Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
71955c8258fa44d0574cbe1ea900efbd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71955c8258fa44d0574cbe1ea900efbd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
71955c8258fa44d0574cbe1ea900efbd_JaffaCakes118.html
-
Size
146KB
-
MD5
71955c8258fa44d0574cbe1ea900efbd
-
SHA1
26738d2f4835a19b79b28af307e88ad1e59498cd
-
SHA256
eb143b26c9c53af03120f1a83a13098e9efd5cc155cd48c32f4db85084a9674b
-
SHA512
d2fabe1a76a5015aa65a75057b6b6ddb66d065645257928c66b129f4ad3d4b7e3e355717ab23645e92029a61c2baa64325ebac2021e30cb4ca18f4109a5ecc6e
-
SSDEEP
1536:SZSvSUzzc8fLMcpSIG6/nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SPUg2S1WyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0EC2821-1A7B-11EF-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000084dc842bc540ff488b576bde9e248f5d000000000200000000001066000000010000200000006f7645e961cfa8137c2e26e50044c4be5c8092d30fd1fc4652b4510683fb7e9b000000000e8000000002000020000000537563b185eae0038eaaa65588304d6fd4b6d093fa96ca3e840a7c4d20e558a52000000012dc99e45b5129dc8d42b098c5289b237b3454b47685cf4afb199c516cf4fb5540000000b9b3f1919a8e28ee043c5ea2c1edf291639f17cd7342f81c31ffc54a9db481e6ff76471a785a4d8b38748c3856b529017d291b4bc99dc5f1031c07278f4de2f3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f245e688aeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422792326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2304 1640 iexplore.exe 28 PID 1640 wrote to memory of 2304 1640 iexplore.exe 28 PID 1640 wrote to memory of 2304 1640 iexplore.exe 28 PID 1640 wrote to memory of 2304 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71955c8258fa44d0574cbe1ea900efbd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6f921ea30d50990c685cee5c0d9b97
SHA10445ae26eded5d689f9cfcd553f17f27e1c29426
SHA2569eb02c7d3f7035598b74fcda9ff193e5884b1b4c7fafacce228629409996f5a1
SHA512d9dddc1e456a4802adb64110ea5beb9893edc72bd0330baac2fc26dc2ee888bdff68e5cc2518bef82b7cf2d38ad68b215dab06a936b7b6f07a5e56ce712926e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d29bb885b0007465529785cd6c0e8a
SHA14f6f830e38a6b5cd6faf85c932790cdbb96180a0
SHA256e3e86ed3bfba5ccd3fcb22de06c76cb4afe91f2790ecf4e242a617097da38382
SHA512cbb5fa3f867f2199ea1d23be9c8d1d702e903e40c85c0ac6f5223abf783fde292ba8b58ed80cd2c0f3f314ad927b468ef130e688064c4b8577b9a27c1b1c1196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c4e462f6143c88f67d886c525bb8ae
SHA1cbb9e187c7f7cc01e9ae29895d1728ae3dad3b6d
SHA25621729eeff73f31ae9004dba8c265ba60468790f2f1847ee90d310e59fe1fc655
SHA5120701019e9e895e57679dbdd932cf3139b54862056b7b351ef2fff8aa03e08e593b526d77a93cd6fe5ff69320f1fec18fb8bc9e8b384dfd0fc60b8d8157813d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a209d1848f5ca6c37e7028abb05a854
SHA1096cfca63c42466b4f9f0b0556117daf44c61b99
SHA25634822e0a0466f41e2004856822f804f311d452407ee8f9ad9fa9a3a56785caf0
SHA512738dcb3be57802baa00274b29b43362b12dac5d64ccc4bab0af954c82940463b9b304dd500355176cfc9603c6b11c65b11d76c566a91078ae59b7688a5af7260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea48c398293356528fea06be47b0ec0
SHA10f2669ff881666fef3420b093b18333880f2886e
SHA2566c2090409c4e3b031166d8b59972b37ca2db21319aaf9334a86ffa747af6b78c
SHA51251728fcaa6e4c6a4769d33b3aad24aca5747c94c00b01404d5106e3c1a9c5aee8ef516422c1afafe01be68cb897432857cbbc88e47168238b8b44ffe7136270c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeea13be622659c10fc36704cb97fd90
SHA1d5f2deb6ecf6fa265e00d2d329079e9aca259c34
SHA25670a40abb37c53d021ea82c257129fb7ff2057482165db5172c96403cf01cbc72
SHA512fe1791a7526a0e31970bbd8e2db643dd847225566b57f996b42783230e4a88d73c3fec3b2e46d5fa2db89510ba5ec9814c719f886caec76b7bddb3b3b50e2096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53627ab730d2250aa5babf675a527be9f
SHA1b71ee9eab2e0c723a9bba9c1efb3288e4626c3b2
SHA256c64dd2b6334ecb2f811a32cc642b4f10765d7d7aedc9b9ef672b82a2fe43fd0f
SHA51222ebaf58df4b0372c4400ffdd65933b59df0bebc2d7ec2ba00d69371b3ddd14366384f3ea861a6000a9568e52f46111fd14a2c3fffc41f93c06609c5e331d33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e6b58e36f70872e761b7ee94028c48c
