Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
968876cbfada845a8002cca3b546b73b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
968876cbfada845a8002cca3b546b73b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
968876cbfada845a8002cca3b546b73b_JaffaCakes118.html
-
Size
2KB
-
MD5
968876cbfada845a8002cca3b546b73b
-
SHA1
2bf459f6875bfaa17c07842cf7d9d936e1b6a93a
-
SHA256
e80f8df29b2da1ff7acdcdc8ef1742aa00f8adb4744a312ba8d7430d783bf4c4
-
SHA512
4b7e8ce60511a86385d8dd5a3cc4d69099a4f0bfc251e2dc5f753000f4364d7d8810af249f2c07f8c7a5c5b840bf6d89c48bdfe44051a0736299c56b6fa30b76
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35355F71-22C6-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e3e209d3b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000b15988cbe092c736ef094a17c9d72aa1ae8bc1bc3aff604223ce9beaeae102ce000000000e80000000020000200000002e52794612f25dba76afdab57db90c986abdb6a75b5e78553cad9b04e793224320000000e2c887c8d9ae32e9ff0d7b975640a1d2ac83c0e0f759f9453e48b262ea0515d7400000004d5ef7d8a9150d85a8fe7b7a2ca848ae24eda3488809e331f1d87fa1a6e7a8b2afa39396b5084fb64115af2e1acebeaa06d3a1f7f5ba6b8cbfdf840f307ea249 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423703884" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2184 2212 iexplore.exe 28 PID 2212 wrote to memory of 2184 2212 iexplore.exe 28 PID 2212 wrote to memory of 2184 2212 iexplore.exe 28 PID 2212 wrote to memory of 2184 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\968876cbfada845a8002cca3b546b73b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a00d9dc493a030bab88ea1720ce909
SHA1aba4a02d61c54e7f62073bcbe88553719261f5e1
SHA2563b1292c077332720b96c9f8cff58d616da2cf157861bb59d300adfb0e4d67c50
SHA512f9ce1ad36c068b6a410e1adbff0068b24040815b0ccf2b944c5ebac41d651da6a4bc1b2c86e3592bdb450926611a63e033a12e45948244946ebcfcae18207ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b939837e4ce9a1deefd0db85f18e5f2d
SHA13bb7d0b49183b3998b06255f2ec31e66b98f8ac1
SHA2560e408a03808cc38e5a6cae5febe270c8558bfe693b9e7897aba5270ce3f15d0e
SHA512c768525a8344cef36750cbc9acb1a7793ee59586605264966dd701565146fe5d97ce150da8eebe568a592312639b3749b23b69a5b8af6731817b6d65c0834a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e624257aa972b7dd1105dc740128bf
SHA1d38f2a618f76276cc8bf8c5282c9f1670aa0d49d
SHA2560f2f22f184bf806c2f7bc6b651dc9a6b67b372792f3134b9953f763497eb57e1
SHA512df6bb761dfddd82f11e9d634cbbfbe6855aa8cf706112fb8d1e21a6801ca183decdcf1c469890b3f324b9866740395d4aea3a3a6be7abc434dbede4addf5567d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed673cfc5de5a64def7d50b56be22764
SHA1628865ef1e65b1fa2c944c1f95973745576a08fe
SHA2565a8797bd73f1c5421509cfd27c8359d9aa28570653be621a471cd60cc3ef0cfd
SHA512cc6655e99534dd3f79bc1f6ee4208052345fbc3ad71bf7df530dd442c3cffc69cc2a09a53c91bc5598ed4752b7b2a5142d83c63caa01ff3c74d93e83cc78a898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fd3f85211c9be0d72266f107a44bec
SHA13b8cf5d350e1432ba42a946eaee2276a8d6d41e2
SHA2565567f16545ffa21b924958eac3ea4406a1e329b3e78ca5400c5f9ba64a240781
SHA512331b8b938862a11477810741d8cc06000f72a7065cf23baa66399589f8d5d6ffaefcfcfdaec6b2449c7bd427612854d1e239e72dad84809e6bc6b095faec2f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0416f12e54fbe7e83f380c7be392da8
SHA113c96806e737e7943b425f93a27ee719b0efe062
SHA2568b6065c65ddf36f8b009953f5d62db8208da9bec97bbf3b59cf584774c45f0df
SHA5124bccdb59d200b5d9996ea382e86332608dc7162eeee12e18707aeea4d8272261930f0d7ebde0b1efff2e2f6e1f8dab796db0539ccec6615f55878be744e0b408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a01a362d030a944fe4d0ee9506071b5
SHA175bb22b17a4f5a7cc76e401355915d1abe1846e2
SHA256c4b930bcbd8a547b320e927d7f3cc00d2c6e066f5a8aa06c78ecdadbd40ff3c1
SHA5125d5da85a4f4aa9705cc0b1a992b1d89da5df42b945b1a897ade50534f99fff959d8c1ba2463b86b914acd4f5453ca34210aa5f08e9dfdc83e049a96bb84ce0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b082147e5c9973e4f0febb6e4e8e55b
