Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2829043988dfe08398069b7600e63d23_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2829043988dfe08398069b7600e63d23_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2829043988dfe08398069b7600e63d23_JaffaCakes118.html
-
Size
32KB
-
MD5
2829043988dfe08398069b7600e63d23
-
SHA1
f41ab4b73f8877d2b07e361138d0f99593c006d0
-
SHA256
fa54778200a0b44197bf8579aa7c065409c0237fc82af86e68d3c4cc3df94bfa
-
SHA512
a64eb4f01408a15fbedfc6da65ca5c280cdf6c32bda73e782fa97ea5485fcb6e2ac61ff51232384e7af469cf3b8f6932955927531d96512b1f160fe267837283
-
SSDEEP
768:I+Xah33M4NZow5Fg4cfMouWc2o79TO+HlcWQ3Wj91XjNyiwMo94:I+Xah33M4NZow5Fg4cfMouWcxTO+HKRG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421388228" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6B05E41-0DB6-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007f38096683022b1ee57b7be92a54b138665bd9f7114f01c13fd658ca388b3bc5000000000e800000000200002000000070a62545a266ba7279815b2b1fcb956c73e6892a51a961a08869689776b8eb2e200000000642b8803bedae6739c59fbd2c065d8657ccddd55292eeffaf5b944f76a6af9d40000000472de96c50c7e1f178a5b9a1a9694da0711696c08c51cfee28954761b98e11f9a9d5507c0946e0dac1bb580c0fa8ef6378c622a6dcaa71938904671f6d5b3015 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7007a39ec3a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28 PID 1568 wrote to memory of 2928 1568 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2829043988dfe08398069b7600e63d23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59afbaebb6945da9f5bedb40d079f6c62
SHA1ec45d9bedb67af15b53e2e115604eb446758854f
SHA256bf1f0300ab85909b5388b16bb73108c916ef8eb17cb5157123395c3c5fb36f54
SHA5128d0a2e9f79bc0df91e8bfb182a98534ee0f8452c3657d6c368276a3c04e7a630ab4366765fce6f4da43174d31863d0f29758e07e0e87cf9b8797ead1f8c25fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2ea424fa3c7d2ea95eb934da68ba593
SHA1750515586f71bebf86d2f9462cd23c1bd038ba4c
SHA2560188f319799f51cf48f82637b4d97ca291b82874dff123dfd7032be863e437ba
SHA512776e763b8e68ca3372b7df2b6a362ddf0b4659db81f127ea9703eae4821071c91ea68095e8cef52569516cb1c4fef4cca2767dc0f0c7773da7728fe3fbfd20a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d73162fedc4e4e4da24c03d9222b40ca
SHA146d25edd6b119e89f594f363fd1790e8578deeee
SHA2568531e1324a08b16dbba78913d83ffe0efa4c548c8cd6ff6e45657b7253105ba3
SHA5124544e2d1a62be04972d25fd95a176d5b759aa4da252f5918daaa167d069278325f549a99ef39ab0ca642635334710124eb017fb8d12d1dd03ef88580004012c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57dd97b6f6e2902bbada0bc17a3d4e5a4
SHA1e8170b7aa5ddcbaffa3c81f26f798167dd34b4c6
SHA256e83a71b9ce18f1e50554bff8f63b134f0e70a66db0635245face55aff309852a
SHA51229fa6e6b802410b5b72a6e5905f31197391e393bf2e89a49eb98e3ea4efbf5f339e671f337ba84f9956637f5226d81c7ad197a87ac364e59611ae745d26fdeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e5a19bd5352a0d1cbc64446532810d8
SHA1e39b7c0d451a6bed4d0056a6f987bad8bd46613d
SHA256549c137d810904b588a4f5cb559134939ccc4c659af9db39b5ee43fa84b71286
SHA512431ac86a828c71f1783acd422c1fe7a98c587ddf118d633c3f4d013e1670b5e58f34cc749686524a19e189d67b5dbb09d6b13d93f85f187424ca705b020bf1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6880a2bb0c7db8d1eb062c79ab5aff5
SHA113df91f35190dc1d97cab880fbe0f97e53cf155c
SHA256c780ffde223df8cdc2a33a07a4812e541090a07c2d25cc65288d7dcab1f769d8
SHA5126f88834c95a3e3342804b3cfc3d8c64f83fb4876830038d094c2d1748a479689b440e41d31152f8749b63b086aad8a0455d9fd775cbd6991f66bac6b6a15050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD590132b8110c2deb2d91110b38dce030a
SHA13389874aaed82028fced3cd3929485843a7d9b18
SHA25614e537a31aa76dcf5f0cbbc750a9ad8197739243cd4f9ade66e5437d5500bec3
