Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
8cc53740265dab81225b246e0685a687_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8cc53740265dab81225b246e0685a687_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cc53740265dab81225b246e0685a687_JaffaCakes118.html
-
Size
3KB
-
MD5
8cc53740265dab81225b246e0685a687
-
SHA1
9613edea9c6b89605979140c0dbc1675498bcf85
-
SHA256
25a5d82770f93d6c620abbc3ffc1d8c2a527bf0862e2ea08978fbb9989215330
-
SHA512
428be0edb52f1479c4276a399b536ffdf3f0b868d3b68badbea5c07e2c2f1f2500623f8384c296d9573b3ada36c746bbf2c3bfa244b5b8be2cd490abdc72cb8f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a078df4b9eb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77378241-2091-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000249deaa9ea0ce433eb114310e5c80e1ea64879760bb58487cd6d20820f512911000000000e8000000002000020000000d5154edfcd904f03260253fd552cd3c02a0b77300022fe3c916103f74533d90720000000795048067c0e43521dffdf0ed2d708378f932f3f2c588109dc4d7a78252904b940000000fa88d9df942e9217b7743200a4b0d85d586570778c1fd9e97354ca8e8d651455c4202837110cc420c42c5b3847ecc76c64358b45215e2688c6a6833fb5a7abb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423461329" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3016 2884 iexplore.exe 28 PID 2884 wrote to memory of 3016 2884 iexplore.exe 28 PID 2884 wrote to memory of 3016 2884 iexplore.exe 28 PID 2884 wrote to memory of 3016 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cc53740265dab81225b246e0685a687_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f23a65d436f05f31fdf3a7dead8fa6a
SHA1f3c09cb9ea456f4f2791df51563835856ea9fe5f
SHA256c348c5b454cf091b8f0ab7dd574b38d14178a01de19d93bfb6a9cab576ee6b1b
SHA512a42ca4629ed6b90109c851e85c8e969cdfc04decfb8924c520ea186398996fb0053949521d1c7c43ba0baf939d0b57793fe941df746a5941294ef97711570c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e2df331dfd5cc455e7ba719f02ff5d
SHA1872bdb9e396b473922e5712dda3e6f496707436e
SHA25607abadef93af3d1a7d6a1ba434fe0b83d0dd373b7c267943c6dc00ac0c1bc88b
SHA512a79bb7392f0d928809cfa57a3160e7a993c696df55780c59c384050260084eca5187ebdef20bc2423af0fa2230f3736860d174764682b962435dc0e6232fa41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575be0a32a5c5cfd24a283d30bcf81b40
SHA1aba940e05c67614e1884075e326758c9ed54dc78
SHA256214fb31667e12a81d0a27a9282c7bc5b910e06343703fac117676645c427247d
SHA512b0643bfbad545a474f694670c8b9915f7477f45ed9ef5d5c4db530368195d6ddc1b6a1491739e28c43d17b2715eb31f595d12687ba27070dc8fa27c93720c67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc00a6af393036b1ca5f40012277ae74
SHA16f2028bdab1239bc269d755eef51f3af746afe1f
SHA256e0ab14b89cca2e1e6741aaa90667c6548dc2edbee1f1bee27a9783ef412294cf
SHA512bcd65af2ec6ac76c3bebe17bcd7f30f4dec85e64f5c5a9015039377f50570bb87d237103f6acb18abeb2e28b849cb1e4ec28852857b1c5fba6f0a7887e58a485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57400857c6dc48c4754f9073d27e36364
SHA117087441fc5c7bdeb3d06a281569796d0319ce67
SHA256e0c543771e7c04140ffeb98adc0d19f25a3aaaab69e7617995562f647be20da0
SHA512044f38b7d75e28a5428350e8cb9264fec93c367d3d74c4c664aa2c4ad2a1d812be47a3b9975a3e5975b7884cadee4a08d280d83b305ab19bba8dea807f67067c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb4040a6542e3e79240822931ed2858
SHA10deec29d8fea730ac871c97f510aa9571b0c8939
SHA256bbf4905f2d5504cdef1ab7863fdaa7a43c3a0a8c79ec8e68548580e831444bfa
SHA512a3cae0201d3a5e3202fe34f3b94bf4f31ccdc98cd60b71d3b04a02c2214a0483ae198457b473aa79391612225cb00f851f204101e348a33d867dca650fd8afc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9c1cae11a0c280fca2a849468f8448
SHA1a9a339f9a9aebdd31cabd44bd6c00b5367082d4c
SHA2567ec246c91db5adda2271e16a80fd8e2d3d3cf8dd398975eed7af26005db20623
SHA512f4fa76db76a5ab391359aa7cbb9f25e8c9381b017e78d08277a4d4450a90b12fe888fe07aadff81588e15d508be1c8ca2d4e8ff8e9c658984cd807e21ebf0e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50601b6b76c37756115ffa00944973f
SHA1d26b4e51b43136bb32293c0581259db6aaf0b927
