Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
2eff4c6d3231d090524e1fb88ae4265a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2eff4c6d3231d090524e1fb88ae4265a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2eff4c6d3231d090524e1fb88ae4265a_JaffaCakes118.html
-
Size
21KB
-
MD5
2eff4c6d3231d090524e1fb88ae4265a
-
SHA1
7cfe7c7b512f70dadadf4c96ad01bb806e2c9131
-
SHA256
8317f149e2b31c3f99a850a20119cda48fee74120b7787743e5060bcd39a08bb
-
SHA512
8853f1e3227ae284284b6bccbcb69fef8b91dfdcbef82a8b27c6fd31837a78b280760326b3b9db3539ae0d249c411b5a3afb86f2ca33703d2db158aef27686f9
-
SSDEEP
384:zi3Khg0TYVBD8cm3RjnAfImEfP4ycbp5pzVc5eDJZTOUu70q:ziETYgcm3lMImGP4yAhJZTOUq0q
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421504251" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a6a8a1d1a2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000002d055654721b9d25594c092c037077151f1b232035e9969b79df7b83806dac1b000000000e800000000200002000000046d62691d961c214683a366516fc8e4a973f4101f02521bb3936a677547965d42000000026bafeacaf040b7dfc524c0dceca2347cf5e25b37c8e779db41fe3b0974e159540000000818de60f07a17fee5d79c6f9fa383c67b84840ee928bc7435a6ce0068c6365b1f7d88cbe69418663b289168b2c913202275d66dad4556f175bc4ae5ab6298a4e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA5B9851-0EC4-11EF-B3A2-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1720 3044 iexplore.exe 28 PID 3044 wrote to memory of 1720 3044 iexplore.exe 28 PID 3044 wrote to memory of 1720 3044 iexplore.exe 28 PID 3044 wrote to memory of 1720 3044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2eff4c6d3231d090524e1fb88ae4265a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312c6e6004a3aae6efafbc32720cb839
SHA1b3fcd3a0fae0979bf4c936a1ae3e5efbd17988cb
SHA2569f6d5b69813737902148627bf4816a614f9a15ebc904c3af97e6ca179d354028
SHA512c1192a32ffff2e3fcd3fa5dd3db9825a905099bd5fe97b273575a366ab3b6c9066b86fc7e0ba622c9835146c15cefebd7a39e9223173428cf648a1cd507e8f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f20c26a5659a3d968ec17255b601dc
SHA1adfc152e2eba4ffe58cd63653a3246e7106eaff7
SHA256fe44e6270f04444c3fbfb6b03cad6f6e439fa0c94736867291321e97fea70234
SHA51250c913872e421e705a68abeecdc0dc8cd9bf37554746440cdd5c6b2b9ca7b5f55ece2798f4ec134bcd1f4f331320904754e683adce0e3c83f5e59a96285844f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590e27a7fe80502e0e7127c8fd2bbbb57
SHA1273f52bc45490f289f30f2cf9ab984400e113c76
SHA256080f5c677e234dd1851ba3e49995c7a06625be8926a0761ef934ddd49f3bc3f3
SHA512f9e35f7c97fb424168344d450635a83bc37836082683a58ad9e08c1c1a6963975a9b647b3a9c3e57f75699265331a1504586e61cf6807df44b95e6553d3f9fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eb23e1277bc836862f77dd0f1240786
SHA1ef97dccf2aec4c800f28dc12b6f6c437b72902db
SHA25696d403ec92437a3c7b95bca3b8802a3082b56f032fe741d7ccf98080ca5ab74c
SHA512d36366d3fc3ff20a6b437b0c2b725c9de81e428e50c657091b29a78ab5a3e014a1f4b01fd6487dca02233316898a74da5418c1d093dc8eca383a8dbf12a6136d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50029e74fc473960ebd4cb1e7d29b1e3d
SHA17f44cc6e7c8468d216f5443bbd03ac4f9fc3e4ec
SHA2560ce68c628b07205726d2a224432da375aecb7f70fd8636b04e41802862af6abf
SHA512f6f5f75b68ee13503da2cd19f4f0e2db5cd76210e8e54a8f6b37ece87fffc38bacd8344114cce1bb5ce3a3020185f8e1aa4dd0df15635c9aa006c5181931a81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d80d990aee1430edbe32f0b52e8363e
SHA19142d41919d36267538c974aa40702118289b9f1
SHA256c68d687db4f8db9021e59ba20b678d827023570fbe99299840e6e24f1696e550
SHA5128961ad0480c0cf0b1a3ca71efa875bae9c02c7adf9318aed7a87b19f004a7bd6474394a2b888c28de8e358dd6a79f3d7c2ec6937da97a88a76f57f9902569c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d33092cdc02f9540387b834bd043ee
SHA1d701a4b33d0397fb5aaaec3634c7cd9cd1622ac6
SHA256c22bcfdfc7f972836d95a67b58b57f66ba5a4b62cc3d4f641019851b511ec6a1
SHA51276d9ce2dd5f0047787ba8696beb8a820f6c926b0187bd2c67495ee00836ed47d3ba0abf5f7c0698c8a6ab999a06341969f1499e327ae2ae973c17ec1cc0cf118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501af40f7096a1ac0b1fff9f4daba8e17
SHA1aed56a83489677ba3af2b1414f92031d26ccb64b
SHA2565e858590b3eb9fd1714ad4e6549c4c65ff881dbf5a8e7140fa3d0258ad5f30af
