Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
4ec1686df641d34e45e7179b5205dc41_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ec1686df641d34e45e7179b5205dc41_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4ec1686df641d34e45e7179b5205dc41_JaffaCakes118.html
-
Size
19KB
-
MD5
4ec1686df641d34e45e7179b5205dc41
-
SHA1
bf1184a4cbd2438eba61a92f70aadd8d896615de
-
SHA256
8d7a851b5b2a676c085df57f98304200e160130763cd904f63f83c86d45c710c
-
SHA512
789b4539576a0ad6e8a46ec00afcb59317fb35d358d82c70b1bf334957b9249f90a871cff4b393b4469d19d5f8372f6fc2c99e24994a66e89539efd5dde6cbc5
-
SSDEEP
384:ziVKhgESDVBD8cyQ3R1cnemLEXucfIk9xhe7zVc9Ij:ziWSDgcV3jlmFOIk9eXqIj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422088368" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA105481-1414-11EF-93CC-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000077f9091e4ba247f85f86a2c82737ed1b4244699a45b3eda497cabc49ff75f475000000000e8000000002000020000000b54bd81a47b876b5d5260fa38ca14fdaf25f7fb5a6d5c77fcf18e93ffacc359420000000779158fd93ce4afc5c7f36439ab4cf6fc564421c0265ca44e640f5d65890f40e40000000dc23d08171f4ba45fc6830f61e1c385ad59fac4fd385b436156494a0614361998e7de7f7b1d9f7ff316f5dac589bed92bd9d857230f218b73fdbff5c29c65f4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10364c9f21a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28 PID 1632 wrote to memory of 1804 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ec1686df641d34e45e7179b5205dc41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592d0bb7b5d9d25d9942b97f48435166e
SHA143119763a3f8f87855f1b31644928d4601f9694d
SHA2566e361172cd2a83b571fa1f06d3ee68f5732757675e5c9f934216ca20ecea1e02
SHA5121a5ffeed7044125a26959b97b48710c7b5208cb90367f94532aeef090b397e80224a180a0e51d80805a96f4d4c0b5d042f497cfabda85f951a8ca1ab3bcdf889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59941ad027fc26e63869bb1d858246eef
SHA1f8da10878068158a62a03aeec50128190435dacb
SHA25616fc2525b973a7bde97d8c76a73939fddafc35e9302805ba8bc4c41391ccc123
SHA512b8441c325af9ec9e3343fddfcc8d3e0716f31a188a47cac72c616397fdd4fe0791d1b6ae76da48af6df59d01ca360bfcdc11107b9cf527ebf4f9e56d76fea688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5912a3fdc5d00f137653bc13f8f48d08e
SHA1a40565adf7250b0cfea4c9cb32c57e91bf0d6b83
SHA2565b3426ae60837a627b1cd218d2ffbdb366b7ffe9a2411c6cdaa28c8240f1af67
SHA5127365a0c49e67f190a7da7750b7dabc4aad6ee1fce78742d286b92bdb65ad5866d8ced55dd0b5bfe2d400d87780cd8bfccb947e171f9a28c7746a82249e3ef9bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5306b5dabc839c0233046e019fd488e4d
SHA18c16bc9d583546cb3dd1c167b49fa9d5c5e1250e
SHA25681162bd72bccaa2c67d931a4875b2004a776e871dc438d25805cea5486a59b11
SHA512c69ed7a5271334c359a0f6cf66e2804bfa796ba732ceca5d273498f670e17ba1cd8d36da3bdab641f6aefb2f24f6858e906ecffe196d738891d0dbc15361d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b199b7f2cd1af31fe2b30ff718c2a937
SHA132c52265e96e0376674468e7cb775b50e0ee4ea1
SHA25674082ca1487bfc7dabbcae1e87a21e3856519489ac707b93be14cc72a5ef9c0e
SHA512d3b5959c594d84319fbfca40adfff186ee2983f1f6cb697de3dbd9f079adbef30cf866496a942198e7ec24484c59ca58e1dfabc4a9829952a0b1e650925778a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555fa66616a484041f5590afcc4f3a0bb
SHA1a68ce32817b6c903d4a13f424ede5849b0c97c42
SHA256804c63edf589186dfaac159d983d6f2bf63dabd9b7e1a2e9b9cd26e48a3e5db6
SHA5120ae5ac0960158cd1c56426602bb82694004f2eba9a0860f6e6a87daa5d1d788979f9fa0fccd1497259cc6bb7ce1970692cd4a5ca85c40ae64ff9a696eae93faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546d64138fdd5cd8293893b1fb08a023c
SHA169f69d497558d9eea0cb2adb523e9505593ba5e2
SHA25626548ca711e2a439b9e3cb3af60fa2da33513727c661150423bfa264bcdf6eb2
SHA512360ad56a58804f1c9ca99bc43ea022b9be32066b632f3e0cd8ef1659ea3efb7970db4a34151c07500dbb7fe9494a3bcbb3b2e12f3c0a42b3d2205512e86b0792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534f1827c1d64e762bd97acc5f7dd5c98
SHA1f8d4e205ee761ea5833b3a108f93b812da0ca8ae
