Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
2823c36b8ca076d285530df5eddf19ae_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2823c36b8ca076d285530df5eddf19ae_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2823c36b8ca076d285530df5eddf19ae_JaffaCakes118.html
-
Size
4KB
-
MD5
2823c36b8ca076d285530df5eddf19ae
-
SHA1
97f80c699528b285c276d6e655878809462a44f9
-
SHA256
fec3d5f0f12fbe34969a0adbb98cc9c669646671cd525a75e066f51c5ac92d8f
-
SHA512
753702f0e131120bae81f65434030a7af136fcbd732c7ce69a67349ccc1ce77af5f4c289d14ca9d26f7015710f1c506b2fa734c8697b749b62379121f04cd5a2
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAv+d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000dd20d5fbb322b639a36175bc7eab508ef858695e9e9f25d93541595571e21ab2000000000e8000000002000020000000a46c8b95f7871784c17222134064bcf527522a1fd969493c62d288810ae5823420000000277b79df9ef537132966acc54575ee8be6bf4bfe0c697566e0edb130f506012840000000414e53e4a2d11d0079835596d7445ebb1e77208787f3e38dd3a993ece20384d7c3972f4c8543ee78d7a2f8b440942a650e6855924ad7e4b40a9aeeef2ef79c70 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709004d3c2a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEA0A7F1-0DB5-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421387946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2823c36b8ca076d285530df5eddf19ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb20b3c3f5ea69184f50be245908942
SHA15cac4acc6825240c0884d878376fde5a4a60f550
SHA2566718bd9906527e921398e7f2f14306de6a104cd5194699bd1666159084e3a919
SHA5127b40114f1e9a888119c1f0b6dab2f2f7c41c5b7a3be5b4df21475942d688e8c98c6a941335a758f0d50eb35cd40008e5690650a830e30daa4ccb2da8c0c3afa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5adac986cab0ab47847ce3115ae7e07
SHA1bcbea459bc96b818c7af97c18a3383923329ff6a
SHA2567a8b22080fe528d67f376f677d008b0e131367a9661c32a5650e8965189720da
SHA512449b1a3ddb4b3a822ad2bf56a5d1b6e86b50d44452a5498657da6f40e0b7738d38fe7ecc17fbb53f81e47bf06ab927518567bc2d10ac7ca67f2dce41a045b5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb40d60c14f51e45b00e6a44552b41c7
SHA1bf78e4ecba8631483e7754ff3e49302ced9a524e
SHA2565039fdfdb069259798750e9292c798b3bfaa3592a95c4051953e6cd1821d93c6
SHA512eed655485d797084bab16d7017495217081366bcd5c93763587b74a14b662d431d1e6bd3dd9ea43a59e9f9b09f9e078870ceba6a50864db6c6cbf1cb593d0a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2daad34c0d5c78cecd23f0a504fed3
SHA1789c05f87039661aa8984c5c7ade0291277e5369
SHA256989589bca9ed445340442c3918c3968d0a1756dc8867ca1db49f29097acf9482
SHA512149f53394abe1ac868b226673c31e7c09fef5707d15551fa28277c43ee76944ebad3915baa6305a848d04d7e48b43698a926a0990cedefee46752f5fc1d935c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b21d7fffcae7d99c79bff9970c9d27bc
SHA105dfd2577a113d07bb64976e82ee3133499b102a
SHA25652d6aa68fb8657874fff15c12c56a5aff12079b3efe86fd998206d92acf939d0
SHA512bca5d5fe0347e7d41d9e9f924eba2cf86293a18bdde8d09b19f45f88fbc824d15ea7df9fbb259bb0b09be7a96b5c8945642d28ccbbbeecb6f5671ef099adc19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1c07f89ffc90d76a075c8eba4ad3fe
SHA1a6e5d00b624f608f841a244beb1f898fe15e4b33
SHA25602853540d03ea5831227aa020e0a76ec113d086473f242d57a7ded1bf49f0517
SHA51215086219b8c8d048a05a4d512376faea1f43230422843127b959caadf1df115eb8d5eaaaabb0b9e9ecb678fc6c87678e2213d40d950115c02f176e34823a7849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b82647bbc4697c519a9e405f2e9e7d06
SHA1ab66715b74742406a0e4137c43f9b02c1a0acd20
SHA256f32df3994dfae9ea73f05c8e312a226925120e6f42d7bc49db3db5495a5bb30d
SHA5127a97ba681036930774593deec73f97e487d4518015951a6d055e85a04a6e6a6c5f14b236c8b0459408d3e230c3fbcebd0364842bdcbd9388722abc62c2128189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0afb32d5f055f145a55dcef6f073efc
