Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
47a49d14c08887f1642c03d9a346c961_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47a49d14c08887f1642c03d9a346c961_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
47a49d14c08887f1642c03d9a346c961_JaffaCakes118.html
-
Size
96KB
-
MD5
47a49d14c08887f1642c03d9a346c961
-
SHA1
dd9fddb9ddacd3be635678c7347b3d4763d883a1
-
SHA256
ed028acd797e901c0fca3e30173d4597fcfd649ecdf84b5aa96b5eed1be08c4e
-
SHA512
e40cc0a42c286a900f9540bd30350f2ca32528181f3e25ad5422b6dac70998e12754d4b9956c562f397ebe727312581f571edc440f8071a47ab76e10f325a33b
-
SSDEEP
1536:PH1GRSJaJDYzhXuRhmcZQgfUERTosv7Q3ePcLtk3sMpCeHVkqNOZceXc+D87:PH1GRSJaizVuGsaWIrXtD87
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000059284519bf180977140b3aad37d9682e3b97128ff346b6a87315b40300035be2000000000e800000000200002000000078d2b65ec266933a4b773568903f564c44226f18b085b847839a9764516e736b20000000667174137810388093b9c9859d42d4471e7c59c72b67cc37a859b324ca29621f40000000188fe7e7e28457427b4181ab6f2e1ae14f74c5b760b6ca16e0156b0be31e98a951656c6287787f65805eaff2c8142df678582c91545ed74c6e07d5ef59bf888a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{186D1DF1-12F0-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0967df1fca6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421962658" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 784 2140 iexplore.exe 28 PID 2140 wrote to memory of 784 2140 iexplore.exe 28 PID 2140 wrote to memory of 784 2140 iexplore.exe 28 PID 2140 wrote to memory of 784 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47a49d14c08887f1642c03d9a346c961_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59009b8c6c60c7bd976e8abfeff89f819
SHA15936f9b073d9290cb33562d840b2f9e8af2ff6ab
SHA2568011001196b422eb2fc034e53842d34a2d2bddfd25f4ca8988c22ebde2e31503
SHA512dda64b475458c9e69d2aebcb0341e72214e55f59799659d6060c9a4249ac58d2ca39d525ea9f12868010c83a00dad585d7af8e34e81d5cf0bd546ba4b4669fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786a37304f2eec4d95b86aef5aecf45f
SHA11592d5426efd0827f0c480d0ee46ec96aaaac709
SHA25669872fbf177049e3baeec2856b40c8e53e6fa2c1d7a30a832fdfe4c1599f3b5c
SHA512bf4dba8bd0c62aecc14c048aee342821a04bfe627d7392b5f8266e2015c3be9969358e429397339551ef53f2439e68e156b3a099cb5bc4c11c4feeba00c59824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb901347a608a714abc77d150fa15b4
SHA12d4a9c71926649b97106054c055b8a2cf1cc1da3
SHA2566bab251b17e581b3f0aef9f387d00a129d877b341132f3fd502285d7959d03f2
SHA512682777d473b2aa3dac925170217abdf6c19c2ada10fb9958af8711ff5c55473432070ba6b3201af05bc8b7b9e109de4b6a514c33d79b73febfcfa8da786b9b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa83fc6790f1b25450aa272e2c0face4
SHA155a91200bc3f2d875fc5af2f5e512c78bd83351a
SHA256524772d6b2e51d283b40f15714ce689b166874b7b0506aca04eea37f7b8698a0
SHA512d80c7e8923c178c1e8b8efc69fecad21f981d0f01d5388bce3f336e1f105ceaf3efb46dd9bd9086a105a0cfe0912993b614755617251ffd1d280c618a049161f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542054caca5c8ef6339ec212ca0d1e64e
SHA15c00928c228fc455a93051abd2c553bc5fc1b9ea
SHA2560e066eba1165626ec3ad07be4cfdf7e45c814a48d117a46a175f38875065df1b
SHA512a264bbbaa48575874bb97695f1d06848e378000b382c7eaa0b579b552fd6fed957e15bb0548cf2b6d1ffc165beb7fb93ae04d19101ffebbe1976f7677fcc50f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51741c1d758614bc6e2091c8257f60d85
SHA1f25a345ce861715237f2fe8d9cfeeefea480dab1
SHA25675323256c7a7ce9b01cc330fd8680511a661b1070601ca13fd7b7664f40dda99
SHA5126f3672e5de691447995334faf96af8f8f0a4709d9108822407774ab18d09b563eb6fa16a6c76b5814c6ca9ef72379534268680f13470263ed80f26e72d7678fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556c0fb90b46dbf013f11cb899f540453
SHA19696d066cdc753798b0c2c90502865168a4b3944
SHA2560e1e9bdc239ccabe349597dd5b689899a790c5a5c3c1bed67720237f242667ba
SHA512ad2514ae71e91ff7268a268dba0892f73edaef1542b9ce4d9746b0ce9f9f70d270117d6a4552bc1aff785ca6b6109f646d1cea51c26732f5e7437d5f7c1e2120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95508eee1ad3763a5f73be0079a8d45
