Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
710ee85679958afcb365e281fb2cf4c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
710ee85679958afcb365e281fb2cf4c5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
710ee85679958afcb365e281fb2cf4c5_JaffaCakes118.html
-
Size
3KB
-
MD5
710ee85679958afcb365e281fb2cf4c5
-
SHA1
fc8d6c02afb5be251dc766c7d656bdc2f9affd61
-
SHA256
730c5875b3a24c8f081c4613e09106c1f6b8058882fb3d14ef97ca4972d413ac
-
SHA512
cd0808f5bc08bef3025571fcd0dc438838bfab8291c2781290d1daf6350ae4d43cc59195acc778fcdad140cf299ba9b4abbe5c45d35036bde76bb4a1879ed048
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a9b36593bc264848b45666b7e43b0a9d00000000020000000000106600000001000020000000b5ada5bfec0dce37e3bd9a66188cc4ed5238455336c0456e9ec04d2bbbc5dc99000000000e800000000200002000000031c127d069e63c0d0dd77ed064371b9b16d6a3a5a0b2b9a37808e2f5226a8ef820000000247b4801c86409f21a657d440bbcee9ecf538da6a1a9c4bd0caec2ac8256c8ae4000000094782d4565c62b16ac9defea03137ae66783d5f7fc7c1ab3c1343d344191c15a3d3609444a0021923ac2b6ea65a7afc50b9c95ebd6600ca70bc77404f9da9901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1165E2D1-1A5C-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409ddfe568aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422778688" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 3020 2364 iexplore.exe 28 PID 2364 wrote to memory of 3020 2364 iexplore.exe 28 PID 2364 wrote to memory of 3020 2364 iexplore.exe 28 PID 2364 wrote to memory of 3020 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\710ee85679958afcb365e281fb2cf4c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5988d4b4d9fff25787632ea979a1be723
SHA1c578a49805a3afbae363d66187dfa19ac5e5796c
SHA256b4b660f62fb8e0e513bed7c0d63d28e79789e34e43bff62e9da159141ae380b1
SHA512435529f5aa8b89d39f6d43cfb98a7b22f273e0e41701e65a1bd4dc658e3a1d8e7ee68a17f85268312e6623a353caaa0bb9ac774ca25f1ada1ce1f6f477cde655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51612bd38aebd97d4d68cae06f5a28c5d
SHA1671c35745aa6f69f0cf4ea5dc06987984f93e8e1
SHA2563b9e7a250672c0dc14b6c398eaa4173f6de416eb6b1a33877b79f8af81fe6e2d
SHA512181936d5dd75eed2678987b1cd661c105b1826f399a8d3c5badb5400065d6523f995675f9f182322629f6f1a99dbf4df55a09c14a8e6030385d7cd8e0fbc7b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f5479b4759f6eb35193298721f955cf
SHA1fe92af1143b99305b4b38f5919163509b206a210
SHA2561781c5a8fb2185e7c47a928d62d920d7b17561cbedb94f57edea1c7d83e5b512
SHA512d4ce4c2f2bb3e91a4fd398f99674db303323d1cf8f5639f97720eb72afc03d5310b3a1d0aee7bae124212c06256941a1d855695db33ddcffe92299ed2bb41ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12a4f7e20f1928e6b635ee7fb315739
SHA1c66c4184385af733fe4026030926afecbe4a2f46
SHA25684bc313d05cdc59478f9e5c01c6613394d3fea6608625a3ec857e9692c9b18b7
SHA512f22d47ae540349333401085a3a0590cd205ac338856c61dff41106140849e8a27f17d00de6a58272f2dd4f39d30758e431f580986e24dd03363bff0ea95b916e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de065fd8613aac15663054c1f278398f
SHA1362b09967b984dba49b4067695c6c38e484d00cf
SHA2564ffb91ca01990effcae382fc0e732cdd82fd9685a64370c1325c2d82926efb7e
SHA512b0e268f9dfb1b3909ff445f467096b87a2d972155a72312f212b0a08d2c6a7e9c9881627c86f54fc5053b6b0734b81c072f3443e18fb78400c62584a930d2d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a95961efe0d7506d2814f9438dcc2c0
SHA155f7f5ef3341766e4b95914e0a745de2f5ec27b4
SHA2563d4d5b04da44d153f43b6c256ad63cabe3ac7982bc5afc703d2bb294809ab9d5
SHA5121f14f7feb67cbe4f9e538984086cca2b1329c07f7bc817579523b882ada5d2fc61e82e1d267cd6184885394f7896fc4697cabbb8b3970c4d5dda15f0451baeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579240718d5eebe516b47e4ddcd29d14d
SHA1d5819a474b4bd883b85bc90a2528e5c9a3a4deb9
SHA2565125b6dd6b8cf4adbc208434286b75ad168da916f4a234aeedbd7b9299e11774
SHA5120be7c291984e8837f3412477e322d1ccb99d1b7ade869868c98bd11caa06397a306bd0bed8f8aebfc20679d4837433d989a75b2f2cdd6d7118b61fa81f744f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b11db80bc8463691687e34364eb2c6
