Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
73d1564542e11e813a8bc0efbf599a26_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73d1564542e11e813a8bc0efbf599a26_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73d1564542e11e813a8bc0efbf599a26_JaffaCakes118.html
-
Size
20KB
-
MD5
73d1564542e11e813a8bc0efbf599a26
-
SHA1
03901ab3341017358523209efb5a84d848ad9a3f
-
SHA256
349afaba35fc2170e4333cd0e5903cd5dea677e3de490d90576cc4ab11cc11ce
-
SHA512
439e453b977c3b03650d8c991c924cdd5ec99778f85fe7faf8dd03cb0e7688c178f1f00140feea932e45434aae24f5eb0a859908290b4b46b8aea9935be11bb6
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoBYUjx:nlVBbjik+zxPKPg0GmrGEJTydoWUN
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508a2a1d07afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c9cfb53e8140ac4f82b9c008afc1e94200000000020000000000106600000001000020000000381b7538dfa153175fb9b1f6e057d43d0f9746cec985326733f0b57eb7d5f94e000000000e8000000002000020000000047f0d69930a8b8a1ce2fb515264d20641c83130ab9aa1c233d1a845fc4abb1920000000b38bd731d7ed35638568f9d862528c4d4b0b94494b1e22478dc80877d317a964400000006662f45e8e7078a69d2fc7fbf37e0083b63ed90ab8e9c3fd0996cff1aa38fb1b1e3d72ec8affd5dac69056bbd98e56aa6130a930851f8ad420adcf20af6f1c1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{432F82A1-1AFA-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422846633" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE 280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 280 2032 iexplore.exe 28 PID 2032 wrote to memory of 280 2032 iexplore.exe 28 PID 2032 wrote to memory of 280 2032 iexplore.exe 28 PID 2032 wrote to memory of 280 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73d1564542e11e813a8bc0efbf599a26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52edf0e6d42496d8e6cb1db706734e4a1
SHA1b456a5f0d0db1623379fa3f2097abbe8ab7b254f
SHA256dd5beab8f286ba47f0d8c2f8509ae8e3aeaf1637cec8700e07cc928b151a8d91
SHA512bf696762430b9636b6c9fa6ea3a193cd927e124e1c6a24daa376bac4e462d32ad5e424e7ae9216700a072a223b0ce502300d6c46c34406d69c4e957e1ae5923e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50690451ac2368c43dd209ecbf6c95f8e
SHA1176a8941bf47005e0e05707c7f8504ef801fb576
SHA256b85d72083503e1ba2d19e5da9089670e7643c32c649b6edfe9451ec8905b1c6f
SHA51292cbc5535e9e00cf16ababb70fb3ee43dfc7736a2f5f03f75a80100a6221912962b43c05df6a434c4935637e913abbc05f1e823f1c4c0f620940f5d62d625611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4731928edde5c794b44b45dff6a7fac
SHA11d6512516e9afcad4a787f640270798f911d388a
SHA2565c14bdd25a105368cc85a04b132b67f6818383cd046656f365c03687309f550a
SHA5120203226a2a8bba3171316fd79505328d8c77049568f2af8c4b222a19574c617103cd7c600931a8030b8d4b0279b6269d9229ff0d663d3e959096decbf2c9e72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8a22a86867d2eea38e82f30fbaa462
SHA17970a3c9a489b694d145e115b75786a1fab58291
SHA25670fa19e2699dde88eba9d2e82d3af9e8ae1b50e90e140f0d68d836b633555791
SHA51281c602e6a42b371418f74398d56fb0c8659035d4142e9a6faec133243fb1774c174194a43ba7abc597b3877840cd4d64833ed554c25b9242241617bacffdd351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e95675912b1d6ebaa66bab8fd5670a
SHA1b009afe742d14a855bbe30f41420197c8104c1f4
SHA256366a0258bdd529b2bf78aaa9c9e8c1c0886b233edb798c7ea3a34abbe0045abb
SHA5127a4039eb272bbbc846941ac6801aad8c7e7540b8e5a2793dd80f1498cc8d3c66875340cb5f10a627911f404013a57fd27e98aa872e8c857bdf4036b52d02da66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405db33cc9f34d245b56758f5a569b9e
SHA126e009c1a5050457c250891c4229322cc6714ab5
SHA25618b12e1e1ae281ec61faf5fc7cbab8bb283ac3c40d17790c03673add790bb444
SHA512f74f2b7473cdf344df367be14991876b8702308109eafdf365f0a065e896c1f28fff0d60c32a354646ce597128ccefd6f78c48b627864e20def16dc1d3695d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50c86716b9f635a00162033bd705475
