Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
79a236ce21971d94f6dace62f292fa94_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
79a236ce21971d94f6dace62f292fa94_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
79a236ce21971d94f6dace62f292fa94_JaffaCakes118.html
-
Size
16KB
-
MD5
79a236ce21971d94f6dace62f292fa94
-
SHA1
2d4decda555ad1423df333b237bf6a01638be2e5
-
SHA256
f71afdcb31aa2a6f09e2ab5b9b18efd69a4ee57fea99fc0daf611be6af113411
-
SHA512
3668086a6d4f4b6051e18ef063f61ba890c4aede4363bc732fe04346ce14c5dad1d9a9aa8a32190a8d60d5cc791d98389a7d7f60c55cd4642b642c792737d7a5
-
SSDEEP
384:SI1BRVQRiSn52QlVbKn52Qan52QmOdAuEHGA3Iynss:SUVjSPmPaPmOdAuKYynF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6053bb6b4db0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000861681486d9cee408ab5b3412236ed5700000000020000000000106600000001000020000000c8a784ab47130025a89d2a642d757109817d4c1d693ce1b7ee9326c58974b075000000000e800000000200002000000059868a8dc8275625de4b412b78fcf707cce26adc52b446358bf447c39d366d7320000000cd95e3b3b6a8f68bfd082051fafa1040b6b1e0bcd6d3f68429e0908eac43a12b40000000e694c97609298dadde45d04717e555d2ce97ee804e04fedbcb13611d12cbf0c5e53c346002c54af5218ff25f357190e2e15248b65df8fe2a3bf9ca50ecd3e6da iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422986789" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{973F2021-1C40-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1756 2076 iexplore.exe 28 PID 2076 wrote to memory of 1756 2076 iexplore.exe 28 PID 2076 wrote to memory of 1756 2076 iexplore.exe 28 PID 2076 wrote to memory of 1756 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\79a236ce21971d94f6dace62f292fa94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa5fcd282165eb3aa509fa61753ec63a
SHA157094bb93e5e380d1c389835170a89cbdc2c35e0
SHA256c9300264cdb2b7bc2fb7b756a14d3a3103e328304b55021b9f0c7110937b2bea
SHA5127abf288f8d6bca9da1298d8868340240fec3e074114334ea21ab39a2b07373e3543be4025e8cb393bf5dc8e6799f023be5537e20e50bd037eb9284ce7fd607c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e153cf038caa06e4dde8b2d7a959fd
SHA1b4dd9342a58119fc78661961aae9fbf958d9f45a
SHA256e0ae4bb0be546e21a4c21cae487cef45ee71d9f9eb3773b72b2009af8081fc0d
SHA512525aec1c48f705d8b9408c16acf08ba7ba8467d0d3a540b52bec1d971ef8e05be39bd27b86d0859afdc92ec889780202f2da38f361a74bcf8eb9e95e5778e81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416e43a7ddad8c994ca1b1a3ef3ca372
SHA1e783f5f9b66c473b2971da24d1e5d37067c575d1
SHA256111b395e2cf2c10ee5ff8c904988a3c44afd526f99afcb387a73200edf629a13
SHA5124a1b43aca46966c786925696decc7a2aaec3c47ecef1a0453f50ae77706b7ec43d1d3564da7c4ca9bd07ecaccc1300d7a32c93f713c395c22e6a885a50e16384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2615336208ea68cb340f4cd7b958a84
SHA1a112e6f66c3f632c381e80e162019674f17b0cad
SHA256d23f610ff7b7775484b56933d8ac4c77adf39fad7287f92ccc6292239af020a7
SHA51255c5487c463b556f1c6462d72c4af1baab906eee680041d6dfc11b11c1d145bb77101ecaf1271884d4ad335adb5876896466b80e416b91a62b5d7d9d9b9fd2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ce3e54413032751c283c43972db0a5
SHA12636854fa5295dc937a0bbce3d0671773a466a90
SHA256f34817f2a506a3d51826fbaa78567da7638108960889429b5850a5209cd524e7
SHA512a81d4c95f2b199d1730c91827f914f678e5b70110c4e67464110248153f1dfc8d6d171dbd935b20f8db58d29973e34969f3c78f1835a7bb421cd603f413948dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df353db64992ce19cb36208116eda6a
SHA140a29d6e4cb848c7bc0242f1ca2e35ddf4dd6a3a
SHA256f6ee0933273165e619f6e6781135bd9503bcc6f434e93d2bd2d9b7894d3f9639
SHA512450de58561b7dd3a5762bbf36c55354f06e495629414c504262f33dc7ae42f52deed7e98d6c92d92739422580e5801e0467cf614643dfd57d68a3df3a1e71fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f559ae2abbe14c804e557f236273aa73
SHA1f68bad869842d185fb4c04d95a7a2bc0917719e0
SHA256c1eada8fd55ea1d4bd3bc46fcdee875a9cd238969a40214e1f407bf10a356c0a
SHA512d98fa3905b4bcbe1f2b60b4d893f86199489bc2f7b0ea35bb6a0bd8beb1a2a128ffcb245d3582b951c7cde27172ef3df0a3901291094055db0233993fbe2f4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aea8d41b0133659e2380cbf35dbffe0c
