Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
3f8685ebbbef0732afa973f17abbe803_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f8685ebbbef0732afa973f17abbe803_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f8685ebbbef0732afa973f17abbe803_JaffaCakes118.html
-
Size
460KB
-
MD5
3f8685ebbbef0732afa973f17abbe803
-
SHA1
d1c444da6fe42ad8dd544ae0c8d0583b01bb7512
-
SHA256
b747ff2af649bacdd101ba702c83c5c5d2a43273d7b03c4b659198053ec54480
-
SHA512
3b8f8699c932a46f281326309f299e361baac4cb69d862602025db023a29a6009de7095ba02006573a8063852569223438e189b7b9353a34edda56baecebc017
-
SSDEEP
6144:SHsMYod+X3oI+YvsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:25d+X315d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F46B46A1-1125-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421765886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005cf42c2b32858654f08de0566446cbc82cd4a54ef2b987bdd84e5cea32035b36000000000e800000000200002000000038e992e664d609ea7f6f2009a760d0034974e8ef35f09fdf1502032a936da4502000000068bd9bfea22af60e40d2ec59ab898e66c3be37184dc5bd214250c225a877d9ed400000003ece57d779317bd7656b927add6340ea1cfb6d311902174a126327d951c193852e701ac9f178f33ed0e171fa2b17f23dad58b2a48733e6abbb08ea1b3788b0e5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04edecc32a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2308 1132 iexplore.exe 28 PID 1132 wrote to memory of 2308 1132 iexplore.exe 28 PID 1132 wrote to memory of 2308 1132 iexplore.exe 28 PID 1132 wrote to memory of 2308 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f8685ebbbef0732afa973f17abbe803_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5436c54b7fdaecd5bf44000fccbff50d3
SHA1469ca5dccaa9980b119160c1e9440691f60bf908
SHA2565d7604ed3b9a9988c0a91e6f8c2f60599386060ac8fafbf7a172fa21770f7a59
SHA51259f0d31272eb0ef1815a1cb1c7eb2dfabace848f6aa7a45341b0bed4a020467dd40353d6ac61206dbdd51ce8add0e30966b44ffdac2ba289326aac8d21165c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17234e3f8e495062ce3c251eaeab080
SHA14ea33d34d83d54e224988d473c300fcfae39c98e
SHA2569f316ccd85fd4cd1c16b261c4b87a7dd1471097a5fdce62e0adbe099d6914c54
SHA51214b70c699acf64c90faef1c43b269e1413a68751721a92beafa991313c74a68c24c84acdd666f6c085d840532c811f38e4b8baae0fab9ef942011d8de6778466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee4802c3ea99ed223cc2afdd52d4c376
SHA1e7f34c8ad6162ddeca4bbc10470968d4f4031032
SHA2562a6795173dbd76e80542cc68e11364d867fe3327b1491286bb1007277df3bd91
SHA5128526f12b0075352ad63f7def41fb54c94c77434ad225bb2aab6137584ae1878fb2e7720ba77c8bcbd5019764043b1e1585de059a81fd0b5151437817ba9d6468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6f04f2c004b0aef8d8913c8f08db96
SHA196c47d6f19d14c12a143fdd29ee66d3959140bbc
SHA256bd5160b48a67da37e9a337fe938417426a957199abfd52b10967ea7813f4b2bb
SHA51243a3848b230f3e96443f226beec16bafa5c2efea1483f0eeed2cdbadf87f25b70af9b4cf366d147717d32f630c68e2d35229d618301d6afc9746580c083b835b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b19dfb21631c175c0ae7f7e61857fc8d
SHA15d51e85fa013437d9e020f4f7878097d6d7e63eb
SHA25692b538ca766e64e4d21e91b614175d6d12e86f74c8f879e043e414f33efb68f3
SHA512ede8ea89c0c6693b83a2c84f2f2ff2a31972c66a67e90d588350fe32b9553d7748abd7159d9891b76633af88cfc932fec6175e4eff172ff12b33cbae5bf3385c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d48e066f9ab841f402e84b7cccf522
SHA13c201ec69299d04c066f1c20af10aad9020c19f7
SHA256230ccaadcd57351728fd52d96eaccbb514eb53ae7258e72fef7ed7ef84c4f560
SHA512c8e62d63256e0dd5a742f1a0cd08d8c9d6370e999804f9eba536a406773a3263775497c66c318ecceafd0055b1f8cf9df5f38219be6afbe8d9dae796086a8844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531994009f4bed3382d98aaad31510500
SHA19a3dd0cf144f2caf5121459c9cadf652af951319
SHA2564db8fdbe278ab5e13ceada567ec0c5bc606f565787a53d54d2c65968c934f347
SHA51220630ab50cc941587421a3542a8350902963f47ec37644276482f9280118f78d27cf8c3250a86bb6f32708c6996e83abe187c84d6f21fe758639d134f7b9cfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade41cef4549b039b2affa1f72524bfd
