Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
972056cc36f6514eb5205c2b442a9a9a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
972056cc36f6514eb5205c2b442a9a9a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
972056cc36f6514eb5205c2b442a9a9a_JaffaCakes118.html
-
Size
14KB
-
MD5
972056cc36f6514eb5205c2b442a9a9a
-
SHA1
32c173be82089650bcc16cb2287d101202f6bc8b
-
SHA256
ecc18687848dce155b44a7e5dccbeb68529d2f981ee5da28be2f81ea1a7db9e5
-
SHA512
f330442770617731b9dcf2de593908a40339dd7d65929cf94dab98136d8a7a74586c356bf21421122c66dd71aca3c6f0c17b8086a7d1104cece8ce49882115d8
-
SSDEEP
384:CyibqnQXB/tVypmFAi7zy1wXM/2SJJoMgpIXAowOV:CyibqQXh8OAi7zIKM10DyVV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423721316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC2319E1-22EE-11EF-906B-FA9381F5F0AB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000896aa85aa2f7ea98064fd6e2df684a7e701759d197a9b7c7703a231f1eba302e000000000e80000000020000200000002ab2c3fdeadffcecbf2608c66fcf057b39a6c38a6f032117bdd4430849480fa9200000005a2472e9e41516f129ab65adb5d160430ce055c832ecdefbf6eba787f1c84103400000001f72ebb4543a76638c6965c4199babd36c19543c9cb33f5aaddfd944424a0c15f5f641a50ef2094ff8d65e7ca0b4122bdf9673443cc94182aaa1352e2a7a3fb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f1e7a1fbb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1664 iexplore.exe 1664 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2832 1664 iexplore.exe 28 PID 1664 wrote to memory of 2832 1664 iexplore.exe 28 PID 1664 wrote to memory of 2832 1664 iexplore.exe 28 PID 1664 wrote to memory of 2832 1664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\972056cc36f6514eb5205c2b442a9a9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce177f134f8a5bc39cdde567f35dc120
SHA17d8b13a1dd4aacafc083ea864eae23e1506664a0
SHA256c111dcbc937223718d779653e40ce8f35f72364b0532b5168795fa9add8147f5
SHA512e9b050fe8f68747f2a07c88638847d24a51333b5351af2c3e0cf84c6e15a85c8cb27e567f56277bb8a8cd9714caeb1c07c5159797a7f2d08572f01d05edac851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c7df1fc833d3b7e4a2106aa9dfea8f
SHA1b9d61dc392f3fa9946c3a0be4dba083ee6e65d3a
SHA2568b0cfb7d2a2a043d26cf6271b2fd9dd29683ad9b41d0b99ebfddd143c6d7d3f8
SHA512349c985aaefebab11903039d841b8c9a065ecaf8112359dc35b7aef969b98ab126baf9b63b927e2635ef39cb0c83bfa53a15d3cc3d4c6ca6ba5a26cdaa24bc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db242d370e4ae26ac1471ae0f731458
SHA196486f6fa0daf67973d14fe1bef8a7ee23969664
SHA2560a2022145b931ebe90e174a7430f93e29868bf440f3cb9c2de5413ce41c89413
SHA512996c5c8a89cff47e9e504094c0199a9a124dbe49385c8509068a560bb5f1f8997123b6c329571421deed15664907d3271b41ec6216d8b420de1a3e97c19e2072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d7ab07ee1ee9d5896c7644835d3aa4
SHA129900ff02395c06efe5c46854195997efaf27832
SHA256be0d9ef57bd728fda9f01ac93c167fd6f78bf11dfd4986c7d1340d696f1a882b
SHA51203e7404da70a05b969f269e8f21d36feb59b55b392db97d9105cd8d1987a29e10e678d4c282f3a19d08aa02b051444ffd06040fdc1a8f06b5effad833769b19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c0df1321fdcae521367b3081a6c7ac
SHA17717a32c47af2a9f28910fca0d5989366ff2dd98
SHA256618be594c33468f9c86f07a4f3c6279ca7c4f1e6d60eefb3d0dd604d5b94b3ce
SHA5129bae98bbba95d4b1b9aee0b049712603cb064bb5af8b6ae2baf492189786e114667437027eceeba5e187ef37b9e43145b863bcbf38713af3d631472f7293084d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be59efae20dc1c13210371b7c01320cc
SHA16d2fd7e504d1ce82a4e93e71ae4f826600a79276
SHA256c4c83b2ae5b091340f22ed01185ee2d25d7781a7d3db217fef250ace38d174c6
SHA51273ade0f05bcb15d386ddea590a272dba2f5526d75de1d33c8eac1e3804f13a4e25b4bf593a6eecad7608c127e0a8032f33e1b339d7af992dff04714e6d0a5dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee38eb5ef5a9ea16c04061d2647371d7
SHA11aeb7aba898ceb455368cc5cef1a3b72b131f3ca
SHA25675a9019e173e9a9a72929551c3ad3363897ce5e49de12548fb9656a9f83cde2c