SHA256f1985b17bb30a3288c4f11a3aad1b0d2336abfc0ece819da73d7650884a16f91
SHA5121e46880545f735b58e234577f9089fdefd4e25b6bde720b0271403e5b2cdf2333941befafda5b926c1d8654ab55ef5bd74893ada2d50589ce42c30c897a2a12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5766198d38afcfe10b3b97225fd223839
SHA1d8b9b1e89922b4f8468a2228530a472c30c79622
SHA256b9a66d08cdd3dc3444667f54be97cb98cdd05b91a82dcd19343893da00d84086
SHA512f56aff44ed75384d7c668b277bf560d88bb490048d267237fdb19f7794edc30618da419f62112c89778383d37f3a76f4a39ec66ff57f583ca722de649c1a5a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a4bfa3c015549ca0d26c43676644f8d
SHA1c8b4c0de8625f0a6d48ad915653c7f44f4fb968d
SHA25619855d2db4914b1e78676628e487e246963d3fa7cf8ee897e0eea2008e479252
SHA51230c4666587d7eb038377d285fab62e1520aca8b7a1aa0d42e3bcbf9e10a053ef82a71b9df6e00caa4c76ab8a357b221f6726ab5e977d0f9f8c29508af8d050d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce8e224d08696b15adda9e8a71093b04
SHA1f76d978067467ad192cefd912283dcbf09661d84
SHA256fdf4de0dbe0c4a119a90a73eafe26af025aac49b690808caaa4b89b92efcfd0d
SHA51215bc15a4784c25b504f710d7fec908d0db1aee6d201cfbe5be2b7771a9c2bc7c1269b818bbfe826eac3f644bd207b928a7f743df3b70b5551468dbef7ce04edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f2a4ab27dbc8c73cff13d08596c11d4
SHA177df0806828f4264056aab42552f1f5b61c4cba3
SHA25639fd6ef8d052d66bd79559c43e5240bd48da17c8f1d8f82351e91c2f867a5537
SHA512123ade7314940c5afad008063491c9ebca75f61c5514b53789de09069eee40781d576ce690861e02314ec3ecdd275952d925eaa8c63bb6350ffae5583dd2c881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b41c46b240d41b360ffc90e5195015b
SHA17489d1206955436956aa72a2ca2e09896d941f26
SHA25666e7a3f08645fba80610af24c33839f93b05812ef9425d649a93d571c083d2f0
SHA5120fecb6527c8fdbf8133b31a63daa98344bb1a14ee8b6031c66e990970bbf1c395b4d6030b6b9f556d9c4d36edfbc06772a29ad61f8559d268cbfde6df5bac24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5154ee7aa2c6983d092168c80ac9d742c
SHA1d5bc42ec05ef283b03102a2ffc1108d136d412c6
SHA2562f621232eaf62cb1ee03037b746c7e09951ee1ee369a7cd9ccda46d66efe6092
SHA51285105f8f1e513d4879f083230e6fa9f3bcbf21c4574cbd7de48bf81d463405e843d25892acb8749304ad2158374aedeebc4020dc782c2198e3bf6bfe9ad425b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f55a78f095aa6504b2f17da172c8edca
SHA18167df0910d2bf9f827fd53faee682bce72b8376
SHA2565377a2a210457f25691a31ea247f040cb425e22f55afebf7c539bd4997cb873d
SHA5121c94c6bcf71d1040e23c75175e43766e6a7ce0c118262091e81de2bb93f88995f0f0063a98360defffa33c15ce60ab576d50199c61fa2d3a267392c9694c0bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b922a62a2931932aeaf8b523dd341334
SHA1841e5519ad3849eb191449b2b178fd06f7837b21
SHA256a520e72c839253810f7864c29461ce03550850fb805f9829ec8b01e916d04962
SHA5122995347952a115c661c235e222f1d478e151260f81f568d638de7f6603c75ba3f125da69c23e087c33289db31b38d47526d7cbcf46310ee2b175a3a4fc96b5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1c738f85ec651bbfbbb082d6aca9e82
SHA1ebfce122d743e948855469f8e4a138943e01f959
SHA256d7f88ca4e54e272cf427426aacbea57f0a6f2dd4ee62b3ca761ef3c16647ae92
SHA5121593bf8fbad78d89adaec6aadec005f5e5eee6684f4e747bab0f0d631d99b49f2b42e1c2cd60e30777896e75bf4ae271b58f3c4d524416f9fb49a0158fcd62d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c45dd0322694e1fff41bf33567ccf676
SHA1eb4cc184c9e05ff8cca5f92337bb353e4d9bcdd9
SHA2568788b8fa01313f8225c23ed3a0df6a8cc71d84958b7a9e446148ed75a48a361e
SHA51231c0dbab1841513d483f1a9a8734de2e73b56c91c26985c404aed6baf01aaa0327583bc634f417fab68620f13718f3028aa33729e8913cae758e5fc3233156d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f78175b73f2b64965eec9a1824743e86
SHA1af5d089376c3dd37f024e7424eb6608551fe0691
SHA256e4e9c9c9ee6bbb7bd1fdbccbc949583e7276cc6ad99717cc3f0763da13464960
SHA51239061a9366b11d24af132ce86905c124eeb6ae602fac5eb80dd3329d6ba424ff5f1d6d9637a8eb01d2dc0373f83522721ee02cc85f2f46b400f688401620375d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a