Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
228a897256ef14fce5aa35ac2d20c6c6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
228a897256ef14fce5aa35ac2d20c6c6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
228a897256ef14fce5aa35ac2d20c6c6_JaffaCakes118.html
-
Size
254B
-
MD5
228a897256ef14fce5aa35ac2d20c6c6
-
SHA1
41816e05239b3c3e5094a09e05e9fe07d6845e96
-
SHA256
afd1bec2c8dcee761ad3f1655351d25de9a59ab38b9b53168e185521d4cb372e
-
SHA512
75c35d10904c565fd6aec7bc14f79547646a66b3e4d9b64943429ceb50011edc898788a90b5e94975d2b80fb2d5125e00f2aeaae324bb6cd671398cb681b8412
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000006b63900b46e149875c0da1b0615c1341300c10b23c8d08220e6d3a01ff0a216000000000e8000000002000020000000871138921043e49e9de46f8a27ea39f70ee2ef00c3a36864a888df6c6a8282c5200000004b6a07f476ba7542108e9c18b92a12c987eed4d3107b0f3519c74114f5b55de240000000e56877a4ee26fe2f1b74af46b82e551a9d1ac2485bed2fed882a89b2038e6313e8eaf939396fb75fc10e80eeac6f5505bbd4f30e74dcea0bca83b737b5993321 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000788c4dfbfb4935304127dd7eef0f12321b261e0732faed75293d4965b1317b3e000000000e80000000020000200000002c9c321f6192f408b3131241ed9032240e821ca20b0e36dddd87dec3d3239d459000000059d3072f8aeb71808a57b440d55a479b678c1a3682063cc21ca5d97c512122ba5c69c8a5b2c134effd27c2928e52cf9259e5c891034d3b8ac9d94120135cebe4d0114534bf6d587a26b3d96ec7252ebffbc4997276106f425c51d3834260a8bd16fffb0e39d86765e8b2e6d157cfdbdb439fa1e8808a5967cce8cc2f4a414a0f4e9def68ec97413144646636275fdbe340000000f3498c8e4ebf6fb8b834f466b069e693ca0cf6f2e27ed2008317cbefb21c2c0b2c0ac5934574fbb67fbf9a9e4792dea8f6c58f66cb6827efbfb4a1d5456606e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BACAF5A1-0CD7-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421292483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006d1f8fe4a0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1652 2844 iexplore.exe 28 PID 2844 wrote to memory of 1652 2844 iexplore.exe 28 PID 2844 wrote to memory of 1652 2844 iexplore.exe 28 PID 2844 wrote to memory of 1652 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\228a897256ef14fce5aa35ac2d20c6c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba6facb6d5a9846e124399759a9aceb
SHA12a24f081df3181400692b42438d959cfa59654bf
SHA2565935c5cadbf895b1a8b96e01b47bebc089bf12cf8814260f1f9b4b74a2d2bcea
SHA5129efc06357775abf703524bdeb1f0ff4fe35c64cf2ba9cf3358731fb34e63a775881a2c716769ccc04e475b4eabbd26770c41b3099b88032de4b225b18d24f073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58376823d1566915e8749fe5668bfe3e2
SHA10699323c3a0a6baddffa68541d1849d711e49d83
SHA25677ab193451f7461356dfd0c39eb02c2585f0059925b5c7b54719d0b14cb8e521
SHA512872499846d681736993e44bc36fec7bb7b419ea045bdd04cd4304e6daa1e53ffe7c7704e47a07b199b160ee9939e25fab6b8ee71f482d2be166cd0facc94e19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d1bc2c6beb297c41b92043a9b2bc9a
SHA1eaa8db3f86d69703117cd893137706da017de640
SHA25602ca2ab90d354a3c2a86da25df9ec7491cade80f3a821e57278627350752a26b
SHA51293148e0be5b503a92397fc240623f129f83c57301a3e20a5aa3626e3b4aa9b6b4b484d0db6512cb4770d3020f34a4be4d27bbf58f014a11870f541ae81787002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5825384afd45d4425a74417c0abd732c8
SHA1736e5e91150ea6bf81f70593b1db82381bc89ce7
SHA256698fcc780cfc0ba680c32bdaf5e2e65fa57c22941837b25ce9db617bf86ee52d
SHA51250755e32024b74925c00b31453e7b0c6ef45414b5a7bdc7ce4164f8f79d8c85e3c6f8265c754ac77c2407a4508d284820454a9fe6afc24d4031dd5cc3246c2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd86e88bae7256aa9734d1bff073cf56
SHA17ae9175894b64360c749d20b7b937b7b5ebfa1c4
SHA256c2120abe2a3a1626b054cd179a84eb7fd892f58ddfa965e636d7e8b41cd02143
SHA5129759e3734aadc3304dc6009c20e29d08713ceb595506446beadf1746695482210d28978573c519e730164e576e9037e4fc115907c3788beea863f861f7db41bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb1c5813311d21f665a8a41f2a989b6
SHA1a156831fbd7082ff409bc172e61c22e744f17911
SHA2567bd052e9a27aa4e3647fc7fad45d9aa8a4cfb21fa3c262cab58d5713f2e040a6
SHA512d942ebc91fa0e78a2898496081bbcec73b9e587463bd70725431408b2e9c889a8a680dddfc2e35d44acce28fd703a48e61dcfc730ca29f45c64fe9bb1fc871df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee36b69d07c1dc8ad6999952b5cc9b5
SHA12232e0ce2eed6ea6dc166e103c5674000544c779
