Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
232022e6c13ac4cd9ba7fbcb3f90d856_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
232022e6c13ac4cd9ba7fbcb3f90d856_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
232022e6c13ac4cd9ba7fbcb3f90d856_JaffaCakes118.html
-
Size
460KB
-
MD5
232022e6c13ac4cd9ba7fbcb3f90d856
-
SHA1
b8b16a55210fb09e757295dda7ac739ce7ff1a70
-
SHA256
dc7b99780654519e2b42bac115afda9d1c8a8ef63b7704e972df9a643ea87f79
-
SHA512
95af9e4426fc746aaf5777fd1981c15dd48f4cd6290557fe3ea3eb9ccd0d86985013dce8f678bdaa76fbcaae3c63874cbb990b7019ec78134275e29a56529fb5
-
SSDEEP
6144:SbsMYod+X3oI+Y5QrsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3G5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a02f4e58cf049ccf9de0bf56f5438ca8a60b2393a4fc81947e7f80384bf2e59b000000000e8000000002000020000000f9e2eb1e96b4a35ef9b0f724707f790d6a3dd08e0333a380051787c8bb65bed590000000d8109dac749c0bd6f758a70ea770a26d71da6738f6bb022e36278fb60cf769f37feed02627483833c57c89b76a4adf3282906d8da27883aa88576824926ab43dea21615353c1b95033a1c8469378b14d6cb81a899af5992138654784c3feb4017d774c06bcb7591078809210785991d8b008490809d5c1727b66ac3c825ff9c477b96ad29584c751fa742dabf5de29fa4000000065b9e48a760aa4c760984336b1f22912adf30e4701e583975b15b555861b2d3b757b125705d72505da79a45b7e0e695a5c208f1da13e51f1a68c2c4fa42c0b6e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fa4068fda0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FA6B3F1-0CF0-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009d014fb1344f92eee1181d26e672a15fc1cf1a36100957aea95eb15fad2a51ce000000000e8000000002000020000000e524f8122750c2b2ce41294297b4ca2725ef3e660dd925107c88386cb45fe011200000008ca8701f7c44e1db41abbbf8b6af2af631490b23a4a53dc44ce0fde7ed0c026140000000cf3900d5e64eee91c094f9574178bd0505e6f07f3d58c35d84236523cdc5dd97cf7d6824e49f92be65b1a5a9f59a14ee5184ab0ead23d215afeb5ba74e43c2e0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421303148" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28 PID 2916 wrote to memory of 1936 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\232022e6c13ac4cd9ba7fbcb3f90d856_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a18d5bca7835246f95b6177dc9e73cc
SHA1ed44985287459558dec5cdcbc09fa16718062e0a
SHA256e5aa6150ff2679d52334bfa7937ed3ace566662f71d9b117fc7ceaced8f357fd
SHA512ef2eb3ab150e9327bcd5ad67c4b8c395d2ac2c5a9ea436cc23bd4fb95c5ce3e0b6fc4ecfda1cf86943ae2c9dbaa27fb5f97f3060d642d4825a0c82767d512307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e51a5682bacabf6cdabaa0454f204a
SHA1d87b7fac18b8a820e6d823f13ba030f6506ba0be
SHA256c64d9a45ad41326e5226936a1952c434a285b457ec9028e7bb08095f9512dd30
SHA512bab62f34efc1db3b31d4a4f7408341f1b6f054fe9d96f4ee4997a3b0083a64b78c7c1ac9891be5b47ef56c9615acd3f92427cbf62a96b9749dd67bbbcc1ed161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e4b6488b8e8bae36b11e76159efc14
SHA14ef1d22aaf34046311d5ece62888c1c00aa3ce75
SHA2561d2bd98b4198de2c5dbff1ca64166a1aa33197be35c2cfaaa5f48017435b552e
SHA512b4a8ec1381092e56d80b11d38882f44cd87e510cdcf64db4b1b7709215b593930fd1e6b8668d2c7ac850e673ff9fb967b582196378955fdf0663641976a8f9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2f83fc7ce0f69c87fa6a6b3517b2330
SHA1e06207ff55c23f850b99bd303cb213e956137d74
SHA2567d3392988d261af3f0faca50de6ae3fb40fd4186e7c99c2ea98357a4c2d8de02
SHA512384c32b6092bb07f35f94f7113da2a775f82870436955a6355dd8510d021bb2a72f255e839f7efd8c5acd41a90dfd91e284e717cdc01bcb9fa95cde3e32dc12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fce5b1848b5d1f8bdd6726c91987e7
SHA1fd99a9fcd809011613abae0c4b5fe994e7a8f0c5
SHA25621bd6447ce51d0815e6a75c7861712367bd5b69b382b639f0f291f8438071468
SHA51228e00e900a27d84924f642332d336778ef313afe049751b4e54e1318ac389e2c766db4accbe84fae1c0b32f3eb8cf5f1d95c3ba3169eeb9ed643d1148ec0581d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a3213e2761f674e91dda4c62838c82
SHA12c472904ecd7e26e94c6f6781336f2cab6af9929
SHA256ebaf7a998386df4633138e8e2036caa64041eee3fb0483c3e1a0a20f1dc28284
