Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
5db2edb2640832c56fb393af3b7adf21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5db2edb2640832c56fb393af3b7adf21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5db2edb2640832c56fb393af3b7adf21_JaffaCakes118.html
-
Size
4KB
-
MD5
5db2edb2640832c56fb393af3b7adf21
-
SHA1
4c2f1c680d754e759971850d97a529c34652b7b8
-
SHA256
2d4ab3dbf302e3735ff7ab3708c7109da22d6a78ff2bff644cf75779abd96dc0
-
SHA512
f69a6f9c02511a6896eb4a0723afb654002ef7bc6aec94a9d560f014d36d48645b36b76f0604fa3426d97e8855fcb05786266e38f320000bd15dca84e5e441b2
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oXlWd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E166EA1-1674-11EF-9667-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b3034381aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422349348" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000c78bb7c1cf46316515b91a1c399a0403d6b930544131002f9d6a98e9e9a1fc67000000000e8000000002000020000000d6b31c8c5fea4cdcdc9db1321aee3a5a688c78afd3f3eb212cb28e6ff8d71e082000000020688fafa9f03738b534f66e3eff5f6e0b08ea37efea6a95fc6b5c6a9fd1209b400000008e4e400a7843033270ae0e6d5e0fbfd797c8a703bbbf0d99040833e4001bbf84f421527a70422b3a02d5464f212d9b54f0f1a550c3dac8d8aed3cb9b6984905b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2932 1624 iexplore.exe 28 PID 1624 wrote to memory of 2932 1624 iexplore.exe 28 PID 1624 wrote to memory of 2932 1624 iexplore.exe 28 PID 1624 wrote to memory of 2932 1624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5db2edb2640832c56fb393af3b7adf21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532785ee307626a5e1fe041365b8d48d0
SHA1eb1f417553963279eb926e2880f68f6c356f4e97
SHA2565789ba5f2ef5522695ab8709d5bb8c2fdd2fee2e67ee2520081d1245183ed9c3
SHA5124d1abbc6e80da22618169db6fe0e0c7d49def2881420f9a28b95ca202af241f99dd32d83b40007f53d420510f78a7e16985b870d792461fef89ecc79449d39e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564e2c6b2a19bf9fc21535de5eaa5da98
SHA17e7d2b28c9b5e1134e880b5b7fa94676265588e3
SHA256ebfba69c8627d9e61680c07bf947a402dbd587c1d5ade67f157e96ed87be460a
SHA51209f0953b839b946b78ac7269a6328725eb85579a3e5047e36870af4cbfd89207e8439b8e6a1e62fb61caaee7288a03af3932bf5792e2acd0e3e0dd2284384409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c869ce18ad9355343659db4c15588c
SHA1f214b07de64bc9b4047e3330efb38f98eaccc26f
SHA25618485fa4e3d0e7da1099469f44dfcc09a5092d0f3ac00f89f8707e6a0783a491
SHA512c631ed01b4d6e8de82a3f7ee613304c84f6a3398c6b07e6f5c7f222946aa00cc33c7e74165e7d6ec4d95f95fb437fe91df965ebf04ff19e4b48822a433621115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e3ae9ab90ce4c6a028248e912cd8477
SHA11ad135fa21016bb8e08baf9e4a689eff93b057ad
SHA25616bbbd3cfc0054a883b7d5edb8ff1d1505610169340dceef48f44b411716eda4
SHA512390c468380da7206d13576f37ca2212aa133ebd71ccd310ff050629e33f0b91d7e961fb09d648aeaaab2acbc69b87742a17a9f5d3cb1a069dca389af099cb21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03ceab17c2674bc11deb26136fbfb1f
SHA1ade3c57839246d807cd81c723a0e57ad0c860ae9
SHA2562e638d7a2c852a178264a1ed129432f2eaba7195df0cc442d34be778edb1a9a4
SHA512c512bafe4de7ae00ce8d44655f6a3d246ecf2978717ef68e06cb5e7396a4376826812422313dde94a11828532f3c1000894ec8eb27e6ec860f5ead9c96300f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6910669970a952e50ab17723b0d4ee
SHA1e06c167c0798fb8ad6556284ec5510ff37c95a8d
SHA2563d46a09139e6fe8d205dcc1e0a904e52ab4d0037b508765c820e6d91dd5b3080
SHA5126e3b269e4240dce05701423415e4c5df5c338d53abd24c08c2c282d7858ec05eef378846962d7f8310052407901084cf9e21ef7fdbe4525614bd4effb11801cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a20ca6ce587bee39dfdc6ac590e93394
SHA17262e24dbd1341fc34e2086c0a3b79febeb49b89
SHA25662c541108634043606730cb621a372da3be981f323ee8776f758a0ebd93cd8db
SHA51299d2500723c22a5b99b0d049342f9ba398866eeab4571d76042b26df2d9ed57d98e9032c82c05c9f8b43e59fa245c818c3fdeea1dce9caaa54ce8511511feca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566c457cde6010431e23184ba76b35a52
