Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
628ed9c691638d3b60999412c02ad310_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
628ed9c691638d3b60999412c02ad310_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
628ed9c691638d3b60999412c02ad310_JaffaCakes118.html
-
Size
14KB
-
MD5
628ed9c691638d3b60999412c02ad310
-
SHA1
8f21609fe0e9298c3a8f71ba2e751e2354cf0d88
-
SHA256
7b019e30bc3ade4942704bba491ad9a7a7e9d9339fb3d8a61448e6fc3c4d1257
-
SHA512
fbdf33198d2647ef17cb7c782656154cd1b96e1996c49f6dc1e0196d5bad0bb27351d2de3284626a97bd56311f0f29d564d85732a9e65ae6544d0ed689a0a9d7
-
SSDEEP
384:SlH9ZF0/ej8dseyd9kzwvt9k+6AkIxznU7315jM:Sz702Oseyd9kzwvtc8m1C
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422442285" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ff6884aecdaa9b6a55232a5d48bc592dfc4e65853e56c4a5f126b53474497de0000000000e8000000002000020000000c6385867c18f3e1a73686bf8849dbc4766be844f65ccc43b9fff832a84ecd8be200000000ec61b5750038ec1592beaa28f3e14bcadd0856062f07249b43d52de6603b65a400000001c18a6e2d4ea489cc4fc8d748a971782ef1fd9faf5b711afdcead8be68eb0c6f3010a6e94d82e480d29ae2dbea560a937a36959bd75db75b393a5ead4b915cab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20352bad59abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1B4DFE1-174C-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2476 1948 iexplore.exe 28 PID 1948 wrote to memory of 2476 1948 iexplore.exe 28 PID 1948 wrote to memory of 2476 1948 iexplore.exe 28 PID 1948 wrote to memory of 2476 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\628ed9c691638d3b60999412c02ad310_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524c50a28d3da6c233f005b09063ba03d
SHA1c9deda662aa4c29036dc59c2755d3c237d2945e4
SHA2568266d6be9f5e1e8eea8ac6a808e924bb385d034f5a0658791f1b5574ca554394
SHA5126377f55fa54064a7513b9dfb37d348a2b3ba5885ee74483c3b911ae66ed8b95cc9cd1f4d4f7dbc091a34efed2d0bdaf13b52458999fe38f6f18a7cf63641abf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9f3d048eaae0e5e8b0bdbb72075033
SHA1f6ac529729926326620f6f11946306332f8e6d3e
SHA2560c9ad71330a6768e9ba303de18ae6ecc52cb2bcca2d9b8e96db40ae4eccc1e7a
SHA512dffbc3e5153b575fa2a93f523e39af96423d5a827a6bfd2a647c5145360cb5fbac8d601518610e197f9369e12b58651c70125d33dd5f11092e0041d76f2b02f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f781c344931c77fec2de8294c1f466
SHA16fc318b38c01b829c72a9c7d8fdfe1e344cc34dd
SHA256a9ef230952ee821d5af1de68cd3029129983e189585248914a0bc7d51de11663
SHA5120f154f300512f347af937cac8eefae058e6df269361e6dc8391b1d8747476ca1214a9d74668594659d57226c3d62f97edf499523270dfa5ce8fe20495d39f57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ace97b68f5cb340ba74705bc0b87d1
SHA1453222a9cfc9a30e7e24a4dc4848ca12030559fb
SHA256f2adae32769915ff27fe558194339e88fce070750f0bdb8ae8bf23952f1d93f6
SHA5128c335dab66953419de942a60b540d9e8647aa8eab10f3d88368dd20e9328f49b4d6e536b943e608ea825c4e645e436c67b5fcae00806089507325b136a124f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc32a9eaa1befb7e439bf7606a3a80dd
SHA11795acf3c22973dadbf0fc3810b070dc807178c0
SHA25668a21b8b7b7367076500ea90d8424cedaf982cc304e1b18d1efc295216bda734
SHA5120f96caff2ec922c06432d826a55de4f3be27db6c9c23a226ee16c555850561b6622f799723aafc2adda9c42300ee88d5ddea59e1f065a94a68ac5b1219bae083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515703a4222914f045bde0eca8339d8b1
SHA15e0668a048d2434c1e3847676b5881ea6cadac50
SHA2567e0b613d3127fde318385a954a234e82495275dd371663d7fef78cf44b4dea07
SHA512d445814f545e4c25170c68b797be89ed9a7e145b7fe5a27722f2efe7b877a993db11ba0f590035f97e99ccb92a0dd4de8535d51f4da1a5609ed20287d4dd3324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec6bf6657135ca55bbe0ecc146c6ab1
SHA1979717ca00af56a4c9d5a14021e80e1ef49b4e07
SHA25665c1522ddc2afa3f1d2e33a5c9148a9a968c2dc84d5a145d6e7d15df7acf8e70
SHA512d721a3b07fa9b42202aa8e612f3d0c4438ae44d8ad0c33507727ce80babde5545b3ab271ccd61e449d3a2e2e9538ef005a774972145e6f3a7decebbe09fca2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5633e9cfcbf43cbf5af3be770f9d8f10a
