Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
38f0b7c16e75f23ab626154792096ae7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
38f0b7c16e75f23ab626154792096ae7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
38f0b7c16e75f23ab626154792096ae7_JaffaCakes118.html
-
Size
8KB
-
MD5
38f0b7c16e75f23ab626154792096ae7
-
SHA1
b9b598797b1d43531e24bf82fe5d9f2a77610538
-
SHA256
b25d83417474d0a75669107bdff4a06b575b3da9b9e63fbebb8cb488ccf01698
-
SHA512
2650cfc92490e4219e44aa6889ed65ff7dabc657eb2d201e671d8c3f0f7253be9da62837993dd9a3504ae9115c6ffffa912f047578c1bf14280893f94cb1f8b6
-
SSDEEP
96:0EI7YFrYEDG+3xFG5ZTpy2tfANTAv3CAu7Efv/hhaU/3J/YMJQi0p:0LejSL3CAPfHlc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421660660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d6e497243a4e0d02e93ce5c438c8fdf8c691db2f281aef41f4f6c3acfa4e6464000000000e8000000002000020000000dc7d97b16b760b9fdd8e29a5bba76cda591907191f9368a722a33f3f87d725fb200000008e61c573d3a66ec67cd113ceb5bd8370e4a431a20061d5937b7197a4f0d97b5040000000eae177ef2f3de00e47a92ccb50046e9548ae2b48d2b5b0493e1394d3be69004e78af3c9bf3bda5848ce9565118405d19773fcef6e155b556f86a4114f31ba073 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09bf9c93da4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F55DE9F1-1030-11EF-9907-E698D2733004} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28 PID 1624 wrote to memory of 1936 1624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38f0b7c16e75f23ab626154792096ae7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d0b2cf305ee1ab441e67d6a39d081a
SHA12e5d382b100b7c512c9ac54df84434fbc35eef27
SHA2564b69e8cd18ec422c9b72b2106dbf8d5bb450063908944be88863a0e4e7b14dfb
SHA512e00d10d3543713346b149057baefaaea7e1b8c3c72b4f1c3ff12564aff2bbcb48adc5d4d5bd49671f374531925bf1c05adfe7a2fb138449521dd21885a377b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b94d9bcd0c76d65e87b5bd98ff080d
SHA1958e01e17bde6da24f00121762e64c087db8980d
SHA2566c8be574257752701dd674b3b9003b41a2cba867338dd0c22cbf2a892c1a9f00
SHA512ef99b6dfd658f80345ce5eb54606a744726f816b7aa9252f92f86399ccd831115ad3c92111ef04e32fa84195a75cd4c335f2d5b0039187bf31737985f7c4728b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffe21170d3c6effa642024a3dfc47a6
SHA1c94e3ea48506e7f881850cd69ee0839b9ee01b8a
SHA256f06c6f45292b17c2004d201f6c925da9ff9856f599ecc269a626506c000446a6
SHA512c2b95f66e1651067c22c36b510d0eef646698734149fb22a5c93039cb92912b1d0a252ba8580fccd618bedb107b10142424b246ef54e299c530a62dcede3842a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ccde9fcacfc2c1911490b96468fef6
SHA1251401639f9302fda422d122d82776898277ae90
SHA256eb26fb325818ea851cb628d4413df27f0e2a0b6144a5b75e13cc8cae979bb7c2
SHA512884aa2b80c8d2176e7f56b6c04f7ec286995f873b6f7e0b2f15aedaa30d28235b6df365600da10741b0db058449e0eec1dd997a0dfeb4873ca1025cf442f478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5420875500ea4a8d9021007ad5265c12e
SHA175049e70e60c3dd7aac479656d11f82feda5a286
SHA25613fc8adf343859b2ca760ec18289a65645c3c2cc68b619484f4863749035089d
SHA512b8f370a97e1ac14777b2ee494541537986c6e640cdff84c5d84481c2a9143c2eeb8ac4833287f2fd67cf6371baa208c8b9c03b7e5d16757eaa496afa409c69c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e69ffb07de8b66acd4d99bccd2087b
SHA11110a859cc11b63e59c2702c44fa120cdfe5f8bc
SHA256362f5fc5f66d35bcf8c9937688584fe3d4393a36fa26cfbc3384b40ffc032063
SHA5122169e0221445d53d6a5a04f8a8819d02ca755731fba7d185e312fa200f7bc13f6055218c43d229e1e4d82b6aa52c1c772e069102ebbed9b78f36c9f311ff0dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6dcdaa9b92f002768a9b5dad44ad87e
SHA1920681030f6c6d5ccdd5f6b72cbd63aaae730619
SHA256229db545319949a4bfdaaca0c2a6380ece0419359f680388194d255d04b9d868
SHA51285068342faf863fea212d82a54a72c8a3e47b35f564cab0f56d09a3408636513c5b92a071c826f81b02e863c8100e74c7bf040ed0e25c77683d0f8053534b5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f6016ad66375d750f541228b031bc4
SHA12a1fcce68e16875749e44bce5d978942a0c5cba2
