Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
49c2f5701447cbc36a9f30e52188cd96_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
49c2f5701447cbc36a9f30e52188cd96_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
49c2f5701447cbc36a9f30e52188cd96_JaffaCakes118.html
-
Size
213KB
-
MD5
49c2f5701447cbc36a9f30e52188cd96
-
SHA1
03f17b7b077f5611cc296e35cc10c90aa0506f4b
-
SHA256
e029a2791674021698c60d235abf868e7a3763fefb1cbb5bd37c66af27cc7b1b
-
SHA512
f66468df1f39f876fbc665d33d9b67c1579c73dd18f6da9e2448ad3f92df348ba6471a46bfe4252be0ab56293944d9e1ac27deff085d4cea4ddfc0b4353dd4f7
-
SSDEEP
3072:tdEdHJ2+58XyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:P+9sMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0215cc958a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4D41F41-134B-11EF-80DF-F60046394256} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008aa25b97e5f50e42af8ce826819cfc42000000000200000000001066000000010000200000006f59f3ea90be18d8b94d9a39fbc98393284731519e1ec2ca2f72bee19dab1c99000000000e8000000002000020000000bbeb3b0d25c512ceb8e7b147ed7cba20ef713f0812bd33cfa9c73eb5ea85f80c200000003913726b45d113355f75b58f01fe0f06849478bda031e86361a2baac1198aa7a40000000eb297640ba5abedf5d15a55de1d4e90aed1ce31d1423193b792e467446b3e2ac3645189f79cbbc7e47c81984d27399b6e98f0de2c98c95d70380835d6c1a8dce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422002110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2760 2836 iexplore.exe 28 PID 2836 wrote to memory of 2760 2836 iexplore.exe 28 PID 2836 wrote to memory of 2760 2836 iexplore.exe 28 PID 2836 wrote to memory of 2760 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49c2f5701447cbc36a9f30e52188cd96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c08699ac7dac2cb0681a9057f65c39
SHA1fa3ebbcf2ee00373cbbfc11aae4a1ff74f70976c
SHA256d0be13eed17edfe16d77f62abbed9b33762136bf1dd7f8ed37fc0971205840e4
SHA512b38719c9d5bd457816ccb198784ece8fa923555714c70a089b8964040afbc02893b32731b8b4dbef996e98cf42f5765f8410679fcd1891f36b2c594f6afca0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d608269110ab160f6cbf4af978adec3
SHA1fd3bc010e700f7bad5569d6123d11180dbdecdeb
SHA256838565abcc2b614a567e95722273a4dd2a63b00edbdbe684357cddccf4808f7b
SHA512da913324e73c3393f729d42199f3b4940e18988cfd685beed39103b71878003da6e38f2cef5b789331f928ed434c182fdee2b0cec81f14bb56ab185210210e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9ac82ee532b322c2504fe047d55a1fa
SHA1f5b69288afaad96ebc549d67edca354f7212c15e
SHA2560395717c7e7b01c1f0be3128a8bf778b89762b0ab4dc1553eac571288b2ba80f
SHA512c27662b33018fcffb14270fe61f8644f7fcc6be329ef2d82ec38ac04a308f4eab510488c8053f2a02a0c2fa6eb4b3b35f0f921ce801c8582520acf51f0643f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2b74c1c6abd444f6c539df78ed3ac7b
SHA15af9740e85109ba58b98e6a009b1ea4c78fdc4b7
SHA256433931b60de362150ab3f6ff1492dd1f9fc9031bc0907a49f7708490e455ba94
SHA512bf9c9a3e36b17a6091bed808a2e4aab20462740dbf0c6cea999aeefe534f941ac6b21695c4a700301e83becae61c55d093b6a1bbd4aff5da3ded8bb053bd2ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075890183a75e5cc43a4ef7e1c7bb027
SHA19e337b976469bd3dcfbd02dfe898468898b118ab
SHA2563f6159cb8027817013e863f87e8cfd37bbb05e19f790a91e7656f8b48e05b8db
SHA512ed2debf195609af101bf0a3f74a73d9387ed4a89111847b6affa07a4276ac15792ab6ce477090e3689a5fde0165ccc7405f7cfeb869f57d4cb76108380107d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b33c6f511008aaf5c0a3aa018273184
SHA15879ef315c8a48e6bd7550b89c8bf5678db25a9c
SHA256c591d6ce76d040c3e6785663380e200c72b31b25850c96db3b8f3c7e979faabb
SHA5122269fa97f622049db14f61d65ef4731dcd7d691de7ef9aba155c150c91a4a3d3b6e637c70abb01ee17e1bf559faace9b276aa5cbcd4b342917e0589b0656764e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad3f608464db3e365836bb1ce14f6f1
SHA183c88213a104531cf245c04d45b33075b2a5a516
SHA256d1c75f803daba922e47626816a0e6cdb0118dfa265408e5b4f35e71a7cba7cf1
SHA512852aac6764a8b230a06a0b011581ac48b717ca2ae4fa50b46ed87412a9b31c2ac4a50f209a8e62fa6a89668d87e4906bd72da60b7f0af2a3a6d51176034ac862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc6b9d7b1952e5c4740d67475012bc4
