Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
6d32645c1c17f79d6796a291d6018588_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6d32645c1c17f79d6796a291d6018588_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d32645c1c17f79d6796a291d6018588_JaffaCakes118.html
-
Size
1KB
-
MD5
6d32645c1c17f79d6796a291d6018588
-
SHA1
228fccef81a2179746f814e819c420786693b097
-
SHA256
4401ecc48a6b32c90386fdecc1e8a1a72a68e0789bc2e2a6dc164410735b8eb4
-
SHA512
2470220f6e27304a008522635daeb9a7601d16713bbe81a9949b5013972c98b209b3e82eb5492463a7d1129d4c9065388e2aeb523e917cae94eaaf23c6eadf8f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBEAB061-197D-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422683249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000df69842893589649b75e9f8391d3b15700000000020000000000106600000001000020000000ce66fb9374bcdb81e2e5c9fbcdc5682698fd7a6427e1a53fde73a0ea798b0768000000000e8000000002000020000000f3d6f11c160c25ffe6afb7de6046e70be2672ee9e6d56e3e600c1ee4fcf9190220000000ec2122802f1dfccee949ec9d04c18f6879b987785e4f9e2add0617430d66a28f400000005ebc65fd6a47027c1f3429e4ff7619fb03daa895bb8a7d9fd2366e3f2d5c22143957a46bd8f30ca4e5d840669754d05fdfa7c64b5dc86f58372c65a754e7f0db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ce81b08aadda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d32645c1c17f79d6796a291d6018588_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52997ac000b40760ee56162949f99c7a8
SHA12efddb96549a06c25bcb494830dd968c621074f1
SHA256d0be2aa258f104ce94d8897e0d12e28f0cd5402b0e5d1ac2b53796875525a3a9
SHA51252ff25b6b60e44f0f2e1227e4c240f056bfc3da65041c2884ed2e3fd5b8513fecbc54ae6e09ac1b00067da5ada70c749b60c3fee3f74a5f8ac99977a250ebfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a88682ce6edd5dd2873f8c78c9daf00
SHA1551888ebbc53227db452deeefa95be416b6eb49d
SHA2568c03cc0986a1b67c325f0be7f47b0d8409bd2e052f29752e5020b14babe7f0d8
SHA5121a30a9a59cbb13aa7d22c2d7b13d5562a2f87cab67c4bb1fd70560aded7e38dd9a34009274be7da4dbb082d1acf67f6569202071767d0565fd02b425ca59a7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f5633eca31fb7e18e12cb1d58c92da
SHA1ef8353a9b7e18454db88babb995c787b1205af93
SHA256581188e67a6587000b5610fccaea2d0687fc0fb539a8191136fe5fac00c122b1
SHA5125fe7339fb26de8969d1722663f12b9eecda9ce157d83f7dd0fe8daaa2dc4de6093e7d3d5e959c472b086a77db62ae5c2d6b128120b06f57b80b6f2f2d15d55bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ced3b193e989c02866d04cd7133657
SHA1d574ede61d6a2abf307a5f84257f3ea628527a28
SHA256300073cca547da8ff2d92edcbf5594f6ab2e50bc2c3dc3a4974abee57168d576
SHA5125cef576b03ed68da52f1b83679e4b3493bd9cdaa51a2253b799962ce4bc43c8270361608366d18d131170ecda96cf2eee831c01b24aded8b6d8c72a0a8192e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef491576df90fc101aa1d59ee4f537ae
SHA1a1d541cb5fd8e14e45350bac33b75b660dc10a4a
SHA256c2a5d36a94708f487bf0579c351f644068461428cfd40b428899cbf3eb195370
SHA512b346b122d5eae41855fe1ed7a0b33672d1425b99d248da07d1fa2c85343605ca9d8f0d663c68dafd10ce689cd6ea4d387b0bc9b662001871b7f995e065af1c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849210a1a61228d367b88167a7583859
SHA1e5719bb9c6a3d0756e2eb53fa7713852a5acd1ec
SHA2563089fff320fa575ef6f9bae2b9ef3f630eb0f7ae1b0a01e6d8e3628702955ba9
SHA512d3987b34fbd48a043ae74f9cf5cfeba67ddd132be2040c9a5393c865966b4ec5c830aec00a3a1d620e0c88b101e03bb8ba7dad25d289a5ca8108821a7442d17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30dd204d8a4b10fa96cbaa66ee52c45
SHA114099f9a0c7f3e4dc8ce4afb7a2ae351e7c0a826
SHA25607daac05ddda530ca2552d608c15256458d36c98128039d1e5a70d23b3e46cfe
SHA5127d6c35aa9ed36570d8379ae418e4bc137762e5a9f36d96b12cbdcbd07edbf3cabe1179e59d95cd1387706a962514bad4ae01f4cdaf8c905dcf33a403b8044ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a7d89f502359ec513600ad9e01c6b2
SHA19a40c2c01b5dc85aab3e458e16b646b04b182dde
SHA256beb7be657edbfef3bd0b9f783ff6ab463e060275f23d6bd68009fa983c1acd56
