Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
34e7184682d87178f57fe763b1398f18_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34e7184682d87178f57fe763b1398f18_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34e7184682d87178f57fe763b1398f18_JaffaCakes118.html
-
Size
67KB
-
MD5
34e7184682d87178f57fe763b1398f18
-
SHA1
0b9c646452cf40d920e977ef6c792fe022e24a88
-
SHA256
bd48e1daac12b0e0abb8728eeb4fb9b37551982f078204ac29b8eb10e775167c
-
SHA512
1493db7f0442d0b4aff099036469d2b0bd2869ab394970f442ba11a88685d9caf5f37baa4fc708391383caf528e103c920d4a60a4648736b4d129402a79eafe3
-
SSDEEP
768:Ji4gcMiR3sI2PDDnX0g6yxugBoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JiZWTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD5A0231-0F9D-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421597404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303d0e82aaa3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005fd567d344038fe28823a3954da0be3d73dcddc95336820d5b79eb3ba4fec76e000000000e80000000020000200000006f41596569d8bce04996a3a5ad06cabcb428b424cbe03c4359b789e9af84737f20000000c17ac6a6f507ac532826bbb1d10cc1c73ab720d7c8072a0540b8c02ea0b46833400000001f9958fd198419a3a1b3ef6adc490a9fea4f39014cca3d6961cffaa18b1bee21175a0ec668dd61b83017f3372bee60ee487d3c9e5ce34c92163d758a910824d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1200 2008 iexplore.exe 28 PID 2008 wrote to memory of 1200 2008 iexplore.exe 28 PID 2008 wrote to memory of 1200 2008 iexplore.exe 28 PID 2008 wrote to memory of 1200 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34e7184682d87178f57fe763b1398f18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587415e2c059d970836e86666940f5751
SHA17add08132d3ab8c35b9bb3f5f0996c9cfa0241bb
SHA2560aad40a1b7c08d74c20e72b3d73d5a498e795f6e877faff7f90e7b5996273249
SHA512bc1c0d61997421d9c4d51ebe9e3139d4ed658afa87a96d281446b57a0c4cb88fe58a305a0d4a1935bd3c8d63f126ed193b4b77af23f50a46e2c48a30637e0475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54643618df9a637688794e4e43c7bbc08
SHA1b99063ab94b49603b4076b2656b05f8ed0d85b0b
SHA2562d150825deb542663f3fd5d832b6c5f8f13ec81c2cfa46a165c5bd8903701619
SHA512fd04cfaa8178e33593771facc0d859d21e0149e7952ca64a84749cc20b5c3b8e6217d303e4a1d22920b967f6921a8a20d21caf224bc83e9bab5d08a353470051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031d2e4fe87ecaaa4ee664ff2156020d
SHA1561acbf1343cf7a1a57a02e0cee277cd4aadc042
SHA25667bbdeb096d29cbe4222f1966a32a247135465f2c5c1376002bd982076ea5689
SHA5122bc81f007c133b832ec698f7c8ea7f013721e53a8862ce1f59557981c9faa30c35690371048acc677a0ea9d55654bc02b16d8afb2732b2935bac7f324d4c0df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b0affa6cd867169e11a8e398facfe5
SHA1729f56f8cebedbf1639391bdca0e2847ea324a14
SHA256e7bae243f3e0a8156f0d5c37c46a9daf849b6631f3b3ede4dc71aa0a63f35ce9
SHA5129a1c6cd4e7b7073288e811a42c2e2eb1ba2d6afd1f69a6e10fe17bdcee4aaf4677f3e67434366a0606f3a6a56b3e7c0ea5b37649def9d85becf8daaf174a0579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff1fd569ee055e33ceb8691d8877e63
SHA1450450cdd90a567888aacb5de1d305c5a18e7623
SHA256ed953297c112df9740edbd1afe41bed9098b6a56314055169a27a5faf631491a
SHA5129cda4dac2d60094bcd51d21cbd8953d5b7ef2246f3dd55ddb474e646923bf6c98c2ab9ddbc0d6457e2f6841afaf127eaf680fc00c45023b67e2303df778ec2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5955001697a218955fa38754e4090d8d6
SHA1c1fde12395a2f53e353943d8d8607e3872eb781d
SHA2567827433f36fb5b4ac7d64df73618a696ae25a54c7b0e2a4bf6bb9e4e5c654d88
SHA5121e907bf681675bcfb12033c6201fda49b1489a807eb60b46f161bfaff06c55f8d8df6650ac157b43c074d53f8c8df2ecc293b32031c4f1d3be3ab07b7f798e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e38beb2b82c2c29f26a5a325a515c0
SHA13d68acf9aeeac2e32e7db30494b867938c1292ec
SHA2560f4b1114280a2bdfb0b591a5e2c62e6295adf1c1e93a666c4aea32998232b68c
SHA512fcd036f80fd2a4b674388aa2d99b6ae2edd9f2a16ed7c10644b198981a49ae6928335da1f9a00feaf5d97da0a37cf8eee4c8ddc15e828eee91538fdc2d180c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a8341001c82cde40e17a242aa7df2f
