Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
63f6a032859c116863349b6cbfce9ba8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63f6a032859c116863349b6cbfce9ba8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63f6a032859c116863349b6cbfce9ba8_JaffaCakes118.html
-
Size
67KB
-
MD5
63f6a032859c116863349b6cbfce9ba8
-
SHA1
92346199112185ef9be4380e006bd1fbe0125599
-
SHA256
871a3e11fa186108608fcbd8cd6a978df1865cbbc62333e75bf5c5f62c5e719a
-
SHA512
2d9244154d74e41bd6c08923a7b53d8b43343ed79155b66e85283e38e27763089b25e632e4528aebb577f1883170d2980ed9e46b25297582b404340706e3c1da
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sa6y7oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdNTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba4cc8d585bf3428b46e7feaebbdef300000000020000000000106600000001000020000000c6feade8630ba282a27efc2543e196795ad4ad8661fddd8c3ebc3e03ddafec14000000000e80000000020000200000008cd248a5f0888605731ef311ee814553f862350c096bc3e54d59f646ce5c368c90000000debc3ed3b8b784094cd6bc5a6120e2de23fa92e773a8ba31d0b16132492324fcf5035b3aefdbdaea3399dfa41884a8143c332e8feafbff0a6a2cad6a217ae51f9d1080d35f39cb7c85e6542ccd81b3ac350701e07713cbd57c509611ae09ed9cf29ca8e117dd60619eb8b4ffe717570231a063cf72b49a1be2a030789ffee0fb8c7bd031030c0211c745c6db88d3f8c940000000b0611ba4fcc93334c15930ad647a94a316499b5e4280c38781c092870a4390e43a2024e272ff0ebdb66f494b77a23da7d181187aabf76c9ddb22e08592fc64f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{472B6091-178F-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470833" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e020141c9cabda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba4cc8d585bf3428b46e7feaebbdef300000000020000000000106600000001000020000000d10544d2bb829559ca59b8745e22b8ffaf090537fe3ca7f06055e1d3a4891200000000000e8000000002000020000000f2345ace9f01522c12892289f121655b4796581e28ab24fc1e06a170f2fc2d0020000000df3ec8896789a502ec077faca7a051f26014da12d2ca495443ea7b22ee09ccbd40000000512ca65d6c3d36b51a89b4d57bbc61c1f28cbebf65b445d948798b0a45217ac90d6525e7e0e6152ec820da98a5d3a64c295dc80a239f0a9eb541ee3782abcc01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1280 2020 iexplore.exe 28 PID 2020 wrote to memory of 1280 2020 iexplore.exe 28 PID 2020 wrote to memory of 1280 2020 iexplore.exe 28 PID 2020 wrote to memory of 1280 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63f6a032859c116863349b6cbfce9ba8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7743e3fb5e071018393ccd2c84d785e
SHA17fff4750596d11b4d62c0ab14b32c7f98ed11c3b
SHA2567c609517f910030c244ecdecd95df3362f855ed161230dcbd2474e2b9b097fec
SHA5120fa3ca6bd98f0e622c3e9a14382ef312e29e46388ebf959bcc706719c48175556741858d745a416a843bbf1671e6808df24bee82b76eec51b34c1c5be3eb85d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424f18403d421f7c8aacb194beeeaa9f
SHA1c4d16cd036e6f83fdb2dbe7dab51acb0fe66504b
SHA256967be2169b48580a65f8936e263efa7b9de83041daaf1d798d0fae9085e0a663
SHA51241c33dd07783a7f995629a30b11ffebb8a18fb386f84d3168583b5d410f991e163cded7167fa39cb4e68a5218ddd5e60825ca41696c430d2ef4946c9c768857b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a267cfb48b2edafe426daa766ea57fe9
SHA1898142ed54ac9c1c1b97f3770dbb5027e67f5bc8
SHA256e8fb5a8c088dc5001d9ba21b37614db834f1dd3861548670be778a06984e2c9b
SHA5124d336dbbd36b8a8065e9a1da885798d8af5859f67a7af97fc5fbe86fb185e3a0648751d36fbad3a01ca96cfc6894c60c7a64bfc1a625c3a3025f390a7ad3a4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2642fdbb0608293725a0731d463e50d
SHA12a03da85a724d6735bfc10e0163edc2605f0a1a4
SHA256923113bcc32ecf903341d8ced4d375abb118ef6c3d0ecc9c3a2561c40e8b886b
SHA512c713ade45b1bb3b1dca0e91f2431a4d9b4f4e0feb103a9caa1f136118afcb2d8c465fb884b377f5c19e33a646ebcbd76fd6664c8d03764cca7e370751859feed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a9d692dd30ec41655405de353576f8
SHA1166c66c144d92d5c1e1a1ed46bd3f75529de1f1d
SHA2568064de45adb2d9f72a8b5a167f61b7f70b953cde5e70102edb34530f5954ed6d
SHA51258d43dd6f1e70d206c052bba13887c86e4de195deca78581394d3c384a376ad81cabbd6eaf1a319788d0f213a464c245423a3f84abc38464f58e068a9248dcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d646c988d1059364a5a9dca681f92f4e