SHA512c0d966d77dc50f7f1e19a9ea84aecf5218a91d2703548c82a282721d9b12ef4a5ff5de1366934fd856808a1b27480b07143d922964f948123c64b94f42675dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524859e36b15b80075fabd3e922b4f909
SHA1f0af372432f7fa1ee2eb626ee24fc64372e2bd3b
SHA2565b6a94b53ebb5486de1e9e18c631749c10778bf958f26d3bc85a4697b999b293
SHA512c803b52b256499da5582ff8ba41b1b8d3a2d6cbcf6ef59e740fccbef181aefb460e49eb1d802cffbd13c7a6c224a06e3ab8a622c3f80ae167a3417c725030601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e97154675c3f51e016e32e0adade3a8
SHA11effe61a8759ffbae1da26a88f66db5ca6bdfe53
SHA256c48d462a8b5684cb5401f4beb6586c51d45959fea162cfa2e64900d8862feffa
SHA5128fe6d86e538cbb7be1b71d292895ce3199f56b3c503fcce2c3e56f62e6cd60a6cbee7bfaeae3aa4ce62094e7685c15bffc910e4e292f2ace58d1222e5bd18c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54811b6b902a0c00d783e334942240d1d
SHA140295888617d136e76d647168affce3e0ad9e155
SHA2568626532ae047a760754bea0fe405a9e28879a5d80f8e68922bca7b63bf5d4c00
SHA512aff99fa87d392607a70fc589046353be8ac4fcbcf148f65533db26f0da40c53292882c0ab610e380e15e7e61833761d679bb52cafa215df1d41a859b146f8fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5679718b283b592b83ef31a29cffec6fe
SHA178f8d0f9bbc275c1b6bca9f65b6675d0def46215
SHA256be993ac7dec5b12eda5d04ad0180fda890ddce81684f8eb323c1a8baa4ddf869
SHA512e8bab976b2d83c4b8f245a0e1050dd665d7b4e5b50767759be4244d7b137bfb6d97885b3359c255c24dd19892afd83fc9d545532ee60f0b24ea516aca8d9736e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf899d586b15b8aea5569156d828aeca
SHA1e14a2cc472b5b05c799852c9bb639558158a9962
SHA25635231df304e6477cbaddc47a447c730feda758c687cce9b9a0788f97ed1acd3d
SHA5125f8427e6d5ad5217363e589bc2a4f75fb5ac2ac59a0b7f18b788b882c33d334c502b66f0575273f5e87bff15133e23d5b5da44fc06fcf08d19ad6000a595431f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f36d9399fb6d0f7d6858198e3fb95756
SHA15d698e2720976460568d5c8d924ceb7fbe8efe1c
SHA2567a91b83e9312304abac22fbb38122a887cce2b3b4db14d59a8937d06ed967395
SHA5122d1d81489c1efa54929e18d00f2e16d842300fcf179e307e0a6f1f6f912dc3f0c0a7dcdf226cf41147563014ff2b03f9c4aaa8597690838e14b0499a29a2cf9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598f7286aee2d6a37eaf08d2d01b9af89
SHA148d2f1b3b3797224c9035f3b8b181b62e4a8b3ca
SHA256c8d3c50701713cfe2f87963f0a091958665f05df438dfb8c46283368802aec56
SHA5124e4d00ddd648fe75c7ad6e55eb16a94a063334174771a97ce49f01a1b737312d01e90808b24376be27ee9040c7477edaf3ec01c5c2a9731170035c86f3516059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528443b828f14a5c0979c835eefbad824
SHA107698e18a00ba143c560209cc4a5a93e554b6856
SHA2568590e1b15cc6ed637d1c51d7b9c67eddae72965683e09961eb64bee91a39efbd
SHA512de08eef1db6c7ef059cbecdc3b714ff1feaa4313f40e5befb37770ce06ad66095da0261952594afcff296fb6d70c67fd7f22ce92f37028cf861c34d0602c4b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51542654ff534b2f0e1c1ecf0c230ca97
SHA17d85265e94567e421c270f53e3cf6b7f34aad093
SHA256aa70fb3e695d8c57efd62f8b9dd90ab3efb61a2c04fdd559ca54d64f438cb86b
SHA512ea933e740b664011ea05074d2af5269d5859a7faa4243c875dfc1532ae5e8302cc2a7d518dcda25572345c894c50f4fd9aa81eb134694c13357c5b50cd17594b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5377e12c957ea79d01fcef4b2eb88d493
SHA1b7f9573f6494c2b58bcf27f5f430eb046ef944ed
SHA256d0165402b6df40f2908e26e407710aa988e711af8573059a7fa97c76b21b18d3
SHA512ea29f7eb96ec58d52e8a6e6e3204fe044261efb185d1d1c5094ff26559c1a820a7ec850acc81a0d04b0dc5b140f59e9d4118e2238d08581123898c894d2e52cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a366784d6eda936c4cda178c8ac62911
SHA15a6c69259af39ff20c1bfe2ad74048dc527853e6
SHA25614f357930bcf63f08af414b2329b35243c1140830bb2b1f6bbed4640fdb3d9c3
SHA51240b5b2fa0ba31d74efe5472131affbfa6b85793b69738f80c12ab84da2151d8ce817181baa4e447baa83586a1e91b15c40cacbc422c84db16bcd5870fd037f5b
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a