SHA176e48fc03a4da85ed8133409202634171938b3c6
SHA2562b6694a6df419499552335d6225c945e1d113c48f89187d86c958c764981f9c3
SHA5128e4dd9408fcc8c45d54e9b295fe2a0327456e610e4c40463c12f3826322175146946f2a71197aa40bfcf40315421980debf56f6589e2ad4f0255873922b353f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e1aaf321d91bcb386365bdbe2402a3c
SHA1da5a2b1ccba8917334c31510dae476225e492759
SHA256aa7c4a7a7d26693b4d074356b3d96e0b77603ad58044e7f4111cd54181102f9b
SHA5126d53d811d212388d7108cac9209164381ea8e48593acae460bd8b8366400b3f05ae839c1f4c9f6b54b9033d9af24214abe9e893bdda508f4b326c20b7bfaf0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5b6951f9c154208d3ec015d77822f5
SHA13e67bfba9920ee1393a01d694ed7ef573659aca1
SHA256f5913204a56af951d1aea21228b6bfd1e700d8d703239dd9aaf34d38463d07c3
SHA51242e4fd89342abb66fc07730981ead5fbdfe4379f956947e7b31f7b769623f2a5e08f5a9976fb38db5a4d79462e434fe37a9f4ff366b9d1a1c4801097a6218736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5620f6bad4a7cde01aae2cc9f4303171e
SHA13d3934e82d71a687693b88f32ef450f7c6142754
SHA256a25099ea94a5fa61e1de5d77fc640a3c62d9cc9e290795811d1bdd4f154cae06
SHA5129cffc218c08a75e21e3fbcf9809999b4b1d30e342b17fcac95db46fd617f9270ec626b4ca570c77dd2a7cb32e81cbe5f017cb3cb35478a3197454974353c8c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33a64d597c761cfa41ef8c114f256a9
SHA1ee6a48fac318bb401e7e92f424ac38b96314e783
SHA25603fbbf2875452b6a0f40ddaa006ea55ce31acff033bec420c19280b4531890ef
SHA512ebf7a1affe2b21a09dcdfe0e2f10a9ce3bed23adeee0bf2bbf732e3a9ddb0292d5991a9288ec21aaf6824381eac58cf2cb276ece2850d62407f9f91fb01ab31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fb45e6dd93a3dd283a5bb64e7bb729b
SHA168ea9b66d6297883d7392f4c7c5cc26cd073fdc7
SHA256a4bdc8191bbf17c97604e3bb00f6ac4c29bd04d6cc9e9e93ead41a06d6e68d6b
SHA5125bbfd000d6a1e796222bb16d9be937060f240dc5b7ef7518f7855f7f42d11dfb5eb7cc02851e9d1a2b016973b8c475c7b73ed6f589988a3e1116cff26b4bfc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b63ad44d34d9d0ca1e2f6550e8a06ad
SHA1af6a808ab4aeddcab92852fed643037a125da842
SHA2563e7f0e0a8c306595f53d38b2fa5d649b28c8ba34827bee6738e884b2f30393e3
SHA512ca387a3d134d748d45e371d0d1e21ec7933d6a8102c00e703009954b9f10e484582d7638118e3bb8f413fa01fdf0792943e5ad3318cdecd33846431f9ea85970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8022245886568dfdfc0ec8c838505fb
SHA1e05c30730afd00980189db01d33bc877a007a781
SHA25654080cc477c50b21b06afbde43dbcb97a677805b41e7c8a14ca002dece9ac452
SHA51284310ba0c4b40491217271a9c8eca06cccb5e75f2aca1f0321aab38b7f337052277de93be8b2575ac6d429ad363c8aad04eb0884a301c1827e35a804119df633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8390683650cb2cf5f0a6ddc47254bb6
SHA1b5099ce7762c6654e99f7621570de399ea62f01d
SHA256d65282b66297839f0cf5babe131c38b12b40efe352f2a2db52960fdc95d6b958
SHA5124a40be53fb38ff9ef1465a282b2e890124d21a59396ace72178904aec2a02f0e126a80d6fea3675834123b851173a170aca418d5e5f7e8be2dacecfdbff9d7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5a5c1614d32b0e94b4907d8352886c
SHA14c7ac6f7c85ba774418b3d89ef7a94b1733a6f82
SHA256719749d48ca43f05993e2fabe17a6f48cf94bd84b20163301135f96afcbc2598
SHA5122cabc4a2be3824482c61d31034a1289f0d414eb319d131d6aedd0d57c6e2593aa482b2aced3f0a710a0b0100e11a7747961d818ce44effd13bb78321210e1d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56ce94f61fa43208a170a2afe73a77487
SHA145e8d63d645474ee0a8d6a84cc9cf9a9fb71dcd7
SHA256eb3e8c43bbb3b8f0409ad50ea31abdf326030dddb4bb384f601af311691d0723
SHA5122405b66e75e3cd883f17d16fcf992462e0ceb7ff8116d56e17e93814985b70fa7dea4116d51ed4d28ce8ff0b2d61d15893503f548d7a1fd20824d2f4308f972b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a