SHA256937963e58bdb608d5b224eba554ebd88db2b39c15148cd5672bcb312f72df941
SHA5129bd3e17e4d722b5416316ffb2d0de867662803aaa78e31c2768b96f818f784ffdaffee53c7c4373a18ef3dce7fe5f08e2f750d07b12d0cc27937e561dcf30c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7a759adde6b176276466f98bedc7110
SHA1aba9e4f18b84e1cd4a1317b8a618ac4b39c786ca
SHA2568e78508f0a1bd9e039896e050c47696b60bc98e0077afbc60946a1a0e35fc15d
SHA512485bcc79f56e0a2984e940346abd38a3f311c22213bed4c822a79f35b4c371567523bfcf7a20be548cfc457348796543c846f326166a1980f33beec65fe82e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c6691e01cba02b1c4d9a146037fbe0
SHA1fcd7c169805767072321ce07d314ad47fe93ff2d
SHA2567e32ea368592cd58e79776edf28400c41ba3e0a68afb4e2f7f858436149443c5
SHA512f2ba041146556dda31d3a0493418214274233180a812193eba62b661ab57202e4c3f0be6865ea5dadeaa5f1e5e6793baa62fc61ec1e2cf94fbab846229310e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39c55400642887f60bbc458639eb636
SHA16ce32d70ff1f69ff7a58528522a40c59ad855355
SHA256ffac69805f22ddb11c13a56f85004ec752b739cd60553b702ec68eb6d218a19a
SHA5120ac8822b246b15fd7a7d8c607137d39a58b7f1655d415d9c3492d2ef4b8855b4e894f7239caa1074a7950f351acf5572dcda62ecbedc53dd7c1fd5da0cc4bace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713390f9c805546a5e7eb03c6458f3ac
SHA1882f4519e7c2a4d5f3f38bbdf1736e928d860278
SHA2562618c04ed588c8eac1e2347f539f0353fdf51e8e5bca6af1289462da92302d43
SHA51257070b29da56fc790837815b5209202efcd6eb103e503c8dfa1b524bbacaeed776baac7b9ddbd3ace910d2b2da830ffdfe8920216d3f611215ecd355e55c5cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf965dd1f2d6c6b39c4f9cbbe41b1e2
SHA19a3c3448d76ee974e8478081decc8f2ff0c3dc46
SHA256d96bd03ed6f036ca11edeebe70c328f40228cb37533e82dd963633a7d08b92bc
SHA5126969facb46865562db80ea20d23e3b8f30472f31c41daf66098525ca62b44322552de2da206046cde8eaaaa1830d6f8f2b57f081091f7507fefb9fe6a4c05604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9ccfe7a9c0dce67be1df02db2814b5c
SHA13749b7aaceb1ba962999cdf23c2b3a1407334b3d
SHA25609eac78538f6e30bae63866ca0504ba2bc76fb1c35c2244275e97a14e4c4a1dc
SHA51294836baaa7d4d8ad308f086614bbc53414f458876b4193253afce3b4d38d55713f05cc3e57fc552c8b4a3309e3b8ab5b4a721c6dae27e5ad3fd23d49e91fde20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50917a30db2b03e4dbfddd349df984d41
SHA1ff265ce610fa51189f3d0db7309892b34508e5e7
SHA256f8fa66247765fad1c4a6cc123dd1067edcbc7f2391f8ea0696d46d8a5ccd0e7e
SHA512d4590deddf59b51f73132719ebece74e34a9431f0b7844d271652d38314f186d381191bb52f209b7fa5e506e08759196529b836472b22d6565e8346e2b5957c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c3d37884cbc16ff7dbe463add303ea2
SHA19435907c576a442fa2695192cdbc2da73ef8ccf7
SHA256b90de5568cbd3f04ca0576930ff0a5e16e6317f11f514dd9437e0a1052db7359
SHA51221c6af672f377284714b49b9a29d8904bce0a3b814767dd7fb19e98df770508ddc070331cb53c9dd2f7e09bcbecb816f0b17f0fbd3b499f401a3688abe0bfdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bdc4871399252239d09c17dd07bee37
SHA16b7b0f94d607fcb52515809cc939ab30c7ee9b73
SHA256e347c1d2c72242206372dcacb6af6329683429b86991000817fdca2e38e0f006
SHA512dc067fbaaf17e508f941251315aa528b711fcb39989f2d78df6fc6343956f2ac0f8dcb295f93207c169931eb45413d8c992868d70088737c1d587c0d761dbad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dabe5b1cb657f56b9a392c8863365646
SHA16300a31e70b49b622ce36df2a89d71f2ea6577b0
SHA2561618ef0e240e8de567d4254251c0d9a413b95e5bc108f55a570702a73ff686e3
SHA512a1f2d2f690fb8daf8d44fb008b6a58513da5778a2bc917699a8107969a6f580a3fc07fb92b88998daff97ec32598badeaa424ac2d2436295171f7f051a75ac64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570628723f5e8a5f687972568ab1ac090
SHA14f113edc99fdc5f66c22fb5b314ee06bf450f46f
SHA25665eaff47e6c60286e532d34a9619807b99744866c6e5540a54e9412e0e2f53e7
SHA512542db26d64e6a0ccccf2ddf70ea44c53e8619ebc6a3d1cced76b2a5849f2a977f632a2b696e9501a6f41895a0a1e169bb5db2370ba8d03c1e0da746d638cfa5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9deda02603c623cf9569cd14a09308
SHA17b31d24f44a8164ceed05726793dcdac4c0cb605
SHA2564f2554853af00d06c2a503329b46ccf53a563661139960ac89837031788e6c85
SHA5123ce7866b594453009aa9d9720b77b54dfff3126fabd7ca65818fb82b934d0e37b6439413ef2b54fed116b0c03e72edaa56b4ef11f93a130bb9c3aa6c39eae7f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a