SHA512e4701dadaffdef8c717d97ffea0bc7e7f7a762d8717b755d35558ff73319b227c709a71f54644bc7a5a32aeabf3c5ccccf429c5e4a590f9c86e56742b87ee3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592dae450497ed95c266562559bf74510
SHA14c5510e1b37a6580e6a253d0ed8b7a242f5a2284
SHA256ec444ff41d1fc51a0d842daeca76af997745d24ac3d9af177526856e95b07219
SHA5126e14342be33df7dd8f24ddef1256f1038ecb880addd0256b045de85d57f249b8c7d5816d8cc714f96bf56c947ba6ad6d488a4333dbe442f5ffe003d355b95759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57d128c4c3808c6ae75247110302e88
SHA134483aa861525297ca7397b28c229431efe5f64d
SHA2566dbfda5ad3431d58c580f546cbc6b721b9220e968ce275715822e7c464d237ef
SHA51294c972565816316f8e069045e8f1b9e0df56940dc1645dae11f8241a7e0ad71b7e94bb47c32cc9a83f2d6be91c73f2555712540a582c9acb8fb422decbc06d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57760147ded96889f1331cea605239cfe
SHA1deb4c2425e735328a11c484c7c24f994396fad58
SHA256963bea2a96981509fbd34349fcb1e111ba14166b37ae014aa4751f551489b0f0
SHA512ac8e209f3023b8f31b4f782223d214e33b3407c6d4e941fca904e8f1ab6e0a8d67edbc8a3677bef900210d71f8d8b44853e1b9261a17a7ea7fd9e853b2f7f321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5977b16f74439eea6a07522eaa667e1ab
SHA1b073dd46fc9727de23d4054dc6cfd28f9811291a
SHA256b9f00fdd5a9e0f8b56e169484da2388f942a098be1ae65c6f1852d6c31911b86
SHA5128f38931bd3b576bbafd6f1d82e0e50e398bd46c065d225f19910ccd6c2688d52d4352a799223c9afac98058e3bcf80d9f3ba32a6905713595451b065736281a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506adc1795b03bbf1d70a72bf4b3a20de
SHA1bb46b5deb1e62e527dd28062d541b62fdab375f2
SHA2568e561c7c016b8018f5e1d1762e5e7daa3ba016ef5b912c61bdf1f636f536ce78
SHA51272f10e23c7aee950694acd3344a9f2f234f1f5d6427f143283959c1838a6d35b3f3c0f2f7c9e0e542d1fa906e6866d755d98d660beda2fd636066132355e9a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eafc7270dc0d3ee1df21eebeaf76848
SHA1056fccca2408805ccad480a47a8e325a17961200
SHA256386dfc7a73faaaa8878def057b8028f5f8fc8067696b07754153407401f1b43a
SHA512825b6caabca65f07b838a32e99a1976e29761df3b35943648fa7ad351479fde9889e0aad7ab18534824329c1a081fea809fdcb00a0631b9e98a138bb3927071e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64d6d5978aa6d9a360c584ea56f2f22
SHA151a6509e174e4d8250ed604ac3517afdf45f0dd5
SHA256f8dd0dc94d59efbea381943589044aab9ebe5e95f6828a7a0feaaca989fe3f0f
SHA51216c742bacfd05bff95453864a8b310a2596a1b9d4f93c7537560bc0ecd756d295c293cde43165ea070af2694b92eb1b84d357085e8ba306c9fb92e51c3976bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5defffb78a7d68be906db2378fe7dcac6
SHA141d5b081af7f63778b3bb263f9c57f959c01e3c7
SHA2566e7a1528971a32a1d7693736b305db1bdd950a9aef8c5f289098e3918e6129cc
SHA5124fd9eba1ec02b3a64425fb09b521461f0255df38a84aa3385a6023e415384b971eb95b7aa6b27a554c742814e1dfdff551e4828b4a25f8f01c7a2096e784b050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db9a975cc4cee2eec2cf3550fe23636
SHA15e09dff920c870fbdfe60cfacb84beb404e77d05
SHA25630068e22cfef49ad387d9f0473128262178343614f555b2a3564e314327dce32
SHA512b24b3af827cbc018178e93ea89b6ef0b4dba712d6c0c49109b56447b28d583bde756ab657dd50fab23e6743cca5b10aa2957ff20698e89573dd1001c88d95c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4a7eec8dd563085fa2b20e510e5976
SHA19e2d7018093c701a988b8028311276c7b3c397d1
SHA256c1814d2b5c3e98cef8921f66732688f8e5996a90dfc3c1c6d1ecdac357921b23
SHA512354f57ede174a5d656453d2a8d4eb5baabbc2f578ade51926e0c3a5bf46ff98b2bd7f1573cc7a76da98b09e6641c4679bb10b762b538547e54f47ae1f8ab06f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9a80be18aea5d5d6a684246da8c2012
SHA1f05854b7a7035315171963675d27319eba2c6777
SHA2560644951371fac344ac925d6bc9299869b5d4b9624e60ac3fdf51632d8731b03b
SHA51208ae6f5042d83c5acc2e055ade1de0fa3b4d7695c86f1e4b40ed89c7ff023d3421b097dd7f863f49b18b5945d084c69b7c18e87c998604187e48b451c5c5f5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b52c556b36c8e1f973907214b2134d
SHA1bd9d23df6edcff7bb74ff35c76838077a6147443
SHA256dad6f56423cfec1e050cb61702723457e3953b6a99f83df0cf1e8d74e9202cd5
SHA512cbf9cfdc8f5149f741a2abbcc84cc91c057851300adf03fa80420e464ddc383ae8cad648d71d8d7b4e53c8d085bc478f70375a0099bb4b60774c252fbb206ee8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a