SHA1ada23ad17449ab8ff929741f6e034d4083282ab1
SHA2562a33854aacb504281267fc904247503926520eb4793c0c40e1cd252687c93b3e
SHA51273abc5e2b892b9eadaa67e9b659b420c6ee3c9492ea80293b1c21a5b6fe29e9fc23ee72412333172b6ebdf0823da8482147d48163e69e649cf75729c270d1c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa8860c4bb5c29b0c91884c6ae0d2cf
SHA12cee8ac19ecc5665fb4dbf2f78f49edc3ca07d77
SHA256e410d526f9208a97e116013909c4da182e5ae6fb44ec8bc32c60f15146a59232
SHA512a13cc367090d2940c8d4f1aa10fda650b77dacb844bfe75693d3b98db4b01104317bd55e135310aa5c61d3c5b87c040f118c96082b57d5f7a96239428b51f208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea709ceec51010283cb8e8968c555e1d
SHA1f266ca67ee1afcafe23f527f91bb130d0ae8c886
SHA2563bfb07f2f803fd3a740f26e0265c4745f668cf677edf83a9528473a6bd3615c2
SHA512cd2aaf383d39a80644d4a947ac3dd71e6eafc98ca6b0e203e34f47fbdfb4a41a88ef84a05d01d1dec66276c02279cb5356d31153cafc504882062e37f95c39b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9dd9d7df28f3c5a4dfbd9246c400c86
SHA1069e897246bf0afb82d9a9d31dd236d936a47603
SHA256c7ee9665997d74a5863984e20e0789672db8e22705ec957ef8767062a4b16206
SHA5128edcb2b60dd6dcb3762b22cd29f46465f46da650be950ee1e18a5770eac044cfbc76f7bdd82b85c6c7efd8b1d90a3a7d7c34b120f5b9e66be01dec5a6a108e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a0fb87ec644cb99b2b1e5135b65753d
SHA1d848f0c42c1b2e225e9f007559e60477bf475344
SHA2561ef778486211e90cf994cf790bdd2b20585a4783f78354924911c112636703ef
SHA5120b5e88153e78415ccbcc849943b9419ba10a2c9a054bfa0f4223e0b50422217e93c3989a77c8882d9f8f174ab77bd5f78891551522da14d890c7a1d8930de4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55730a462f8eeabf126c758e074d6a765
SHA1c9d3ab97e77137b947167932263d535fc8d2ead2
SHA256c3779b02b7c13f3578b99c9c5d284383304ebe2bd4030f27f9677deea3eee0d3
SHA51229925797314adcfb042953d6f6986dff012d62a3d15d6c972985dddbb27abb9fc284abe243b8f9a2846ba52d7c237e20246826a96beb0162afe4a1319aa83534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea072f0e91b10a78d88a9d718c8582de
SHA1adf71317d5a445ccc9ebc03c48a44ce1ed4221e2
SHA25616faa1ce0d080a405d9f82bb9ecd92a6d19492e35b3fcb7322e6f56e4c26ce8f
SHA5124fe468675feab7873148a0754dbf157a558c6c946c3888489501345c5a88783599dc3b9b218728a589cd4825d569f6db035362018ce5169bfb494124cd41dceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c125d2468bb032e02ed28abbdecf90
SHA1caf0c74dc2e50a62eed8520d588e214d633a0e40
SHA25646282631cca11c25b2d35080985a5e1b39ba07834bd28b364d73ff111d9ced0a
SHA5126d5263c80e2439875f59ba931c68554a9f01b5f7a561def6b519b93bfaa4a89881997394172da80b0a762539ccca65b44f14621225657edae32eef300316e3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5333e46add209a97d864d89475126e062
SHA1788ea01d94820a54742b5877bc0b76960973fadf
SHA256940fbaef3962f6a553145926ea2cad76c90e28191d61e3bd1d6704766c556964
SHA5124a18d9cc83c50fda8fc793abae7ff4dd29e34a728b6e1bb3cf9a89400f4df825f229c3ae254feb44fb2bae9240f88561d9457c124d4e0975e1af4882091a2a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a595ca7fe4a07cf29f29e90e7f34d2
SHA13722137638699f2509adc884caf605b3dea886e3
SHA2566195f118a594208c6253f3eb64b19a285601bc62765dab43331be742308e0170
SHA5122bfc271a2764b5392f98536c467d9c2a407254064837abc6e3ca13b75d957117f1d92c213e0410272594ce9ce7c2940d1b26d4e6b70f43d1f5c241550041ff3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3932e76d054e8b002763d7dca9e85e4
SHA1003cab900a97ce16e7e0c890d0309ea2cdde3ded
SHA256540de2b32a45eae939a9c974031f66fe386b87a4db02d3518c70d009176cbcca
SHA512541075dafc429561b02104082f91798b2fb4135a9922fc1b7b2661db72c5e92dddbabbed110467372fdfe0faf1c3f746578dd4b4ee1480a9eb5d2d17e133040c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bdce30a5357ab8ac1b3681d028e421f
SHA19df9f8439f0c2b5a66ae01929362701adf02bfe7
SHA2565c74c83b63745bb8259a6ff6e395afdd512786e4eff12980b3351228708afe86
SHA512815c86bf2eba72e5f5bd3e6e52018fa99ac027faca6160aaf394995626cf422e7afb012e5d0f93c3eb2bc525e208aaef59bfe72dff8087a8267dcdbd6d0724d6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a