Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
8681fd0deebb510d8a001ce8709db809_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8681fd0deebb510d8a001ce8709db809_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8681fd0deebb510d8a001ce8709db809_JaffaCakes118.html
-
Size
460KB
-
MD5
8681fd0deebb510d8a001ce8709db809
-
SHA1
688e5978446ce0d4ed43b66eff232263519bbcef
-
SHA256
6706efafc5f291d732fa70a1b0ab02c2e43bc74da164b3dfcaf8aa8b14aa5a5b
-
SHA512
3630ba0236975528cd360114e0ca53c5655bbaa3b40403c4d7ae2efdcfc77c7898c7c10f86fe636368910f46160b748563178ccdf6aaf76961d130fdfda0dc16
-
SSDEEP
6144:SvsMYod+X3oI+YesMYod+X3oI+YfsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3O5d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423309137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000158b28aeecbbab41a981eab4364f1853000000000200000000001066000000010000200000009b18de62eb2310cdea3bcb8251295e5cbddaa8f7c4d356630554358cd04572c9000000000e8000000002000020000000e4445c4c3a934cd74c41dc880a97f5b3a5c0d87bf3d14b77c688fa7a81828b6a20000000e542d1aae230d2d36ff85272a8d6dd3ca79fb8aba8358eaaeba316e1045ead0c40000000dde1611fb63c34c6c796f9fd65193f48d1d281bc5ca4dcc037f8baf1091034cf2837271636db5f6c3b05e493002388ca052104b5a2b8c7328b9b98873e3ab085 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09721f63bb3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000158b28aeecbbab41a981eab4364f1853000000000200000000001066000000010000200000002246be7612bd9757e7ffc78f0d5d7bdc34ccf7e48a57fb02902789bf1a93de7f000000000e80000000020000200000003862cde5de4eab12fb169f16408db8b9c4c51ee3f9ed054a58b969b155fc92a3900000005275b36b9de86e161f344a034f3dd4032f4eb44e738a5d597a8a0890ad049083cc32a6d973d423ceb5ff45a9149d4cffb53f9c88c649b5c75612b5a196ea2fdc27afecb5bbc9707c23a0713fe017c29fb9d5361cd0d0d1eda939dc9b577c4a3f35d1c89b3ab9f01f565b11e445df80d97520f115ed0234ff50ec7ca30c227436ed35ec82ecfae3a286d0be55a6ea452c400000005394f4ba49a95f2718668770128f6f88502c8559f6524b131bd14f1237f5eff53dbf0d86b3e02e395706c8a458fa46d21e3189f2b84268b095027683c538b4ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DA2DF81-1F2F-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8681fd0deebb510d8a001ce8709db809_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8cd290a4f85fad62062cf8c3cef6f7
SHA18696ebf383f9bf4b006dbabe0e3c65bdbd7bcb1e
SHA256a889c3a92efbf2dc8bb77e865a27fecb9e23ef9edf8e73f6d512ebed1a7dc460
SHA512caad587b90ccad766bdb7e38a406900b87887dafdbc63ff723a7db83c75c0ceb74a593ee6a380555bcb1cdf242cd6ff6152a6761414dae9deea03524ce363ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954b2c0edabb4e9e5d85194406c2cef7
SHA1532c57a9b281bb7c4414df870daac488d428ac92
SHA256ad3edab5bfd82ad1402f809bc967cc6ccfd4b2a915456a9d4264b6f31a53c7a7
SHA512c2df41e719fffc9b5ad99e3b235c73e6bee8472ac3a8bf19fdfe0dc1d8335abd4c364e490807322c13195cfa5d3865587d6f5266b5c4bcd1dfda680798e88428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca37d48ecee1b9c6ebc1821db7d4a21
SHA1ca97dd5be206b246d712c0f0576df97a1c61bfaa
SHA256c3828ec0d0dc69fefe66f2e91f699f55d911554ff3492d5a15a90da30ddf7f05
SHA51205530501ffcdf6413f96bc5f147e2d218fd9cc79b2d8686ad037359a84ee46f50194d4f2d33c2612421a3f9f8a2f1db4f3030297e6930f201ca82b4c51652f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e41371759d3d0c3d70061e79b93ec5d
SHA11c709361a9d8e3a1028c69d3f1b13f7858c3831b
SHA256443feecf39266bdd88d8dc35ee7801cc4603d7b678005c157751386b618ea6cb
SHA512eeb40760bdce76ffc4454116507692295946cd512ff891575f17bf42b2794e761ec42f38581a401d73992119603cd03ff7f023f0687e8dfce437e84ac048064c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134b67e3da46096e253b798a9553d0df
SHA1684414e1a849ff8c3b4f65877e9330987beeb073
SHA2564f21add397ba10d2643414308031dfaa3c65ea1bc803bf888f54b6e3bb766094
SHA512495e7aadc8bf36331d019c89f2b51856e5c0a4e4b814e7e9319d45d47a0dab71877c6d5ffa900bf1a52ef2eb2c279cc9a300edc39e5642280f03aae9704c3a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672107df121d78ae47c3eeb785ea582a
SHA11f113ed9325a69a1c5461a36989dc75908b67b9f
SHA256eae4315e9eb137b10b80c50d720a1ca89aab7872ed69cbb521f2f29567acd5c6
