Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
988645b92a4240b13745bbf6827decc7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
988645b92a4240b13745bbf6827decc7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
988645b92a4240b13745bbf6827decc7_JaffaCakes118.html
-
Size
460KB
-
MD5
988645b92a4240b13745bbf6827decc7
-
SHA1
a7fd7bb704070846fc4cde2722a0d4bb5f86a907
-
SHA256
5a04457ee366bcde0756ad72f641d6933f547c69f36578b62bc1470b020473d5
-
SHA512
7917c4565111a584b54f295c6233b17f15435796176dffc411bc0b5b3426e4365362c820fa56d443bf73e935357dc691bc41ff8688ed22c99274f3084c3c1262
-
SSDEEP
6144:SMsMYod+X3oI+YX6YQtsMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X3K5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423764509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D24A0D1-2353-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0849d3560b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d392972e7cfe58e27dfceb416b51dc2135ace1246c1ca84806bc60f0976155b2000000000e8000000002000020000000118addcd89c9859c7c46663149197239081d98d315db0f155235f718cc5d3a65200000006cbe9e4f5712d968de84d80b48f913af162b2ba1564c6e38dfe7acf51e1fa80540000000d65e9778bd70a4d286debdf3ed6347d8dd8f04ff43e29aa273059f468e1ea9eb34221ba5aea990c0489cfce1359dfef97df76fcab81ac557e4f6699aaa33a6ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28 PID 2248 wrote to memory of 3000 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\988645b92a4240b13745bbf6827decc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be757f3db28511130be31e58721b4584
SHA1a8454c1d225f142dfcf5e16045ec94c5e5f98d2a
SHA2566c090087847ac71a119e99b3a5995911f46841ba550fd4ef7444f71c31624378
SHA51281dd7e55d5c32b4b2b5b956ef06f6f9bd7f1e3b0c00c50ecc0117bc13541a937bf2925f2e64da7caf4122d9b136a47fdd05baa242233c100768f4426c771b71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3623de80e7a6f04ddc3f13c206163b0
SHA12ed976355270ef333a7a99a5a27f1b5fb6e1d840
SHA256cabf8b34babf3049e9420fcc1bf7f96cc414a12b7bdb60b34fe0b393f3053e2f
SHA5126c2c06795dc49d4fc628f221a06b87a37217c21f357aeab1afbb9d33de2d47ff40d54fa30a89205491f738da0e2d3fe400076a418686c8508359aaacc42ea6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62ec62a380aea4a4f256ca4fa0b1146
SHA1e70799a372e8b5fd8898b235e7394d6fe5d4729b
SHA256cc2463d0354373e6964553a9918276bc49d9efbe09849497d91b9db534b8204c
SHA51255e6cfc4e2b1eb35cb0ce8a29c9080ace62d17005cfe2476d7a24df136b5cd5aca37521cc802ac43fc01e505f297c78be07a6a0832fd82fd3c1094717fa3d73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460d12b66f1cc97cef8a1709d9b01687
SHA1155135c2f0b7096d8726f3bfd1f1aa24b3b6207b
SHA256d88d83b5a5635e3a12966aac2a42469bcbb0b9f920dcd49fa28eb61dccbe7e3f
SHA512122383928471816925f5fe79c39177e455d5063e9542b12d208c4f08e28e0134ee7e78212286d60bbbb4000d6944073bfb0b680091f57f55d51e42da66d8c75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be203153025268ae782792164a86cd9
SHA16e27c0375b3f60f246e8d73d0749b3922fd4e221
SHA256416db84272f7394ec435a7dd44ec5eb164c80a35e4fe0f714e0896c26c0bbde3
SHA5127a888b7d2218e8c65beb1069b77f893259fabc13a1f758d695f4801de340f0c39ec3901aea1dbc449b05a7531be23c1c656c0a1eb322178f055f66b1fa40d498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9d3d2576401ebc126ff548b4bab8cb
SHA1536a387082cb780e9005d169a959dce770dfd489
SHA256c5e7bb686e0066ef35b61efed5b440be7b0c4ba4b30ac3f2e40d4efc66df179d
SHA512707802aa5c27c22667e42dfc9206b03eb35d39f2867f318f916a0e158c939885e4d4599047d490da426c096b0fe283f437505fe10bdd1e411dc271fd32faa915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50902242e45a0e506b3ad175761766d90
SHA1aaec6841471e121582ffc0c7ce916c9c89e291e2
SHA25650ef6d87088fa3ce9efb7cabec32ed126b31891fbb5628a797cf21b4fa9313c6
SHA512f53ebd4eaf81b96631b4e43038f11819ea6f6403f52e6bfd1678597e6574a6c19b9f17eac85399268ccdf731a15b3d3ab98808fa25b3af09b63467cbd0cf827f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e35a10bbf70c3f60af60e35f0426ec
SHA13dd6e8f9e90ddeb3790ed879438a5cceb57af5cc
