Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
274f166dfdfe3a469b6425abe594d08c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
274f166dfdfe3a469b6425abe594d08c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
274f166dfdfe3a469b6425abe594d08c_JaffaCakes118.html
-
Size
474B
-
MD5
274f166dfdfe3a469b6425abe594d08c
-
SHA1
02ddfd9a1ef33a1385f9d055e0baa9b598595953
-
SHA256
adb149df60c1948d4d3efdae2d72bd67f996061238545e913c924242536b63d4
-
SHA512
2d26a84c9fd9761945077f347bb3ef5d5e8ee8ca9ed8937275968a90e2cf2201fd44a1b192d0bef9b9f1138679faf6750c120f73abdc65b3a88a405caa0de876
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{279CD5E1-0D96-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000697eb5235fa281fbba05c5c45d75faafb86eb5a2487e0c7594f5baec9d8b069e000000000e8000000002000020000000d128de7e1a80b125e993ecea33b31f72e1f90b4d7467413f45817844f310562c2000000066a03d6cf4ec26396c3ee48b23553a8a97e8512b92505daced3a762b02b3b19140000000d1f3b3eabffca08bbc22081b68e6a60e116d782ef2165208c563f33682f33a08412ed4c92d31fd4cc244e38345c438092f1639b926ad79fbab9f1ecbe83196f2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fa21fca2a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421374270" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28 PID 2004 wrote to memory of 2368 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\274f166dfdfe3a469b6425abe594d08c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a11dea36cb31b56d096f5652cfa6c3
SHA11f5a2e381ce18836141a814a5125c3958193bd93
SHA256354a96c8ea5d31ab4992fc5c4657c90a4ce8b5b6a981a7762f784ec891dba9ff
SHA512d75814408abaa8306a2ba85ebeca4b3d7332ef0d6bc3c16094b20c78d7e4ad95df9b5ea2adf15b934a3dcda324f65a37d10cf57abbc59671766b7187c30a9000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e039784b23d99116c31dcf69c2d82de2
SHA1b4c2919cf78154c1ffafd64c14eb0c75be33afa1
SHA256036c2abf9084acca5317f633d5c000aaf94b70237cb22eff435b857a06131bd2
SHA51275814a73ad7e1b75d2561034549611acdd1eefddb990a076d3c59bd0657f9589c1c12d0cb824c7109339998e9e94d4db05d169033453bdc60c6ca8ec2bcd7c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da1914328458a3416d55fdd8aec4169
SHA1110c807d3093efd97ce2754bbfc6f29fdb8151d7
SHA2563416b655fdadfd1ba1c7a49e7d084d9f34a69ae2edb77b889d4d1b82ff1294ca
SHA512cf4de3ed0da17b4a409dc26c4ea2c2b62aba88ca9c16a070f7aa5177ffe9ccdc346bf821024343142721b5ce4b388cc46eb54b6259910912162ed78f5cee362a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ad1da26b7e88c2acc00e96e22ac9d2
SHA18d7c9f2d06d21a548e4bc3e3784dd1c10d973659
SHA2569eb52ed33f5c24e16301a517d292cb52c8e52c2f7d25ec1f71f37ac1427d02cb
SHA5126fb3149854fe8bf4e5bc9adce1b0235b40b737c357ee5f675791c55227dc5193570bd40c3ea10be6c68ed619a0cb93f0c219d2b6723c6443be9fc549a0651836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df295eeed3bdc01930647d2391a249b
SHA1d5a7773ef7839c1255e7d005de01679a30f92ed7
SHA2569a03ece853fd1ad9ca1017f860f362aa897d21473fcc7aa82842c26f9a853b37
SHA5124052b46f0fc8f9fe87c818010047f3367e0b674ec0fe8c709a1591f0ebb9e2c1372e78e8346c4f01aedf0b9d0b3e25369c0fea25334173650caf087b36ebf5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572cca9d870f954a31bdeec87827bf8ad
SHA108a965f88196248b2d4e0467aa732bdb1ad29b61
SHA2562b8e765dfe55132dd327b58d79dde9bbae715bffbef0b2a94edc8246d446f3c5
SHA512fe31dceabf65de06d534753e2a498f45526cdbd23afd1f238cf194aafb612a29b8be388bc6dbb63dfe9e92f33b974d8fdb927d6dc7bd06563dcd22f69a28eb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a4471ad02c750b38247f4fe7e5e6fd2
SHA1a2ec12ba584b5bd83610008447e3837cfc99dd70
SHA2562e6eb1971785709cc9f1369cf6cad4a79d1d93cd913d34f334de88d7158a72cd
SHA5123b5e10dc482bf92b0e6445bb6eb76d5692515a0034848c0f76e860eb9f3f718d72878dc76d792ebb0f1a3d3b47155b0bfe341ca84729cd2b570013af81bf9222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea234e0be41517a2038b685c95ef163d
SHA16b03dc77688b7381f2c3f1b479f46fdd848d3d9f
SHA256cba757d0874acb497c943762c08bc005e8e4606f8b9e4109fd719c4de92460c5