SHA1436d1e0e281f169b3f2c0d3ec6326efcfe8a3b0a
SHA256617bb0d04295cac2a03d76abc80b22a9e927a7c581130dfa093dad0159f38a92
SHA51253f2ca045dfd9b73264a63b6f7d82f1cbad140421dde9e9a84e03ca5ec064ac9dc36854b4428bb13f580215a8de49a884346606ead6972080ef7715bdcc9792b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c30c7515cadc046703e4a10c123bcb
SHA1c49cd699185bd79da32ce6cc582371cf46757ec1
SHA256e3adab960ae5e4b7762a0088971eb67289c91c4b97ddcbcea2be4bda246aa3e5
SHA51212cc44bb198942f97dd0211eb9ad747c55006355357adc3c40112d5141bc4fa5559a7d07bc1fe21f10cd920c29b4acdfdf25a75a5251d344e1cef11f747f9153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b94360820308a501d61b8cf25c9e053
SHA13602eb8777218cf3cc757577694c456c10402cef
SHA2567062306e9064c20273943a48951e8e45ce3f0e37b51d6168a3906626598f4ba6
SHA512bc8f98960ed822abc314083b862cc30f4947c04536512348c45e7282bcbc879a9819cc233f13d1e88535f86a5d26babb0fa163dbe17edcd67e716459b903b280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e58ed8510cb1e66aeaf0c84ae2e73c2
SHA1865b0f1418e35dbb0a9ceb11f5ceddd5a41ffeae
SHA256f1708a5fa431da7fd68d8a8e78b436b94ef2a49b72f6bbd8d4af0d279f8cfc8b
SHA5129b07d38e9b6d513d8d6f6fd3a01eabc2a7e26b91d49512ca0b60efe8f54f268da6fbd14173fbc6ab4773f215b5224d18f9cc9d830c5d6b04852b8318892e8197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9313ac0d75a2e0bdfd1101fa4a86cd
SHA181c8222903a3da8e3cfc71cae6f1f258112ac53b
SHA256b83b998cecce3c744c31abbce8413bcda015979ddd1fd0e6c0f4a499f1539e77
SHA5123de97336b055172d412f769b61f49afd0203b07cab25bc7e6ce703d23397d8f6824b69ce699c374a3dcb4bcd0b65ce45e2554edb7df3df4915cc55c91a5065c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555413e2ae47319d92dbeb87bf1cd0b84
SHA1593995f888b93ad51329fb10ae32b175a00a925b
SHA256fe23834f35e77751183863bc1648147de14ca575c5d0c8802895d377d9d15d71
SHA5129aeae1c3302da34000308aa806733688b4272141cecd224b1f4ed27d99b4e8dc6afde514bc41314d51f210ef1acb1e8ef03867564a123af0194cfb5058f0c988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aac06821a6125fe70079fb873297473
SHA1aef490e8232e2c5d537139e814aeb4921edc5a6d
SHA256145dbcb8125038bdddd72f2dd372dedfca9440cbd49355a0e5ad66ed1775f151
SHA512ec61bcae1711102cab164867c93f3abe3b5cc06b28997f94f527ccf4efffdb741da922788c1e39b04bc54c0cae6b92ef0e0b405a3a2e94abd1923048bb34b1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512cb3dc509aeaced250b9746a236975a
SHA16313a2598d177c7561a718b46ae1412c6203a3cd
SHA256ecb04281214ea7da02752a9c083f280ede19b90aade40754ada59ef6aed097b1
SHA5128542a1c6d62b75e2bd7a997d353a873f273de95fea1f909d0b0c08316e445a379a95a93a5c6390f16ada2f69d4c21cb254cb7a2ca831ec60f316aaf7304400ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d7e3503537f97ecbedbdf47965982e
SHA138f883003c9fc8cb7858d3b4f2bbb733a10bd1f5
SHA256f243f48769814f1dbb9d2d147cb850365a4e76ea2786afab32ce83485f30f1f0
SHA512d9d2c57833e85d0acc630ad23413466302ec1440d7eb1617eae698dfd63d3764c062fb4cf2c10ff3974a83e7dd0c8bc9147c8c4fb3c4923aff1e70dc63d2b5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3da259f022ea2dce0be91476dd4ea30
SHA127014317f99b5fafb29f3eb1aa244f93cc2646b9
SHA2569a675cd1657f49e02382f31465d0570ab71261b8d8a4e481a07c46d729d08aca
SHA5122bb829b4e7b9857849f8e99b7a9239d6a5e7ce8f0d3fa5daea6b96ddce31adf036adac4bf50cd0a4d5d18197540ace1ee57d8224d992ee88e550c427e19492bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0645588c5b61e24021c497c03f61de9
SHA1b16e5f20f1f5e2e138b2a035cac6b3f70e64951b
SHA2564930795f03d2dff484b68bdd927085d6f161ba7650794cb142a47a5045518ed7
SHA5125d2c17297b63328ac1c9b93b584cc8a99fe7e3317dc287d5c20ea1baa6856ab90bcb2e4de2ae23b918ef490fa241a866d1006a400fe4b7bd0f3e4943bbda3bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9a02b12e84ee2d95ac61fd709a3a95
SHA1447d274445fe8d70372f56537ac72ef1f06f3aee
SHA2562fdca8cb0cfae0e4d93e099b147e497d6e34f8ac302979cd60e8c884bc1d72fb
SHA5121c6251e77d0457297b20cff9e6601e7abd6b0443d8490fbb0c56fe3c1730c437765ce2bc184895b6c9c9a2ef9d6f7d9453aadaa096db4324587e6506bfc1b400
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a