SHA1e275e32864a6523cda3b78c09d1e28d5ec67c730
SHA256896899b4dc81d261dc07194d8eb97e57bd6d2508da088ec5a03db4d5b6bda7e8
SHA512689220217d5d9c6fe562ad6c1040781adbc6e9e765f9fe367b79503fa712f98cc75cc1367ff39b3a7eeaf048fef3280c87e6dd2306653ca63beba8b8007051d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3526d655467950f44e74d62e2acc87d
SHA1a122c419528dd42a9efad774c984f7e034e8d1be
SHA25676b63812ce576f256e3142483df9618bd32d9c23e5a6c40d5f4d4b2223450e64
SHA512dc0ffb80872a8c2cb72a3fe08f5b837b42c228564678dbeb1a3f3d7cb1380866901e8745d7f7cc4f3a88f5c2c1f1593636d04a239546411b3a3ba6c7120b124c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3fcc08692cafe0cf12a55a0709b7c11
SHA12cbe40d19e2a57b8968dd7ce2532e8637f479c5e
SHA25653a7d60942f11273e5f58972e36989b4bc1b95dc1cb4d24fd4e3cb0e9e5e28d3
SHA512febe5e667d690dbe5bd1939fe247c6d52a90bd3c87097215a96c5b2d3b17d42d34c7ce6e02956bb5a41d12c605d91694f72a6b2d2f760660035a4c4e7b01fd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f2cc148ed01e72229ff0b6e76d9e892
SHA1c02d3d0cc85a51ed7c7d2cd47695cd67b630f60e
SHA256d0564162a8c2d15c2b7cb83f25ab95763796fc7c2be7c29b4126fba935dec5eb
SHA5123140786dd453567b3d80ebf1bd4d15d23ee83c4e2dbc7414909a3534e5f924aca3bc584fff0f10859095b9ca14b8d84b47b603bb611063ae2e3a1a0098693337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b26394d0a50dc8baf369cff45448a488
SHA1ebfbbd34eee16e9e86335f92ece6b8ac326a3983
SHA2568a902c47499d7c598f1deed464256613ae583395a114c4ed8a284d017440db17
SHA512eec1abc95013032e774e938d2f4f0a1eba1a6650f07c360d7a93d2305787a4abed83685e78967b8b435628554044f52e3574a2da779c21d840b36a242be886ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a883eaebd9e7894c541ca978b9c90a
SHA15fc67e069588817621c172a906a22940973f8097
SHA256e8b1c07973d8adde313b4edfc179c7a951a2fcd4fa56d284f9bddef7f156c32e
SHA512bbb0b97da4c8ec122c704f89ae21ffd6fef005e63f998d00812e83f7de620f92d7dcbfe88e6aa065d8f2c43a587819c7367ddfe88e48c40b9e13a168cf2b3a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14c2f32f6106b6e78c339ff03bf67d7
SHA184f26a4202719f4c53da0f5d5c2fb614600d0526
SHA25617a61bf0d1f57bd9f65f8e3944bce7104578b9279c25d90023f1eddfcaffd4bc
SHA512c72b1d4420ad7fc0ac63255227512be2c7b6f192e2c4c3a9cacd7aa3f06fbbcfe772195fb95d231bfef0a3675393416f2369a0cf38634a355ca759ce1948257a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702461b5d9fb266e1827039f40ad274d
SHA1d0d3122becaf76677a91d282df1cbffeb43e2261
SHA256b8bb95ae3d74576ba2669e2eb6800bd3a2a0500a15aa9ca9c2cf716ac2abf2ee
SHA5123ad2c48531a539a0e18f326394591ad8f2dfe6192e0c45c80b78d1bd9afbf7652cadf13574361d25b53b663a0786e04f7dcbde77995ec1b7a356ed0246da8420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c7f0382e1927fe59543b73b1ebaf01
SHA17c2ab4b7650f30ea55d2ca25a5efccb51adb8fc8
SHA2562981e0b7520dad23d6a56ecb0a7b12a772e08c064137d71aa38176932aeca91d
SHA512dfdf83fc9bd91c1e31a71607c6e7dd124168061e11d9a9abec3e357a95c3273259418d1f78eb1b6b15655299069b665a941e16dcbd1156b9263b4c21055ea0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588961577a3ba2ef6db16a0a66870289b
SHA11b7ff7e737d97d9ea66fe7380e7eb7635fab3d43
SHA256cd129aa23620c483a4685670285786526f6e3c70fa7bc149c68887a10363a7b8
SHA512f3f3abe8d869eb8be0cbeca0a57cfc400265232a67ed9449d8265b8535133ee7b314dfa2493cb557aa17345ca4e097ef480763deb61290caec7b421d53a1a7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ba0db9bb25f4eac89eb20ff4f3b330
SHA1e6170cc0beab58bac51fb038b705f92773610113
SHA25601d4a732ee0f2813569345e2ffe9bed20dfa687d9c7fe101ae4a4692c70ae69d
SHA512eed0b4537c4f8e64079ed9efb2ba5b3354e53606c15881452503a4d499357635f01f661a94b2b6f1ec2d25a3f11c1b588e4b59aaacfd4ee25c606a909a4ee7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57921fa52e0f956b0ffcc7528be5b0f3b
SHA1b4ff067b6f0a393110eca1ec05fcad44b0074b7c
SHA2566e3fa30d2612bf8a9b5f2c650cc40178528314701d9fd7552172a929d7fcb824
SHA512bdd5b6ad609a178fb51bf1a16bb7c8296ded5c4dfbeec2f4da0389a3757719f986d3b9e623fb52065efd6d10d5c736fab60b7274e86bdcccb199de539b6fe997
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a