SHA5126adce6024b1cf6c1f7ecde992bc8fb65ab96578b780dd579cf6ffd577476dfbddaee6776b9ffc7fdfcec9baa37db2687497274beeb18a64a4217ed61abaf6948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea850e625b643a1b3d5eb45fdd481c5
SHA1c6629c6c9d7c9e54720c6bf794c3c787599fa7a3
SHA25639294b7bd6bbcb36fa3bfc7f633d8d19609808e768ccd2c634076e25ec1f340f
SHA512986a7de283ff191da1853b0b42abfbd8e4c792d49710ee130dabe0573fd2fcce6f133755bb8dbd593d4236f6735e8f829db928b232e6cc81412d057404e1165a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f5e3f5dbc246a6b29333304be981a5
SHA1748a87f04a44866e26a1c1ee2bc9417cadbde3f8
SHA25617f2b6e5b4ab5159e51a7311df6292f0e3f2c2475b263bb3faf1d7b32e2fc888
SHA51283abcb91bdbd16547a213789b97e5b0c68dd2d0c338de5886a4349428c6adc9ba30e20ddf3151cd55a4f9837e0a81d083e949e97c2add377c9f779579bf5515f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305b3a82e91c6d73f9fc33942ad8d2a4
SHA106c0ab20adf264f0765484a0521743c5ee0d5aaa
SHA2565a290f628d5b1bdd203c7fd5355fae260152bc70d6732c3dd87f4a0b7546cc5e
SHA5126d9b431852d27de4e6f6703d3233dd68014a3ae4820ca39509745addefdcb70341f248061c2fdbb535e80462c8168680bc4737433d9ddb673e3b1a2f3ede07f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6711c0ce92c6ecba0c957494bd8749
SHA17709560cc95e694ce87db1aab96e05a4acd30fea
SHA256ae91c26716acc46f4362bddbe381c8971b1b35d018d7650f864e7591570645e0
SHA512eb588b2eeaadf5c48174554255b280cddcf973393324e9276a544b16d6104338c620bd46ab7714b8a03fdeae9d06667a2d0453ceed6ae9cb84a8eb410e08eec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59673eb6129e99c39189c6451ae03cd1f
SHA17b2fcb3715480fdeeb296de4d045f2bae2195a33
SHA25667c178bd2852acb330f6b7a57c96352e6fdf5af5068a5adc0d003edac9dd3420
SHA512db95fece5399d6794c668ce0bad976ea00679ec311d50fc673a1ed66c391e66d06434b5583c67b822860e7907d6771f1087c793b34eaba005c6832c2bb9400a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50379babf13a27ac9096339ce2bbf7538
SHA1366bae5fb1917465b58e30acd6b2401e4d85c813
SHA2565c7825c116f65035f41dc9bbea5b46cb2433a43a03c4b8d7a6b584f7d33af36e
SHA512e8e46e61ee125f79dcda24183439d028a81cd729755e667a4f5deb0e280b35b9f5fdc07631c25b9d524c4378ce4e8fe1de8dbeff8b199243d43d40d24312b717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913bffeea3991da305ad0fd331435655
SHA1c00e2c94da21994e9853ebcd0c3e5e9c09e3d154
SHA256326fb107c6362a20bd9961908943a04622033f37ad4dac3bcc72541e10f34b00
SHA512eacb60f045d486b7cef8e3293f122a440d0b3991a6a8e07d5eda76126cf9952ad5228750952d477e5b3be90b09b1a4f1e2f65c6a8a319f137e70c27e29d1b62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57cb31939c38f051d6f91508d686158
SHA1e8712cfc40715e67ea02d9dc1160d84fb679be15
SHA256428b02af7d8d9d46872d026509ddb4d5ca369f37760d81441ec8ea5ac8ee3164
SHA512f9b1327120d33dfb3f99858e45b58f23a153bd3d1e1cfb074b8c307b345fbc6bb5341d78766a0e5d7a6d7e5096c224e9ec5dccbdbf73fba891bcf0f81df59384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effd12263dfa46ef6a80e8d637787389
SHA16a3eb3e114b517032c3bcd0609a9c09b762cf203
SHA256053df16272f8524e16a3cb09ba8b7c18c04ce19718bdadde3cb13a57270facbb
SHA51299af143beecdcb5ad69c487fad4de0805242b6404f97ec826baf9f309f7e9ed3aa72e8d5be887c5ec29026420a43d7e0d1aa6a98cd6dfc87b898ad47173bdd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19c7906baf8997e9a91f49519b47da8
SHA1cecf44f607886e2006e8505077bc007768348b7d
SHA256c272ee90603ae390083380075d3486e0bc435c7c15f1622d8a211f65b874604c
SHA512a728560c19f7495bcac44e1c04a5eea0ab86c25cf2431129e8831b8deea2d2f075060853f456d4f8c9b6f343a5c2c71d5943c1dcc221899bf8be5b6a0262a2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9ba20d7df8ce75d8522c6ce675d130
SHA1cee3311934e423911b1489e9cc1050558adc08a5
SHA25686251070778dae00480e55d533ed0c6e99be2b27565aac8eaa0779fef69af893
SHA512d56ac0c71c3755193c64519c6d873040936426a49ca0206c653430f832cb62b160a62dd9651f0720a7d3ff3d7a5c0bb5e965a8181077e839d9bd9d1db6caf9a5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b