Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
7971c2b2af03562c2a3e7ba77e41a44e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7971c2b2af03562c2a3e7ba77e41a44e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7971c2b2af03562c2a3e7ba77e41a44e_JaffaCakes118.html
-
Size
20KB
-
MD5
7971c2b2af03562c2a3e7ba77e41a44e
-
SHA1
451662bff4a481c014984b029c447c80b1a26386
-
SHA256
2c158941a743e1457be04efe9b936588ee08413ed39330e03152d785c7c91c3a
-
SHA512
b9ca1fceb69d44ef1fde6ed3ff38aa0fa8998ed79e51a19ed9648f748a9fcc49e4602bb0adb99b92b749dfe374a80075415cb386bcce970b1aecab3fb3314593
-
SSDEEP
192:Ch0/eq7J5ZFzT64xBv0TbgbhTWP/VZ1iSz7a2yrkb5D4YF/BeS5z0pHzfh5EVxce:S0/eaJ5T0NZUSzFOKmzZ5EncWSgCk0M
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422982646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09a58cb43b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008bcce9d44332a4cafade3e974fac34f00000000020000000000106600000001000020000000c9bc17d948eed6c45ff28745490c4d46733f5b6c418ef2c7a40ef4f9e263c4c4000000000e8000000002000020000000b9536948e03d13dd39769038c7fba84d363a9c8dd9605f51c818c8b0c6e506a0200000002a9578f14a01118869fdcebc233fea039255f09e0fbabb5224ba2e89c48e69fc400000009131476aacf5e1b96ef5556e79fc1cfd9f85a45dd024dae19f95b2f872bf333d955181248e4d22384b4ae82ca630eac7e589485a1ddb2cec698f02d9d58387c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1DA2D91-1C36-11EF-BF93-66356D7B1278} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7971c2b2af03562c2a3e7ba77e41a44e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6af06aa5fef7a355494bc8ffa41dcb4
SHA1d89829da5c5418857a88b15a06781d1c712561ce
SHA25673f7ef0a14b636a887fa71f3f634db6888d8587cba80a23d6154d9357347d09c
SHA512c4cde17d59605eaf98bdda783cfc8ead1debfe171a3a97792fc8086d017a7ef4d3fac900415fa0da7d9aab2cc9c8f7a5c7c450414789fc8217370eee55df2fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034c2d451ec98b2a4c08f81f51dfcdc8
SHA16e459b89b6a0a7bee54060a07f05ea05ef63431b
SHA256e279e00282f413eac5a8a0d92528212b58c756562a1abc7b6ef30656cf75bf70
SHA51284e8778ef75740c09d51b681b549e896a3061ef53d35012ceeb4043d618cc367c2c77a5b93e19883a4ff4ef709441b896dd7d591a0a4e3861868a259a7cf5be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532f2df2ac5282b552d69b6800a9cf371
SHA16dc559935150decb6f3f4c296e14cf8365eedce6
SHA256a3634f8a8a9299831ee80569d558c398a62431339ab24516b780e3149671b828
SHA512e7bff5c847423f1d5514b9425717accaede328bf878adf8d09ecc524d1f0c013b496c9c8202850d3e63ccf8107fd284cc1b6576cd3f23207ab5ce811d288236e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5310b01addb64fcb2dea049907a1c0f
SHA17ee57ea6752c38dc2030423a87b5d2c08312aeb4
SHA256b9748f871d24babc8686ef6c8762c1975b0244485c0bfe8102a047072960cbb5
SHA51247de897bfc0f7dfde0dd1e19999eafe1f5c9ef6a5d210c09d62ab8609abfb0d3f1a3013347c8815e34a46cd71aeb5ef668b6f03640c388456b50823fab161f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cfe40b5f8aa5d910da87e215c3c190c
SHA12d0bf2786210b931dba4de59b44afd75ee210813
SHA25693f6d425847486de0eb95eca781fff400ec067276499eaae1320859190673b65
SHA512a7b88a978fccdb054c5ffe2bc30e4126444c3bc355369c35f70cc2ff3567caab6a736b7bd93c7b40a3ac45ebcfeceaae3a39f9da3b92b4bb588609570f6061d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514a6b7ba46f1bd8d8860e992466df8cd
SHA1eed9f0e0ac9fbc41ce31bec37d51ec8c6be7a7c1
SHA256da65c280100ae686bd21a9c75539b457e43898896aa6e03d18c2bdb7bf982ba9
SHA5123287c96fdf3af381ae039b7c4388f0f695486d8cf14903eef42a2f2acf0dc9a9c016cc82b2997cfe24912c64e5aa9b07eb60abd84e634ddcab86d8accd69a8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5466645b33add1f798ade6a5893f2f02b
SHA13dc66f54ac6f357757942f536289cf2cc360d65b
SHA2565e316fb25b57b20adb6395d4d41c438ed1e4ce87701a67d6bc0c532eb3cb83be
SHA512405aeef9d301244dbcb4aee02afca42577badbdbcc50605da7c623ece0be785eb484e7ead615e057ee90fec9e7c562215d08ab0a9631c13365467d27c7dd806e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1c0ea8a55611c1774648dcf444c5944
SHA1cfc10d192d5d774b3f46dac738d541026dafe494
