Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
90fc65660aa885b59efede35a2901f17_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90fc65660aa885b59efede35a2901f17_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
90fc65660aa885b59efede35a2901f17_JaffaCakes118.html
-
Size
461KB
-
MD5
90fc65660aa885b59efede35a2901f17
-
SHA1
aa64bd100e75ee9fd1d14ad17f3ef9da7698b47e
-
SHA256
46554885d242c731e6a840910db559534ff583fd669585823a2641883eec213c
-
SHA512
8483992a50d3ec5140035bface8ecfd3e42df9286148d0a1dd160c0480724cd8739386e1349bcf7e4c0329bcd1dc37224fea7ebc65537b65071628b531dc8191
-
SSDEEP
6144:SzsMYod+X3oI+YZzbUuQEsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:g5d+X3D5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1049ba8089b5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007343315b22fa57499d8b78622854e55d0000000002000000000010660000000100002000000035bb3c8610c62dbe94124b55f7b7b77f475d4f4b0b07ab9f7f4d954e755d13bd000000000e8000000002000020000000918ac91db1665566f90e3825b50732a58a1f1b5d97a93c89e750d35cf49ce9d02000000094b825cb03dd1fa91b08bfdffb4d4c8508d3b285fd3d8e73099ca61026f8469c40000000d096f370e1e176b6d503fe2e9dab078d57c5e0a3e6e25e12378bbb6b52c4853b974934ae794b8653320a6393c5786bcca7be5d98e9abd451da496e4540a3f69a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423562343" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A82E59F1-217C-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2332 2128 iexplore.exe 28 PID 2128 wrote to memory of 2332 2128 iexplore.exe 28 PID 2128 wrote to memory of 2332 2128 iexplore.exe 28 PID 2128 wrote to memory of 2332 2128 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90fc65660aa885b59efede35a2901f17_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2660ad7bee55fb23b60ca5595a4bb52
SHA1bfe3750f1be5fa1e8bf829c4523e201b70e380f9
SHA2564beb956606928ca0c919baa344478e996dfc0a77e708e2f2a5b8150e97682051
SHA512ffb461a085642e37e53598ba2057681c0cee2e80d38469fbfd8f81da7e512d316b3e6f80c708dabea24301589b91167c9fff73822771a7608edec9606d0ca6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de5ce0b3d0253fc00ccff0292bd152d
SHA181c8d147bb20dc5b3ef037ebb29747953013d464
SHA25620e5261c0d16a255dc521091f976c6849c2846f823cc38ee7eda8eb74465ed98
SHA512849cb3760b4e0e414d1593927213caf2dead11e25e5c74d1f79ff15d124b314d53a04d8657aefe643abed183ea5021dea24e47532e2a83ff3e371d4eb4e6e134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbb2d49a8e034a0b2ab4d2105d2865b
SHA1ba570681c45550ac50aab819e0331446e7b2e9db
SHA256611a2d3251c07937074b232c5794de16cfbf21429c18954c30ca3c5936828e84
SHA51229fd0e8054c584761f7000c02ee1ee730f7f9245745337cbdfb2c2ae5b1df8526b6e98813db011eef4baa3d5d9e4e29b08e1e4d1c34c264cf2cae3e5c0fd280f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba16ce7bcdd937843713f27a526fd874
SHA16e74350c9500afeb7e850e1cabf689bcdbcb8527
SHA256a6e2d707a85ea90b565313ae7b59f1295d99881e48d1ddc1de95b404992df0e2
SHA512fe39266fe49849d1cf1088e4260d0531d4d3bd9cda3e65b4fe9f8fbac5e954dfc8b1ba1d55a20167bee45b72601a39f7d88a15d95555fc1bd22ce710c64894bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9c928b35f719a5c89b45ab0f6626d6
SHA12379bd3e275c7e23613d675b9c829b765c063f76
SHA25663e31484a3112e6bfe4b84e2c606c7ca3b81d9f3915ba60db1ad9a287ce56340
SHA5120e6d7de6ecb86d72baccdebc4a71d42b7419acccd4a7e557ae32f992d89692ef1ac5e7eac75090322ac435afba65b9ff722b7431fb9e670b1f6b488fd6cfb937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbfdcb41a9881ee0efc89fd0bfa6424
SHA17e9ae677a9421909f71e36baa62cbb0d5981f172
SHA256ebc31b8196d02fd8f18cfb634ac703489a4cacaf6ad18228a86843ae4266d092
SHA512500630d6fcd3098d38a47e0738a44c45ad841c339e4d4b904703acf835c3f71da4e8ada793df02d9dc6e29799da86aecadb9bf4b9c83b6027a2898a8bef61184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772f0564c87efe38639ab9eab29e8810
SHA1c5a169450f692f0ffe34376f09a092340d7e37a9
SHA2561cfe9e984460234047e00874671f22d9f021a990b1f483cd9414021dc08ed61c
SHA5127fa3be0a85b50208900b8b39c4a02182cfa9646a6f0f4038528befbf5a29b5495f1260665c78f5902eaceea63cd2aa12131481cff4565a079ee14b8393000b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf85cee48fc50fdbadc5540c46af150b
