Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
8a692e2e19c4f86cf77625d1ab67066d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8a692e2e19c4f86cf77625d1ab67066d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8a692e2e19c4f86cf77625d1ab67066d_JaffaCakes118.html
-
Size
349KB
-
MD5
8a692e2e19c4f86cf77625d1ab67066d
-
SHA1
c718664c582881236893aa1e11b121eb5b29ba8c
-
SHA256
9a1f0c00c0383f449663efd0f976c3fdb6392f214bef141ccc0317642607579d
-
SHA512
8bd234f683242c8fbaf4743a295093639323cc6274a17de4bb48727452ff795e52d58df90c3e1abd95a748a933fa952ca7529b4e94aa4bea89b14b44ec182e7e
-
SSDEEP
6144:S3sMYod+X3oI+YZkvsMYod+X3oI+YAsMYod+X3oI+YQ:+5d+X385d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80831a7c1bb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68E65051-200E-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423405041" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000353bb9bba7b644418ef011756cedcde400000000020000000000106600000001000020000000414570f74cc7ce1c2b1be9909eb96e976c02cdb15c9af8eb3070e38a38c0b6f0000000000e8000000002000020000000d8a020ee2dc589b4ec9fcb07b01637974a3372547f96efb0b314b8e3c635049a200000007f946822bfa8e92a81b4f6ec25c95bd64bc53740a1addb156e025c75fde0e615400000006b44de23dd765b2f57220fda9600aa34392b04570af904bd0fe6708ba1d2b2e73ad5b87a12deb02ebd8098b70d2ee2bb2887825a85be90ddede128ceb68d80e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2608 1640 iexplore.exe 28 PID 1640 wrote to memory of 2608 1640 iexplore.exe 28 PID 1640 wrote to memory of 2608 1640 iexplore.exe 28 PID 1640 wrote to memory of 2608 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a692e2e19c4f86cf77625d1ab67066d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d177043c31a89c0c54cfe6cc1e6c5e27
SHA18a3d753f873a2fd6e9ba90871bd751dd3b916232
SHA2562925d77b408967a80ffa7953b9f092b7315681b91dd927d5e40370168fdffcf3
SHA51260af86f45e88dba47ed03ac40ed3478cdf8e391ab973843964a00e977c73b63b7b549be7b539f211e48bd3581269860269f1b5ddbcd0b9d5a6364cca1b0c3cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580f88c3e7b08b8ab3f6ea43bdb6b4ca7
SHA1680399fd63cb3fdf22c5ebe24b1f8545a85c5a12
SHA256e7d784048d444aeb611277fd6d47e358576a8e8cf434223a53eaba15e542baa4
SHA512a1ed452c685ef3b43c2e09ca5deabb2dac016cb87492fd7c2aef4905708c519e1f1055729cc7f77d55a36af7356955ce3101fb1431f0a2f8708e326bbd9ef2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d33ab4821567c23952489d2ca024827f
SHA12cc9197ef747814b117989e91d422bc71cb5d7c0
SHA2562f4396318ef3fa74de2095f8b19625685ba64b2412b1b17c67f40b931b33d184
SHA5128f1af5163532e64b67c0bf2b526aaf75a3ba16bf0dd999e032ce8423fa3840f41f731403bd412539e248507af405fca12083e7f2c001b72be9e59cc4c2047c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da33df5d6e498a8f79ab16fd5b01818f
SHA17d27c88655a7bb643b9527c97ee12c741c14e3e4
SHA2567655d21b85caf417f0dd910ec1ed001cde216466e4557f684721226db39a3c24
SHA5129c3cda94db24ea9ca713de7dbc3e1c11e00d48ae770ada77eed54b995398ddbb5d21a0199759ae710afaaea0ed61c6ea4a76662828ceee4ef8921588fd0d2a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea4938ef3ef0e62e8dcf9c17ee926e36
SHA1952e3d58f1901c6875a1401a712980deeb42fc44
SHA2569e3f804f0d9498e523d24d885740e9e63b394d0629786cbcb75592d04eeaef2f
SHA512bd363640065883b57928452a7a87177cdcd07a0ff1180c8f882747b018c12c9f800003cfcf669f23a0f2befd0791d5bec4cb69de3f54c4916070a5dd13a5b62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a7ff0cf83a7438fc79b7637cd743455
SHA1539e0e072aa420aa5f9d2d6b73aa1f34175f5937
SHA25666de43d95d77253c344a080166e0a83f16bea68325807f2df51a99c3b17a991f
SHA512ee2072576b6c139a118a4696a5243f86ffd2f3c9416bd37b1c95fa3b4075b13a567c8e6d893515b0112b5e3a268d9caed1ea7da6914c1b615ac617b6adb66246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c273bb8fad3ab5ec585782c36766361
SHA1522da2db24e330f150b26324fdd80f6e09423b78
SHA2563636dd9ab0f0d840e52289ced284dee0016ed522375ed35f353351217b641df5
SHA5126a5e7396d24467ff6764c4552361a7b864d43d494be16e8120169466fa3cb8b49c483f05918a2e4d2684c1a83f652dcc55b4969967b84fabacf7740cca35d41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525a337005cf2183f21c8e7495a5ef0c3
