Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
3f803802b7057273c7db9ec2ed22bd87_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f803802b7057273c7db9ec2ed22bd87_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f803802b7057273c7db9ec2ed22bd87_JaffaCakes118.html
-
Size
26KB
-
MD5
3f803802b7057273c7db9ec2ed22bd87
-
SHA1
0e3509a2cd92440560ee83138a0246fea5bb1913
-
SHA256
c9584921fea2da02695e3641d4083a3bd307dcff7f5973c165c62c82e5f4cc4e
-
SHA512
91320947862ec3125111b656ead9268cc59fe82fb53da519e284ad497c2c31dacd569001490e446942197603ef6ac4168f0df18a7b14166e707b3249c7ef59e8
-
SSDEEP
192:1Qm+oeqfb5nMnQjLntQ/fnQie/nbnQOkrntRqnQTbnWnQOkRo7Stco+Ewr3vMZnA:1j+o79Q/ZK6QR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000fbe156597ead610f7f670a5a38c84ef4ae973f02e81f0dc8198b753a90384d46000000000e8000000002000020000000aa8cc9d9ecaf4fbf3c137c4911dfbd98435a3f52476676543aa8bd2192a45c6320000000259ea585ab90b79984fde6b5870a69551928e5013289ecb3267a79a2f31f439d40000000788551e4dc205424e86e3a44e44e4d6cfa9ebd0977f9ca73f6a26695184c0172058095990c22dbc0c6ec46abd8740a696698e4f4321ddd6b905ce15f0734337d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ee1ae131a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421765498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BFC4901-1125-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1740 1196 iexplore.exe 28 PID 1196 wrote to memory of 1740 1196 iexplore.exe 28 PID 1196 wrote to memory of 1740 1196 iexplore.exe 28 PID 1196 wrote to memory of 1740 1196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f803802b7057273c7db9ec2ed22bd87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bf5b6b4530ff061e1d9fc0b12d3601
SHA111c2affad00ff70170abd8b9eefc053e67ddabbd
SHA256fe72b1c4e8734c8af54e1716dd57dcb865f6d1422c02737d0f3a6408b21f18e1
SHA5128926dfd6682041f9b460d36d2c950b014cddaddad2eed9d3e5bf9b0deff30c98bf6788b7f1bbb67cbe4a027d3b6a3be70863076c34fcddf7d96c8ad6c2bb7cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b3ed4bbe323ead174d6d80da45e6aa
SHA1d99b49c5b74ce425e2da1b3d08c67aa0e9bafd0b
SHA256b5451ea5b6731d1a753a82df145a3cb4c987176b8f0a3d7b7ab0b0077f94f739
SHA5125c831d202bf373ddfab10e140f1ffc27b603bdb674554dc67f24e201883ef7e756dbda07d691d6dd92271ab5249b42226485042ac9f105911a11d48b434547a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a8a715cd33e4225cb0791ad4e2d1399
SHA17b1d58533a2f9710084af9966877d75ad67946e1
SHA256964366e26a1948cd40bef4d60f529593acf5cdf0f6200f0dbd1e8233cbf286ac
SHA51283ff9ae1f85fc598c334629a6624c4a86d2c9af80324e1ef26adae7a5ac47ab89f282d3eb91ce9578d193b1262dd7320b18c2e87414769684548852270f26cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501956245c9722611e066a7d23a3f178d
SHA17898e3b578baf77b293bc71ff4d148abbede4d47
SHA256dd57136f2a00b765b44239173b6f6b58139e4788c580110566d9117220e9fc27
SHA512ec4908f3d2b49848de9a1a15938df1c2f4916976d748907436a73988a1795e76ad88b26f3107315003e1e9f6e595d50d83c169f397849e97d1c63ea9c49e709d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166a2a42c3a266f51344bccdf3aba5c9
SHA13d75b94418d695895f799452878b5da646baf875
SHA256589f51ee8a8b5fff7a5eecaf0ed5a47b2983fd61d7522c7667e26a0b8541bc09
SHA51250a9088930221b1fea60c60e134839c5623482a70ebb80b47cd304cdc87a528b4702f064af599a2c512bc716270f326204d2d2db13a99cccae55b6bbc0177d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e42e14f9bfbcff2583b5b8f582fcae9
SHA166df7abd13349b8d21d4bb5e5a087be0a1ebc13e
SHA256601dbda9d3a4f169b3fd8bd4175fdbd23fb91d744224a5b14dd915e5785e8a44
SHA512a63abe452b23ed472f362bd1d4083d0ae1bed6ed69090ca8a6561e2c9121fd9cfdafaa941b6871f53b0cdb836be6921ef45def139191239a61c1565a5d36051d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838431ead42aeaaf3cc860b6b27b5ac7
SHA1a6ff453f74fa526ec989c756782f5e561138e3a4
SHA256efd5de3634e2925091918e48dc8afab34075a07078bf3adc9476bc26082c452c
SHA512deea16470ff82fcb7ac5f3b63b6c9307440a09280ae2bb9a20ad520f766d26eab55916ab85e622da4ce802639d349c481692763bba464a35b35b621dc7922a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50304c616f80a5a4c8d5646f531d7b9bf