SHA1ac1669bdad41b4af07df84d0dad5a257aca4c772
SHA25679b01e44be5cd996522294d11951223b8b0a986a13b77d3da0557e6fec947a4a
SHA512c79d117c53f9f7c6efbcc79db0afda199bc0486f0a4a85eefb7b8cfe1a90cd4a9e7308640f42f14038f47c4eb6a68c4e6adb85a5cb88b9b8cfbe6d938ffe3e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ca0bf6acaebf51a81380e6a9b281e77
SHA15d816ab01c335cdbe87247952b539d6d11846384
SHA25687dd1b6dbc29ccfa317cad3871c3d5914ea19b842902cfe3185d004a643d1ea6
SHA512cd64973f066d2f0c3ba636921c4e63d68d837a59ef3722d63fde2863a1556ba57d1a4550d2bebc2e174f3aff9f304d473cb9736645619668c7a26780014cfae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50348aa9561bbb8438cbcbd68764a2e0b
SHA19310c404cf6fa7d16c3a5ffc8b8dbcb8c5e6fd8f
SHA2565cdbf49c3c222deb92893b711b113f824d2b7e0b935b48e73c7e4e8a46bba35d
SHA5126ab306b05f1736e87ff4a0faccffb09d0c52b2bfafa549816a02f99a07c3b44a0a8b7ea852c4ac67b974e38994bd2d4f03225fbe8d903511603f50ab46b5235b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a48c56135643edcc8fb71b96401d0c45
SHA134599ffbaf7739d0f550509bb828c2c7cc284ab5
SHA2567a7634bf7f0e5db5b2e6f2fb146fb0b2be5eb638bdefd779c076bf57ee8f3ee1
SHA5128f7e64b12a65a8c5a3df135f0e005ba9db6cc522a530fd761488827b6e9259500fa50f6b4e6ffc7f0542b0a1f9db335c71844f4542acbeb81dcaf2f6ba949d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb5998ad9e03c9288b04bb8f3b08758f
SHA19c1f6fc445f32a5aa21e199904ae1efe0b83073e
SHA25627fafcdde0341893a08a7be0862d7cc4f293a59acbbfd6f1d2360216b691821f
SHA51277f3fb8fc10c84365af63e70e2cacaacd4df61cfe379c18bedde93fa23b77fdb905580d6295c4d025b5210cc439020cd3f0b55841b259e6fc24134193876d45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f62a4c1929904682f1c7e8da5053ebd
SHA1c134585894e98f5f8383197aabd211f209c3e30d
SHA256c1c31b29515888206eeb733aef7d19dbc737c44534aae1647a50f2038423b929
SHA51260fa65d3e4dd9082cf96f860ea3ef9304508a1240aebb28914c4fe5c40539421f168d0b9d5fcdeacccc8dd91ce57ad39047b6fd0fff003e8db477ad7e4e1c496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae1b1583357456e060da432b240282b
SHA18c3f94c39a4879f80d1e96cd8ea62505a9f74bac
SHA256909f083af0d23a6f2c09e70c294d53fa0a688d42aa1e0f6363b44d70751478f8
SHA5126f7fa6fd01e799383065c441b6ad3a87f7547473b82e283c4ecaf375f78ed18277bd09b7a19340a3c7dab6121d5ace2aa2608705d891d5e6ece5652d1849e99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50098a5b19e5dfc294ce9d71359f8433f
SHA1f2e5a2c1cdb59b194bb130249ef144a3aff36aa6
SHA2564995a36118dc8a0fdeecd20aaeea14aaf890db9f68303dd71696f23238b093db
SHA5125d833a2cb0b45555cb67bf14e6dbba060ab41b50b0c2de10244863d310de2148a0687652265c95b0f1fcff6c0968bb80a9f0c27391a359aef3bec472309d9870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5468215cbcc7bf6c364f1473ef0a65541
SHA11cf8ad622d8c57475f633e46e82bc87313c16941
SHA2563470d29b5da324414abb77da57ff3ded9193d106833f5dac1535a9f31a515dc7
SHA5121c946e7727e806e655d1c75d32d20292350d067f814c94b6631531febb456065045b5a2788cd4b1d2c9767e1baa6f725c5bcf605168c99860a158231fb3f4a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef76fbdc6dd81405396c7c6a89ec6165
SHA1eb44d9e2a0bc06e62c8d79747e80c2e2f8115da0
SHA256e618f125c9dfd24e1392f78de5aba9bafe763a1f9407cb812a4c3af5f047620f
SHA5126bf61516a22f7654a475aac12bb0e468899dbb3a2b4debbe05d9d0efe301baa060015f137500f435f6e3edbb044273a40a2a18fa2b6e510e104a4850e48bde9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51300cf71b1e7602ea1c71f8a87f2cd79
SHA19df8dcd9030335f6b802ae4031a2ae97ae7cd9a8
SHA256d18ecf74fd9174a2c82ce9420f858c1417f2b72e3349bb8ba5ff2cb500ded7e6
SHA5120093f4967ea7c3ea9688ae8b7501d3401c0749fb71d126a5867816920e8b4c22e777c1ce428b8f87caacc379484212df0dfa63dcb2e946e08450bd8f4ca90915
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a