SHA5126998b21702a663dcc08f760681c13e74ecf202d0161dfad94b72d330b144bea92b114b106e796f478ab5ab9cfc82da16770481d5db30fd52a1ef9793dbf23a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9b5d8375c11af4714a67ad0aaa9890
SHA1c127ce24ba27745e06f4d4f9ca06514bb0f4288f
SHA2567b607e86179b6c6cb886be5b064b80790d7d65fd77dd8e2c5733a3197df3d707
SHA512460d9fcd4cc28b977e485cc42fbc0c6c4141d2b9bcd17e005ce56307d523461e2911b6d2c3025e99785a7c7cc343a8f614975d22b556d6a0e0b4c491415b9f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f922cb55724fb567041251bed0f188e3
SHA1c9b4bcc5df1479d84d719f9d0507d7ec54924c16
SHA256ce06748e66c890f598f7d23473902a60f9b7d03c665679df0a0812d8411815a6
SHA51296b57e49ad41e98bafa7284447ef90bd6f38a207f7e04e29fa7af2365ba111dbab715b61d969d57c18f46042e3d24e9465c47b543c6c3f844dc9c67a3e6efd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5730da025d0d4b370299d8b428e2940d5
SHA1c4dd03f89db1fba93277fd2c313db9a2c452f2f1
SHA2562e7a4561235fddf213ceea92d3581b059623b0963918f1f9bdd5a52478d83158
SHA51232c041ce1a77b45f46c03b0196e30517943ecaf3e063e54cfef271f66e6d23514d04ff8a15a1b2d9d911183353df1aad6a64482f9710aa8d8270ebf0f5771492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e0bf2c326424b5f8126ca447d32ccb7
SHA1a4f229d2b770f0c20f7c1b2485a2139ae4b77f4c
SHA2564d35ecb19a71c4f3ba086ab92d7d62be38febc4f7ee10f4de9fdb2b48ec2d509
SHA512f193938e894e56f070afa75a04f782de19ce8ab5250409f8333e2e4e6b6575a46c6b5eb817931f2fb337f2d219f3d696d0671817d008525f4813749d0120433e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45d7f9db31852eb7fbcef77d50ca9f8
SHA1c79bb4947d22036192b546be9b015b361179b4da
SHA25690edcdb94b786dea34bb6de8c643245d04aad00d38cbe70eda4afb5da328a318
SHA512d0eb93a19fb1c4af365d83cc6db99710d22ffa27e81105d14a43c49652d00e9afd06ee037bc4017467e7696d40124d9a2a7fd410ace0cc4f21a4b1b275e22ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7861464c9e0d26ad2f00b684788d258
SHA137ca24e758221813f304b213ae6a25614a61bbbd
SHA256f49c9621efd639a748c75422a063ee8c9028e9d3a9f3db5f9302a6991c7c780b
SHA512ae39dfe29a282c15365e2ac8593e3f68cc2221985414b53b81a66e9361fb0ec43164a730676f71f59a5ee41ce1526f1c46b00fb7832833aae45941131bae704d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55032d337e200c8ef7de82d8d03067212
SHA101e9e4a1a205006c929287861494f33014ff742c
SHA256130bda16f1ec561ff224cd0bb502a5a3ed0ddc12aea7b750ddd273fcb47b7883
SHA51254f315f190bce23f6d27b4355ebd91aa9e535ae8f9c45b4a851f8c2612f9e5bc4db61b3a4782b414eac042798fe5901787ba377b7d170ed9c8c7b84131b4cbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d675fee964b069df2a6df8222e35afe
SHA1e2735267b618464a0f2e4c4bc1e9586e64c51c8d
SHA256f7b589872369502115d64a542d9a87e0b8c3f95f55800283d1db1f15a85ca9c4
SHA51269e2c23504c1c47a9efc8ce2962b9ce2186394be741f6a574d6ca9073b1d2f7664819e1217f2c8fa4e80aed499fa359de90d4cdbf4f9a400a1af8a5f9c0db2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdae62fed271590bf785081d0e59948
SHA192c5a31af92a01c8ad9b0183c6d001b67f04ba0e
SHA256b030652937f3a782414648ae15a91a5363d5549c8408dfde011296f4a22a5c47
SHA51271bccb0b9f9038461920b08943e3b14a16dabdcef4dc5b66dde6713b7d9bd0aef909ec7dc3284910c96cadf1addd92ffd882c1bc49def80c260fd823f5c39e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56a99fed7e6a22e85592cd2b9eb1a15
SHA1f7ee4cd0b6de2a10ed5077547b85a6d035f29652
SHA256f38011870e305d6d1c279dcb59f67b9a6c8a81a9c21364fb9929771349f08f8a
SHA512a347c7a32a04d1b9b64bce0a1cb2e324ed27cb714a2eca7b03c0b3e123f261df2000fe2bba0f73a46f463d62d4ee2b138acebf00fad53d6e6c326c57cace46ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1df553de96d68b0f3b37abc4491ba5
SHA12cb22ba42230adedc1986cba64c78cb081a9e7f8
SHA25674adb46298ebed39455c53219ffe9eae3010b35e2af15c62c3a5256e3dc02709
SHA512a1a2b5c8c3be16d2ee94e743703b243e306cdf902f63ec9db97ba057d3cc63f3086e696b76853209b2fc0644cc3a2d095f6f452d7f7745c1b646ced5550b4d1c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a