Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
7ea2b5a5a378824fd1afbd72b00bc617_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7ea2b5a5a378824fd1afbd72b00bc617_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7ea2b5a5a378824fd1afbd72b00bc617_JaffaCakes118.html
-
Size
23KB
-
MD5
7ea2b5a5a378824fd1afbd72b00bc617
-
SHA1
e7055fc34463965ade577379657efae0c6cde4cd
-
SHA256
b6a756b3cee50fda53ad8e00082de0d9e567c43b8bd434b0815b51b3f4fd9cf8
-
SHA512
cc97f6084e8a82c68a353c401db8e7632777aee198709ba327aacd811ee2d2463b669060e85cd0cf554d04c3b4d2457760c04fcb79fc05fb52d530f3c7d370dc
-
SSDEEP
384:1C2bG9GKG1GzGyqGFGNWvbn7lCPhAiS9toP:1C2bG9GKG1GzGLGFGNIbnpGP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009244ed04dbe8354bac0f11ddf9382348000000000200000000001066000000010000200000002f961db70826ff7eb3164ca4bc5dd57eed2448fe9a6699472b35553c30f598e3000000000e8000000002000020000000f359ec895eeee20cfba4179547fe518ba3984f5fa06af6daaa86362d62de1b632000000015a65b1305825c4eeae5dda21514a5bd034708a12e4027caeab887b024382a61400000005d431b8ae0c5a45ba5a1cceb5e2c627094cf1dea1f89b42afb66a1addc20d4863677ef767f31ed5c8e54cdebcea0ced9e3568d3f46942b1411f80e0439fad30f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26927451-1D42-11EF-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423097410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d463fb4eb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28 PID 2268 wrote to memory of 2892 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ea2b5a5a378824fd1afbd72b00bc617_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b24d5fe4173110e4b51fcbb4c0b94b5
SHA189e0c73996358af448f49af1c4d44beb0132a511
SHA25679f8c82c931b8e37fe889c0821d3f981bb7acdc584f7abe94025423d7e9fad68
SHA5127351070ae4e73289961aad8f178c52143966373593b7f57452e553dc662452c228cda24f4a1af2f1dafe501fd8a6e8615b2fffb03adc6577fa29a2357ce7a3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b973f54306ffb393eea07b68e2e9fe04
SHA148761e6c522d07045b11e5c4e12fa8aa1432a279
SHA256f45ab0ee622bc81c3d4de825937638b95967cf3161210261d299d7d4062e8cfb
SHA512ebe840ae87eaa9a20597c61e59d14de41074afe12e021647134949fb650f9fae3f20658885dbb40e6cfdcc5deb32961b85928bb6a685b0aed8a872d6f68d7854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b4669cbe72f300aa2f9b0afa6c643a
SHA16324b0ef7542db433d30833aed4fc6263eb80e4c
SHA256e9e57fd424a78007df0f8f1ee78a8a5e8915a26d3eead42285375a90ef4e90c5
SHA51223d8a03cf1805094d6eea63a5b665b25c473d49fb8f6ec077812db68563f9111a0bcb7a2ca4caa1f41da75e5632994f282beb57ffd6cc903196ba29cf95aad71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558697154b2546a4b4af6a8903fcdb6f5
SHA14692a5723d4849a3cf1b61d186158af177314921
SHA2567ee9174f9a148e8fcce749444c9d727e970d82c0bbebe3d5111aab86f1da8527
SHA5127fad21c8e1963d7535bd7fefb239891fd3381feffc53a0dbd2556c10392148de76bc56613ad420c4626eb4f1258dc9880e23461abc068da7259aee7dc48e9daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd2d431887036fa22e58ac045fe0da1
SHA19eb68284d654634b907f7ea40e7bda2345b1f57f
SHA256a0b1839d3d188fb0b97c262d7e5107f1ea59ceda511fe4a89c66693b09bd419a
SHA5124ef772a6f9e0ce2f717ecd08f1c4aa6aa48041dcf056d9fcfb56f819455aa656b7c3b9c712007171a0f585f1495e55c0409832e3cfff39d74e77789fd5d528c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de66a6ce530a96d5d135fd9bb564e1a0
SHA1b86c2a2b2a40545eeca0d893d8cfa8fcb0409b82
SHA25693b73e101848991586ed1013d06799134dcfab2791de0351e0664ec448b11d0a
SHA5121f30c2ee050097586aa4ae01f8bd7458f143ac425f02d6345949b5a651adf370489aaf98840ad187824f06ad4c2695313beb76d88de12085f68c197a7d30c4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58871e98c94b20b59d88b057ad5cee314
SHA11b398e01cfdd2cb82def85562b6b0761f48191c5
SHA256ee9142e54173f19a8b405128cd4f2155a721e0c7323bb1ec602d11aee5d1f231
SHA512ceda869cc95355d5e2057537a1d96a7fd96a1cdb9405e016ee7ca395d0a9a136cf35c10704729d57756f82f3cd9c66bb5a9db03f55060af861c21d6f644d238e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572442e70891accbaef05b7ab50dfa8cb
