Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
68c4a554b8575c9f4e56405c867d1f0b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
68c4a554b8575c9f4e56405c867d1f0b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68c4a554b8575c9f4e56405c867d1f0b_JaffaCakes118.html
-
Size
5KB
-
MD5
68c4a554b8575c9f4e56405c867d1f0b
-
SHA1
2f0a907c99619f858d2d683c28db3baa4d2e66b0
-
SHA256
d423dd21469b5926d7fd71eb2dad4bdf071582e99279ad03b7d0374ac7f1059e
-
SHA512
c3665726e0a5bde6a792f03d08a9a55e36aba8ac9e53c7e495ee93b2d0d7a2a7fef4adc6da90e6133c556549021f36e435f4cc59836a9eeb0ddd544830483718
-
SSDEEP
48:ImvNufODN+ox8HEDkFn43U4UBn0bHks7BcpuO18ZdEtESRSvr1eoTtQ5BeNF6Sur:LufOpAC3jw0Hgua8DEtW8oTq3cSlxL/t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{386944D1-1886-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eae1a64a8b22394db6220670856afecf0000000002000000000010660000000100002000000040cdf9d78eb402a51ecb66cb866838770569ac722331f3a8848204a9d65b3f76000000000e8000000002000020000000a9b0decf247849812a6afb797a368604bd5ee052201f8248fd4115a644096e3320000000af1f1299705d3e62ddd433d4bc6126adc074df1cf3eeee0633607cf1b1c8fe1f400000008db0a94377ecb6583164a35867bdc396d4511fde10765bcbb5bdee93a52886f45804a8725f023c2d4b317c13118edb1e95c83ee215fbeb6ac9c6bc5e9142810e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cde90c93acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422576890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68c4a554b8575c9f4e56405c867d1f0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3916d8b946d8528817c26b6d7c007e
SHA1c432c26facbbead225447440f10d7135b8b352a0
SHA25641776ad6a1010387ecc2a643f3d4d03ef4bad037ea1b34282323adbca0428744
SHA512cba4bc2eda9d3a876a4b32937c4834b8700bdd990ed9f633a1d8ec32e67828695f8a16fef58720b9aa76d400ed4ad01e478e4320021633a1b3b5956a5d46a835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffdbe3b3e00d500489c0b9e7838172e
SHA1b487d8bf87b1a3b7624caf1965ddcdec4885ac03
SHA2569d0f33925251992ffba2bc27d321dfb178f2fcc4ff0135f1ec6a1b35fb86512a
SHA512614dda7d8cc9719440391909d4fbc2b7e6c7db761a8eddccd4f87c663323a79ad38b7008b1b4fcf881d7f18dd08e76fa6ff64e192b8c54f68079305c2843e5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59403924eb2d411ae7e03dd693d52525e
SHA14ba5f1943b07cc3d6419eba68001d1d5d529daae
SHA256bfe9e1517261ceaf321743fcd69bbf6f675e15c9a4225df8f889d9149062634d
SHA51278c902b2b47e276dcff224fcdc35ab17b29556a864f18aeedf1b78ac1ad00cdb24213ed99d58f547f823afecc964030a79a859c9e769c1023a276c6c449422b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe2b0da7eb5f742cc07d1b35b8b3f56e
SHA114189d078eb8b7e34ad35fb0b797a6a4de13d21a
SHA256f130b819053dd50399df9b24401a9eac580e992f04d4b507dcffbbf8b02fedb7
SHA5122c21ae17641ca087fbd938fe3f6bef1a99d475c9c81dac8af9333c408a636095c9ee7a1a516e6155a96fbb6e94ea737d9fae47d074c895204f9b0c43da3495ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c1fedf2e98cef737eb600415de3dae
SHA170c2eddb192d496520bf7706d5de9dc91a4e2a11
SHA256ae976a3d3c80b17adb731e7d2cb837392e7df19dab479cc780f67aec6c6e4c4e
SHA5127cad188f96f502bb8c483657b2d22156fa0a408c61ad749605ba7de824f4b668ed3b4aaa28a36885f105d1c6db9dd45b680e7a50e6dd7fd636584282a3002fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f931f2c49f76eb34272194cca806bdcb
SHA10032bda7e9dd94b178045cba5e5b359375ec5216
SHA2560f10e997eb9d1286f4d20679bf778f07c309f0c65c78014a92b2ab2d934ee2c9
SHA51290df7aca68b30280778d312b0653f9a499114106481db755ddaee535074d710090c10e9bc5eb3a0f6a1fbf084d764f976d4473f55f88432f9cae72f1deaa2795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16ec7aa27227bbc88aa007eff96fcc9
SHA1c920a97e4609ccff323be5a6e693796d5126987d
SHA256bf52b53a6d6f0d7477cb805e6f0a92a143f2ffe477695380f30a5902dcf11506
