Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
3f9b1ebfb9200ed54577fe58c5788026_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f9b1ebfb9200ed54577fe58c5788026_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f9b1ebfb9200ed54577fe58c5788026_JaffaCakes118.html
-
Size
937B
-
MD5
3f9b1ebfb9200ed54577fe58c5788026
-
SHA1
a9918b986baf5c281b7d6586b34647dc708774a6
-
SHA256
17da08e93920b5aea4c02cfcfddc49fb272969fea3f1d0731a0d512df0334cd1
-
SHA512
9e28d504bd787a666416b8e8523603bde36bfd79b43bfc619885b74218006aa422156835a9a76de44f22c01944f17025eb76ba1e6117efa072c1b6dc902a09e4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002b0dad508cbd5d44bdc524b708423074000000000200000000001066000000010000200000001df007733dc35dbfa9f7e84b14bd7e7861e748a9b617feddb3fb73123156f4b8000000000e80000000020000200000005142506a087e555c715e332634c87659a5660863f30aa0779ef75d5b98446b352000000085c359ca22665320f83a4d0bc2e227f05be8d3bf900d49f9401f90fdfa91e7334000000097dd19fd1ac6f13bc84678d42bfdcfbb4402b74234fb41adccc4d31760528fd5e4bbca7565bde581eaebea5776c77480c41910b9c45c6b195296186f3f063684 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E35DD461-1128-11EF-9479-523091137F1B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421767145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9023bab735a5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1972 2040 iexplore.exe 28 PID 2040 wrote to memory of 1972 2040 iexplore.exe 28 PID 2040 wrote to memory of 1972 2040 iexplore.exe 28 PID 2040 wrote to memory of 1972 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9b1ebfb9200ed54577fe58c5788026_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD580ed5655fc52be766bbfc7d43c351de5
SHA10bbe958be6742d026951bb4ea7293fbf3b1676ef
SHA25602a8343730216a6d5796fee3ceeb44a87a6f0a7d3286efd62b7735b011ad2020
SHA5125b21efd5f82a3aaf312b055282757f665ce8963295742a5649df5b63b8ace81296543efacbf7830c142975645dca32f6054ec65bbb44f85bc5d73a0ed11de6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec300476b45b8e938f96e7444550a89b
SHA1361001cb575f2702081848f11071c5912e0c893d
SHA256e58d48e0663ab9e57d8f5e2b6cf34fdddc7c24760ceda03682ce3e47a9ccbf6a
SHA512cfbdef1c5bb377d7dbc65b1cce625e88e88c6f15a302472804861f3aa0ed056db0b1dcc94b8ede79b752398bef30ba064f0b718744e2c6b37b4911162fdcdd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae94ac1bcdc7f89bde29707517b3a89f
SHA11e4aa0040e0f796930bbca6735eb9745e5bbaf8f
SHA25681cd8bbbade5b58c763207df9ce7eb925316fbc0ba4109e076710da0f7842cfa
SHA51268d76f9b32adf2e375cc931dfe4df36fd43fd505dbde5e99899ed9602baed71b7462ba2964b98a67ad181cd8e59ccdee1a7f197bbc43975ec61070d644fa0cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8bc38c62625c59e3d6c7cf80dc7574
SHA19b58c4ace838e8b08fc26c27016f3ee0f71ced14
SHA256e2417e3727076580001338645b1826c34269427ea19c7a8f2ee899dfd1842d59
SHA5127674bfd1ca84b1455601d6c4db3afa771cf13d0b9cd4daae5c4eae86e8a458b0bd35a4e69d039479c9b6af1b58b13b60c2f09f648dd54bd95cdbab65996658af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df33dfc800af4cbd2a489abac1c0b58
SHA1163f6a09263ff4a573fb6a4a77613c213a0110a6
SHA256ecd9badc5e95747bb54c4b5dd8d83bf70c7c9829e328de7c653479a05600dc83
SHA5126ba35d89a04b17078b8e468cc761b15b2ccb78a37eeeb64ca0279aa716c7c0b44abb608eea82f11c301dc85e2ca5359e36c8d938d2a34612e629d7583a7cacc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2dc1a5e5ce42ee67d60fb4769764ec7
SHA1254f7bab4eef6c4ab2175c06b88e7f3afa5e68b7
SHA256844c96f302a97bbc1e64f73bfe4279287e17fd628560b4bc9eae9d10c4c3fe53
SHA5123f697e382d54d924ea08165a5e576acbce7f0d693e410f98cc2baf447aa6f660f7bacbe31817d224a4690b671fb5700fc45a93d0e22b966fa7f72a7fc81e4f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d262e72460b43f8629dda90753be3d3