SHA1b9a040c123a907b7e2d96ac494c1b8aff37034b8
SHA256a8c1bcb0a2397a07e5f3eb802c8e196c51223d3bf81b689cd5afe306141d8d07
SHA512ed8eba4e6ab12fca779e19c80ae608456dd8c16709b66ca793ecab47315f6f6621deba2e63f2958d6b3b22e139556fa501a1acab0201ca4241b5fc7f4315bebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a314baf2d3bef20f3a37d34c9367ff38
SHA142d30f90360bb1076f6a29e42e8a73cc7f909a89
SHA256187cd1541b03eeff3b20c3b0b79b06e9b03d1204a1bb13d50c82b1d6ad2c6a25
SHA512b04c9671373a13947d9c78a609db4b536bd519d5418aabbcaad3ba8bc2a8498d3a1572ac23462ceca7d6b3c4de2ff764c25f1d55fca958bca21a861a05421ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f435a2fdadadc022ca0d348835c5397
SHA1536daf859107cfb027cc24bae4fed461af3667e4
SHA256e9105771b21b1615f67ece5136271e71d184f3e7c5afdfbc3c681f45fae8b66c
SHA5127f8100083ea75e825daa4084d149e00bd32d5664f7adf4883b55bf8d74dbae4245e7ee1cdf550392f28e79e2b2cedd6d055dda8899cc04996211651138288fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b799deb54fe3af75a42e5b2a944241ee
SHA1a5b6e9de4d05ec3cdf78b6a404f1f737d5eb7e14
SHA25674fc32acd15ae5320d18f0b757354d271ceb4b6751a967b6c011355352703221
SHA512a674db72d961c09dc737f0a276ed601129298cefcb4a993ed6b7c2e675ebdbf365ebc7ef8fc5dd61a91ac261f19191901b58175c7b045126b40fb80052d87d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd50332521294c6463053563b05e332
SHA15dac29e010756fcd43ad1dbdaf8acec66dc44e5c
SHA2560b3a64903e620ef02562e28eda0c740ed285547d022b6f0c7092a0a1ab085a3c
SHA51222eb9d3e48d995549af5bd516881e122efab0922c03687cfc50afbf9b3d24cd2bc92dd807ef812031320425d22ecb48022766bc76b5b919e9a6b3c78c0994c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ca29f7d869973a34ee54af2ac329e3
SHA18dd70eb1272f8c0d638f5066793f443588f87219
SHA256051383048d6318c2bbcdf6a34f73d6a01dd6889101c619039e5df064ee4e99c2
SHA512eca9673d79d69e808d2db77688eb89d573bbf17c0c026ec6c5db9ec6ba151e01f68adeb6e670e6bae5481b64286c8590200164237dd8679dd679f61652ffc412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a666588dd6ff533ad737bc9eeee2a7
SHA172ae9b629dc36772c9ec35e016026257e3eba62b
SHA2566a329bf215a939825de444e7a2db94f1ccbdd02a11693848d4309c3a86858a7c
SHA51213d0cb408ded565d03b67362fcb9f4453b18a93e607717a98e70b42b67b35775d25871e6978fe006d29068d8c98aa1a8ce5bcd2c83c88bdf79319b711b258ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90777d7f53aca797c49617a9e22e118
SHA10cefc07c6a3b85f33e112825020853454794ae42
SHA2564e7967d3547cbc1b3f8d0dcfb212b3a4f1abff2c7efac7e909dfda2db3cf6696
SHA512b45126314fa18bc4d809159d24ba0ee8ee5d9fbf34fe2617632cddd6210f11f0bc14ed93f6ed6a036741432798284f6f406586ce6b6066c593fe6ca97ab3f520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b710c13be4cbb5f1caac911539729d
SHA167d89e770159ef821b00f9af1279fa657cb8c9dc
SHA256c14b539f9538f0c2647dcb35ae7724706a09bf9ba5d155938ab9e7822576bec5
SHA512b7f096accb6300cdba31ba44627093f1bd2e60cf30d91a07073c727b4a542760ea2c40b5b939b7097eef6ca13da73a972d6bf703a4e94fc3df8dca96a8a0b49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00977bc155f21970c0b5b2ce1c05b9b
SHA14427bb555a92c9e99c08aea56e678bc746011cc4
SHA2564083767069b4e90466291d88be9831177e6de48e8ab63ff7950a62d4e59a8636
SHA512afd9592709c5bf908b0a9b3d3d45326f88ceb58a68a47baafd05e594cc4efed51d040735f24fc1d389ede0b7e4de982269862d0ec35bd80d4263c74b7c969938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a73ba37610f5d4173a8d5928a9e897
SHA161dcecb945dc3c3e915ca095a729affdb5bfd839
SHA256fba96864e411ab0a2a2a152ade3f6f8690a907a2ea94c3296fbd2afd791a6558
SHA5126512a11abc17d0d6f8a3f1f0d80f826620ea6f9346ea1ba1e94f5eda7e50a29061f0b618c3675c9b61a53d325eaae1df5f540b263dcd2bb9cc5b78bc5534c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53914ea97ee2bbea91526c4d3a036ae36
SHA1d5ed72547746076947384afea955fd3d8b038ca1
SHA256a411d1c6fda8c7e634cde0ae0a0b5543afb75d22162038ac34d06ec92bb0d9cf
SHA512619aa6c3e509358aac49247a9f6015139b332cbd416bc44b2883051bf6193fed666a4c536f45ec889ad02245ecf920c4e6a3bb4586567037a61f2deeb7ffea44
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b