SHA2567659f15b521159fa2cceb3269dac96e8e76ee40fb81ddca781fcfde588837a3e
SHA5126dddc2fa15ba392147cef46d1b129bddf48e5a45ca90aa486fdccb3f2dd789399305e89a0c44766957189e318ab1851ad2c702a6a62c113872e65be8382ce449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9c5e2c21dcb9eb2e8829967ada879f
SHA1279f6febb57b0ea4f2f665f8975db4a988b838ac
SHA256912ad2cd93a779e6d9a7cb2d2b51915cca870f01202bc304b8242a71c59da3da
SHA5128bc55be53a7341fb613287ec4297f4ad0ff04ff68c229fddafa798d6a18a64766a7a3a3118c9bfafa5cf199139f2b2058aa1750f1be2d8b9798055c961e5216f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97d10abefcfa98ee9ffca8faa144c19
SHA121851f4018077b2e79e382d246635b46d3063694
SHA2567bba8078a17af5eaeebbaeeb0ad1a53ef8d99fc0d642fa93fe340a45568e4d52
SHA512073b8d9cce77ff22d7d397a4ab6d1a70444a3059b1ff5c6ea6858740b971c15a8666a8fa409f205d402da3bb3e92aa827413a4fca0d0603d31c5770556bfd3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56920755c55e85641fa027796ada9b41a
SHA1b81032ae5c12bc88d14c42b696b17a35fb01ce59
SHA256ca47d1a17f93ce6a0cfe33e174d74d273eaed59f320077eb5ff5b4369d63046b
SHA512f454911826092c8059cf4693b3f76ba3f6577e51fc1042b5ccb569d2a3a1bd2b30e20edf8eb6b5194a0bb13ae54627284b683ec4247734c52be385e0cfbf7134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5341217de1a2477f11fa010a601c931d8
SHA1797c872c0302435b009ec5894135d425c21e1857
SHA2569f7530503a987af460239b2dbcae70012108fbb2b2c266e3cbdd53201d1ea666
SHA5122f6b4d8f169a43d02fab0cdc05bffcd3f5d058ddcead69bd2994f48fbc611d40fb044ff8a06a8ecda6bc40ccf8cca75f535b8d229bbdca02681e8e236981f206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586ecccdc2717ef8473c1b88c79a5243e
SHA117b3fd9d6386f3d4ce36187578f4c74e26d83233
SHA2568402b0d7176d440a235ba9b72f0055665fdfebb96f1674fb50db5bbc53a82604
SHA51258c63acf122efe62ae364a97a2a3d3940e2a12379bbc1e4149977c91504eeef6840a85840a6260833fbf9af8bc4d76e00f1a199213942e3bc199552df85b2d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52886c10f3f1d382043a02e44062981f5
SHA19cd5ae42c7270bd60408453a9864872f1fe03d7a
SHA256cfe228d5a654c9c345d36c4967a114eab40c9febba38c4fb3cd6cdd2f9a951ef
SHA512b7b1694f2409a2b899f519cfa5a3d31bac9bd57483b60e3ac5a2f0ac811357541a5cdea1d65dee99aa78dd809631f64641aad190fbb3b0a34521da1702c76e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c3efc54b46cbbf432a8721322dc047b
SHA180265c947fd8c3489295bd0a1f1fb183c66a15f4
SHA256011e91d0f820be7f490e035da63498a8dfabe3f818c7aeb9abf739c655fd3e06
SHA512df3f68b4955f416f3da9740c7dc54aa215574ac8b9660685e01ac56d7bf826843b00b7b586105dbaa2c13ee85cf6ff9b790013f5be328caee19c4408bd0cc2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c51c0b4053e1341db44cb6c39358c8
SHA171d0859fff64cb6cb4253a86c6ceec85b2a39c7d
SHA256ad9c8cb885b4820796be3aca954ec40f63c7dd918deb6ef2f4fdf67d8f545352
SHA512fd2803e93d6e4716b24226f2042f822703911210f79984c0411d1c45489dc6b706bdeeb2158397fbca3f118b227da78f89efa24b362e3104ec25c799371860d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb123f10926976d258549017e0f9d7c1
SHA1a68ef02dff6d874b12798fbbdd0f6f1cee888563
SHA2569127a93ed598749f64f1c4cbf61ce8b2584a77c544a79ec51c835b82169c0eee
SHA512a4f7e31c71bb973da2f0d2946bb37f43c9fb0cd4b6fcb3553b976bd05a7a2573d813eba734e39e5b9c7c7d02642a9509ef1c17672a5cca4822ff0846a910fe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38116333aa461a482c38dcd9fc07b71
SHA184c42c6f3a8826577a4f42c72bc9eb7032abbf25
SHA2562379313ed79f96be5ca021476f061d0a703cae36dd1c079113e4c91458999cd7
SHA5127dcbf577fcbfe3aa9922ed060e2f8f85618c959fcea2d8cb954326a1e1976605fe915aaa67ff1cb9c5b2d975355b45053acdf1393ecbc69649147e1816f19282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69d2da5f6b50e02fd56b68917381556
SHA17aceb2d7f84cd9fcacbb5b22849446bc62281272
SHA256eece0ded823292f4163068461415757ed17466489c7813ac0bf2bcc99efcbff9
SHA512312ca65d77f5b956d6dd91f820b082c74a3b24351a5d3c4754a56a71e3e83147894cfcbefaba82572ee5347efb946f98d34f65002e33c6ea0ee55f273e9d6a28
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a