Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
4e378d1563082c29b32d35c6226c61b2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4e378d1563082c29b32d35c6226c61b2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4e378d1563082c29b32d35c6226c61b2_JaffaCakes118.html
-
Size
869B
-
MD5
4e378d1563082c29b32d35c6226c61b2
-
SHA1
6968464f66b0b722b1c9fdb52143b44a62e0a79e
-
SHA256
f6c7f99ccfc4bfc8fa56c07ba84c92ce59bae7b4dea66d7a7e67cab5a620c537
-
SHA512
385e34b0c40517f9551727a182677f29d60676007b9d81dc9e8a10a79ce50ff86cb3c2a5f692c8b95a4e27135e0fd65f70b287003bac509f0663d2d7cc40f679
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000bbef21838517f0096eecda371c6e444b30646b75056e94730ae5af558e67e347000000000e8000000002000020000000f772023807ee2e63804b380da3ea2388ebe2d94a1caa56cdd1abb83cc71a721f90000000247f001064601e56ffab5b688d4e549d98f11db3b34dde6704127f53d118b1358589ad60a4a087bc3cd1ed39811fd27a2e5ff03c531e89f74561ac2a6405653ddf2c58ec0e4ecd60f07ef7ad27885ee1821e6f609402d59cb6fd7eada7b25676ea2ba568b2fb77bce0fae17fc775339273e744b9c419b4a535ef4ecb66088f994628c6333088bb949cae769f7722894440000000d80f91b69f76b1185a9c448a28bf4017f6ce3dabd13e81d07da4d0f3c2b8fd774436207a42673da10bd3a2ef3c179ae797c978984beb0c3e42281757bc52d8a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000d30513ecede479e9ec5c98e7c372dc00258a3c52c2621cbac85fac70587e69eb000000000e8000000002000020000000976ac37ddca9c39c909c1ad53d22b0f15a883b08af19fb0635ba5cd1d82315862000000063719c30314ed7e845b4fe5e624566f042bb34967561c5a6fe655d274458863640000000e34596f788ffaee291b71f60dcccfc19ddc1ef581d10d72f2be0bd4b4f5a4abab613d8606d9a2ea046bcedd0e6bb709a5e7ece1295d7644c1d6faef28b5e7b80 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422078077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4AE2E71-13FC-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d055229809a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2636 2012 iexplore.exe 28 PID 2012 wrote to memory of 2636 2012 iexplore.exe 28 PID 2012 wrote to memory of 2636 2012 iexplore.exe 28 PID 2012 wrote to memory of 2636 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e378d1563082c29b32d35c6226c61b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a00983ac284f645d8b12bb36d81228d
SHA1766dbf84bfb464223a8667a55f71359c4a211a1b
SHA2565afbb1446dd39324f20d97ee9675951a69f9a1fa1e0849192bfd38afd9584854
SHA512070c4f8837a8e7ca46d3aaa6bfe6fcbf9f5b2ebf1ad973264a8381b130d5bfde2004e4f47dac611745e770ead8a2daaf72afc9580f5ff6d6284ed7f4f47986c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134fc6af553b93dfa98163373f337a3e
SHA1574f77dde01ad37003980efa7ace789bed23d3ed
SHA2562f82dbe00d181d627436b72e276f1ae923c4e99e65716d86db7c1a68d63dff12
SHA51274cf57e34000343e48f386af0e2eac0a7ce70d30e619b6780710622493433f092b8ef8fd7964c5bc465eb03c9e6ae8a9addce0daae0af69d62b7b11ef49ef27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b06f206a1467535c10a7c1756a59f95
SHA1bbc6f05425855294fe110e1a62e712eb79d57eff
SHA256e9ef60591146c4c5e16c7db8e7b5fbc81b06c59e43cc6e366884af6cd53c2f21
SHA51263d235f7bdbda116d1f9b222b4e86c3b97055a1ece5830228a8be0c40f219dc712ca102600333f40196c590e5e2a52cf77dac0de7de76dbe66491702201ae4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584cadba90e0bec46b576109d01e06665
SHA1adc21e9db8f74c05f54e1fd0cafad577726c02a3
SHA256bae07c2be9735a6ad9b4993809c7a39fcff3ed8e61ead2634fa63271c52edbaf
SHA51217783ecbe4537b70bb0622b5ff55adde36139153b5c58c475e7fb04430240c143638c23db963c24cc3a286f4eba65db0a00de161f79501faa35f4ca70aa40b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d8786955b8cc624670cb0212d472be
SHA1710ce7418fb60cd7b2036eaa11dcfedabb913b0c
SHA2560ba5e4de4bbe4e49c1c57fdc52402dfe0aedca4e8acf625b45165b7f8162a796
SHA512f6a7b19b134c3a9abfb584a465d540abcd41395582ddcac6db2e034555a78a2c656d40ab038901ad21d0cecd518aca8d659eddee21abffd75ae27a467ac1ede6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5826d0e2a7e4e934c15787cd3a6d1cc05
SHA14dc30e95d0f376884acfa8c0fc86994384daabd7
SHA256dcf3d2ce57254815c11425081edd07aa6910cb664234c67fc4c9e1c32235018b