SHA10a8ecd316931f132377818e81addc162df24be93
SHA256078e79b797c85a3d5f1239140012f2cccc8eccf9bf76b3025f9fa1cc7bd0476f
SHA512288b539ee2ccedbc8fef971d7bc1d8b098d3553518225c7c8c602616f0a6f5ededac18ae338213330451f5e561ea68a869f996d662195267684ee76f80768643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d883c043258694f195bd51e81b847e
SHA1a08a658c90afab8518c2f5bf92bf670e89781307
SHA256875bfb2fad2b24e0c02eb0700d4b2c0408fc92d5bd776a6df9240688d418c428
SHA51238b2a1f9bb1c621d7debec329dd047d0806c5142ef53b49366933f5f8094d3e1cbf8129f25301385061d2828eeaa6a145689e5c6e94ec40193597347dee81576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb82a38a119f2701cb7afb5ac604421
SHA1968d9e4e7dae44ce4df1d65c625476f2c205134b
SHA256fdfeaf21399f91d2834d9602ed134608d26109a464c0400bfcee5215526ac5f5
SHA5126c148dd84f7862635591bea33353817ef272b2551f133b1ec2a4b11173e9e681d3fba2b4c15073e167cef2a0db53026578e77e7aa5d3db58d5e9319a288ef5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508835e71f03d3596f60f4095f2aba39f
SHA14345b7df864a16a0b17574b8eb7c538b01abbd53
SHA2564d8fee4a0e452954f353755f9f0b0cd5e76371882bd6d449b0514896838971fd
SHA5121d53073798be5d2d87367df18a0a0d4f6b49b0a43362f4c5a377062d85477c815b1c9dde1b967e3af4afd5e0336aa8829bc26a5c0e13366d47ae346f317c3e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eecc1e8ab4b785db09acda4f512f654e
SHA1dffd4e762852775e34a97e70689e6fe69b28f62e
SHA256535f95e28ecc07d65794e5ae16a3a2faece79cad58a76d1a4f8f8930c59d03d0
SHA5128ead17d0822c7cfcb1e43d4c9ad60e8b8f56930e57bfc39b43517de6e4ac50ee52d8df6fd538bee8422c502c955b901647e24393f74cca38ab6aaaa55da1c787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433138b1041371b784321b6b97650e27
SHA13e34fd49a571d460a448b131e46212127da1e040
SHA2563efab0763c36ad51bd2cf67b00f88b912e76fca82a72c76a3b453e9769e4c09c
SHA5128a63c536ae08d612128412e216bb608886b43e348eae96d08807d251118ac3f4d534900059640f2bcf84acb1434eed874496c4cf9e1ed270e3ce237d39a24216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86e2ee4c55bfae0307e389dbff46a65
SHA10374a8db71bbdeef4b8765fe4801d65a4259c275
SHA25653fd06ae9843269614bc3fb492a99bfd77686bd6b6dee51180c195cca78a90f6
SHA512f84ae00c59a8ea67eb9c6978cfc3808e4ff82d224ea82ff162ea3ca5fa7cbb35e17ddfa0fd2f27bb17b7d209209db74c395e7b103697adca276f7a9d5cc8ec7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5504dfa25f12f37196ee4e39534094ffd
SHA1ca1c9b769272448f4d5257b287d84fd64fffcf27
SHA256fee7c96e1c5617d8d4c6ccdbfdc96d32e845d024247ea2dac8521cdc37388bc3
SHA5129a237682e1462dc55ee9305a6c587b4d5e827aeb8fd75854253b59dc0c54cdf68f684b03471cb7890c298fa2d81c767fe54726230066a25d8a4eba2cd434e533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5365f7edd5b729671ce242e6e985d1ddf
SHA10603104bbe993ba1187ab0946f0a8d6fb289b44c
SHA25654c1916cf83832a8ce8320bbaac24803b3030d06e3c56054e79c38a9278cabb1
SHA512b5c320aab8e343ac2d04d47e7c59dd93b3248bc2f20d6db3ad362d2438642b61972e8a7c3d9154ee0537724f223b806844494b661a10c3e8f59b133172d25bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ac94c08cadaf8f55e836fe92f2ed768
SHA195b2ebbc00f4de734695fc56eafa49fdb3defb6b
SHA2560504ffbbd74923d3475ac12aecbdf49de4c37c1a22d77659c1ffbaf70bc8d4bb
SHA5126fd955bf0dda776d9c50ac17aad2493ffd5238be855f04547fd48e41d97989a2971930eb017fc88019ecdfb32a13bb4ffeed8553798b212544f3fff0772821cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523919384e1b58b9e450c553be6195fc9
SHA1936c32c91d5982eaef70f208e160d65996cca05f
SHA25631719df45d00093af5726160fa1008278d59dcb45ab5ecff6184ec510335dd06
SHA5122ee40fe18105539e45b4d2287a9833748946057d54b47a33fe8c9c5851665eca95b8a042111e630b94a47b914a573057cadd0d4a0d6b6df1d67e533c7eaf0782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd1db96b5b75f5dc4421a23634772047
SHA1169ff3bf8219c0332ee5c84931938f6974aecb68
SHA2565e4ede1e63d26bc48eb04019411caf9c4f0f3e3cb0f0470d943cbd34c5cfd007
SHA51258b4b116440fca39dc491da88e47f44249b19099b5f50904a89eb45ca7d9f34e0590bff8ca4babf045ee9679a19e7b00b4538bcfb21fa06d1f0c387a2a751d41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a