SHA171caf879f0c9c460772cde42de0f9e10beb9eb29
SHA2564d6226f384a10af8f6d8e1866e57946ccf32beae696835cff6854e1e591b9c48
SHA512542b1f5115609b13e2346e5b89ece138adcf679aa785fda42e45c7d2ad48e2baf7a91d09091420a959a0a0c2b8f8ab606bea6e442ecf0e69e1728bc51959ca2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369dc4a8e1d88f3dfff3e79f1e830f64
SHA12d1779a65c2271746a6f432680ffdd63852081b3
SHA2563c8d5e4b79c792ad0cfcbffaf23f60eadd6b74441c9483e869689656880393b7
SHA512f18260ce2d3e5ea74112a945c3c9d3b9f0747f23f39237a9a1b3c3ec405ab7c65aa486c34620f265df68f2af6bc7c0a63db561a2d16f7377d0ebb8187ed39d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccf1edc44c4f2f2415a22b5fea4f418
SHA1d60409c73cf78d119f40448b675e1c6e277358a8
SHA25656d38306c472d7b59357fc4c1f07c0869e7eabd979d93fe58e4e888d7f6d7663
SHA512750228aeccdaf3b3d3325fd1a516a9fcaff66c49ea987196853695c1cc4c10abf70284fda315aeb17b4dbe156b0e672e26ca3b9a9fb17e81d49fe70720daff60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599978ab15bc41337393e35958609f418
SHA1ab33ac2429eb01d94c5cbb06734bfa53c5e2db93
SHA256e3550f8e5f881fe9d32f6fff60c5cab22791f60769cdf80f6b2fe308f4a8bf89
SHA512b4a42c967ad42ab1095049d0e106707f4d599fea6c2f4039f2c68c70adb25b459c400899da1a543d415b40184f5b62a811818222817f09ffa0046938bf5f4c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d660375cf24b148eab7abb5f6c3b04e3
SHA1e131e561b5cebc1923f19b108adad82cfc712f6a
SHA256335966b122c495f896b0eb8657616bfd56a5a6b3183bcc1bda6ad687ab83cc5f
SHA5128ffb28d733d05701427a81e27f86165ae26fdbc80ddaee737b40cb04fde8fd461b05fc5dc46e35cfd090e2f7f900cefdd19e105f488ee49abd0de42ecea49d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1a520ae5f51fec4e301bf0315130ec
SHA10e80d21bf1820a97e738ececeae43d8c77bd63ff
SHA256617888c3d942c5143825b05ad33c1fbfa79044db39f9adf4b059073c68dda2c9
SHA512487765ac62a2cb0fd5573eb9249e789e0f4583e4b88519bdb5d1d7baff1f1c429333dbd57ec8de8643664ef2432e1ba6e5fcf1fcdb8c7c17e48f0892f78fe9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5804abc4ad7a78620f20399cfc6960
SHA14202e016b4514d48b13d368f5cad3404362ea0e1
SHA2565286ea463aeaaa5089e4856188162a250deebb18c0fe32d9112e0e71742990e6
SHA512a458e3e8efc8492bc633ca0449b9e53d90b2412ece6fd9dc83239693ed357fd4b58c883726d23fd81432a81ec6db6b27a096e2ee314bf7b3a1c752c3a055c7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e7960db2a264a4c66e369a52fca8f7
SHA1dd4fd7f782b0d996801baea5c2636d7cc8f492f1
SHA256f83c7a0621fc2e95025102ac5145e4a35d79660587143caf28d8f5cd2381924d
SHA512d5351966f2506bcef519e745dc92f6a030327c748942653daa64b1da3343b091994ae625bf46894ea8b2c9a87ed565cae3baf88afe18c6b153f35afdd20e3d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8ce5c1a78a77a8b54b8ba52d2e9923
SHA1e928d075b91c17619d39e4df2343dc610db5db00
SHA256b9adc6b4139cfe59c4abb39c2f2e4f9854cacee6718fac45e0ed295a236c59a5
SHA5124f9236b19a77745d00c5dfd2b84f916bd5997114b21ad00fbb6a5c4bb7a22763ae622babec2ae3e64ed2f21650aa2e023d6cd828b994d3c9943c8a7732005f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36173b14382362b209463b13a88e970
SHA1c23b802183edf5de46391235c3400fe084d04bf1
SHA2566c4994aa9fd6052d6cc0769852fa2ea469c6c34dd9d2a13a15d974c11db5252f
SHA512e968e043e1cf305ea04a451f6bc4fc6ca0aa843d378ba4707c4e47564f3d2669dd186df0b26d795df29d07ff8d2a579d3ebade2778078b7625b346cde59956c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab26cc75757b1dfa85e680f7da705f15
SHA1dac2163ea1898319293fa68b0601066f6e0eb42a
SHA256d77394c66e21710a56132a3b733b925e36c02e897256b9f5dd7de3b85890da9e
SHA5121385cd72985853e1afbd48c617615111d861ab0e9282c5c73ccb0cc41accd6dec24c15f508e3cf1bc9ac972bada5fa946263daaac1f5f8cbd5b51578ab275404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8e8720c71693a2f4be53efc2806cff3
SHA1c09c134e5f6d66f532921ae8822f68ed3b88ffec
SHA256d1d345ecf5eaadb6c7e19abb7f536162ad24f72a7b2fb80205d3c03b1babb999
SHA5125e4ae39a8e1a7f289563db66c246fc7930e0b36c553ab58c04017e7fb2c40c25d12cc3f7e1607e257e9356b46076280bc17b6d92f06dcb6ab8946e08d361914a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a