Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
2bec103e2175e6d56d90fab8565639e6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bec103e2175e6d56d90fab8565639e6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2bec103e2175e6d56d90fab8565639e6_JaffaCakes118.html
-
Size
357KB
-
MD5
2bec103e2175e6d56d90fab8565639e6
-
SHA1
c8ce28a83454b30515bfae2477933f126ecfbb87
-
SHA256
95bf74a632683eda816a16dc854117be4071f5caf4d919a86b3ff21f87f86120
-
SHA512
80631b41efd5f88f31607b1648f34e00435d8a85f74d15e516a3a5f97b9f0ab4c386785ad92659b9117bc87eae106397474775c63707deea0bc204f16149fbeb
-
SSDEEP
6144:ShsMYod+X3oI+Yj1/sMYod+X3oI+YMsMYod+X3oI+YQ:o5d+X3P5d+X3s5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421453994" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305223b65ca2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000f6a1f8eeda8a026b08588c7aafa1f9d753e1cee2a5fcbb49258efa1ca0aa9346000000000e80000000020000200000008d1935ac93a398e39c4de48aaee2a536accb39ae6d9bf3c97a7990aeda30a838200000008a367e8d1c4dd526a8f5519e2496283305691f3b09d20165f7bf47a9ea9de419400000008c8a9e23c8c1cf37656b76c31ea44d51e0e5f01b148c8d6ab5122e60d5720b57497441d53e691b45dbe56b7db6dd5b503f4693dd5cec29f60ecd5188a486b95b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C64971D1-0E4F-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28 PID 2128 wrote to memory of 1192 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bec103e2175e6d56d90fab8565639e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789c87a35ee4a0c213da2ae0ab124c70
SHA125f48bb3a7ef3aa9e9907afefe691ce861ac0e40
SHA256c15530e6dce7d99309930b16d40c49a0e0bafdb81bda4bb5e37829886710b375
SHA512d15fac6a11aaf8bfe8fe01ad9c1b0a011bf8be1715f0c4b0978f6e08f761234746f56400bad276956ba1876685ccf9129147449a98159c0027a43bdfcae87e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a8280167998f7b8d4563fd05dbd260
SHA1c52cf68a429bb1d2acbe9345c0e37ce4d430ce9d
SHA256a4f71e988ee3daa00c9e31343280f4e51224197ea0a21a6e7b010fcae727f44f
SHA5121fe746520aa7ed61ca1212d1ca012b42b2e2d50fcf80800acc1eb8c0c2a785510c55c3e9e368f8a063f574d3e171e721bc2cd84ed888f138f5897531764f458b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e296632ad3cacd28b29240a757bbf1
SHA1a0a21590cc10a6a40917121d74a680e98f0c37f3
SHA256df96a8f115da9216fbb5fb5eb5b69012ec3f1494f5db02a5b357d7d7498c03d4
SHA5120070db5a4174d743de98afe9e8f574ba9b5c73899cb319da8eeb33030a5ce866e51d9c60904f59f8cbec2cf08a3b9e25e434041b2df1479e1c36eb994be3d0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59753dc0c35de06f4e8f59d76afe8c3f1
SHA1c943e32d124b2e3bbd0ee5fb2f5feb25cd33cf44
SHA2564840e72fc76cd32da77531bbb37bec1357f140cee965cc76894b4e8b6de8b194
SHA512a07234671457553134ada202f85a11c316cf21c37072059a0811e940a9a3ed98f0ac8d5c9525eec7a8aa8cbaa10e5cf1cdcb518e03395e74d3735657ef818a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913ed1d619b04d412d91242e22bbc4a2
SHA1708cdcc368d57ec860304f13afcd0d0570cb093f
SHA2564ac9f8db03944620f3d480f85362cefb22d104ecad74f8268e1a9967db4fbcc7
SHA512325d35e4854bf9230e3acd701ae8d3ad814dc647c0c5d35b3ca9e373fdd7101bf59c905518a3aad5624b15961b34d712e2fac4299758e7e6d6e7823f0bdd92be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7372b2822f0207760ffb2dacd4bece9
SHA184d1c482d43e83c68950539098de7babfea406e5
SHA256359071d6dbe6b0819ed882c99e8c656aee4c9d15db67c64a0f561efd49ee66d5
SHA512c00afb5094efb93d8843429244358e653516674cee7e2ac7e13d5891c3ab1e29cedf50db225881a48e87a9f02a0cd87d606761a93a52d0641ee13ce3dcd7e0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd7d23d5c1a5d31f443f9893243f25f
SHA144c7b750f80d66650e9db27f56262bdf438d34ec
SHA25656f250cffd8dbf3b6121030ebc55cb174cb242f263eeade4d6f4cada1385b7a5
SHA51249b293e9e746226e00a6ea90941fa94b88ce5d66e259274de1e572bf8d3198701c272e39a93a917c8fef5bb006d5b8c38fd7aced947b541698652cee4df05faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552edded21f17028a28c5f5937b5fbec0
SHA119896307b4ff4b9c8a7a389f6cb085d93a2fc7f4