SHA512c15c344f392612d1a7eb9745f0f99f5ed19783f0293bb1577e817c93fd89fe5e5f8d224171f8399d4685b603d5417dd26c8ba591ce044a8f649ce241426d71ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac2449c107e5b00b424acde37f3c5f9
SHA17893c5799a3b95e54cc04d05e61ebf9d38832daa
SHA25684a1af942450ac842ae45661467aa97748c14d2edeaf8b0b43699393db28101f
SHA5127abc40c3fbd2499c216b6310e06be917529617a4e510020fe12a41b3a339c261ac74bbeaebf917436bedd617d152709d99509f134d2846206068023513cdbbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6b6000d2810e45d214cad1a10da8ee
SHA18fdef2703a15e555c29f64d183b3cfdbb18f2f6c
SHA256e8fb2f209e4d105ba807a6fcac01cb124aa176b65669129848caca3524b1fbb9
SHA51273bf8d3d74d150772e3b916552f2f243d86862a4785c298f6b3cd489d3fcc52033c85989a34106653eab12708c5b0101fb833d3f5637d696c9224dd299481173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55266e392a301e6149b6d21f8a13f382b
SHA17e346065469d6c22b54ab5a4a2504b7618b9dc6c
SHA2566ba9646ab44f89eb95e55cc087b5a619b695810f1796e397c3c0b653a01e8ebe
SHA512f920383553238ebec3b412167d219685b1cea27c16eff56fb0eefffa880fd544d66ef7a9f213af8d1571720779fc9730ae690c2f321a377723c6ee6bf74c1e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113991796e26d462c49813069831c4c6
SHA1c8620dbca1fa83813442b8619e91b1a4ba67cad0
SHA2566053a449e15916a4593bff6028243d7c27f0630db0541d5b4adb8c7c7d22c4ad
SHA512ce8c2a6c9c8a2a477a117100240e01f00b8745156e3801055f92192d6af8925bd8d68a502bac005515854388ef1bb3b565e83522a50d967bf139de68cd349471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e663db80122e4161d2f1ed4bd487f287
SHA1716f2f3082b140b06e2677a8c8f358e1c3aa6d7b
SHA256e4fb367b228316cccd94b6b3f22863a257f4e0cd453c6fa8a6cc461986d024ce
SHA5124076e8b92d5bed44469b756d6ef8784cb8867f7459eb3bc3f46bc7eb75787479bd743cad8ca64c7b70b5449838cc2275fea68bd45d9e1a2d16bcd607bcebb84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b951dad278374aed73d971ae52ba97
SHA188340855707390894496839a14acfaf8e01c745b
SHA256db6ba708b30f9ffac7f70c831beb9994efcf0f040b45ef787b2c7a36f9e3381d
SHA5120e18885751ff463ce087fce5fab29b6effe1a351aff1ab59d107302e8ac9af1dc1df257fb11ecb1abe898b8d8d17e12812b0e029732c666da4cbae32acdd0a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6be999a63163820a5335d77fe93e5dc
SHA1cf256b59affbc3c1d2b0ed420f45726a6f40ed9c
SHA256177b2e4762107fff6e660e5866a3dcb9f6f8635456ab28d3b7cb0455007ae649
SHA512d673832288300074fc29f92fdccf8ac8f26380e32479bcd9745b3f45c763f56d09e6945a879bd3b8926b33ab224d2f5b9093f2ed51eb4c3958d8ec43be7438b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff9f18fdb7b8fa578efeea3b57d1d65
SHA1859d1eab2b2192ed4d919ccebc494a457fc2a9b4
SHA256ba888544c3a7b84dcd455cb42f33068d2a36b2049fc5a2a6a3511daa11379e6a
SHA512b8fd29346343d528b520fde00020194d00c3d23fcf42b5c131f9e8d2c4694af909955d01df7180ed3ba1536d97eb7121df609440445fba40b79422c12504b6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d8be1ad38dd9055d51546928429a80
SHA1eefc37f834063153c2d03d481ab14d294343a2f7
SHA25672cc0b6cf0c4a6483ef386601b40de716eb18d6c5859fddff2c35d90a89a6500
SHA5120d72b2e9e1c38e35465648fe6b2075f01272f24d71f8f1db5a3028105e4344f13b546c3d54cc0a187a578ab80e92743c566c16b958e5720900786d7f12b46407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57217567e0830bcf4451a679deb5efac3
SHA1f4ded2208261907f4320b17ab14f35417bfdcf60
SHA256819d2ae4d5d9fbce6fc50c5cc13332c3b48b2256f757d01097ec739718bd5f22
SHA5129d261a58399c80a48dc5c2d69a726a7158bc60c77868b982fe8c1c0e1a41958d1a2b2ab0fe626dc2e38ecc9dac8c5eb52c43506584f82e8bdfba214f1ef3cfe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8005c6052e0eec9ba8df94691ea909b
SHA1c53fcb81f7cd15524b23444db1bb490bff72f03d
SHA256c2fb5ae71d9ef900a5467324517ffa0c32e6f50f59a02b64d528c5e3eb554180
SHA5121285a03bdad00ac33327e33df69d5d47b70f99d09470e3b815255ac06b6d61910afe4cf8945a762cd98c1c5aff34ac09f9dd57987b43c38a26049f8483f632f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975ca95b0c7a75047ef7cf1fca1f9cd6
SHA1908b77bcf013830b2f05418f79e9c05263fcae54
SHA2565eb9109f7e2564fda8263205bf1fb01733798d6f008ff1381293021263bd8ba0
SHA51221c613134c708c6c14550d746cfff90202a81b501d83e35c487085920bc8269227cd6d9a1dd1c2f4af650a238a25bac3db6e7ef46b2d5150da43228fa2dc7c83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a