SHA11f5234f6693c61bc4b17384a8a7245918022da25
SHA256bc47b1681b97e0ab9f34a6e612bbeb50deef424f5c4c495fce85af5e845c825a
SHA51279a8112357a299e6f4441cb5a0ca886070a4b1ea1e7e61d9e55277d8e5e3c120ee146dc1097a5afef89c375e207a6dcef54182e421fe1d9fb3d83f78a979cfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5413334812cffdbfb2a641bbed4d867bb
SHA1f77bbd792abb27e22e2abfdb16dd38833fa5c37a
SHA256b946c1ad48e81323bd9429030f872efa973aef3beb0b46ffd6157da38181393f
SHA512b2b076e2e08bcbe655d6db035b31163e791bc3f53b2d879087e9e64ab746bfdc442e5bf89a47f42ac87e6205f4d604c7e1347a0b0d0ace234d141c570968aeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52763c8236184ca51c4e6bd8e5aba12f7
SHA1da7be6ac16dbc8115dfe2cad23c414d75470aefb
SHA256780e2601e3881a747cfd398cdcb69f4a5d6ebf128be9682647ce0a6f7ca6036e
SHA512d2a5fedbe0e10f615d024857efb6483d67e180d1847b2aff3b7a540ea426188d9af33e73ccdd7b17f2ad853c51967ee5806421c362df1ba623316137c8fc61cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566e74df2dc6c1a77a9ca2a6af9460a55
SHA1d660bf4f040b0fefcc0faa8c6ca26b4e7bef2e65
SHA2568c07ffbfa1ae732f623df267b39b50744ed00a2dd0da9bd55542a9ab7a7e86cb
SHA51228afe755798958d0eb8529dbd20f086a8e27b94d7dcae22825e5272269a20cef7c6643bfc32946d08e72753fa5e58772101c885f71bebd872f15f51cc3ebbb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b968034e76a1bf1f84218d19caafb1c
SHA1d6579043d86e89447de1b5840c1f9c811c074775
SHA256d4c73b2f6606b0db412879519be6dcd0bc8bdb5c0ae22788dc4d8d16232c7074
SHA512b1bf181953f233668e42840031b8c83865905dfdc096240d07ec9b1e3a3b5475b200ca3c88472cba8e5ba6fa086c478addae2bd05e9b31e3f618741327e7368d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573afa434e13faefcae671369d2b18f04
SHA1febbc24407a1b0b75f885e7c9ef13947ce86171f
SHA256a02199e7b0671b0f86ba324934b62cbc8f87387e86a64fbac73389b2c7451dd4
SHA512aa33e4efebfdd36c02cbf79e42b8d6f86bbfeee0afc84eea7a57b65f922944e846642c384fbe14d07e188f8b3b5b8f815375a6c336189813bad86c281894acfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b719072a66a29fdf1cb22306a87954db
SHA162117c62dfc7d34c3f743b489b68a2be7ee3bdc6
SHA256d8de0b451ee7ee654821c45df65a8c21583b37435affec361fad9b7eccc0f75d
SHA512b88f01ba32eb1a6dd94bad153be9767df04abdec08cc1ede8223d33771948a41c632a7171eeaff9911ae0f35d1abb6bb3188dc5b443e47a1fffce5299fbd806d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777e1f8ea45872ce13767777d3b9d156
SHA120fd4eb287afe7e9f8fb66ce67daedd063dfee62
SHA256d0008b36a52e325d55e3382f6c76ecf6b5068f49ad20c89ca5575683951a6e13
SHA5121dac74fcc82905cabf4f7d927a3cecb6917715506f6ddf21d4355df456a85ca771d9a0ba050c8ff7a3de426542c63e3d7b5413d1596f7b9b07f78dfa7c5bc6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b8c59e2a821136ff45a7c5d641c555b
SHA16b3017daf0ac3b5f3899615b09295fa4a74e8323
SHA256de5281e1f73d2dc490b3ef547a314e349b04b159172728332974b5d3457898ae
SHA512cb8c81fa3eb13e7f8cdcab4b2fa2ed48958e038814c62bd23bc89e54f6216d12e41a64404147d2d3d419e8742a720a51f08df5049a2923fbc68bc0b2c92b0974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561b213a6c38742132b5d6fdcbba7151
SHA1d0e9ab6b27675d509c91a7808eb2958eb824eb48
SHA256220135b0a6b5bce2da81d2f09af1a4800f7bd9f99d8c7726596b31c9a6910f2d
SHA512578a2c5d26b752f68bae1fb8de1b4fa0ebeb1998c2b5547e736f62e01f946bcea4d22d60b1bb807dd2e3b3516fc3c1e8de3ebfaa9e0d521dd3b983b235ad72fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5978b3f4f21fcb5be8b5885bb3f4cf5e6
SHA1ee712e9738288a8cb7887f82ba0832bca7fbc806
SHA256942ac6284bcc3ac6862ed67208153965223551f36335b60165688999a83d0c07
SHA512f189f287c53c1d44163e0feefeedba455318bb1835e8e25074c00b4c42d87932310e8209b934e0fbee8a55b0178e507fde1cc89089e7c08383ada27617f8e868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a5ff9b760cd63898060a6dde2f07ea
SHA1941fd90f55c7f73fc607be5d8ff08922da9d6253
SHA256a64c431f54720fbfa9957daa6739b4fd939607be078c353c8aafdd050087bfcc
SHA512faf06717aeb9a4fb5e010be6db3a8a7ad7426dddc3bee1d80b2c9c9d6293353fb3aaf2f85efb15d164a87c3f5d9716c76e27bd3106d46bb377efbd63049fbddb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a