SHA1fc45f6aef2ae7418be740ec97ec718cfecf00bda
SHA256a41f312885c6db3f1d2004c6744423de0c11b1538b5af5cb253a4181cfebc453
SHA512cc5cd6d798f1d3830895f69478494981c1e91afbda020621bd260f663ddb322e6ffd95f77e6c9e15ca7f126c0d50b5771b2b8f2b438213ef3cf7766812d0cf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510edd86a387c191484c8ee6c97a41cce
SHA18bea45a26481d96f57d5248d6964bf3b648ba65e
SHA25614079b8a445666e4ad4018bd6bbe006295f378ff50982c2bd3ac239552c0c831
SHA5122443048159318bd9042806a8ee04083141df89b0eb07ed8d4fc858c3c2b971aae689d97a28f7cbef39b0fc861a51357fe9198fb2372a6d65a5c5850bcb4380b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afe7a00488e105ee8d41c77a6a504040
SHA1f7033638faa4a9d4d56c772911c7253d048ca1ca
SHA25600a45306beb870bf7ff74041ee0ecbca57f4a998e966e3db2baabdd82c3f67ac
SHA51227b0531a786dfca27a678b2c554d3b7b3ef7c93009e3bf458107512a57a87d6b39f7a5b72a36848f0508eb24454c1536a4ba69df3fbbb45a5c15f1ffdcf3d1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55069944b75bb18cb95b9339bb5d1841e
SHA132dad9e7adbfa7bb0a897090ea3633b0cf35cfb0
SHA2564e58a06c701da1ac844dbf165588802b85b0ba4534100664bbec0c60baaacf8f
SHA5127bf41eacc48e32c8ebe83738a741ec811400f54414c4a4422bc1cc33f71ea916fd14469e69cc78be969c8130b8c63982c8e90e9884588d2f6e06687e1d5e2bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7a8d62844b5f92a976cc46d9662e44
SHA1a3511cb031f36ed73d870add4e83d5408cbbb4ec
SHA2562f3f08dfdad678061d7e24429e50cb8e29d67cc6bffbf5331ac7262feef8104f
SHA51298c597e8862b7540dff0e165f88565aaab88653ffb920919e777e900ee903745feb71c1ba171057c1550f6680f3fba80de9473352d68e1e5cc7d91f9b2ebba60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fbe393b51a1db96e136de0be90a06d
SHA16fea84a1ce086c3c668c0bd7e6a4f8fd7a455be2
SHA256d2f1ee1e1bb5c97b4112cc953a0bc7fe9d40abaf9a3d62c319b213a19cc4eb07
SHA5121ba56e3ad0d9fff62a68cd6431b059351f421850ce933f9ab3407f868af74f5314cc00019f3af9c55e82bdfd76d421683a8e84f9d444cb02ef0062ad4582427d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eeddc85748b475edb3a18430995e769
SHA1dfd4b0e465dafb4eb0311c6d731fe883349e7e51
SHA256880a72260ba9298568123e1593f78ebde24ab80f7e2e779cb23036b834cc4b21
SHA5124798f144c92bdb0499650d12dec9932840737d68845fdde00964946784598a3788242d63f187e01b32025b803438c400ee165e888e240ca4dd6584d3332043a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5432e7f1189dc30295cdac015f3c914e6
SHA18a52b6a33729747449899db6ebf2853f29d9979b
SHA256cf7341d7d0ff210c3972afa215088ef1cc0ade551d34f4666af7c05dc3620c54
SHA512ffe97354552dc3cf73cd301543d4ae01c6218dacd452b858f765716cf51df02992e3a9b86bec6d18bde2cff590fdf76524626fc9fb2c00c45cbbba67ae52b532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de6eeef49db86832d31851b932246fd5
SHA13eead872046a3eed29651a379e6bfb7c2b3d8907
SHA2560f63e96cc701e9d12741ff311a230d1f0dab2f05c09e074db76fe7508c126dd1
SHA512801949e02b1b0247d871bab1ce9720e05e9f505039b94ad0b1c997f8bd2345656bf66c31f63f517f2ea61990582d21d181c78c26f08dad7e2a74fa3b0df3634d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58767eac3fa061cdc8b7dff79c0bb9df7
SHA1ae0b22676af6d5f2e736c1051e878b3f1925dbdd
SHA25662cb4ecd11a8894a4f9d2f4a1905369532cae6a5e164e6959470962f413f2d5d
SHA5128bd995f55866782508517b3fe276f1ed27bf7c7b52bc1a8844697913ea5785ef9527a307df0fb4691a42cbd40feb7d7fecc7129a78d6bc9f0dd3cd8e630b3508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51140b803a73a68fdbec7f5d6d2ed528d
SHA12f6b122da7df6ee461812752abd4bee66ca9eb49
SHA256e1d252ce0bcdc0f9e2a072f634193e3527aee245864fef9a5b1e4b8354124740
SHA5124b50914cb61b788f334c4fda22126ba882f7ed3cc26969611e534216205a510559b3938b60f473832b89c4d4a69e66c569214d80d20f84fb2f092c8968851354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557717fc067391478a4c36f5131311849
SHA14262c112993f5d212fbf7d75ef22c07d259cd4df
SHA256b0a03264e6ab3f61734d76170ee4a737eb4771a5dbe58fa9c517c711a316e785
SHA512417c0da573749ab29ac2eb6e3f19ac482329b762022f0c6c10dc8079127f0bb087f2191acd31275b97da23ea8a9fed8e2548314c5edc73ed9cc8936fc6e9e285
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a