Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
3dd6c2a520730b6899a3f4493e9ab996_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3dd6c2a520730b6899a3f4493e9ab996_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3dd6c2a520730b6899a3f4493e9ab996_JaffaCakes118.html
-
Size
2KB
-
MD5
3dd6c2a520730b6899a3f4493e9ab996
-
SHA1
75bb68c3cc12561023308019144234dfeedf68d9
-
SHA256
65072d41ad0b923c116bd99ce44742ffb342e33dd8be30f1c02008aa6e12ac9c
-
SHA512
d2d90197f5271ea00dc578160325d52b45e035f9a9f83126bbe335771f962df1c9e3cd708615c9ff36287943c598d57c04e9c8a6376e3e2b7affd1407b22a19e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421738908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000068d8c4eff2de5bc533072f0e1da8be291018a6d2deb62f5c56d40fd1d6df601f000000000e8000000002000020000000ca4913f0b3cfa7c586acabcb5ece9e44e40ead2d951c92489fb10faf743e10f520000000682474bd7c448beaedbc80a2b60809ef8dba5a4e129cb74a87a07d3cd0507943400000001178a5ca7d7b9d25e51666b18c1c241f7039e6ea63a760199cf661ddc8e37e1abc7653c3110bec55ed87d3c386ea998e2cb75bd2af86f432fe64d38f0484850e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{243D1F51-10E7-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a043c2f8f3a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1300 2820 iexplore.exe 28 PID 2820 wrote to memory of 1300 2820 iexplore.exe 28 PID 2820 wrote to memory of 1300 2820 iexplore.exe 28 PID 2820 wrote to memory of 1300 2820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dd6c2a520730b6899a3f4493e9ab996_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a3f2d147c3709f06759e2a382c9b98
SHA15988979c2465896cd4d17c1f5449a3de8ed33bc0
SHA2567a48bd20e23d50cffe2bcc5395753d2f9226225832358e2ec2f580365692faa2
SHA5123f7afe441a2ec4466630799cb7f9f978410f84521426a6e30780974acf94198a9012fc4a6c8ef3da05c5306b6d5b878823ea02386b9c9eabcf527225609512a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecd52ce00dd7201899fdaf67b9074ec6
SHA19581bf97e0495a51f81e6c7dbd76a9d5b81b12bd
SHA256e2c3fb05a19149acf500237da6427189ab8bf3e5be754350e6de8267dd13d556
SHA512c0b77203b5bba624d1b7c17bfb0a96ce2dd791dbf3c6293b5e7cbd98fd7e83130af4902acb7b2e666b727bc8f4eadc15c5cbfb4f3f9784f642132cbf7dbfbf78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be7350b2814a76fe6abf76f3334c993
SHA1b86eda236ed2e858c68895ac0b09fd45d0c0341a
SHA256835bb387b431008c7b16a1141b836883b47b0987c5068758f6ede83d5a3588a0
SHA512c4e6407ea9fe50a4aedf17d6c58f2929f9e2a8eac4d18f1d6beb8865dba137ccd02825372db04410d16d52c167cb17ad7cda06c5bdde32bbc22229b4e9d9adf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53420d4cb31b751e69ffdffb94c93cde6
SHA1a52c971196c439ea3d7bcbfb9a686a0953a905a3
SHA25683c448c5d2b50d1e0ee36bb3ca04f5720a12c697b2fab1accc60ce049a43ea51
SHA512e887f6cac1df1738ab00c39ea26e50b7a3230e3e1757d34ca22308be52125386f83f334cb71ccd34f2b30f93a2e88a8304df0d07dba8f97ac3514de19da4c20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019b61aa89977b9f63837e9120cf06be
SHA13b8d863506d4a8878bb25a2d5a4ac1548d770f51
SHA256dc730ae6f45fd2386c8fbe7bd9d77ac77a2721d6a0cb1b9677f099b126290bf1
SHA512c4c5e2c4366c96d672c1f4436097ce97fca6067bf6716cf8376a3e3abc9679f10e191d0fac5f7fc7e5666ec78400ac397cfab422ba33b3a000ce6c5b0d786e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a885416b5553a12e58ff25ab8657fb97
SHA1577d65a77fe3e1c6f9506b0cb27dbb7ccde6a1ac
SHA256e5992a2b849139e15e38be2c6508f62df45e1c0335a98ce63243caccf6c2f7bf
SHA5120672cfdb70f98d127888897b310e83b9b43512c77aaa195070b929f682e6d9e3073a002be483c3b40175244835147472e161a3f92685d01da0a54b0762c7c7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579d9682982d1d947577f8f5f848005f6
SHA12d71dc76dd60963941db83515539f8db2bcdfdbe
SHA256ee1dfcfe38ba7deecec36c562f0453933c062fe6002837fcdfb7d968f92e5c4f
SHA512f8b0dd66c4d39f9b4fbc28f813ebf17180a6aeed4003d54346eac4b3bb2a6aefb4c075bda97d158db8da5323c217c43b0c6e701d587bc0966c508e5d8e104088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525fc880382839d134b87bb9d40ce8ab