SHA15479d74e0b8915733da853850fff073a5c27083e
SHA25669e32fc93cf7187b64f6df5f851ded711dba7bc8fb437d10964aab9e5696fea8
SHA51235719c5c6f7c7281c1f529fe3558611c28edcbad15b8f646da06121192354e8f14e12939a16cc172edfa6b426b2d8ba02f7e7a18da3810a7a6bef7e7d8adf713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6c4be8b9c4c1f257759f7945255b4b
SHA17d356320c968e8db396ead2b0a1eff88fae75534
SHA256e229a6ce2c152ab4dc7be5fc3d8659792f14413f8c6eece1a8391fbb13307275
SHA512d0dd20477f9afefd3018bd73b164718db3d578a3af29f65e361e59854af1089c283ca6cb3a71ff1078625e23cb236aa18445bb9f016926c27a7d0262f7b4b8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2cdf0730852e8b36bf66ecf23170c0
SHA183eca596cab50dc192da9dc52e2142461c837cbc
SHA256f92f250ceafb352a7f6ebcab3697f242b5d8ff257cc2f936f6571aa794624380
SHA512b5259c7833693a87e6b55ae2e5dcf4bd9de05f764fa8806e0002fef5d0c186650255ff8df0e13d903f5399204dd8a34d2049ef22e92c1da4e104f3dba8689074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fadeee585b4bd1d44432cdb8997c4d3e
SHA1c158a7e474e5aa8b9b922ad659c6b57e770d900a
SHA256fa8f8effb785d6b417599c2820a2803c2af0f12a635a6e87f6d6a48b8b0b3dc5
SHA512006931f4f40ec39cf6af778100cf8819619f2879e3fc3f6a7ad718ac6883dd980103f7d87c7c08d54e3ace77bdb71a45da983e084606b1d855778a995f54860b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6f10ba110509a665e0ea21a8be3db8
SHA18baa5c9a24891f4eb1e28e1b87a1759f016291ab
SHA2561f888a27eafb818ff9d6d4af40297bbf106d8958932189a7fd37704ad0354c18
SHA512402cbdc8f19b204d18e1d02e6aa45dc788493dc5ed75505771bff7df6e60a9aa0f1c7d19283c6e13576b90053daf885b9b3d52d70d7bb9fc0cdfd9c5a2ab1b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216dd6c3ade67a852ea54b4e88ecdf28
SHA1c22f701872ea9ad79b5e5dff3b621a73c3ad058f
SHA25660a3c426bb52260cc07e7cc4f64207332b442d65fd081ba19deafce368083058
SHA51280a4aa94c870f9e7787d7a4fd561d0364ac4ea82c2e42dcf034cfdf15e63288b85b527fd13510731ed1f2c385c828d598c44e28972baf77e3e0c006c82e4ea9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c25d1ebf3baf0a44a1b4adaa67c6136
SHA16ecf3206a6ecb1eef915386be7b2f127239fa120
SHA256e4c3332452b3a91dbc21fdc5ea256ef89245d3a1522714c9d182ec80e2d34f58
SHA51216d4bee2cbf046284f0edaf8121e5319e3f6e0de1449e7f2bdfd38eaba99b08b9cc759a05a10ced05ee11bef944e32686559cb529f7f858002c8e0f62c15f42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51618aedddc59bd8ee118297a7b889acc
SHA13e652b97385d90a5762886949ee804aed30763f9
SHA2569e09f3833aafcbf498408d5ce09922743c3387a0177a97a78689db1b2c35b9fa
SHA512cab34fb54347a6e14a3552327b1df4fd6834ded24756949e0ac991eb1ba576aab9ab066811454995fbe3fd8508ba05067ea3660c29e1b53680d86599d20756bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75c7fa9b3c20f0d13a5b5ac14bd495b
SHA1315cc4f98f5e80b84a7feba4c2354f3a4e1406db
SHA256ed2639ed5dc54656019e30fad145f2992c47d5f6679efd05c6b7788a5d0d4bb8
SHA512b4dbbb7d68f5aa1b5aeabcd764b5eac485acccd0d59b585f8be13dbd259ba1cd4edfa5556e31126e48ceae17ff2b3bd40b5828f331d4dafcd7b90b5ae4060177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b68bf9aad6464530cd94aecbb4faea
SHA15a399c5e5eba28f91587fd33ea0344025e165d49
SHA25677539e85302e0933efcd3fbe67194a7bf2ba9eeb958e2a5c51829a8c3338d4e5
SHA51242b8ea54dc0b40243ae140bdeb6152ecdfd4a09541ed5d8fca9227931449125f6708ae2c276676d3a00cee57ba980cd8d14bdb0d3d87b42ae955e82c37f9b520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa4c43f687929d9c7836f1a8b0fac8c
SHA1e1dadab5e19c36c036417eb2141071172e755f2a
SHA256eb4cc4ba5f0482ff35549e2bad967b944a0afccd519f7862181ea709b3554cab
SHA512b67ad08aec64c3248d19b098fd2ea0f2eb69d6cca982c980b59cbc1b014cc044e4fe3fc1862497f10a8edfc7643e98a551a9cf2a65c5e2eb25e8b365e6ee4946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca6a621afb166e1608363faa60bacd7
SHA185f8ffa82a902fb0fb2f08155322f003052d6152
SHA25646b4d93ab11cb16bad18ae1385ad6f6de1977678787804c68047c2a7ce0188be
SHA51276e6b607e3169952c5ff3c350c03baaf8e1d93530bd5ae4da2cb7c3dce5a8d6ee6675e4a8994a4366f10a4d02c4af86cc8e7992d3c96c8c11038eaea3aaeafca
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b