SHA51279cfd8b85d2a19d5d2031a8f8dc51985000efb8222dccc7f3a8df063b8cf64aeb099280a270942056f7e76d17870ee0bdbe38a6eeb05dc5acec92786284e13ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4911730c87068df53f3ca5afa9bfa19
SHA126540f5ade1aa86655b9ddb0a71316f43c41a972
SHA256b284866a0f1910005f5e010ebb549936a4e08673ea1012afc6c0a2a37bae2d6a
SHA512431e438333b53f023ad4c500347ec7d0b7c8c04331b4aa52a78e27ba9e6a183378bb390f8d3d3d941eb629653baac4572ea88ed9e35f6a33c519880ce5a6b33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b7ba7032c910979c9ccd9f12589408
SHA1a4b468510f45af3b77c543211485ec2b9af57f6b
SHA2563d417bf246f7c24887392407ed7af599ddea48735f7034a5025234f595d66826
SHA51280958fedfa94be9670660dbff1a4b210c50543cbca05fac8ff0b67bf5aa8da458e45a5159c3c013f0f75af0ffd853d066394f4fff10b3f07fb2cffb4394c94de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59860b895d242f1d50e02d3d1951648d0
SHA1a3ebb85ea9769a26bec601074a3db43dc4a303f5
SHA2569d782e25f42dbabd7611d142b22b54516570b2f1747ce85e27d9380244348a3d
SHA5129360aeb45f561f4a1b62bfdbb5681f59b9c84d6792958e20663579f05fe9f47e9fd0c38d25d72b5b8a1109e35bca14b10af359af8a5fe5aaf8a59ef7b8fbd3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59607a65ff56c126e0531579518c10c65
SHA1ccc98ae42bba3014cc0e03b2e6596ab0a3ed6eb2
SHA25667aa6fc6c85ed5aa86de78f5291db6b8194d5efd353c280082a1bb251328140f
SHA512f0946697773e2680cf4a1cd3d9c5c843b8d3cd8c354256274f291cd90a29e213c3f3afd13c262b7f9b8349960ce2c247c5cc980a849ecdeff2123f94aebf3b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e892a0ac9a5f19010b76b0cc1fa6dc52
SHA18a442221427138ff1f370f9dcf329981df33f57f
SHA256442197a0aeaa456d07c6a4533ec04dca73d18e15e6c0482aa4eda4ffe974cd9c
SHA512e9ed8b1c24d6ca63f7ea14d0cc3d6af8e29f93716042bcaf42daaef37d8a7d0f4ed82194f5b93d007744a167a2d5e34acb214e13a92b149967f46583d1d9d27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2cd2a11eb541291cd40f4d6aaee0b8e
SHA14265ebb5f2301631f8894d63a87d661cbd549cbd
SHA256816c0c77adaec52bdb19a211bed3c49fe3fb409765039a953570c63882767f39
SHA5125225116a136c816d921abb77b7ffd7ebc0336ae5e4a452699f495881de814325495d510204b6698519b51d7403b56da91a6c3f7867cc3d764b02099b9bdf1fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504505e7e3948ceb454f35a751dc96258
SHA1299582d52340dc07404abf929711ab1a89b9ff4c
SHA2563403d00f94df4b24cf434a71304ee62956b3f9ae84b07ff18c76e9b169abb9a5
SHA512d54eddf1478fadb3479dd18a25aef08d292b16485bc5e278227d25e0bb32149cd349c5278691b97d879737fe7b7cfae4407e666be813c804be98356c6682665c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdba3b5a2c67ec8d07e5ff04fadc7789
SHA1ce5f3d57461d16dada9c7bc604a4a0de976daafe
SHA2567f2c2795d9de9d12fbb9dc0404b3668ced50d3eb427e1924e0789b7e6e14bef5
SHA5125776a4c4f855fd9da72fdf2ee01b76dbcab2c67f9a9190b8145bac3a52246bd7e4024d95483a08134d9f2ca9e577dba34a1fb5eca0e5f94c3aafe117420c021f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c953a0c45b87ab976c63e7cfd59d5d18
SHA1b5418b4b00f3742b4ff32c2a7c0ac27607208040
SHA2562471c2620c20b3195f45eca006651e17b93df681fcfd0cdcf251ecbd52cd50ae
SHA512eafc3437fd0ee2ac6d7b1e0fc4576a5d07a3dba61119565031cded970a46c204a5777773a4c09a1fd01264fe238927ce912d38cca18565a4a130e22357fefeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee637c5a6427cd0d8d3e5ef540c645c5
SHA1d999c4213939cf3e228433a7cce0790bbe525063
SHA256850c208c49879af4758b9e3238641e3117e530d9a1a92c481d80ad558471894b
SHA5129a261a8f514b5209376a448b1f80f3e5267c0ef48183067890dcca5d11f9738878b2fe7a4ea2069c7e43badf4109079d22d38acc8cf5686be3c7bb495a642e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53015106276e1224c23ca4eac0cc61b63
SHA12842fbc8b8ea419f45929b5b3b51de484a7a6f1c
SHA256e53fc76a1ae21ea7267a2c4db8b83461d00f15df826ddc7ac1495e01c151926f
SHA5127a9f3b321ea48a4aa89e39bc00035e9e84132052c6a828b77f536ecbd3ef53dbc3ee767e52ab3aa957d1f41c6ee0fdc31f1c2601d4df6cdea38cdb27edb9507d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a