Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
2a6be2710423d74529a1aa107fa51a54_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a6be2710423d74529a1aa107fa51a54_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a6be2710423d74529a1aa107fa51a54_JaffaCakes118.html
-
Size
14KB
-
MD5
2a6be2710423d74529a1aa107fa51a54
-
SHA1
0e5e3a3b54e88c8276cc46d5d397cf76d776a71b
-
SHA256
6f993304f26fcca8beb08bb3876bc5b0ab8c3fd3b4e24ec9ea2556722ee35904
-
SHA512
642436caa089573664c04ce05de92e00a5f97c5bb206a100431c1f2ab2e978335fa9d354bdf707790d7a9a08426c1af1d0435a2469233f6ce8d4a5913446c501
-
SSDEEP
384:Cyi6D07QNMxQsQ/RGaMQFAi79y1wWuMNH7m3GCW7+4LRGyFgF:Cyi4NMOs4qQFAi79IEM8c+eSF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000077a042956ab23b9dd689cea38fb6f81ac1745f0d42bfab1b982ab0f5ee857ce1000000000e8000000002000020000000354d8996b076f6cede63ef288e42fe0c5fef83354801015a355f222a8ef04478200000001a8a44915a19efb9fa81449fc51ec310b76e2d3c28f82f8cc5cd76bc6e3a04744000000096561c49da4db0ff5c8386b6fcddb8a5fc398606f6f3194baf21c957ad51fdd9a0988bf72e27c6b15d6d2bbddbe780b85a83db62a8fe7dd182d7f0ea51cbc8ab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421427195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60D966E1-0E11-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5094a8351ea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a6be2710423d74529a1aa107fa51a54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596bb015f8ea3f4f8ff1a314d0b69bce1
SHA184db39bb5c143082a1caa5782a746e97a8116889
SHA256bbc427cacee0724e18c77093cf0ff01f6d2307a5a89696b058dab0b6f9455a07
SHA51228fad88ba8c44766a2c0da11b31b57f530601122618a8c6df2da41bd0ffea4d1a2d377b31a9f3e15e264aaea6f2b46dd98e3769747514290fe0ef0b798423a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c3656942835cc37aae44da926aa98fb
SHA1210a710705b77ce1a797ae0269e7430da467c3bc
SHA256758575b344e66471a5442f52481c15cdd8ce5473dd1bc60b5c036fb63839bb18
SHA512be0151b24c31fc3328856c2ba72ec3e10d0201c7e63ae7b6dd372d0e966cd6d6e87807a802e411de4d245957824b0738cc3150ccb7d87bc91b4a18e2f4c5c34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cdaaeb8b82ce60c89d2663395bc7daa
SHA177479a8f1684733a9678ead2f154394cdb85f12b
SHA2563416d9708dcb56b73c9e8b4659ee3725264ba5768ec7940aadaa5b287cd1abf1
SHA512a8b95a6a3e4ecf02f075d023b4f763f765540d572d3697acb2b5825ae3292aefe4868b8de59cd67558c431ce229eaff4cd8d15f0c7352d9957a2208c2f4420a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59322d58c075e0cfbf712d9a5fa2a4020
SHA17a01612b3c624665d1fdb5c6481e6c00af11195b
SHA256d59a353853cd287f3d459b0ce1208de1b534ebbc0309fb6f145874c75988bd72
SHA512071a1949f74880c5244c92c8d8941e0b711689c07db239643a8838432763cb844fadc9b6febfa37683f1f6fdaeb0fd6e0b22cdb92ad0c1f95d9d77687329663f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfdaab0621949333f89514f70ad45e20
SHA1e287a6f6a79969273ec8babdea8eeed951d51d8b
SHA25625858f74d59a1c297716dc8763177edd89eeac3e36cafc0da90d4bfdd2c98854
SHA51276bbe4e1e2ac930e193aaf2fde9236711ec6692855585b480782c1b94e5a668f13085de2c261e50eb30cc4a77c296e67f14ecd5089c5a1382d3025149c15466e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6720751c7c7070957069621975711a
SHA10f99cb1c34142c6462b636a6086072b768c94304
SHA256a20dbbef96480304587986d7cc7c5364f6dca3efe9d1de2e1aebea0496590eec
SHA512528cf3353052a8c9b47d6150270ebded0d5744c6e4ac0e5e2f04be371fc733ef5c9658054e648489ab9536d48a290b502cb79cb73058f8168a2504e82d21347b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba91e1b933e2c9e9e0685f79f50047e3
SHA1a3e7b140c57fefc404a30d382669948d8ce19afa
SHA256491b97e64ec447378aa7c6d33f8c314c593ee1ddc83e7689767e51d306cb98da
SHA512bce5972f5b8aca080f11c9d013cb3308243b2f7c7de0289d36fd8ee6cc398477ef8da9c27b351d9a6d64c67db6a4a158fd0234a6f8e8dda4324b3b80c754efb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54baaeac56ffa8b6f80adf8112a077655
