Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
66b0287303149d1a6e09df10bd26ecee_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66b0287303149d1a6e09df10bd26ecee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66b0287303149d1a6e09df10bd26ecee_JaffaCakes118.html
-
Size
16KB
-
MD5
66b0287303149d1a6e09df10bd26ecee
-
SHA1
3cf32105255d31a2ee97477c5575e6edb9b24732
-
SHA256
3f8aa4e777e67a79d9b183c84b6406d6c4ba0a7a8e25562ac72b8cc0354ab54e
-
SHA512
64e206164d822110e76563a740a4459c8b2cd3b712cbd0c1f1e03e90d911ca1ff1121d23d625cfa92931e3e6357b2842659387d893e8990c9af427a94dedb827
-
SSDEEP
192:CPMgBEOks1QTxE6av//G/pPU+jwdhlrmwrtgrGp6rJOrSAr/SrRsrr5Zrqr:CkOkjHav/O/tUlbdexM3Gc/O
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fcd21c6234274094c53eacca6e9d17000000000200000000001066000000010000200000001488ad048d2220b9de1eff95c3372f5504634b0e246654be52de01bc26b179eb000000000e800000000200002000000007808727e3b8b431e1f7d1027af7bcd86893a4187609deae23c631fdbec03b6e20000000628938fbf8b3d62fdcfbe537ef2ab68be6e649aee574bca96852174e5049f26340000000a8df0535d0a2a622850459686f70695625efa33d33552792485b49b985d8a1687b3a04f7254e13730c5124d3d7b19724d2d46e641aeec2b085e7b9ed842911c3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422529459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d0aaa024acda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9611541-1817-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3012 3008 iexplore.exe 28 PID 3008 wrote to memory of 3012 3008 iexplore.exe 28 PID 3008 wrote to memory of 3012 3008 iexplore.exe 28 PID 3008 wrote to memory of 3012 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66b0287303149d1a6e09df10bd26ecee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424f7246314d48fff23da17f180d05ba
SHA1aac9b0c01d76666c139897b5489aec04dc510e7f
SHA2563de292809337ae02108dd7627b3006624783adbe8aa4b2487fc30117e97fb7e9
SHA512986b2822d151f7b10a282d6b85ff93f4cba4994a78d179a263fcbb09112b9c02092e1f7f03f4e0357c36cca57b5b7f69abe632101160892df030bad0ad40cac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac2910956519654a8f6398b5f59c7719
SHA1b1a484ec7cd6a7d355b7c1e7fb85e73e02332a3c
SHA2562f4510c7dc1d3a9ca13c59218664bccdee036f7084fa8a01ae0160a99f0537f6
SHA512604765c7806739b4f22aee80835cdd6d0288463ac5efd3ff69b98168dfdd5e6727d55d39160dc7cd74bbc2ae6f10f7280d2bcdb8b5e21c40785636a4a415d06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d9559a4932f434a8ab394e763c34bb1
SHA18a9e1f97aa8a5f6026b2747170321502de00a339
SHA25645b6ee7ba6a64059d2c74303d395f97a877ce07b1d550cd358953d2956bced31
SHA512f07622bbe0ad79774cae92f804eab90b1d3fdc4a85ea4b176fdb46e3585cbd222cf61f7b454b2d01dbb19f4dd26a6be533ac6806ebb03f1d265917b8764ad7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bafdc6502491e1040e20eaeb54269a08
SHA1be2ddfe0a32d73c714dec126d97ff4a433608424
SHA2566372b8af3f7d6c8fe56723e13ec9777501646e604504c8dc5ce3b9a8e5a589b4
SHA512bb9940be3d020eef6b9e5229a0a64744744800b915525f9951ac5617edc60eaa7311a4aabb601628304e487a3079cbf08cc3d9acdbff87cd8a6d9f960b7cdec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f10d8b0225808cf3605f9b1b9f8cd6
SHA148f86d68e1523710671d0be69373762bcc57f2e1
SHA25692e48f56abab6f6ee7118eebc14cbd795b377491cef70cb2dda1f209582f1a13
SHA51274f8606b9ec1fe686a09bb8c97d16189f262143329b3f25d122c94b61cb12c214659f30ffc07c85c83fb34fe630368239fbe9c0bf7f8135ce6aeeb3463059c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5160b2c7fb8abec66bac2b3ebf2d6ad18
SHA1d42d184b3f7cfac0a1d63f5a1bb6f3ee8d01f966
SHA256a07f0d23fa9506ee3143a44e6a4b295c114023df3c4275157e555ed4119aea27
SHA512de59fa37cf9cea10584a8aab37267ced4185f37b8c160aad24d6fc8d2cdadab98e71e4a4688cf2bdcf240cba5e322acb0901fa31c9f74835d8ebd14e50cbccf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b7b2f796da90a7519ff37114f9996d
SHA1260e688a926f9682755dcf52b54b50122071c78f
SHA2564d0bed76a930eb854f2ab4130010ccdeffdd0fb7508de3e3166ac63bda9c7899
SHA5121daaa292ed1f38e675b248ecfa782175fe904ea885090d32fb0872d341b006223ceb953470225ed4656cf4e91c117f2a036b9279366bcf1c58e64fbe9c0e849e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb500f43c2c17f3f26decdd73540a6ea
