Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
856c76085ddd62916dbc5f53efe26a96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
856c76085ddd62916dbc5f53efe26a96_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
856c76085ddd62916dbc5f53efe26a96_JaffaCakes118.html
-
Size
69KB
-
MD5
856c76085ddd62916dbc5f53efe26a96
-
SHA1
e30eb645bb8fb9bbad5c0f5c89c26dcdac25cbe9
-
SHA256
9af50d491a7db344a7adee25c0b87ba1e95cdd7569412e817e7eb9823a55e42d
-
SHA512
8298eeac345ec4303e4b1a57d8ad81a6533a8d26d648221d5584efd0757547bc65cbaf5f49997d4a4bc7cec7c38e1f91bbdcf7eb2e9bef6379534626bd4e6a18
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s+62PXvweoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3o/OTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005821efd0ab36ad498bbbc06add07214100000000020000000000106600000001000020000000a89bb90144b1417cd1089dca44e505b206389ca68ab16033358bca926c3e0f40000000000e8000000002000020000000af7b6625cb4a1b73c2705c14d0162a1244229bb522f3d23d063fa4f6cdaa850e20000000c2ca2fd14e07a7e92b18852a6ce3fa5fa8d16abf41a96a7cfe85f8bd8f95843840000000a18d7b0fbcb72ba080799cc89011bb1bda13f5ca828a99328b81000b858205f5ee48fb9da0352dd81b05808947ec4570b375006c11f5ebf422523020aa803c09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bec8e3f0b2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423276900" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E6D0041-1EE4-11EF-989B-729E5AF85804} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2700 1708 iexplore.exe 28 PID 1708 wrote to memory of 2700 1708 iexplore.exe 28 PID 1708 wrote to memory of 2700 1708 iexplore.exe 28 PID 1708 wrote to memory of 2700 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\856c76085ddd62916dbc5f53efe26a96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2422f1770d47773c9f2a73074f9356
SHA1105628ae99e6c9946861ffc1ee41808e8f041f98
SHA256c3b00b3549b67ca81a22c39b95f2b0c933693394934001af876173d93baba6ca
SHA512beeaf6a67ffd1eff79060e16a3b79432dd3f683ab1aaf9936527986b5d8aaf8b4cd47198742acae98367658af3b83badfb9ce0248c2ab9cc8814040a56ae8c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cd3968c94c27b848337b666273af5f
SHA11d0affb741e69d06bbf6725d9560609246172368
SHA2561a7bef27bc908854e02f2982a8eb875a3434dd738d44bf7a39ce53519d31f7f9
SHA51275779b2979c5909286d6a906ed3c1b305013533e71a42aeae9d9dde7cc035b844ce1185c1214c7a2576a912d471dec3a1f0cefb29518fd3e05932701fe6b8129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a804cd927fd70834fe7d1fb973b231a
SHA172209f810b9cfc7fff43f13177f7f56bb0ea4265
SHA25605959a30921725d7ef4b24ecd66f121543f30dcad776a0ba0a07bcba10fa4094
SHA512aba5b9f8970f81835fc09c0c63f437acbbb2973b9d3f669f5c88aad607b611c61931c49c0264ec0564108ba74010061dadbdd3044363a833148b16e5e80cca5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518609e14aeb56151cbf732c519acab9a
SHA1884931cc877b884845047ad5bfc5713ac09cd10c
SHA256c1df51c99bf47b63052f89a5eb20932747fbd149f7ded5061ed76f7c408bf9c9
SHA512fbe77b2e1ab5f326f95270ceeb8104e90df3ecc4a10e1c11044170e6787ca8783d600a4f5985f5c21df5a23c56e3382b59f802675026f566b377d8ba30ac69a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0bf800d9df20defef3e2b8cfe5ce45
SHA1de9cc0ff05704b43f981bdc628a2a8c566b173a4
SHA256877a18256fe01d28c98075912eacd18b3a973b3b8a0f4d92a0e1685cf078e9a3
SHA51262365f13a132c439891f72b766045efb704606fd844378ee22d6efec2e5893856c002b63be23a631be36e995131397eeb60f024bfbac4098f65bc0651023357b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47d24effa93a14ece62adad857be280
SHA1d0d27d3a7c20f231225975f0404911ce68f6e8dc
SHA256756d3113b20eff47b00f1056883a4697598d8afd280d10981ca131c0c70b56d2
SHA51279b97bf220816c79a783ba64f01338b37deba727d65a19208e71282eaca91d01a5934aca4dc54bc59606109e94db67cafdd0c84ae1a61aa36d26d4e720eae352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc132f9b8cb499e3b0bc394858e14d4
SHA1e6190760d16568585d23d814d8bb1307db4f4890
SHA2566a8794d901e0541084b3f992f70395ae50650c8a18730180b6c0464bd5ea46d4
SHA5126571550bab5394e9dae0570d95a5728797d4fa2debbc99a0469972844e68452dd6049d6a591ec8041bc9ca9528c6592699f56b1209c309d6d7fe94bcbfc8e5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a620588cc389923d17b6cf71046f94d