SHA17233e373e8ce06d5a736538bb6bc7b19563b905e
SHA256cbedcd3393d54cde937b24dd1471d69086c02567e2f1e41463e094b8e0956ed2
SHA512522f794f441d9b499be3bc8205ed0acf894731d0940475bddac9db9f9b4ab062b2a92c085b7b6a190ea5c148ae583bda41c1e47d4c856e5631de5762cc38dfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5991887d05305bf9e359286b1392649ed
SHA1b842ddb3cf5ec06ed4860fcefe1e91867d9b828a
SHA2566e5cce6e5ed623d95705b115704de0e6dcb709ec1da637a33707d48fbb589988
SHA5124994bbf3ea9d753c523940f9dc14e1789a5251bc6872b8934bed3d30fd9ef8f314c5ffd2cb5dd44f3b21143dc17f79527a477d88b3633af4e4b9951068be0012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586b4c914906b27a3b54efdceb327f504
SHA1d15835a4aa6f562682842b2b8cd6651d46476f33
SHA256318dcf5ca32943e3e00cb716dcd0a77e6656ddc4dbd32d8d2245b005f7c21641
SHA5121bce460b2f705cddd1b684054de62a8db08a411442685d40f0ea09e7e76b0f12e6fa41ffffe82c717d80f11a82df9b8f329c0193c83f7e3da29d2ba98a9b8247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5020f44866928062e401bd6ee884c53fa
SHA129de1eb0e9d00b48d710113de770340781ce0736
SHA2562139c3ed602a8466b5ca11953d2adbec1d569fbaff89383d87d282ab35d28e20
SHA512dbe6733d6b63060f389fb07cd92dbaf07893f0d5bdebca7022204bfed6634d1eed1a2326146b47246f7b73c29f887f990f81403f49c6beb8f6f24bd1216b97dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c93df90f10d0fa2af0b51adbeb577965
SHA16da2d78a204bcb7c90f16ba4a658edd3ad7023f7
SHA2569c005c71a7859be6ef8d05d4648c55f9cb35c79832c1a94c5a6fb9191ced542b
SHA5127044d57282550b59416749d355701c5184c870784f5c3aecd34895b09e75c23fac5bc82e2370da842c5c2d316d9348d4ff03d06b3704b632408a9e77d7fc60fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f8805bde9de8a1999bfa6b6d342c713
SHA1b0451f8a4c9fdf02aa8bcb70c15cf04c10807864
SHA256fc174d0b4af3ae146963234ad28816ee02629f087760c5a4937eebab6af672f9
SHA512c76a845f09480b6161b0ca9c3c3b591f81c712f2273614c8f948530e874d22c66975acdcf96049977126310cca5b372d27cf3dc5301d61c68be4329c3b876262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e3ee237fab19c97832c70023b68804a
SHA1ab037db81f2e78ba2a44686cbed1e6f7c26c9d8a
SHA256229f7118f12dd03fddf038885f5fcdb3d4b7d5626fcac5088b1d8e93cbe909e6
SHA5128c9d45514e989e787d6c1aa7ce72f11d13f89cf77f8e3f9d8f0557f368bf34a58722b62ee39122c908ce5d72f628b494e2ac86b157b5ca2a9a7dcc4701bad80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5cf95fdbf936032806897c7c0ad4a27
SHA1c53986deb1904917ed76149e98640870ff7644df
SHA25639312359cae3d9956bfc64d6f290456a24e9cdf80d81ea0304e98da25176e57f
SHA512a0f9e5c50d68f2fce9fdc0949f8f41c99796631638568a5e87c323e187f86b2dfb6ea4ccebe39bf4357615bc500eaf8c7739ecdf665a7800fffbc55adbb5af35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b0e117f03a006ae47a1eebdda66ecc9
SHA1350fc47fd85d042764af442d10d02dc29b9317c2
SHA256bfe59d61be3d74925c95a4c11d3ca685f197c3421de03cfaf72b9ecf51574a58
SHA51244a7c3a5a48c8490dc61d5c4dcf7ea2d0a018ab259310568f73fb5abd9dd66663de19461458556ca515ab69a2842101b19ae5458317062ef902124087b565eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5689254ec9bb33bf6b7edd7c5ff8059f9
SHA160a8f55e94f8e9249d9d4132c29c04f51ff524f7
SHA25670571c11bfa6c7b569cef8824a31d7adbbb37d39754d09d8f99bcbd62c5475c5
SHA5123b8a6dd0b745908a96b941b9f1fbc4e54d6afd8e668a8dd233fff4a1e058e3666283579feab2c886ca0270df32fe11d5431b8ce48748f9311529e8d7628c441e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55126323a55d94570a828a24e3d803e0a
SHA1a2a24c704af488347df53cf534748c17408780c1
SHA256e68d79c49c3177558d0c9e0c1d0b2f825c03cc9f777a069d0f334ac39faf90b7
SHA51207f2363750b499ffe97230fd5a1a7146f5fc79d6373bc497675fe66106e57dbc46a8e206a5f25101338c590932b5d170860de07f6189e7df40c02d75b1bfe632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58dee263ba46daa5a5d7564df5cf463b8
SHA1459c1c51563ddc3e1c98c1aa7b40ce2904c9a13f
SHA25693a2ec7c949c237027e9e4950ffd9ce34866e4135cb93f6c2f45dd3dd0a863ba
SHA512d8881091796bbaff661ed5737d9119dc5aed34931a771b6a4256be48bfc546dc403c37cce18718df95742cd7e6a64c285b5d63571d0a74bf8dd790df46dc6f46
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b