SHA122f88c6bfb9c62e6ea338d60d8090e7b11ec952d
SHA256d40253b8303f737351482211789beba08f5fb0146fe6a574cc54c02410ae0d90
SHA512b5362505b00e0f9000ccbb0113a26c91afad5dcdecb90bc177416ca1033d42898b5172f26808790507f3b815a12dcbe47504950f96ffacae777257c4af7dd233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a4f80e1d77114fac2d6a0e052aabaa
SHA1fb619165d6dd8190a4204cffe814a2de40b35337
SHA256de3a1e9f134beb0e02712f1acde0fc8136e6cf17a5c3170cb63bd3793fa9cd34
SHA512c1d80ff8a67cedf65b62044323c67903ff0e32514d62edea07861aef1631ccebf78c08c68a81ba949e4965922f32af5e414517b8d8aabb8359ee9c43a7b43786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507688a5f6e7a037e1419f9d2bbff544a
SHA1f3859f5ce69fcfdfde4113861e9b161275c9d2a2
SHA2561fd020f3d6c8cda59f1cf2a03f9e67f7ec32324b37d223e17b70e1b13ad5063a
SHA5123a324d70e6f06541d9bbe38633c641f894d4d1989f3857bfa780720b0f2a840fe4683496ee4be4ba4536b02f2dda8825d8ed6a6ed8f4e79b9801242aec20885b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b411e92652bbc3ce3142d20ce322a43
SHA12d5a0d310e480707e7fbb069997945d69eeef977
SHA2564e20917de55658273e0cf6001d1dbf61c01db057652f5adfef4640ea076037bb
SHA512356ff9a0239f10cfa6fddc1c0b8971f1d5b7579fd0098c5916d62db812d38e267b1416ba1ae3b5be0d8b549a2a69588c73bb8675429e2444b40b3648784f5992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59454f1981ecb0c308b9510ea98612b37
SHA156ee730b8fae53e2c47d3acb1d2a63b33810c3b2
SHA256e0983e04326aa47dd2cb4c7f96788f90ec2002b134f186e3d5ffe2b2ff717a80
SHA5127ff1edf1fad27ab7361291a1bd22eb89fb9551d8d04b9a1b76fc66f239d82f819121ecde98d62eca557d0a6b56dfc59b7dbb7b2fc32d32c7b356a67b6b9598ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8bec836edd3f6f7be37a19e063b220
SHA1ac1ae74365873627d2464ec55d930e98fe7efb4f
SHA256efe4bc9f1cb8e05d9b66a863aaaa9ee3f7322300318f07a176328c05426c4db1
SHA512a565c89af6f144af1e97f6922b3b7c1ab3d0e2ee159ac9b5fe67dc278c5ede8abcfef26135a0c3c01b487776bd12d4d9e61a894c93c8a23a64e49f0b2aa7bd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d2724e021c40351be9b001294ce8b0
SHA1c854c1c0c417e17dfe2fa8ddbafbf7c94cb8541f
SHA25619a5023d337d483cae4ca0184a809b745c3f6b9ab4f7b1ca3a3d435701a8719e
SHA512b20e42730319c6e3d1e496343ecd0ccae296089b8c6a5b861ca08a5ffa93c0d4f8309d59df5bf0ae17f7770ad7ec3d448f57b86c30204851a157860171d4458c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ec03d70c0a33e552e3ce9493719286
SHA108d70378861a888692194eaa619a706edfa49d40
SHA256826dbf36fc9de534222982d600348cfca716b582f3e20f2844cc8db5a09fc12f
SHA51288e4cbc2a57cb6f64d7efb01fd5d380a97a9c55ca6ccc505f35bd7d261e29e4d161e1a17b19d69329a6a2e26f265cad7847b11bfc24897804497348ba60eaf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c653c73209113179b7cbcacb8e3019
SHA1114461ddacf717b17b75ec423c360335cb6acec9
SHA256f78b71d6705482eaa8172c1b249ad65a262485fc30d8ed2b10a37bbdb177b23f
SHA512ea769b2f5c643c4119441182f778988dc5d4e87f5417d77c536fba76e2af38a6deececd253b60f5f81caefbbf5dc5d13f7b36c9d70a076baa33acf5a0700a69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e1a66fe257f2cb9d0e1b78d6c8a420
SHA1f915f8ac7c55f2645e6d43fffa369803b9c1f87c
SHA256223edaf8b21efadfe31a3488547aa686c59b6a01d4cf3bf8d9eda51329c26965
SHA512b239793b08ae78c968776e48a482ee8d397f5cda4d368eb90c5923a248d50e07176ac910f7212ab8fbef1c6356ffa10fc72100c7ed07f520cd6f34801a3f1ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf6632a1bdd2458651b8a13f9aab32d
SHA1ded0af33e61fc3d462c851938487704727933d80
SHA256b10e4c74a638361a4bf57a678603bc07be3cd330ed4e5b2b33aa98f30cc4b7bc
SHA5125716036396e037977df9cc2968f445a090d8cc1a1ab8a40bd7c22ea51db40c10181c5251bf861bc64605018c4abb4c8589f7a72bf7f46e9199c3cd6d30b5fec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0cb6b848997ef2947a707bfa446be11
SHA14e3c0deaab549a97a14db99f9a2ceade87489d1d
SHA25620abb6436e219bebe2b27b189cb6615fa431ba19673d0f8e34233491b1e1b499
SHA512d258175a2bf847b6ac7cd94d40d2ca66da4c09786fa4648b88e1ce79b1ecbb52b9cb68bf486e35a9dcb5db38c5e72bdf3c0a2f9a962b8f234adf02b8f5d67763
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b