SHA12b7a89b158537c59db589245886332496c61c003
SHA256cb2ae5112cf78d5eac77abe075e98d43d4a3c7d84b1b7e79b5f416ba14e0f098
SHA5124b51fb13c679fe0f0a42e0bcd1c8330b1401d746fc97bdd0e38edaaacf04046750f0a388c0eb7b4bedf09b6635f5ba03836cc132034b4307ac310f7d6052f4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5796e96440060242da6e8719639660078
SHA1d1699581c20290201ab247f86562c50ae0a4fc41
SHA256910db7acb5147cf9621a9d65b0fb4b0f35b3994252987c86fc889bbdab6d63df
SHA5120c5ca1a8196ee5884bd3b145cf4f854497b4d4b84617b36042d748e529a44a41475a29800287a640080367a10a8b147eb0e43a3668f4dff3f26e4685d58d982d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58efd13c47bafbc4bfee7f0208fa442f7
SHA151946e95caadbc088c8be274ee0f8362b7dbaf59
SHA256fb79b13533bbf5394f40f926813f245f3623635ab9120d686db19bccfabcd1ed
SHA512859c266085753d012ff34ce186d7197b13cac13372b20ea3d7978f910c918cc9a46b98e578be96930fd38012851d175eadee8f86471ca882bb23467680127603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f722a3235ca16849c5ece727f84b7846
SHA1bb716bfc03a72b28b23f8f94eba0f42ee4c80327
SHA256ede4fc4b7fa3e04c29ed83f0df5f4846f585cf1e7d9e04238842091a98b04a1a
SHA5126f61e7f63faf46a899b649a301b20dac7b1d4c83de291266dcf7f6181053bb9a7ecec7a7cf4e5ddcab1a048e9f1d4c093bd2ca1f9458136763b3437ae2814395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e6b12e1620ad20b24c1d5152f8fd5b
SHA153d1b0a2fcc96ca0e3227b7569859811ca170cca
SHA25622de7d2bb7f8b2b12cadfdc662ea769f0af3e690934cb24cf6001261551e9bcf
SHA512670791a98ff945fa703d579649ede656d0d5aae6495197923d62518f649ccde1ebd1a0743af9692a689e291970d72de774c165ead4ca07b66a39c1553b7b5bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a3c15c962afaa8e75e923ace54696d1
SHA1a811d313f2490c0cd74483707d580c94e2b7cfc7
SHA256b502831f657c2e948f9fcb820dd3be5690268cb0247ca47b96dd1b072977fec5
SHA51230f3e836772ff5472682766e0b6d45b79ca6c3b8f03f6a8c9df554eb592608158830965c16b9a22961d6eae33b985bcb416152b4dbc3d47cfd4cfdbacc49be1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a625779a4905f1a4493bcc7598ad8ab
SHA12228799cf849ea3e5366aad72cc7fc31e8c6b7ef
SHA2568bdede2f59ae8e38e942b55858968a122b2c36cdf79fe554ac367e08ef77a5c6
SHA512b9c68fb29e9784185e974f5a3bf9e264896ed11609c4e5b3feb17f2fe491fedd238217e11195e77d3521744fa43c71440b850bf96fecb17db75b08598f58649e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58bea12bb02155044f6cd5851870205
SHA18f87b1fa0a3c314ceceb579b83514b5ccf70452c
SHA256a29b21fa6fab37da16d1c85b616a01ba4ffccff33784f3dbf60dbf7d8833b909
SHA51217866e758d57a048c4dcd8dd865fb3193a0b0b00d4a4e027587bdaf4b811fb144969673d365cc67c6da363d27f3ebb9f0a590a592816df464b0462e10148850d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee19f76f909cc72517eec671a1d772f
SHA15163419af1a8ea25a8e4da65a178d020419282d5
SHA25657768e8c09ed3f067a8f683bf24fd47936c71f824dce9e4bec73cfa3426b3adf
SHA5129763004a9b8b9dd42e26161b433921cca1ed1dd50261d6dc6695cedd6d147a5771e00571b1a6c71bb60b95d4dc613e4e96316ec1548e7c2e7e47925b18d72cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea755633e2dcf115879c8a8df4c16e6f
SHA1aaeccc0b137525df34da068d707d61cf1f4b18ae
SHA256b8b803194eb00ff9de3fa9534b8cbaf61becb771652dda903dbdab5c0d9a822e
SHA512b4a3161f9ca657469af3df8872cab0c067f68fc9b0150d1fc1f1ef5f91e475d3e4ff28e22f2e11e0bbb9bc350691c99c6435c6eb269b356a9cf35a79fef083b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53808e32ab64d82caed824c62db375323
SHA1c417e447bd96212a31e5ab8f6f86a479a701898e
SHA256810f12a359fe9b01f999f1339c2d7106392f59b6e8d00267aa2ffeaa2c02219a
SHA5123e3370a96d03dd3d51030d35ad884af0d6e05125f3b91548a6a16f7891797ab1e9004bae0c2a2ec9f302b149dd0264b90765ef8751fdc8638fa0ded14d42d882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a