SHA2565d90c47dd4c3529136ff2b9da709e2b7080d857cfc4822363b1acd31df2c6fe6
SHA5129988525ee62c2a564f72ee20bc6fa836bd6cd67534aaf07c7653c66174fa36ab7de0e9e89dbc9360f201c0b45612c7e3d8ad7b6ef4df684770723182ebd86595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5193781da72a1163a45ddf75e6a669dbf
SHA13d3f2fb9e35c08cf8671ff4d605fcd29f58887ed
SHA2567187b4c6a65eaba0139e4b451a890e7e7e8fd00f4ae6a1e6847039b631af0f45
SHA5128a067dc2e986b1c0d2487045d25cdd40466aa50657228dd60f2350407f39ba751ab593b4f0f36db0eda1460e1a0d26fadf529fb7b23b188097c5e2a909f4d40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67ea9f989741d73e3831ce1c0d803b1
SHA1c11dd59fbdfb8c3f5153c2b97a0817a45030fead
SHA256f4d50a63d1938793970769a7a6e54e26cf596987274e289a638713e02c89124c
SHA512feaa12a36ab1a8b0a32033e96cf517d9f10e581ae4b14c9eb2bc862ef6f07b917e2a17885fbf9bcfd81aaf0c60a0171d3bb4faaaa10129bce212cd62ef62b928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55836e8213b2ec977f8f391afdb40956a
SHA1c7ae28b25ba66c9b5305996fb4a1eee30e3dbdf9
SHA256d95ff7db1285bd4412edbc3ce57a04aab314e8874ececa7de397b90f963b588b
SHA512306c24d34f933167826e5532f33113ba76bed24bd474038a8eed56e99339ca1753b148c8ae611d6379f340172c2d0ce46002fc19f20b5bc6c7920a9b654171fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55314bbd2dcb581dc88d48645e98a621e
SHA13f587c271be13d25e692714fa705b7d01756149b
SHA2569708efb83ce341ab058c974603a22f4214c35afb1ce27f093ab92f2464025ee9
SHA5125d9a4844c1e8bb27aded184f262b8945bd880732667658b0c2738c52ad2bdf9c5ff65408b089addc15af840903e935279f7b0a8542541529b039cf757d7de730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86be2e1947c041bfdc3e5fa5fc2e8a0
SHA188e65e74fb56083a50f4d9822c1c8bbd69617208
SHA25667a95e0ae3aca6f88f9f8d01f75ebe30c7ed70296e4b7051966edff659cf9695
SHA512f2495a162a1374de125c2cca9bc1f642228e543673ab610a6a8ec60bd4fc205f36b4bfe15dc66d1a32d9fdb5dbe853a013efec342ed7d6079035cbf491bb4e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c28ed0d5e6a6d7063dcbf30c66f3cee
SHA18f32090eefa62c822e6ccdcc30bae08e627bf4bd
SHA25634903aed1941046067d46b31a2d346be7a44dd3185cf2be25843ac522a521839
SHA5124f58cce3b83cab5092cc9ae771c2d23ae827645d33ea3340ebbe190693158bf34bdac660b000b9cc05dce0733897cc0dea48951bf36927b4501dfed6ffe47b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fda218d9d1dcc5e3921dd28f2229216
SHA148e732a5b95959cec54c1fb98f158dc4304c175b
SHA256adfac362f92038d728833603ff3e1e2fdcde4404c8f6109493520fac7598456e
SHA512de9aa2e95e890a7098a03511725db140b0ae124fe0bab9de750d79eb56f63dac651c8eb7d59a9efbe7cf290c438989aff7bc83dc4fe0f1d3db295c283fb883a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57661593b5f82fffd21f9202666dcbd91
SHA1cee33d043a074734785f2f905fc288aeebab4fdf
SHA256c57a2f285c1025926768e179a8a78405d4e103d78af21c6102b92617c6bbb467
SHA512af219826ec1a8e010ecf3cf10e26346227bf6a68ec6f621f2a896f98978ea4c5ccd8da3abc11896eb70c243cb327a22a1ab32860adf38b41e6c16dfb0d6859a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572656a8f5df86a6e2dfe5e1a7bb64798
SHA1f4d9c1daee4e006423862ae8cdb239e9a387127f
SHA256bb2643c3283462287d8fab8ffbc93372bde496df55fe50be3bd08147d6e0752d
SHA51285c5dad4bb06debe254fd4d2fea6fe8d25cc98666d8d03c29be5c21bf29f0a92be320fad7c7a1ad7f5af875df0d1468801e73e7dba72c58deee95adf1b580410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9ee1b705d40bcd91d90d1dd1bc0437
SHA1c6c68d864e599cd7778c1ed57dd221896d4242d1
SHA256550ffe9bbe5422fa3a7ff3af3d5c6c891c7b14d327f1b82da16fb64749139d60
SHA512faba893f393b401be6d997d64334f87bee7fdaafd6eb8664cabe8c442bac41e837b53b122801505f8a5ca14a961aa5625a3277661d13f254e0f21c3217a41a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f34ec970a35d53356923dc4cbff7039
SHA135c31cd6813b9576a58f61c60d453afb4d17b67d
SHA25638c700b7ee15af84f902636ea1fda4448c32706e87d47cff70570762ace3405c
SHA51209240c2d2fe29da0bbd5eb81600c1e1b02e6c53ffb0a831db6164798732ee1b23b15bbace80ef5f8e792355b68fc864a3eb9191715ed2f6bf4694913e279c10c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a