SHA25694703b20c27e1e06cbbd8214520cfde89b7f98f987b5cc1144ca4c2a53b892ff
SHA5123c81b7b10200fc4e605a9a17501fe4fe096dedeca7ac5088a256558702b233968870f1499bcb0c772819cda988f1be9dbe372d0752c889533ac5384b23d5b217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2b4b5752c03f9d945b62e1fa6452e4
SHA19c6b0b61b28845257bf36ba45f1bbffc646dfcf8
SHA256600ae01ad1157a02f7ecb1c012f757d1fece9bbdac0591295bb79e8d780e84a2
SHA512fb8b67c58102e198b8b7c8e14f7c572f8e10d0c7fc727fab6af169cedccee09dfbdfacb88d69658815e71c0ae8145fb1f14630a981526df8fb7a9699990219d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58309ac7049bec1506c71bc8ba0efeac5
SHA1fcd5598b1c26cfc227a16308ffbb630ecfc4b6cf
SHA2569190e98ee647fe6f1370bd95d725bc47ec938b2c776bae9867feefa802c66711
SHA512b3aa78018bc1868305ab25c224d4ef97641f82f60472914fd8abec53cd8d2a025b1563209014b72c821fc8c0b0ba0caf3890e9c621335b247ffdf08439839eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4118d37d6ac427674ce38675a5aff21
SHA123141828de18b786498a0618e40b19eb9c795793
SHA256a34a1d08e81473b956002da5eb59a0412b0444d0273c29e88f7d9b6b314303e8
SHA5126a4342f6b5465a2943375d7444cf9d2bd209117c5030e346373b29c42f74e58e278527b5632cffa78e0a8824e192b33c0fe1a12a909cf48b3a313d66ada5374d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c07360a0e632702d203fac158a283c8
SHA1bcb7a3966f7381daa0bc708c653079683f0056a7
SHA2565183180b729677aabd8b7f25d6363e93e99c19221b74115c992fb8d4b916423f
SHA5128f79ecc4a427de667f87dd28c3c5350abcc42a591203cdf546b3447ba2495d287e90dd2e3828444f99ea63a33338359fb1a691df99454d25a8d1ca3201b56612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9f0638122def7d6797c8adebfcf52f
SHA12325c2e535e47f83b859db3a3b6529c0d07913e0
SHA256e587beb5676b88650727338233535b9cc8186bf528b3d5c46598a606da3f49b8
SHA51203f77390d9d9c3f423e27ea63c1ca2e7fcc2076f7de33ddeb878b8d939c2ba7f507b9075c02a70358143f3a164e1a527d8feb6eb8302a39c9ae370ff678f5883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556db19b03b2eb10282b81aad7a4079a1
SHA14b67b4e7e009642a7dd101b2ca5be836adea4536
SHA256939f97b342245b5ea6d9e0f6335b301a40a99ef078c37619b41eacf9bc1016b9
SHA51272f58caf171d9f93375c4f6e44a204abc5a63be014d72672a2328e920eaae61f68b594027353dce384227f10237b2052f1a57aa0eac3e7be5a31dddf991283e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665a82a19ab2e3aeefdea817701cc9aa
SHA113075c3787f89cbc20d516cb088649e0ac67ccc0
SHA256a8df8188624e4a049fb0c063c8dd7a8b884deb44fb0a7d70b4930d785bad31fc
SHA5129298fd949d6701270bd60915994219918929fd58db5872c271027850ae8757bd8b555fef6f56c30e2de733c55340aacd6748b585dac11ca7b4fe1cf22d643d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc259e43f464df6e1c452e886a8c527
SHA10abcf7f56e6587d48154ac7e161ae239066037a3
SHA2563b818331b5aa1fa2494777c4cb090de33cdb78963cd44f7bdc07dec21b21d5e0
SHA512efc28d6a51b83155c743014ccba6bde309ef7febe119a31d9163b3b13c83e20a1b1124f5fa9ebddbf5081d4b0b436339e55f0b4094127fdbcaffa7c8fa8b42d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a64f9a7b2a26aeb90484a77f0fd408
SHA108ae1126991986f0d0195f2e9e876df6f660e7aa
SHA2560bc15e66a48bb780eb5bef7f07fca8a73f272027811d4b0e8d74b354812f78f9
SHA5124a1d693783bcbc5d05b2901d0d319b55292ca6b210b416477398b1c2909b2f42e6cb71bc81002e107f00e9bfc00ccd0a0e6a64a59c3d256313ebdc6f85502e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556346aac4a809e38642e43aa78003e7a
SHA1e261f404a7dd9f2c297bbb83ba075022b7d8f047
SHA25667a75094fc52012687703e5de6a1ff4e34b4817267bd3208f6e7583d50438582
SHA51238da067474f2c19b009c19f80b0adbff15cbc548bd9c6d0b53160d44eb98bf3427575c4f77d11d660bfcbe298eaa54ef8ecc97d9f361f94287d44103a330f435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a09300ac4aa930272c72ac9d074cec6
SHA1541beb212a8a5cd4ab7c12dba4dbac40f3cf73f2
SHA256bcbcd2af9c605ea91f3e302c0f3cedf87ca43729b46414dde9703394e6ab74a2
SHA5127202055af84a27b322af73ad795e39ad08567a09b81a81ce3d884aa39a4ac29607f81b0f69c271294401691687a5915eaa62e1f00fba8608ffbae93a73a2da5d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b