SHA51268a0d3f08e4d641edd9a3de4bff04d6c19043e314a24e90405e950e2fd181b5fc7abb1032b26db0696fc55b4b792c5290d49d6f46901cff85d793a10fd71dac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99420d0d08e8b4f989f2720b4a84e28
SHA13b268bd00bc4cc6e20f462a745e457cd65a0ab3b
SHA256a163f0f1e0b7277d702c42837afd6936a77ae581e3e76af25fda0f17c904fd81
SHA51206095811288378e1a98a43cda8e651a31d902452be784c1428905c8d12bca3a98d8cb079ce3fcee8f9905989e7c2976609c6951d1fb63ca7af5fce68f7731876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036ebd658ca1b03cc50b2350c11cac04
SHA1a038d238b57dc2ba55b61467f97af2aadf017ba4
SHA256771f9062d50401f91e75456f0e7aaca878f4c1c8dc6d60a3ace956d815d4509b
SHA512248f03705db996d359fe6fff03816adb55e74ee566e51676aacd2f6bb9a81bd77f076041cd69c58fa5691ef18e5ed966c92903d39c12704694e4743d5ff91d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82ed1580a74858b8269901e3a4bd7cc
SHA1a6e84fe5da6a2936406fb874248aba2517c1af92
SHA2563f0f468cde40cbd7abd6cf45af103d3f9da5c4ea8511cf9a404f325d7f8df4c8
SHA5122950bf64a5c41eb07eaa0579a64e524cff0131d8609287df45934da4703d857675dbd5e02341a41d6ed02052afc16ed0d837b8fafda2ceec836e385552f6c55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69126afedb258078ad6e834e8e952d8
SHA1255636b23414f78dcc513d428933fe8b690c13f6
SHA2560c060991c8655dcc838142af2248170ff93f82c45c73b2cbaa1c99b1d889f3f3
SHA5124be40196ce2bc822230881d7813ab54f241b9d65ae8117fbccd5f88533e2c906e5302f90e6177e787bae5a47a53be12847ec315e909ee83584becd35fc6179ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239cb3657a3c837d2165130e8f640ae4
SHA1de15e6c5e6d071b539eb5ddc9faed2934eab6b4b
SHA256ee8287089c599acafbdeacde9dd42baefbcaf388f0dba912bc6d79680903d151
SHA512011f8f836b2a2d6596fcb160a9418e5072c9766ddde5bbfd94e2f79aa062ae3bb9432844646e4e2e626ea7e72a26ac67f154b2a728a97e21d2c59ee8bddc0956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a8080a82b79e93680bd291cbf58cab
SHA1948974c00d0bd993a1784043e1aaec8de5298bd7
SHA2567bbafe776590d53ef6a265050433f2b26f35a8d3518ddba80e0eb88a7041eadf
SHA512568c63ba5a5973f32b9b17e8b0fc321f5acb35b15d13387c3962791f2dcb012b02d3a53bf81b1a10101ffe474b8e7d2be35e9aea2c5d5d30b8c5762433398557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1df18005e0b3c4df0ab4c701b385a7f
SHA15c36e7d7306a7d0bf9b6a0325f93cfe7d5ee94ce
SHA256571c5c2915b0464124f53e165b76ec61f0dcfdd830dec687f19cfc975e7a1a53
SHA512f9a6b5215a692e0f5f0867e801e4e3ce539cd44dd7a5992c993183764afeaa87494a6e5b94dbe2ce12df02f85d5f54ca7184c9b4ca67a8135910599649862d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0d287ef5b9ebc1044416443fc6b0dd
SHA11b2c4175a6c03e7ad773bd20c49a177f1dc081f4
SHA2567877e9d6a1bf5dd1c264489dfac5a08ae4f889ec5ebad12060c72e32c2757a44
SHA512ca00ac75f1fff6d83322eb072ee9424c294cff41c02ab5d5ef805260d0080ff8abdb8089afdc8e80414a63015b40e1e7323b4832a9462ebfc5a1fe31f2209a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a04552c719585d2fe07ef07accbfce7
SHA1805598ddeb81685803d566ad2e1064231d7bea90
SHA256199dbf528abe6a305bc5071c4000532461d9411fb17ca6eb43548c965e01298f
SHA5124657e0e0e740d3b16393f7f9de7ceffe9b2ba962d599c63425f4f99619822587060284cc7b46d9a02b1fdf7d007aa5c903266d9eb4dc9806e9d01bcabdc06e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4311bef87d369266901e470f1248e7e
SHA1fb7bac7bbf8fc52f08d9315a5d89422077581733
SHA256056f2fffa134a5b367de90ee45cc6273c7f6b53eeab5535313a96eed0e28b1ff
SHA512eed8243ddc3ed51795cb825408d94838170d444767f1821f795302c12ea404267346cce8d3fbbc2d062166dd70363909ed9df631e4bfcf2b95f76408e1fa0c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a237abb1cfd6beb87978e616e4cf2afd
SHA1548b8030b8de9b035aa68c7bc6abc54f1d89c40c
SHA2560b3fab87ce14615abd6399f9e444a50e57ca86e9fda66bf08f3263633c753eab
SHA5124a121a56ffeb2abac8363f0b06b096af4427414b5f1fd8c52ee7e4429f10b2626a77585a202869d1339b4ae0454b146137c9d7ef6c386f86ba6ea7b945fadcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929d22fdd962c1f6bb03ecd4d0bba767
SHA1c7c56e910a6054b95be910adeab185028ba2d9bc
SHA2564da749810999f49be7d06b1ecc652181f463f718d843e22610e181b1a66645f4
SHA5129ea529f0a4cdef4fc487caa4e459daaa8d8c12d16e03d9a7b9894852f9024d321881a2e741ea148d3cd1356a6fdae761a193f3f999373fdac71a4bec1fd88597
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b