SHA1380647cea6623da5806cb8adee7eb9cfd15ad114
SHA256391faa36786a8795113d0c844fb357d4ce553a0e6d171113af8ffdd2554ca224
SHA5127bda6c406f9451c8bc5c10ad2e2663c8f1137469f023fc3863b320a3cd0ae6ad94694d3146e68bb702876fc840cad3b5ab364de716811ce3b969ae0af8f1c891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2415becdbf6bf110d811501c9b22358
SHA1b480084e75f99fba7ce92d9be01fe102215751f5
SHA256bb784da2ff9d3769ec33fc1eafa44db1f0979afeb3a174eb639411e4fdfafc8e
SHA512db7304a62959c5d88067adcf02978919e9403c403e4629eeb7467d014ae610be98900058f12cab19bd538d947670c36f073529e71028939b6653aed2ce04718e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55966c46fbe5b09a6b46bec511741d33a
SHA11be5cea9414aa40ae28606429f5fa7cbea815b3f
SHA256554ce2089120793ced1282f4b416ab97bd30cbf1ef939989168f28bdbd907f25
SHA512808791427b2c2ad241e2b20c6f4dee75913acba8a7305b926954c7504764f84b7d82b9bc9edf19e0aa7d4cbafaf726ad52eeca307eb75463355b3d59d2c4c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7fe38f336b3eab47044cb6ee6e61c63
SHA1784fd77858272fe08273fac6af9076831a27bbe4
SHA256105a11652d21b45e3840bf93eaf68f0ce7e841659a4a3bad338c154c120ec248
SHA51270fe188fd183872f2885bedcc9b5d966fc2ebf1e2def1915697b1eed5ecc7595908b08785399e9149490c1ec7ca8d350b5f54db47b50f674d362419690061126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b22ea3a628c4a5625eb09ba23120392
SHA14c5b36f03766ba16a6490e418468b55c5d8cb2e8
SHA256d97edbb96c1065a33408a0297eb47d9cdd8cec1c8a7c08f7de627b1e2788b68e
SHA51249beef4213e9af2f8ccaa391e6bcf32de3ed33026861a4cb268194dfc19129301d3acd68c15d3ff83494e24e976f5259872c65ee8149adc0a1f8f029a52d11f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d09513e6c571114e1a66082eb6d6851
SHA1f43f9df8b300d1c0a452a97e1186b78ba3c81bbe
SHA256c7caa0bc6baefe1f2013813c4da5e3ec79b1b28edfd4f82abde20553db68aac8
SHA51244315be645758425de5a9d346af71b9d8984109f661c8e4d0ca8a516c606d33b9d7e399b22905590612e1280ab0e9128bf2486407d06d49fe232587b8fd14f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e495572cbb43ce2702fa483e90fb9c4
SHA121078c9e5820e5cb7981984287ee2e809e3d3cdf
SHA256d9513b55368e5be34602e3e17a50e2aa94e37ffc7495d64665908216493b19b2
SHA5124888e8f05e0198359fad7b9b7a24059a7e5e9f5ddf561cecc1663883780f988a67449936267122cdecc5879eda92e9d871a979037942fd78315750bb619d34c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f52dc64329565dbf68a8c04f2f2c38
SHA1bce0ef3f6a468208c37467c6b3ca8e8519d57a06
SHA256925a75fdf77c8e55dc6d1c957a2dd9719a05033d95ab6cc884f30692604c06d4
SHA51201c8c45d12f6671943247389856e684a8226b8aa4fed24ce5be0410097d1ca15b0a775eb5e3c7e64e9cf1a39b80d40b7f667cef1407ec423b534aeb71c5d3daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a98a73cb4062cf6c0942b4b766798c
SHA10e22209e991fd4f0fc86f0ebcecf25a36b84a785
SHA2569184f6c3b9f83940bbfcd0bf18e0aadd65270a4eb597844e86052ca23a659d00
SHA512324fd1b98efe27f98591309ec34848c6b7faaab962daa8f74e25d16eccb440d5b9e068583de89dcafe0afa0d29060fd8e195ca7fe5b98a13c15075114ad76aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e6b4ee645d0825d6293320cb4cee59
SHA13a74660f47a93d22231d02531eee5188c241d1d4
SHA256d95540eb1835ca4a7fe253dd2c749efb58349fc6270ecf3367a20008c8e71508
SHA5123e90bd3fdeaa023558d10f4715f0866c8d91e21c3f7cc5acfd5fada860b5d0239c38853e373d068ba6af3a0cb8b1795fecc14db1ddd75fc5f97846c64f308c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f724506df9c5a258431d9b49c5a2324
SHA1687f91ccc367a15edfcf6e0bc8f38fa570c4d41f
SHA256844cd820d00ac155735b9d4f7cdcd8fd7226dfa5cd8f35764e93a97ee680b4f9
SHA512c88ccc0683c3c15d9b572ff56862dd7fd2ade21e17a6afc7ed8b4b143eb71a5230b502d564957fe8cd75fb0bd53ebe0ad0e332bbafc7b6f2859e63d91e14cb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a918e827375ba1f898de961ef1e169
SHA16554e45ff6b360ebaa9e1dfdc7e4708c443bb7a6
SHA2567cf0e462ff4e4a74f9ede5511db5280276c09f63813d03c0f21623541f1182a7
SHA512e210baf5b0d6108ad7620f19707b06c80cfb3ac67d85c1d655741a60b99acb8f15f2ecb715d91beaeea7e8d24afc880046f89c6302777548127b1430ab0738e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a