SHA136d5ad791c0f4f24f37740aff98c96e4146b586e
SHA2565ca6b6d213c8be815649f911f257d12c05c7fb137a3c47bd7ba8cfa04f15b0ac
SHA51212bc724b34ad62156e442d3bc42291e3254307857bf76377d2974ec8b8f6d8488f83d5b73e299f6e3f9c9749b7fe7629ce1610e24632ca4a1e0f659aa3f5fa70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d1febf4eb3b41dece2a7b2ee55ead7e
SHA1219596abac2fc3eb26c2107263828177f857b22d
SHA256cb33b203f0df43c2d87b337f4381e00d85ba7dd56facc4c821c607b17ab6369f
SHA512adf8e0184535eebf8b3ded35aca1f7654e1b76e2fba7e52225eab85e8bf18fd4f5b53f8325dd2bccbb02792280bb652c57400615383728fe98f026727ec17074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a084a60097e5d35183e8d928f851d2a7
SHA17a1452b0487196cebe78632eb2d6eba4cc25cd62
SHA256781a893a5ce841762d4f0b3accf44c5be69ef5725e19bfac4f7b50c77758b2e0
SHA512a24889c970c08aab8508d6169ca8414da61637509911ff3745de4afbd4b706186d3f62cb0f6fc7cec326f8774bf0e7f59c4afce3d00ebfbf8755e06e61278458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57193b07e8043a0e9889ebd9fa8bd658c
SHA1da078ce92e8be76bbb70ede5b72c52c606d5cde3
SHA256da9ad66a325e88ccd87c6ffd6b1cc7b681a385148418ae30356366a3f05532d1
SHA51273b0d926bc61d65d64b1f37239d570675a53487151965e4e37babd35184b796c4b5238e6ceda77c979c3cbf5e9f9ccbedd7c612b273c4389a9049c1782f9d472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02154a5903ec66006e99b2949b9fb18
SHA19f41beca92b57be1b162fe4cf8352645cca6c6af
SHA2563b600710739e487439cdc498d02d3bb0823a473b0faea90e009ebff27ef302e8
SHA51238f907b6554e854343daf10594cde373f808cf7128b06b5714cd3f12bfcea76d1a0661ff68ff6cee646b9a485a669856f8109d310a934ea31b2b0316b356dbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556020bf0141b08e5b0c5827df0c36382
SHA163c5bfdd233f04b45e44f604f3147addce29d86c
SHA256cc92a1661bad9b722ef15728b882e8bbb716a9577c2b1447aff1b5cd37817cc8
SHA512a6067ccb251cb383a863873f6a6418abe5306b40dcd0e25f8236cd4f22c309cf6567d25353501fff0f572090307b4a191c8391dcc095e049eed8c7d58f4e19b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5194ac2b41a3c315054b6d01367b3a850
SHA13d0ef4f89a4bc8c36a65248a0fdfe302a6c39627
SHA25667bcb5c42a14eb092b899f7bb19b8fbfc5fbfeda7ea5e99bf4ecb62e7953433a
SHA51240ac4211f98b69325580538fe5dcd96f306bd8d612e9c00aa2a67757a62cfbe9307843247176e19cabe7b0fec5a4d45ee6d993d4492e12e451c5abb4275d0fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e74195ff931979820bc0e7c817f465
SHA16f633ca3e4ee1742ebcafedba6fd3c3a71347da2
SHA25625b9c5ff9635a1a19c548556c589472b5f08e3985a5b3de7468a824e4e0e850c
SHA5126ab5d80cf1a13f64c424ffb638bcb5b8f5b1bfbf37fa3e254c900128f5c89d54e072d529410cdee4e6e1b07a2e50ed9de40abead1e760200bc1aa3692c0efdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ee3d8f2aad0e5e4228d4b00082929c
SHA170b0f43d0c049c4e7638491318ee90d2079369d1
SHA256659f7594f487a78c5da2eb1cd7701415f32fa2b42e296ac698f85e15e28b2ada
SHA51296a043970f3e296d9e41e7b68ac6cc55193d445650ad6c1ca24197bddf831bdf4b1863ded5687d26fa2c7eb10374a08312a2d387e645a0ee19c818358b567f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1897b94263837497e3c8477bf2ac300
SHA1663ffbf4d848e37161d81d012f7532d27df20f20
SHA256bc6a9dde1df3a46c263b077e8125777e44a5312a632cc324825d0f3c9dc30e10
SHA5128f72438f8c9a85d28c4886ad1877015ecb8a8f8758b78409b2c650c288555807a4c2ffec83f8eb497d4f2ae673ee5809d05b42e82fc2f3dc082d455743074618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5736a7b272084221b9477acf088114b8d
SHA1a3530435192f6bf676516938ba183062b73340e2
SHA256c162377a6241db9449c7eda511c0bea8c77ee1c45060ba7929abb57dca2750c5
SHA512f5aa247115b18cb922d4a984f2dc92586f030af6e2ac13278148037f2598812eae91835698f3c35028c57ed578a22f195302329a78cd1495cbaa5ac28044dcb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531355783ef57d16829f577696d2aef93
SHA11281f675a4a10adf10f443176391dbba53707bda
SHA256a38499ad959ade3e1c5eca727192f342b0ddb176426f2c2c2ec1502440c20599
SHA512c61e5abe9467e5e1922043b418c5853987a6247ba5b7f0a4f35cc39b6278d46b34a37f82f1a43c6720af8dfa4530d9193f247b87589ab0edd64d80dde673eb4e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a