SHA256730b015e10857aeef81bb1fabd26b1b05f8d5d64634a730d163d262619206199
SHA512a2c5a2c3acbf08a0f7577bd60e710382f082f8e212c68c757bec57513858d1d5e558f200f5f1e7dd34200e2a08c72e2c62f5a78f2e460d0007eddd0cbbb68bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7e3af3d0a1524a86c40e501d352025a
SHA19083f2cd5f70e787049d6e1cdbd7d1bb054ae7a6
SHA2564a8219e7742bd91087e892920dd26a9e2d87cb82f5e2c3cfc29c9247bef91ae4
SHA512d9c35796f1e9d71c62c3d5cef53423253816360f7940c78ef9f6946a6478d3ff127a12deb497012bf2b22b5b3f22cdd71ac4db1c0dd2acc85b4d1ee9319807cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818229ad6d85ffd29d4b39ec2ef71156
SHA17c33940fa5827cf2c53a63d0bd26c8cce7e61d77
SHA25655a6c764736b8cf2f2da628c8e39723fd30202fcd10a8a235aa450825fdefe3b
SHA5123dc0eb4e09e58282afc56876f1386ba398c331aaa09ff9ef2c927265fdc88c570ace3fc1761a4f75247c16a2cc4c9c7fd2e63f1b20717905e7de1403addb20f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57f85620ced861ad13c169547cefd19
SHA181636cc17e7f2427838ee342431601ab8c1b6448
SHA2564a643ec90e6f0dbf2a0c9791d37304f46239fac7ab407d5a62894c1f235be1b1
SHA51245f87561ba0ca57ce5947abb497847862f95d84a24aa5dcb848b842a19afde99bd0837c6961eb4e69bbe01873ec3a14ada27f884bdfa9c4d6372568543118480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b3e6aa3671e03ed952452d277c12f8
SHA10e50fa4cedfa1c1a89d1524e7d9d9b3fa50b8771
SHA256bc6a0edf9b2f4d7cfbd8a7a0fe38966d4cb571c7fcf667bb6c856fe6865fad41
SHA512c77c2bd5f7a2e03a9de04a49b738dc5345ab291588f56469eda395992968feb21348b3137db5b0d716027eb44c9d3e299de1ec7c2f3ecd0ab19efaac59094327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2d80569c673241ae33ce79d337bd7e
SHA13472f08e35a129e5603c2485e74477d2cbabd242
SHA256818879e1b001162be7d95b76988481e5dfff6d16daac48fbce2df988ab04d60b
SHA512f52869d1dc33db78515899796f5f09b396cf418261c3e2dba9790297cde94d98df3ec511a1f7576590d2cbf3bba960cb9407bf917c8961de55e113552465584e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d33e8d28ec85dbf8f5ccc658e8a5355
SHA1c99e0d256efdd7b75316850cd8d1bdbdfae76550
SHA25606be4c4caa6a1d86470d98309a77197e6bcab963374f32681e256a89ed34f535
SHA512f36e114041332801a5ee68730a38d3735cbf33d394aa72ef14b655c9710ff51d829ad9889984f05544dfb20f2317dafd004beec54384e15daba4aa6b9135f99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9afc85baff06fcfefc601ff69cef417
SHA1dd522cd932c432997ec9fcce2efc26450842c497
SHA256e3f754e91501da55b353c8147930cf3685747f640ae2e23e7583ef94dbbc2d8f
SHA5120995a24bc578130dee6118ec427a9f1e84a9ddbf2d72e8ed499db266ab527eacb9c495f37133840fa3fcd56d0234a2e94b3159a191d15397e43605d3d67aec56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540a9c59e4eb7d082ed1a577ce9b661cc
SHA1764211ec022006deb115b56f61c2efb542358a32
SHA2569fcafa24b09cc3b92e53617b2e9ddaee9dd9382ded029576fabc88644441d868
SHA51299e24980ba47174931d83648a5bfcd47ffba1204cd286cc4da77054f58092bcf1c0c3dc139f455dc41cc1da64be900a1d2504540ca9b683e47ae8c9cb16f30dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7af8e83d200a5df9319fe95ddfe2595
SHA103229c4ce84c1b3831e3ca77c02f5b7e8c29b558
SHA2569fcc5099079633f0a2b2d7348b6cd63a41084e62c0c72de0d2dcfde21c3d3ba0
SHA512b311751decd6997e5697fed96f4e76a35b1a55953bb32c225e1f039bf5a300de5d91d5f80d17b1c7849dc236332c3d199276e9d3b9b267b654719b632784a20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63fc451af2e7ee291f114669a0382bb
SHA1fd4e5a229c1dae670ec4597d8b4fe35c6ea6e39e
SHA25623802818e623274d30f835a7f1b37d02e3dcb337fbd803789dc54482a3bff4f4
SHA5123b3bb7872a68089288bdfda8033e055a357799540b3dcd23133180b2552ff2cc01004e9b91fa8627921ced439747a356926fbddf22364408f8057b081ea986eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582a334e825df7fdbd6d8f4d23ed0c779
SHA16c75dc6b1975421f827e9897bf3fecf91ac3231a
SHA2562fce5e7b1d165171295dd367ca0fd721b9cc4d973b39f5b48ecf970b456b522d
SHA512d9fe9d1fb9c1749b26761d1eb9f88d1d76df32e839361e71d248fa56872d6202f3b115363fd4140fa512273b5892e1161e40bb06f2e10615ddf6915fb2e2eea9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a