SHA512b9c51ba6ece0e030ec5b6bcbd00afde27a650277d819f8ace59047ce5259a0f807e33a1d2696d449ab4448b7f465c6346d4290bb3b032aba7a8da79b5ea31d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5790eff5122ff0295af15496b3655e0d8
SHA1cb6926ab3c59d848efc6647146e8e9518f9723d0
SHA256656fdaadeb106e7b53b9dcc6ddf7c99a7c4f91dc93b1b67ad114a387ebc6efe6
SHA51251c067970662e03e5094b5f3e1f6057041af3ad35a97d688bb44975361d6a5304844b355afa1987a5b08d4262ccbab3205dc68d71de1fcb4b77cf8891988ce9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e593990e43681bbcf9d75116c79b5fc9
SHA19e56917ab50da3bbdb30a604ac1bc3a7de8f825a
SHA256fc32233e4161e762d469e17255a44241021eeaca77e37b38d4981d66672546e3
SHA5122165206d3f4ed615478f9a2f2543ac957b081398bcd5944bf8b0e6ee95e72e2147c8d52355db7f924cdfdd326d5bfe2e1b0fcc01476ef3b57f6b7b771d678f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c21c1d5ed1aa9b911a6a9b478562099
SHA1bd0d3e2e9e036ab9305cab7c514f4cc7cdf56a9c
SHA256d6f1cc70e89bfabcccd7d289d3a278623d55b62320c31f406b3c1074a26941bd
SHA51205be123aa1fab6e73d5e3600888932c74f300c5622019a330554faadbd37a8e6bb7ebd0ecbd4fbafd76ec3b3a690656712e4067700a0296845551562fe28e297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd140ec9f049138e67e484078796358b
SHA16799f41158c2a466f5cde93531aa56c0bf13b810
SHA256cc0f56ad5f1c8e5e26c985435dc300e1f1c6fad9f5c84e63e49a3ccb945db96a
SHA5127be6a5ad16cb964f48bc35cde76df2068972753c5f3825f39951afbb2ea890fd8ed1719b0843484b8ccc0498bf67ba85f47806b8020487749eecc04cd3338f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c197db1e37f483349d9f897be5eea172
SHA1d06c2d3364f13542734c3ab9827f321951b6f597
SHA256564f7cb3a9303314ae7379193449e3cb9e79e30af2f6aaf00e6bf5a0ffcaa4fe
SHA512842d506c8f523621da0adec8a8e52ec972f9cb4638cb9f64ae25e06a105163c3f51ece9ddd65adbe2d88082ee4155152e4ea8f099f7abc1e8123a51c44dac377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c804d6d6b67b247c7f84f019c3f9da5
SHA117c4b5c510cfaa37c74efad2dfe40dcd5d6cecd9
SHA256452958d16e8b3fe524024479f4dc7a97c780c75d183fed9e8e24b2de86075501
SHA512287f1fc500afe6cf1dcc27a8d3ac2fe8498101a27bd8f052f4ba057e802134612b159e16b6bb0c104634b0ff207e3935469c0e500034f51015bfcd1c3070030f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d73ae46abb4d20be98a55f52261ecf1
SHA136eeb5cd3cdc18a2009b2123d5366569e9ee0c54
SHA256e5967958fc4af183398a605111c500228fbcdf37af1c3c96816f35e58ec291a0
SHA512bd4e3a305280f161b61de60c7d0358f66358a2655b08cf13fb1b34aa978c3ac2a1c8857d12cbd2d998910d85576e9574a041bdbac081662fa810ccf24b53d3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a21775c642adb24b47170804248b368
SHA178c9ffc2a0ddb1b2f7d84dc61aa4c0e8ed4fb1e1
SHA256568868e94100422c891c0db2a3a5999b392e0e29ccc3660f2c505b43f210e1f8
SHA51276241f3ff78a43107867fb74bd60f027417147619523716682c93215154fd48a0a99d3bcedb462c17d41f927af4cf64428b02758778e753eaff5102294e09923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a171e1834fb6f449d07d5b08e7db0e2
SHA1127947ea3cd3e984920a422fc7894663b58f33f6
SHA25686c4c5d7703d2126577e5070427a0a4ca66a972da494432762305b76885beecc
SHA51237b88454aac0cb347e5176f109b455ba01fa5dbe3b676c92c7155f307528cba4477323df82bec7df4ab474e9beb6adc59a9d2d9477d82f58e42e21828e365629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c83d5b7457289298f9ff39a2747d9239
SHA15d6b943d7caacb6d3a816767193e6fbf56b52b1b
SHA2560a39a63391c98f32549c6311c07f62d517f5d231369a8b52ce9e6c79a38ecb58
SHA512dbd5631d1a68e23b964a4e67d7c5356ef5c5b09cd0232b8b3b6be8d948633c5a8e02c8304b9ccbc0fe45287545aceff5ee447f00d64794af497fed7cf41acbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcefdece448a0ae4ecd6156eef7f23f1
SHA1e316077abcca5ba83322899f5b8e6eaab7fbd6c9
SHA256e7e1de901adb9acc36f5143efd8b59e89a41166c0c695476a86deb9c682f396e
SHA512169a3d9002b1761cfb1513cc15fc787c75f7d7fe6d34514388a08cf12aa488a868860001b817863f464f357c639abb852c3284c81f57016ca3d13ec7cd721f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3775ec065244dda5268cd8cabce441d
SHA1b612b4126f118697290650c7f54314675cb1e397
SHA25626d931117d7f53b4d553222dd6058379f4bec88f35e3c337712caba23ed163de
SHA512327bcda01a48a92e938a3063793160da87e9f464ebbdc7247ad6fe9111ce6fd02c12342cfcb7e0059cc8fbe6cccbb9ec8defc6972d85abacfc2da02062910b7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a