SHA1d4fba9653187f32892e094b013f902cf7b812549
SHA2560083d0532934a89b78089d893b86aee56e68201fa65496a4cee0fe5bfa518233
SHA51282707441a7e257adc6518cdadcdebd7729cc068cbfe18b635b3762ad75a91b1a72d2502a56db23d75ad779caa33c4a721b548da927813d55e9db7ef2d44b3c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51444d9bac58d25f18eaf8e2155988c20
SHA1706cdd805633f87f0ec69c4349541168874b8dae
SHA256755dde02afac77f02a84582237c05dbd9ab4019dc3623994d52a54124999cd04
SHA512c17efd6cde56f1a0b8b7897d669834445aa086ada1afeeb575b08251f064b988f80715613d17f53b98093a037f805466c8d558a09846ec5283c95af2952977fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c91963a65b43fc6a40c9e3601e0432d
SHA19d26e6dce6c461f4ffddf28afe33f9d225990315
SHA25644bbd3a80adf55f477be4c62c7c752452dc01136916f04554d71700122a2f7b6
SHA512ed42fe445a213fcfae85e1c620b4f5875f02de0301923cbdb2e5df2088640eed9ea855016d9d35ce14aa377533b610b9b67014a4790b553a65a6867a23e5540b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb475fe00a3705d179771c02c9a3903
SHA1c829a0d25fb465dd6be8e4ccb392f8002991ab55
SHA256947186204dbc7dd074b83171cad9a1f859960562a44b7b2575ba8c75d5343ad4
SHA512554640fddf08f7f5001bbafed9e0d253c9fb1a823828a3eea45bb18967532cef6831a575216c6953fcac3fd62d44b5756898c6909e30b233bd6b5eba53d42c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef73e9b6ea9d897fb3a237db624938a
SHA195d7629ee1f68a9305973d3e2d5645e7125033f7
SHA2566e683e945bdc9f8122db3d924399a1983edd5c6927dc4adca8757aa6394115e9
SHA5129d20687d8dfd5429d4d985c456dd0b45aab216be614e079c3263d02d0f92597d1eb1457a1adae5a1e1e7f6202edb3096ee2fb209b797610fd08cb99f2e644d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d56cbfb21942d3ddd6549c2052a25693
SHA1f44cdf8ed985de26aea4c2b1744c20c989951893
SHA256874430b578bccc68a3425de589ce5544ecebd3819114d1da3e0eeed43b214645
SHA512a221ec6a612a8be9de7b1259436ec95c3dc93b4ccae9cb6b26f9d9d27fff78eac5cbc28b1490e2e84e0f8f7b4f9ac663a916c1e1cc20d5ee06f32812cfa1e2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86419b32e73eca3f29e9392bc61023a
SHA1fe304b3ac9ffb6bc5c476bb3a0bd42d1f58bafc3
SHA2562882e36920a89208cc7ebc7c48dec658a53a7e757216f92c70ec1e89ba35242c
SHA512128c39feae69ce78be65fbb200fd7b1b73d31d90187cfa8ceafb11fdb47a47c125e614acb07cfe2bbfca0e4b49537a8d58bcd2d8e2a03492050c6ec841bb6ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37f9625bf703ef44da0fb7a919d46aa
SHA1b1da48ad76cf302ee88257da2e48369453c56c51
SHA25650fec6cd9fec3916f2835e8f7b7f79eec84fa8d19ebf0e7e3171f0c4edddf124
SHA512324c567c17351763c8f7924dcc300548f7ace687f4e08dfb083d1598765a7fce47036fc0bdf5abcb2be06f7d698966eb8373e17e9ead5776fd73132712d4efcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c10d94202ccf1c553b43eff800409a
SHA13d8c40277e6fbb5e63acabea27feb7cac1dab6bd
SHA25626c94e2bd9910536c72b4f427ac6d137ad421fc3ffbca5ff5fde61765a5300b3
SHA5125a4e02b0697752166e82251e9e870172d4ea65092e5f0a08e78c2593c44748c94173f5e239290f9c72a14d02fe0b32ecd33e96872eb92337a9e72acbf913e6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ab3ea95911a077bd7d8a5475fbba957
SHA167b8bf9ee69f9084f636af0432d323c21b47e216
SHA256a6f928c8d0d18822961aedece7330f8cfc17c0498f6548fbea34c80695077fb2
SHA5121522a32c2672b3678063b8c63bf183ac6f70bfb5745ca0b64ce1b4cb02b1951f5ac260349353b1c82fd9ab7bbf86f7d4e8f133c564a34a4ae0ae1dd48a5ce0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd6578a7ec91fd036b406ee907a73a4
SHA1a298ec22549601eb991bd7d5822c9fee4f60ae66
SHA2562236dad47ee739ecc37df1625169c0e453395da4396b9a9a177379dc1566ae08
SHA51222ef26243ebe0feb0c949808e60c23d537c2e844813fcbbda6fb82125ac5b154c7405b1499cb40d2b9f5da98dde7334c56133b19f72fe802d15915e9d489d6d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a