SHA10000133ffa90c9d39c961981c5e2636433357a20
SHA256973c6273df9ade305cbc110c2286c168eefb51a1cc5bc4cc9f74efd7545c5831
SHA5129b7e00623854d3a9b56a2ff918fe112933f99f4c4b13fbb2c4858bd5b8fa2db50b65cebffbe9ccf87a6bba635090d8cce399344db419302377ebe4bd4f4daba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5fe4e15475e880d5598fb073a208c7
SHA1b4e93b8b59de60c4685ed73067027e2e33ce7e3a
SHA2567b2fcd0ab72531f419fde45749fc05b641f003bd27611aba241b5d416f63f799
SHA512659a566cd9f2207d7e89f5a4b688a2f4f2b36ea2883c0cf2be594603f9ad5c1cb156ce866564e795f59c5544efa5c49291f70efe228872e35a4caa3bb14f5bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592673dc7a361069627e0137c71423575
SHA15380f9a70caf2c93b5f644fe41d0bc766d3499d3
SHA25657f8ae1b373a2228a84bd5bdacb30e31fbd1a9d29cbd633243864c37301b1823
SHA512e652442667ef3317889e3d2b1c6078226819a678f58ec176d8024756dc6f85ea5292a3330ec1ef07f31138fd2f5679339d066da2b549bcb73c003634bc118bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac97955ea0c20f4731e963bc1ca2473
SHA14ad1a63a7f9ebebff8234ac4fb2c71dd481820af
SHA25675788f70664a4892e43cdd9fe866ce093cd521129be4fe38b34cd533f7144824
SHA5129b259328673b4a27671f19657f3249b2bb362e89f2cec3152e4f69ed9a5da2f8c0855e97f9ca1e16abc763633b2f8b94aa6f60fd21143ef20f46bf941cf0dc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5f9ad7c2ac763084130f4c3d7f172c
SHA1933a9f0e8a1b4de701381fd65a8d44a33aab0b95
SHA2567963eb9fd749b7d29bc0b0b2523840db80ccd88058d4cc35cf806b881290ecdb
SHA512eb013d875660029842ccd92e71006bae843084f968cb2905fe3330e4aafb8a608d31adeed554633e6558fcee74f36b4f9f4a908f970918442a6482b6f39fab0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63c1e55fd35b95bfe61a351e5588031
SHA13a622244b4c2bd5980f14a7e575e97de58dd1e35
SHA2563cbc0ca029589dfd89d7807161ec17d8c6131ed5e0361acee50bf691b39be623
SHA512b809926381723814ab665fc5588cc0a0fbd0bf8759cd17ea25b6ee83dca572c4bc2df83b805af1c3da18c5eb0bcb1140ad804935aeee5ee77739a94f873bf2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031379776b8cdd0d5e6b8b1c4e0b3c32
SHA1e66181e48811dec7d5509dee971b8eca29562ba7
SHA2569aff74c67c3c4d019af440b6871868fd6420440ed4f858fbbe7ceb3d631ffd22
SHA512bdbda8028e45aab0fafcd9b09d65415e4614ed48e062d54afcb30bc6ab91b400c67fb78381b666a7452d514173ffd42d0197a394c30cd8bafd3da34222d5d641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68161ac20b29421e2e9f49eec9c02e4
SHA140926a1bca500bae109d1df233c3f8d180dcb4b9
SHA25661f3077c1b74480223523b2672e4049146f75e09647955978cfc180d4549afc6
SHA512d73a2647d3c8902bb04ba97f20e24acaf1a3da77ddd96332c0b9dba83cd2cb178c3daee388ca9d88b2e2484f3e7a4b9ca07f98d44c401da73b3935a16370b3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94c789e4027cf4a8684fedc6b2faa88
SHA1c7324f37a25adddbe078d2ff703a1a7610df8182
SHA256470f096ce172560bf061310d5cda713b79e25459abeb925b9329f13aa6335453
SHA512063f874d527b287e7532180047e5b11b2072b0217cb46290c8ddddb9144c8543c72d336f77a0d5fe1d9ed5dfd9a09274f1244b0f0bd2ce0be8bb7ad657499e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939b7f7c8cf7dead0d327d26c48420c8
SHA1342721af4fd89bd8d59aeb67503837c76358a4da
SHA2562af7c72f15f6ba64ddc56de4dcce069ba5598fb74f4e9ca663eb3d5988c487e7
SHA5127c46406b0d17bbf0aa5d4f0e49109865a933f4094754299bc893bb783e41bc2be501ceca9a1ea6667a2fe8985c20f8cc5bc74f742557443dea61cd19c6d823c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6950fdb35c435e7cf91310a4c23d2f
SHA1eef2c01c5aa872ed0a337ce850c925d52f7a74e1
SHA256ddb03a1c20201b7e0cd93a494497685e81716b2513b68718777210e913ef73ed
SHA512488c7d0aa02e502b4eb2cbd60add787db052b0cedc622c3b7e3554eb70bcabcca8550051367138d2fcec2697dc2d0104980ff58a2c434b0bfdddf3e4be13ff1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1bb89488e536813c2d84d4bd83826c
SHA1d4f0c458bfe92adc9043532f2e5157a6a405e7c7
SHA256901b2dce0b15539c1b4eaacfbfde23f5ef27779db44967e852370896d4da2bd3
SHA5125419d4498419a2b1ccb8b48eabd2e74e2e9785f40e56185b744cfbb7bc69d6ba09616d8aefd9b5dc88a16bae3af0be8092c760f6952e34bee7a20d0c1ab9df28
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b