Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
98673f0de9c67300945be0456375ff34_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
98673f0de9c67300945be0456375ff34_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98673f0de9c67300945be0456375ff34_JaffaCakes118.html
-
Size
638B
-
MD5
98673f0de9c67300945be0456375ff34
-
SHA1
24a2989f2cb5e219e465d2eebe73631f3586575c
-
SHA256
905e91b108205a5179bffc9f4cef9a9285063421831cb5f2fc9cb53aaa82d089
-
SHA512
516a5f5b1f9eb26cc2057ac5ca016265d9c7125b983915e840847654295970754510c59f5aa615acd6a2f580e45d8bdc6766a569ee8e575aa5413975ecbed034
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009aba3565cf138a49b5b6e17091c8b39f00000000020000000000106600000001000020000000e7f59c71640b498eb689f82fcb58de1c07008baad6b5e2e89a838f0a8b343b03000000000e8000000002000020000000a1cc37f427dc9dd68eb60f01337e436eb729f10fbb07bf3011fac67eafb6396d200000003bc930bc6ce0bb90930d3bedd1d183b03bc3c2dede481f42ca2809644fe9c45b400000001f809e1636f456a4402113faef80632959db67542142caf4bf1450920d576d642108f2a8f38d8e919c743facceea8e23500c603d161ba635235593ddfc0851cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80695de954b7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423759693" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25FA1AA1-2348-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2884 3032 iexplore.exe 28 PID 3032 wrote to memory of 2884 3032 iexplore.exe 28 PID 3032 wrote to memory of 2884 3032 iexplore.exe 28 PID 3032 wrote to memory of 2884 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98673f0de9c67300945be0456375ff34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f82981e676a75c7f06cab9497df82c6
SHA162d6f0951d37676cddd3d6f788d72b7dd93c2db1
SHA25695207e57789c054183edb5fafdbd2fd30d6ab2af86d48992c57627b7904bf113
SHA512d0a18558221a8507472c61eb2dec3cf0990a54f24cba8e83ce6e57232b459c05587e1ba91ec3b390f53eb569bd0c908504e88e0244fefb8fa5d26a6fe7aae97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53085d09cf51977999e921f9571f92cb2
SHA156ae9bad95d998dd52433c5ed428d1107de23881
SHA256e187b5f275641ba3dded3dc4e59bae4f58ae121898f14c06f6ea56ffaf685eea
SHA51229ef200c9248caf931e1850584e1e7cb3f9c71dca0e16b376168d6370610d5c0ce7add66bf1059257be9329cde66f043ac95b6927e915c33902df8791e5945df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e49503c22bdec6bd8119fd6dda10d5b
SHA1a939231feb4b4f8cbbf94ad827463cb5bd263a31
SHA2561b2759fc7a47a1f434c23a7d12c6953f5a24fcceef45d72683223bcaff347018
SHA5127dd431c19a2339279fd90086f2b76881bf67ea27993f970ea6602a037e5bd68dc4eb6593a8f4525612fc5f56ca091cc7cb40918dad3e40aa8822e986ddd52f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b0c64eca85228effa7d93bf53684c1
SHA137e42992801767515f78bd6e50154c9b279fd7ff
SHA256397034c52b11d5c87b171dc2e7b59e98997f7317e53aa4233b5eb0b02d8f4294
SHA51243a37257bd6f754a551cfefc1acaa1a2a7c1b4157192e71df8cbe18d0bd70a2d9995d5383a5ad6667427ee39500b105d5fb99ef7a60fbe57393cb091377ab1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa6e0e23b9b24f2e50cfa77bddabd19
SHA15c0fb0878ab0c8c1a0be02bf781a0ab5d6e63615
SHA2569e1a96c96b635adc65d12c9005bbbc7bc27ea2659d67a38a02ea014023f81aa4
SHA51284c2e989cb015218f2ecccf8c2acf8624dc684a145cd9c28d6ce1319aff5512d6ab88609bec5098d9c7b58ea0a8fe3c24acf45949b0d0eee00c0ebfb3bff0c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9346c75a0c97dccee4f66b0c172f4f4
SHA17d3298595c29fd8ed90a2b510e7c544cc032f192
SHA2562b85839c20e9acd20f194616924eadec1855bfdb9b0d54a745c43e38efc8dfa4
SHA51256ed6207dd10d5715e89c2f8bc23031ea9f15ef38a40e738d7a649ec6cd871af26af540038648eb635bf1783beb59f00bfeaf9f925a0152f301630c3c33eab8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b60f06e2a12aaa146564a9441ebc0b
SHA1aebe14297ab0cf34b3f4a923837c1c15ef6a6b3d
SHA2567cdb1926f243fe81625aeca3ae42a7a94d2e59f69d1e9bf738cd995b21600373
SHA512e46198e90a20dc88a6df8b98cedd55e7fba7e51528d7b3d458c22c7c916724d1127e7ab834f8fe551bccef1e7c0f1e34c4e66ed958449746127566c3f270e15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59935841fe869b09d6667921fa42db239