SHA18f1a568f0a4d4a41f9cfa753aa134d642411a6e1
SHA256305467067d90b72fc5c7892a4837b5c2896ebff7a5329e4deff96cf2263245c4
SHA51226bebd8f8c941466aa109a01e668f0dc9a14b8e0b0c36b1dc4c2271d479c2929073e90c069030d36001254523ed2cf77765a3ac410b14685d4fd079b16732c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907c93da9f3f279172276e2221095dd4
SHA15513a073c477971ba997867091c1f6322bd83f37
SHA256f9a9f95de9fff9a4c3bdc495d6b54ccdfe3b264f1f0eabda5d1d9e781f468778
SHA5122e35ec90d4a704d5b030e7855be3102b86488258cba819628950178d92ca9eed90b44231f7db83ffbbda8a0d97e6a1b1aeeae6c92478f7e3383f55a8cbc28230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a904dfc9a1b33598efd44193f621166
SHA1cdfe447cef1528a450aee2ef54de6baa3fcd2799
SHA256ee4888294ae987b80ae960ec2ef5af512314f8d3cc58a75b622cd473d4c84933
SHA5121a2ecd843f07ece80c272566b4a2e5a427687b1f916b09e9c86968b570dcab60c14ff6c5cc69b7fcd1a2580211e18aae0b995db2a4ecab5454c9d39a05b806aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea39af924eeade7edc3a14c3b6e2158
SHA1289631707269609f7b912b38610d87957f47fd74
SHA2567f5f79511ab1584c50a834fa4caee21dc9e547854c92819e59624b6452fa7667
SHA5125e79b25bfb4e2b93626a92c177918c697e0addcaa19a92ae4a86ba203ab7fe9d241e381501824c7a4e54b1dd23b5412d2f334e7e00e80cd92cfcfafefa076f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f912b4117d7c53c3a1930454c575c76a
SHA13b67896071e51fdd07a7bc5d8279097bd1c3476f
SHA256d3e9faa1a9084e822c60232e7b0846101039dd38c3a002341cd205320b6dfa6c
SHA512219bd15080ef4755100fd266beb2b90056663e4d69563a7b23491f9245162d55d2137cf229e8a49cfff2e10fc28c43ad35cecd4d57165feaff375519a272c98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7b08940f57b5bdc4ce0d9375991061c
SHA1814ec7e28d70347ead6cacecf2163656e9c63e9f
SHA256f706ddd49c345d171ff0acc8e0832a5c70711c2291a1699632c384fd7dd8d9a0
SHA5126f1779e76bbbf9532df733d700c3a79d116416fcba3a1cc67b6ab9571bc6f4f7234950cc5caf5224cc078ea0a206d6f7e3b26d6348aa85e75f4be2f1d7565c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcfa6d652370b93d29b553d2fe75bc00
SHA1e7d66fd97cba530d3ad23a5b3ca7305e77db24b6
SHA256e5b438e7036c065c897007cee0408541a7c42a460747424944ed4b19ba752427
SHA512cb9864733af49476ab31b501f0a798ab1693b69cc88b3f20b1df6dada04ba938aeef49c5cd99c47cb79918a9d4b1262a82db0ec45535245bf8e024ece00fa6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce45f5305edbc052c63fb70ca266013a
SHA14c096c1747f7d509a344e60a2bf3c33532e3de71
SHA256b79f4cc20e6a2c3a9b1b65fa679efd16aa98ebdaf8bd7b257912ad6ca4f68f35
SHA5124db7285f4b94493a25e3c940595260b5354cc3cc405d38eb043f818b54a779713c575165e8afecd26e508268da15000afac3864631471987762f09323b61332d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5789927f8852ac73d172d0122421ad71e
SHA1fbcde02f428eadf2f3715667a4c89c4b84d0c397
SHA256306a394b8071effb161f03d5362b47131a8f0b43b6c49dfe73c8bb3ab1605a70
SHA5122bd9f75ce6a35c2a7438fe0826a012ebbd86b6f6e2413b421e88ef6636ef37e3ab2303696ed4decf0ced93085dbd38aea085ecccdc456858c021c48d71f75f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836d24c9cd9548b4a70c1520cc0eaf72
SHA190fd1fb712ece481418d33a579bb941a39874a5b
SHA256e9b243ac5a72207a2a22ed8faa3fd4d6129b1151f4ed99a8061cea3cb53bc3f0
SHA512d7ad7f9a9caa8d9194a568bdd5194bfe64240f46efc061aff581ff778d7b40d2c57727dbfe45350281ed4516a232e7d0b911fc2b9bdb281555e3f437c43677af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dace7712b74d13f2ed8b6d47420d9b37
SHA1379f98e0c7a243983ea2436c5c22fd282d5d3ccf
SHA25632f1f45e839541204ea2604f7833ca3e69ae8f8872f97679c0f926791d5069da
SHA512bbf41033a570406b0a2cb49adbcdd44a6aea3691d332543ca7f115455abec05dcdf6e50c6102d53c2c8dc928541883f3af05a2cb666a7b753e172c70f4dcffce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e5858771f0f406799fcad1f5381cf3
SHA18628c116e4f7ef1859f103016fe7e33bd3549d9f
SHA2566b44671eddda3fa0eb5cd2fe11e1dafc27513ba99b33fad21307f2898f1acaed
SHA512994861f3acc28f49a20ba407926583c8e322acbbd13f9a1247a86ed37bc6a54648b7f9b7d1505f197e7a234e3d1d70831b9182da80bec96709dbb687dff80285
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a