a4efaea6d32fdda041e5e90bd1066318d7d3839ead7
SHA512dc585f99a23936e76e4dc0d79ab53eef0ba98c981ba73908286111fb7c266b020c0752663c7d1e1e8956628c0dc845d9f099529cd541dce3d853bd1b894be6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d618af076945e465f87d539b4dabaf79
SHA1c48bdf08276b92a2466d6658e9d0fd1c11567b7d
SHA256caad1fb31c146488f77ac84176ab99565096faf1b8e0c3dd029f57426a1e325d
SHA5123b1bd81a7860375564d59e5572340aa7a16e3f020e6423e0a0a9177f9c0db8ba1fc02e585cd87119e64475e2d58e058fbd10edab9183aea9fd869ab287309a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d03cedbaf48fdd0a98c6c24f9d9a9b5
SHA1cb4a3085376f3df45ec080423f47ab512c41b7e6
SHA256c529387c34e6c8bfbeb960f72f7f9b5c6463be97f6189440b0b36db44b08f999
SHA512ac6dba89ae7ab579c6ec102593fbe8e632ac9be1362719c5d9d7e890bca148b430db3497b023b2a12bca40a3870265361120f854c6f6157f45b1ced76f0f4850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f877547b92269626ec79b85fb4f144a3
SHA12da65babfefa76aac55754437d58ba5f2797cc72
SHA25645dd9e19d430c875a7608bca560c464936982460e76fcd9b13e740ce0686c18e
SHA5121b22b34e4487cd93f3efe0918b46ec1e166b4e0655d0049e5e004d6b9342eb3241136e5b6c60004334c1b7c23e61743e00ec76696d875cfd48244fa4e0ceff3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a81f6511b56a776e14c299548e701a
SHA1260cd6f26ef9d899eb980465ae23a06d895c4763
SHA25607bb8e3c44f8d3c524eebb3f8cec0fbe1132dabf7930ba7414554ae01334d134
SHA512c89c8c8967fb6d4ef12a913f41b4ee518ea26b7f2c215a1f221ac81dd637c4da4bff7bef0f215628b767e19034ebb5d13d4dd3eda2bd3740ed39f59b09ba87fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ead381c5ef30dfd153b21d4e79fc5f
SHA136b8f858f619c00f24acce84080a4e8cf289bb79
SHA2563a5c5a5900b53c66ed2abe36ff0f84beb80243b200731440c93bd00f2c4d8028
SHA51244f44078e8a051b9cdca4a6df680328ec80f92e1a146c284960e01b8e631780ce2bc398706b189e1e30f4e554fe081dc6d7f595b5a81694342bc79009304ff84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cebc909da3149dbc0cb7d07528f36d5
SHA18b73792a86e5acf625af23902d5b75d441b1ed29
SHA25604862d22cccaad90132a81c44e30e99eb68fc32ab56b83bdfa66a6da73a1ccab
SHA512052d9b5c51f5cc1d43466a7b87aebc7c9a28da1788c51cfddb2d9eb28cd3931725399f94c779aedd2607d59a7587afa98454470228b4a034e2c11c366915b3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bfb33cdae17b695c452b29dc398541
SHA1bb028077117e8e42b7e41b2246143fcc08c0e748
SHA25648e1db15e9384d7560d679f376cc167929aa257d71c3f3c7d417baf99920da70
SHA512894e41dab302c99f366b9f811a3897e6b561536ea472e1d1f5cd4cff9647ebae19135b25068a0831bbbda99c0d9b320d4de446fe1cadde1f7663be07e2f28ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaeaa1e1c5f32e693fe0768957874dfd
SHA18e922d687a6c8a8721e6b8400b46f98ed883bef8
SHA25687ead4e5b4a327ceaa80737c0a86b7eb4abdafe9d0f1f279786bb18595e80163
SHA512f6c9fdf50e9008894e22cf79bb2f48fabefd7b2a051b554dfdc5c3f43395480d486382181fc2fa3ea6071aed3dd468a5b9bd3745e13a632b63e336e7da709b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e725e3e846c64d1a767afeb646d164e7
SHA129326535d0d8e1bfbce063a6b7ff27157c7cd0e2
SHA256add6abce1af9f11c98561a3b3bbe08bcc33933ff2e661fd313b2a96ba129d103
SHA5124ad5cfa427dfafd96494b1078ad54dde1149fabceb0ac1ca3c0b92abd612939fbcf502177f42c142790744f7bc597bd6c1225560acf0563577332d8e9b8541bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c933cdb5bfda54230f08de12715b61b
SHA1a549989f5b22286e94682d8e81fe52d48a3e1e1b
SHA256dd998f63be5a8bc0f6fecb8f5e51b1e675fd5764efb87e121cd7128655a9329d
SHA512ab76a2a469fa61730a7b84eb9cb823412762d2548ffe23ce7978eb33ec8dcc34dc7faeafbb2d3efd3ab6ee15ef5d0f4ca6f679a6077d378d189c2556d79746a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525493265e6b0a2c049bbd8bff6075bcc
SHA12480bd5f53c40a34b63e8b4b3c68cb7f4e4fb7e4
SHA25652a2acff0969259898f0544be9b3185cb132d5084a33193dcc2ba74951dd558f
SHA51281512a50e4847d8712ada83a36688ae1cec550ab1ca05bc6a927bce165a1de4b7e447ad8305d3af0ebe9ac851d36195ac988a6bedca2b6168e77a90679a2a67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f2ef0bc25db742e1ced39bb67c0dd2
SHA1be752214ecc3bda5875eb988ce2f56515527125c
SHA2569b637313293ace23f02834bfa7c9673cefdcd82b8c8e171d4db1b2a80399e4d6
SHA512fc34ec8644405d643d48c72e8a3fd16da1453933d6f385baa4b3e1380c91610f755533f3b0f0f4d2b993a74df330d690bfb0737cf219c516129517e1351b89ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5550b0fadd62830f15c5866fe56d6978b
SHA19d00d4cef2b87d1b991f465b4d2251eb9c947169
SHA256954c4b23443d32af98af7b2616b9af83b1de2d3f96f5e67d9fb95ed853b2988d
SHA5128137990f84aab55e8859661d4789a8af8c6841edfaf121081d930e6d3392a8656b1b628d8727e37282737ada9fedba0c28367953bc0b05cbf704f06f6fd3d34d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a