SHA1b1e9a24394dcda4aa66ee87740c51305f0ea95c3
SHA256005f90b22f79e0966b37dd552f903e2a61233e1efef154b44ba1c0255a35777d
SHA512e3dc15ce8b9db7fe4e3edbb90b4deddace65e4203e187f0a994605526fe71c4c638f718fde14e6a25552a956a329401b5c2ec7acfeb8c06b2f74b7ffbb68782e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54094267f5a89d5d11d966ccf18b5c72b
SHA17962c1e4a788248fd2bd638ee820b1d373ee0fce
SHA256c25d766f48ff26044563c659afe37a53e6019c574ed816b505ab5205b3f370e0
SHA51274fd314cc60c5adb71955a52d9b6307155fa16ec15304180aba1ba04ca490c42e5c6f2b5606951463f157c7daf8c25931b81006a062ed5a48a345f969e3068c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1b6b355bb4ac995248d860c0aea71f
SHA111b3b6efdbca89a7b016f2f72ce1c9b8571c94e0
SHA256d1bcdd89e4a0ba7b975f409a418476f7c7bb1fbc47c2c1641aa143df98c3aa79
SHA51209876c8ab6306b7b6958b4e10b6807baf1ec253a0490d0ed595328cf1453c8f885f2c52a33979d259c87fe8af5a653ec32311710d636ef78abdac84eb75e8ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bafe1284cd0ccf7680fd1f0b09a7b1bc
SHA101475a9898c771cfe31a1a62a5abac313fb18566
SHA2562095230eaf3ab3efb1fd754cef360d03e771eb98549347eac268400dfa2f9de6
SHA512d228f339a0f8624e93acbd016610851e0f394569d46827eb25cfa81b99468c133ec7eed873e4804ada30dea202e15ac8568b0d8cd25593f68d9759624e6b50d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b49800847260f2c34b5e9a9deb7d3695
SHA199516dd5549a9f63787fd6dcf00acaeb9a51e767
SHA25638ff3c9f4a9fd7b91abf49cd4780b462a2083f9e555319eeaaf7b30aea67e1f1
SHA51245ba636fd401dce50c63a0219d750cf1c33dab634653817bdfbbd73ebcbb6ab0c5eccd314f7fdcb45708986b596d9b0c61a308242b8562a8a5b2e7400d0a7ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adaf3539fe3838f233d4821341cb425d
SHA1672599de5f2b58b7989ff71a28a5e1d07080b394
SHA25684c723a7db819f5804669d23df2787dba035e8fde62be329802544e63bdf8d89
SHA5127e1bde757b3deb03128babff8e55a608a7b46e8562ffcef0d8dc8b5744a41cca9c2a27e878ad92b939f556147826e7648b69bf55586fcfef530945aa27e09159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c10ab365b61c65c03e6577599b6fc7
SHA1f08757c0ecf3cdbc621ea671d15026e4e963a7ec
SHA256a7568ca8176b14d7d67fcc2e3bc8b73991c99792fc269ece1c8166d9fff8e5d7
SHA512c5851d9e455e87ff2e5512279aff8478ec8e17c727c0dff5216245884f756d23666b50d3f11c6189af6684634d2f1cca4ba474e1998d6298de0e5bf1d1445129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586731757a6d514380314a8875dc05eb1
SHA1687eaf4d5e341cb1d13db4503302f3958fa4ab6a
SHA2568e4040d3590393295e75965dde2288333979c82969057332d0f5e625a3524597
SHA51213ed765161b7c5365c2ef8ea6eabeb56f8d6e3f5fabbe4cc5870c09249f02c720e12e187baf7a3613e825063a1f045cc8c5b9a68e924119b854326a6ca3b9474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba0a4e79f27d26d7149bd2886ef2d20
SHA1cecfb693f89331d95e6940b4c9bb6f0ea09603c5
SHA256b580e994875fb9912d73a20433230aa07f226f5b2869537efc0d8674f385f04d
SHA512da9d85aa07d8b030d749ac4c1343fb42cd5dda64afe9ecb753d29b61c10ab7dc362c54ae4498ca312e892467296dd9f233cb79f53ac3bc40d2bafc1733bb3754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546987c4aceccb440bdab9c0be7f81d09
SHA19fad1ca6e449192e03653de1bed51bae291bfe80
SHA2566c62d5f9121e35f3f5ac71630c5b9727c0ddbbcc3ba79b0667be7388b5618bfa
SHA512c98096b633be2f175c3e668e972fec19ca9ec4b8ce759e9a5feb4a0da73404b31510d1bb3fc263f3b1cfe266de4a78824aff9689bba2fe724af382c986d65e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c5d9228fa2f11639e133601b4f23b17
SHA1f623f99673c2503982f77f32b9b7dc5fa24c7a98
SHA256e13a02a49dc3776bbcbc143b40dee620f769543ff7306c044c433255ac91ad8a
SHA51216ac59d15d75377e736857ff0959d73c6620196ccf7f960c398a8e5e93a2bcf364a0c147d97032150e224a980f4260b639915217a90e1d071805152a8ebdb2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5030801cde30653e3b4fbb27d1ba54929
SHA1fce18735f3b086b02e6bc440c6949c57fd022b84
SHA256250248ffe942bf1fa5de85d2199fddd39dc1f1e2637d39f2527ea6c485294545
SHA5128cf8ea98a52df00e271cf4fd117a15d376fdc631231ac4c8910d094e69f28a05f817e7f1200d7977b8a320467a697284333a119cd5f8be6bfbee76046e9327ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a