SHA146ca3b6b6f1385dd5582c246c301ed2237cf127d
SHA256d751e6069a21261e4bae88321bef5ba9f652015baf213b6eb916d2c2b90ccd06
SHA5128219d3a7520169aecfd93bc2cc4f005f3078d2ec89470c0be90aace085cf20a38542290062b176a94fab5268efb17d0d652a0792556665117860bbcdbaf57e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528dcdc7ed2534fef3d257815d127bf9a
SHA1b90cc8adf0bc91fe33c44e41d3dcee68a5fec8d2
SHA2561dc8e622992767c74d0739f0d10f3fbc2ba62aa1a5a6bed8f69926a7842677a7
SHA512644c331cc1aec349542e1f473450ee1aa5303052d227cae3fa1d38fa4dc37aadbfae120a3a6ffd2f87f31dc87ba609b7b881bd6f58fa3ef2fd79bd85dc4f4b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566735cfaf1e3121939c0d6ccfde88ffd
SHA158000b8d1104b2dfefebf2a86bb454c3a1546a8a
SHA256dafe81fdb9113926070a40ba0dd0401f90e48c2f488f9c01cc25991752ba39c6
SHA512ada756c0fddd782de72516c4e3c7ad07f5eb2f7f32f94688e179f828bb626017b82ef4bc2f2efc7e568107678e85ed535f2fe7737b763a75a7c6465cf40586f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8a2014de0afe646b27448130dacc25
SHA1fb9b5971dc4bfa99f00dcbc6c1594d236d9f7dcd
SHA256f8d667687743dec3f2cb7798c0fddfd658f1fa0ca5b27d7f9701e789b319b68c
SHA512627c6a00c00759fa94323bc42779bc7be48d3db00382f7606049c82e8337b27d48c3ca9d4804ab0e771797f1ba3b7d437e1acca7521ce9dbff471aa4b6371738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81e5dd0f08c816333277c4dafad181c
SHA17d1ec6fb6384a0dcad7b2e112019529cf0990edf
SHA256a5be3eb9eb25d84901f4fed1254437dd6d27ecccf542cf59b2b511bebd5dd8ef
SHA51247f21d1e55883fbc9a9d842258cedea978f08d2f336bb566b8d1a10935cc9f79804aed2d4ac5a1d659c588360b6911e94620fa75f7d9645360fe9d18cff4f08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011a6e7b1a1db0c2c2de270499f831dd
SHA1992a09a2a8003f6bb9cd6b3c76694c5d506fb918
SHA2562a336b8a255feae0046ea1064aa585fac2905d100e3f145dffd432a63da551e9
SHA512b85658a2f472589b0badf540bd301d05f6ed537b873385ec28e597b18d8da611b199c16f8f01082ffac880628598aad36e934ab897f3e17dbc214e47e3bae968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be020c55b447419557a5d880478c7612
SHA15da7e20ba3fa5539f3b4ea68dfd9be8ed31fc24f
SHA256ae0b42adc12a1633496450ae7ca32fee79c7ad89e612a33511deceb35c17a979
SHA51246e9dc4a8b2ff448c941b4915ecd7536715ca632843df1a7e04a260aba2338f64c5e344db370d6a0742b56d43320e0765dd27587f3c7ee14008dcb705ba43c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99e02b03974df8c960c8150c13e37fa
SHA1d71bbdd0383f904db969ea29afc5d3fe374f2dd6
SHA256e3081b057a58838d78eb5ee8519365612094dc53dde66142d72681a0ded23485
SHA512762b322cdfd1e3c464489be560f99407c0e0af93be0260bd2c3e95d6af30806ad9e6403274c20d19fc555eb20f278d8da69d9a66dccfd4e54c64c2bc71c9ed6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f81a5a3f97dce15fa7c1362c29d1959
SHA15d39dcc77b40cae9da1ee992e4999d72fdb46ca0
SHA25675f15ec67a8a88abf6cb11e28661063e2f08406309d6752698b46610c1ab35cd
SHA512ae92ca8cf91880c433a09b8a56b413ff59e1a40d7a22ebd8617b9562b67520bd18244467e04668f4233bf974a45ce783afc21b04a7104c1f416b70e5c0c2d7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c328e8e48a125eaee39ee18a45983fb
SHA107b2d18e8beb1dbe3e79888f48d8be4e86efc9b1
SHA256b1d48332198b830d0ce3a5893ca5a92f1bbad34bedece3568975d32468a67573
SHA51235543a33f94194f3d860f45ddd093a991e65b7863a84899e20637ff8b32c906853cb5a1d5071976456673c470fdf159936738e4170185c4bc354a029b6fa6a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e64aa2d6fda028c5839786e568a209
SHA10fd166adf1dfce437dfa4c18de96211fc8e16904
SHA256244f3367f04491a8bc906ea22dfe7372cd38a4e0ddd713fb876c6db1432c5fc7
SHA512079e46366584bb2eaa9f7f034751f0c3129bbe401365f263415bcbe1f551ea2b88ab2648e479267c9c84f8695fb4e324a27957c7e17034dd6adf228962f70002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de063642973bb7182018fe25de0e44f
SHA193449a83619366af7f1d9720170f5c75888da5fe
SHA25683719f5be51b58796670e5f69df10db5c5b8d4d63fb575651560ca31cb236a76
SHA51269895ada0d155b8755462ee69898821aa415db7011c494ab201d936a9273104fb30fb0b1ae9f2412de73f8a59e00359c1df34e55d667e2a2a9c1c3563280ae6d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b