SHA2561c2243f9f59d74940a14e0ba2f953d9fb0c65be5b16ff308cd5fbeff4e333772
SHA5127993db434d9b8986dc775b4bde03c48e13a42b97edbcf1b2bd8fb45cbb89a8dec2edb3c8f9f4e5cf7644de1e2cf8aef5025be7f77070eb894f6cda376ffe3a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204ab06b0fb60926f8113356817ed812
SHA1ae2eb4113079dfe0705784d5862941f1c0bc5bdd
SHA256b7b49c5cd9014e400296f5f3df2026c757cd5160a0309ecfbb816e562c762b05
SHA51210ef42fb51cb4dd2903ee08d59227c90fb62cafc07ffc488af78019c2ef2de4108fa7dad83bd1b879a5b9e362e4327633e0baefc2a3b4bd54b522c99606fed3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505585107beb20f793b0435611200f563
SHA1a75fe3f0fea3b43f2ee1f745f451c80c96c4e7cf
SHA25601865a0e41338092a8e9733e4dfa143051074ab566851a7c80f297e261a7236a
SHA512b296267508c8b6a238330069de554ea48283ec59b507ab31f62602f16064e1399670d30a3a2b8c558f2217fc6352c1ebc9f82f75a3f9eda2859dbda39bcaef60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b527f89f4b12b77f80dd1a4653840f57
SHA178d651476599c69e437dadfdbcd274026e07392c
SHA2562297436fbf7a068f2aafa43e6450c244d96d8e2f0ac92e8b731641f0e0a303e1
SHA512a2ff4449d13c1b9427528bedbd32314da972d7c0505e831fdb800e46c86474be4af29cb7fd97617c386f00358ae6b593a3a7ba4de167e4bcfda66088d88d336c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5c6af6eab15fe72b78d4ec270361ad
SHA1950d0f741a0065317f7b7287f9c4df94b02bf5b1
SHA256dea4f4860860eafda2305a29b4f4567473fee7f780efd3978ee30d433fc43be2
SHA5125bffc136fb1ea4f3dd9092a2a9bf452c2b174dc852fe4f9cef2512ec56ff63fed5c84139b506ff727f904f0030248b0ebaa8a73c58ce2fa3506a4bbd70bbea81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fb7e6cd5a6a9b1348aad3345d2fdef
SHA19376e591959c308e6d2d7d00981887a9deafcb41
SHA256cfa036dc615a4274553ff472eb8c60cb6908944fb5b7e662317c1a4b08ea3057
SHA5121866e1d74f8ef4b36c926f105d6d32e01de8b4fbb6172f947143b7ce442b1ac15b7d136445bd4442515d66751fdbe2f8c3130e431e59c8531841f3d72657152a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6538eb887d0b87fef50b4b08bab66c2
SHA1710a7cf2bd5c36c66c6d2d0666a11722a9c17aee
SHA25699014d6c864785a38aae95acb1e387c35209db3856d51bcb7de328851fb758ee
SHA512d62d899875331631a932bdbc112919d4843c3312efd9e18dfd7595ff17fa0462dbf3399566b31a4339efa3943bb6ad3bd1750e288f67b2b2131ae79847d0f0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b82e242154421232ac63233877645a
SHA15109a1f8470a0c4448723aebef935f35bcdbd537
SHA2569007effde4d6508a7d2d27093dee9b83a8ff80e657c6d1cd9014b8df3f612c29
SHA512dec7179020d530d5d43ce710a970a065e2e9d4fa7a9bbf9239525975c02dacfbdfabf8907ef240edfadff63b9efd390a0c37372017335191b0625400e1cfc92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515767f49be820674d9f024f4883cec73
SHA1db2cfaf555df17f670939154ca61437bcfd769e6
SHA2566dc0c785f60fd0adc6c2cde8be397f366c2c8becd94b6c1efb00a87caa0e3a40
SHA512c1b4620a09c527476e4a5cb20451109dac6cb172d75ce4e33de43b370d4465fb2705f56111768a78b5cce4833e6caa49afbf93de0b0e0e66e7be1166c8d0cf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df5f0bfcd8ec7168169441ac8bfa3d9
SHA1050f70386a03c038c9dcde938435ef5c52796eed
SHA256108843fcd6e88d7b69c65ff08a1de8bc2b3ea5543224c9d247a0f03a12a7c0d7
SHA512ea467b0a0dabd89714104d67412541244ee5522e6a5058851b2f150c4249f6117ee2fdd4c80e7371f7c0508fe4557b5246973387d265ba9daa2d8124c91dd19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1606f58b7738b7e0129f92c8184e63b
SHA18f1f02193e5abcb27ba5fdc4c4c2563e70be09fb
SHA2563e037be3134ccf9f331c6c9994d105b93bb7136b80b900dab329e4c01c412d6c
SHA512c35e0dd922cc74da7316047829b072fedd985da006b0c76fda7b4d9fc6643f0eb3cf997950ff5f979cfe00912b78395f1a3aff12dcd59447af517589cd90ce49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f300223f1b53f48d68f3af8af368b289
SHA1c2f626f3eb6d06369e916639903d07bed92e45d1
SHA256db2f4d8178e4d1995bc7a5e983733375ce37e0ddd467a9b3756993a3e6e7eb4d
SHA5129963d97e02d5b7ddb49384efa06ed194b51002435b44a5557555eb497465fcd1812d52a5e4a2f3d32e75e75d39a71c997e903f0ee982c35dd9f1f4cf1c790c99
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b