SHA512ab4e3618ae1ca21ce95e3fdf20576a2d3614b6db576288f57921fa1ede01a0f3d7b76c5b0240a674c63e2d112d994d6bf2b7e2718928cbd7386313d9697c8f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922da72315220ef65c3a1d90e6768831
SHA19f51b36e40e1d6e20a1a050226b51320f037d82e
SHA256daa5078cf3d7de603a482f65f2df9479e98074aae4cc96c2ec82d1e43fb2f745
SHA512a45e2a9cf2c10d8fc14a9b0c438fc113ececc06641c6dc99c90f0171841bec19b17e93dfacebdedcb940331b387a1a6cdd31e2eb34a89fe87724342bf3bc4a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f927b0cdb1e900d20265095034bb74b3
SHA1f643145d84d016e051e61308f5cf4cc3e3acbcd5
SHA256ca5e71c21a1f5b1bb60a1c009b8de1c03746d9362fb168c2bc6ccbf49af1b026
SHA5125d4a30a995114d521c7760f8c140377a27e73a4d7858f31c0fb3bd4258465b7aa5656b5d717b5affb03e93591920bec39a78ae411625d7f4f14acaa310672773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59092ffcfef086af5fd709b66667080db
SHA1051e8fbad7bab11e5195a41a084cb5c29b53233f
SHA25663bff3084f58a2db0e783aa27197ea7340d437d95d8d46a2d4b6915fe1bdb051
SHA512efb32ed7d3859198f0510757c3292ad591ed30456899be9a16135bdca9008ecbe84209740b35c74ebd559418e43b0bc896c03fe3a27cab5165243df8e930c73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598378c67c4128f3190b6f99d7df69b6f
SHA1895ebdac7c70206b3a4cf9c174814ca2483b08f5
SHA256fdfe4c894cc812e8c072c436d5e2d47632685cf1014d552fc10f27b0976423ef
SHA5126559fb35324edee3d3a8c999a85c7315a0b14d6a302c48a6dfb2c2165507ce58e3da86f7cf69ccf06e24b60b4c1c56a24ff63a513c8ea3e66552b992b9292a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de0a39a312fc3558800a0e8fab8b752
SHA15cacc0c8843b27beead4e40fa6849f17f475674a
SHA25698fa64ccd29f7488e92ee4e647b1631e1d83f1bdcf2bca14fff2a28a230c3b77
SHA512d230b2e9d68c3fff62c1a89fadde3fb65a856e326d9548a61d8b39d3a969184005a9e6d8662c0e8802fd20408df091e86438e431341219c4e28ef04460664d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597eaf17e27ea4d7af659a18f439eb364
SHA1119c0907f88206eaa8e6380db2d5a88f30cd2e15
SHA25650bfcdad50ac95563b697a00bee3c08d7bca635c8f7c9bdbf747ab779a91de74
SHA512ad8379d6bb643e22159e902dbe50d1dac85acdb3d65c8cab3b55ad54bf2b1bedac5162939277504fa29cfdfb6008037a161b7ef13849203b275346a732cc5fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43f4e17f4ab9f2279ddd4ae748b98a7
SHA18a1a39f13bcfb4bd7a8b45937c0a2ce18e84bc4a
SHA256682e500405b363f7fdf8e0fc4007fd4d0cf3a8d5a8de4b88b27a6ff4a82ef8b6
SHA512c9de4ddad497c085cd15e3ae67ca58d6c579fc59e8faf33cd17d6cb4d5a95f244280a7e85d2a316ba87f8fc33ffa6a1818501d54cb244a5262b6d06e9896997f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4df34c620a6c8cbff4a77a1b0ce2ded
SHA1b0fd2bd56031741df5946028a0a68e24d377a182
SHA25632529990c58c35797e6e6a6d4ba22e1e658977ef895ee5ec9f88d2c24c6e31a8
SHA5124597a9c2119d3c1766418548300ce62880fe86504145e546ef115e6a4b7be4fcbec3ab504ad0efd10e8025b0ea33266ccf6b9c9dd0f9253fa4d3cde3ef11b698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50237a2d0dbb44de3b237f4e24b1b1675
SHA13aa3cd76a58cd789c8b88e691ef5bc63b35c38a8
SHA2569283b16e733031534454d10fb47624b2b2ae83afe9d67819d9a83046a37dacc1
SHA51268304c9cf2950f285525068ae1695a12e8ad269313274a354ae3fa6246a4ff3b808a96ffaea9e2708309c7862df4f10ae88f9b801138044fefe60e86f383fe90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a657a25b9ed8da35d8cd3a3bc8df94
SHA1833b1f963b4c7e0e49c7c89d3f5ebd71cb02d6ea
SHA2561047754b77d47fa91f81b43a3d506607f21845e749edf2c7397a1004599b9522
SHA5122ed87f04221e0241d34f20b06d8fb677c6f36a9bd577dfb71e421f4724124485df9288824d19ad1168d1b55b14861e943032f46ccb8a80a752aa10c753ef52c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02111e9da723b293e9571ada21ff235
SHA1120b7d44e1e4984be1d07d284d90e52d97063a37
SHA256f3527573eb5354392234e10b2305d8a4d1096669d294b593f87e13f5c911bc50
SHA51249bfff66d6084657f8bda4251a17c385b01de075228b0eeba4aadb47600ca978fc27e1ea720851292cd5246c9786a365d1366f194f664ffa8832ce0d2beb85e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a