SHA1b164e0cadd1bc8ccbb40fbdb134ea8db13204f58
SHA25689f344b24f8f24408a28fdcd574115ca7a6f499e12d8df6163bc492073637159
SHA512cfff6149a2285a38305cf0a0d1c1011470dd187e6fdc5b55b00b6d3b70113cd7d2cf9ddf51a9ce4528fdb0d7b1fc41a86b71707fcfc10f44b3f0826b7d9fa4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a1b4fac0dd689942c55d5ba2552f906
SHA13b47499853b618d1b22c9eaf9d5248714b2aa44e
SHA2563ecf965bb05a37cc18c5cb23721f425a7bb0a3e20e83b98d4dba7389037b5307
SHA51230f11bdb26957255f8289f6354fd6dd01ec4c7e00fea881461ca9362dfddd216cbf5b2a26c153f9c83a8ec3ab7eb447a6d777d41cc5838ab2f4e6f0125f4b91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b089b173f72bbb672c2924b431b5e2
SHA1c448696621ac66b145835fc781c381703e8923a6
SHA25632024c92b0edefe56a942e0203d355c3172e035d1099ebb972afa00ff85e7f5e
SHA512c1015055ffe331f9cfc45da60a6ecb84d34b269c30e8417018bd0aec846d7c84976d7c27966eec4d9264117f4eb2228203498a7a74d849a1246cad534278b864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea41a8ecf7b098fd419cf265c86f2fa
SHA1a19a065a8b76954dd49efef4220963c231650934
SHA256268391ede3fa3998458592d9347f0a292924549ebb1336dd3ad1a45fc14ced7a
SHA512de494a41614cbb0997ddfd7168487789c693cdbc0de153d6e3d3f9185c1c88e7b5370bd76d739e16b197516b6d380aae8a9185b3864cdfebf06751a7f7a1d672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5210f64b0f244613520c771fae29745ed
SHA12195d809a86158aecba31158418363c0aa5fc7d8
SHA256711e78dcbf04db1bfa23e690bb757de577b0d57f6cfcd6f36c90ec6679759d3a
SHA512fbe51d5c1d6e07fc8d9383b87ba2f0648e861ccd96470a71f7f84cb53675c757851bbfa5281e2018bb0172e657600cd149912416e7dc5da7cc1c68f31b48b9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a4732e8455cd3f5f6a166b0b3f6988
SHA10d6c42481530ab6506423a28803481c4767bee94
SHA25669abfeefcec71010043fb86e61f5f8ce9ff5183eaa206801c91285eb6b39f2c3
SHA51202d33e81ac4b13b8ca71e7c1160f228644098d9021bc14953b0ca1a36b409f2f4ab502c7b59e60bc38a0c6a4e2eca21f8bb751589b963b2218fa9dd60f32d851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bf5d38fe44eb28606d46566eec9c556
SHA16517f0fcbe517f5eb32bf5a0739c9388b6e6bdf8
SHA256211a9d3b293222647ca225c1a9b6851e3d6489a9988e560b9e8840ce3b483f78
SHA5123871309c3e18af6ec3012d1051484e90bfca7d4239e4d117b5488f42f1115e0c1226d6df0e52d6849f971496cd0aac45e6f4a6c10b82a11c9a15e5f6388b3966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521944f439c4c8ca7052ee9a9727fb9fd
SHA142cd30c5845e3c4d973a4ae737d191f6e41d30f0
SHA25618a4f90408b14e0cf76938a1c2fc850f00bb97c9f1e2274200acfe910eddb351
SHA5129caf830a51331d54e9dc36e235d4557ec96b69bcdd18815798dd039430bc0f20d2dde12b45f620f491c630477a62ef31d1f6fcfe19a131471a24d7221ff96100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185605df0e9b9a642616dc8261f49daa
SHA136a228abc257ed0ffb09c4969bc22462b391a606
SHA25686e89e7b08d22f5f9e861e6a46307ff47955e23b6f403bfc11d0734fd126e752
SHA5123bcd728337ccfef41cd43715c33015c389a025f351b74c1e4e4b0d375b6d5b2b4f2f46c4287d46bc0f93b4bd9ac3b36408d48a00a8b3fb75def4d2fa92fe2ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c5b44e1579ba4c49cdfd42b45ecb6f
SHA170a1383a796c0bd69dc268cc8a8cc3604f99c9d0
SHA2560e1cb8f0b10c87139af3c106ff5ed72ce9807baea14bdc1866ba998e25625b51
SHA51254e293cdb75b11025705dd7e57b14193b2614d590e9bb9acab7bb88b5153f0f7e9df4068e84eb9821cb7ad31e7db8975c69d3b787acd15a34dacd3b3b144df66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4de27836db2e5b5bf415ebf678914c
SHA10e9a57952392a1e23dbbbfee682bb7da0b047113
SHA2567a80e9c418ed4bd64f713676d9bb3a0d36e4e9a5391abd83ec404e7bb05f844c
SHA512046f000d179ee7c59783838a7a661560c3f79f3dffa6cfe95e249d35ab1a929255761b0ff7546b1729fb261a5b1618d1949e5aa9e1a8c343001018f59e4e4794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c3f574bd8866bb9edc1fbfbd2c55603
SHA1fe1f6120146328a3935cf76186aeead1e32cacff
SHA2567deba419eb4d817e33f01b72a12db972a80429fedfe6c9caec4e3e5ffb9ba058
SHA51253db0139c7ef9743ec0fe467bf80a135aa36f7b00b3dba5f5084dbed49449c2884d8179a9a2285c5dbee214593a5ae7285b39b7efac5ea3a4b7f3c6b3683835e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a