SHA19039c8c967356985218c2dc9cc166fd4f592c648
SHA2566436348095cbaf94dd46c9d2229d7a863a0d7832b21976a185df56ec2ea72162
SHA512c82e2e865ad6b2899b1d4cd169e0696c516fe0f96483a470c620652df159e7e879386212bd26dfcd7486ed29080f852f05c4179acf8c8ca3de61b64c94b703dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce4997b8ce72ada7e7a2f71c92fccc1
SHA194b8447663789fce41d0cd3a5173fbe3b7a17a1b
SHA256c7fe9bb0175054afbdfddc56f8eb09f820d9900e6edffffdcc7415b9031b9330
SHA512b06a573c12db5978bc56f9f0883b360b19671223b3e59ac9c053c0d4ad2b5a18febf1e1409f7babc0ec01904b75b2ef7116221fbff76c93722851c342af8b899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c2f384e1711ef910fdfc3c809a466f4
SHA1a6f99bdd593225994b0c9ab010bee8d92353e838
SHA256bab59e358da927ecee1370e43d5f9c887af98c7aa77b287567d45934ebcfeb34
SHA512f7e04c4d91fc8db7b5ff1857275f720d3da150d8248d2fd056b113f4ec0af2a3b8a2ff4f61480d32537ccb38738ebdb335705ddc6302ce8a604d38a5fe1dc7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268dd0a5969669f2f4799da226579e43
SHA1bf5c48808ba9a509c96ca36f7ec7bfc0a1a8f7c3
SHA256b81fe9bef600b527b627cf6a15d955f5b064087983421599ab95ed214040b17a
SHA512570f03a117ce0b04f4fb01e1798924fb6bda25aa51a0fbae96a20e3e62e3feb2425751e3600600a88a5119bf810ebe9c25be8cd2f88ea3a25f3a975393bbdf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d500a02c1b653389f2f91d3c48635668
SHA14527d965a30829d25eb695501e8d2188fb78105b
SHA2568bc53777b2750981b817f92f5c388aa596ca16113f601665e3783b629068363c
SHA512f188101ed274bca252d6f297c0667f5b743c420a83215c36cfb9c331cd453cc90d4f1b53567f0ad31f01ff58e4e994a5d4cedb5ad0903b5aabd9c572c2d12ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e49944f8f8cfce81e8e4f7bd8654a786
SHA16a5073c9581034ec08a47f7ab4f615b431ec48ab
SHA256b86f066452c69d7365fcdb4e5676060f1a188e3c6df7d9abc52eae5b88801578
SHA5120c6aaded52b8d11c9e7f3bac0c6d18378d1889d5c264f44a7df49f4bb0ab76b35d40ebf466f3d1f910d3a6a308364bae6c76b75bcd47709b46843bc639649a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572653b0812b1ae04d324702e517478a1
SHA1c39fc5cc031a1d994972e3576c5c69822c636bc0
SHA256e7c63a2fdb9269a6bc2faa095c15db8afa7ee37460b2146f974c1a7f507baa14
SHA512100793dacc79143e357adcbfcc1d87729f93b4cdc34a58c6b10a5b6ed1adccd517ce0856d84ff7c67cfc1b535e55762bf17a3b68c13ebf3e489571441a58d661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560247a8d18cad660641195a44b6370b2
SHA1214edbf25973352b767f0eaac34b2ecabdf2eee1
SHA25645e16b41d7ddf1cfff8878d24847347f849b22ef6713bb5d1e8f0d7c79e04b1f
SHA51292df044f7788419002586adaf46d9d3202a7c2c9d206d64357f84e58d5ac66c3cce3022ef5128782dc1aa893936a9509aab6729b8f78051dfe61574a781eb116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5196a5edb21ca9f2c75150916636974cf
SHA1ec1743c61df39ffc9252197ff6f8bed63306f478
SHA256027428c4f69ecc5baad90ad8770c6bf76c1d563aafd1cae58e8ba4c585c0e582
SHA512dc0e1cf50985daa080f14f7a735682fca932afa03f448c95935f04a893ab5fc599c86854f045989248725f1920cb6c0aff02b6a8eff96d0180382baa32b924e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae1690094e27e1fd8f58e33ad344e51
SHA1b5347a7310369dbf6226f971a17fbdd6b6db5dbb
SHA256c2ac6f8a65b251feaa0206c003a3914dfbfbe2b4df53be5b8cc1fb8b86ff6676
SHA5123eef5909d63d557871e0b4463642492d617bedd83a3f4f8599b1bff25e9bae82cc6110341f441c114b80ef03611900f7139625494a106b58595a009b649cd0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548074ff18eed01d994a8161ac1781732
SHA1fb9f013c4c5ba5590683915c4181fe7969b8b02d
SHA25682f6722c66a55b51893dcd55f57a20241109ba49299df02040f6be36539f5a71
SHA512fc93797a0f9ae8b2123d51ef355d59feb1bfe8f758ba5b0a222d234eb9840f45cdfb522f49064dd0cbc0fe4dd31239a1ef773f137b31b0597ffa894676e21382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d483d1fcf94637c50ff50de887fc2692
SHA1b83c877b0e28994921f37ff5496c56232b60baef
SHA256e99ff42143f6499ecb78dd9b3b027bfaefec391d9016e6ca37500dbb245c0222
SHA51231623745bdbcece71e17425183db366ffccdf1d27a9e6d832f239d53df1db4cd4485dd0d6df2a4819832e7c23d1864d5c2834bab4a005aef41a8162b7133fc02
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a