Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
ab991becf2fa879177002a3f758f0887_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab991becf2fa879177002a3f758f0887_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ab991becf2fa879177002a3f758f0887_JaffaCakes118.html
-
Size
42KB
-
MD5
ab991becf2fa879177002a3f758f0887
-
SHA1
6a8d6dcd9bd02ad54320efa747218cd3fb3b3e02
-
SHA256
6760c158af3a0f479c91829d3e4b2003371fb67fbac21dec120e2657aa3c0e5c
-
SHA512
8f37a5f5de77a697663d66554faf76327576ec9890303e3ef0993e5bde8a6d115d646f29addeb2c43b1403201e2b9d28cba06e1b9b606f8a40cc385559fc349d
-
SSDEEP
768:SNsTxbbgv0GO4N1Ctnz9qSUKGWsmhU0fScFd6I6vnB5k:SNiBbY0G7129p6I6vnBy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13DB3C91-2A97-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80259201a4beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004638ac6c3119e644ac7700bfd0e44c3e000000000200000000001066000000010000200000005ea3472ef03c76a6fedea4f43bcc257329c4e14643c108c247ec151e241239ff000000000e800000000200002000000048d92d362f636df72a2337d8d1016435f7a2b038c97bf251dd72a4cbb00e88ce20000000ea48bdc9431826c3ce1eaf890cf4ff3be493e31ec45691bf22a13f815d2ceb9e40000000bbcea5bd4f9df7793870693f4e0d12962b161bb5e16f2034af7930ff0883612d64c4b707e65d201e85da42e448feff6996c02b0863180d4594f9ebc0eff48c55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424563251" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2912 1984 iexplore.exe 28 PID 1984 wrote to memory of 2912 1984 iexplore.exe 28 PID 1984 wrote to memory of 2912 1984 iexplore.exe 28 PID 1984 wrote to memory of 2912 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab991becf2fa879177002a3f758f0887_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083389ed8683c77c7d8020c6d84882d6
SHA1d361da9207e78248c2779430a3e967e029b38730
SHA25679aa06e2816de5638542990ab238a9b43fe865e1c7c56da6355914d08e39aa6c
SHA512d99fb384e5b3c5a49d326ed9202d855072accd3286c0eb487dbb62ae4251ea75808ed2bd239259c47516c7b1b46516c1750bb33389e1ccd2d3ed4bc28d0d6878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02d32f1e0a11face4265ab7928b3de9
SHA1f0645cfaeb38617f32bb227d2e276a1552deb136
SHA25699d01c6c5a2538cb4c0d727df8975c42e8c8bddc805b210c61b32efd289185dc
SHA51290c5ad248cd770e2bb9ad58f75af0d0456205a8a308d704adc7aeff45367cb6e932c623f359e31d204d66f49188a00632041b7751a962d8cc8637150cf885690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f10f12028bca03b79100322e8442d5
SHA141a8171a79dd7f8ced0a8dd5cf629f3e8aa43ad3
SHA256f93a2f5321b655ac2a0056f011764904ce7fcea8538b0d079d97974d6b16d714
SHA512dd59cd92e62e8a3bb2ab8f16386c916d6ac3688e7ab00f9aec965e09aac0ab2e305dd6ec479596501ca38029f0755f46caa2fe5d1a5cbf76a1cf78139c9cbae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f44c819340f0aa1b289a9b8cf03025
SHA1a292ecde29169267df2649f7a2e4ca684c32006c
SHA256ea3957c71a380392938ed8a8a3276ddf1a6ccfa1f1c751cffeefae0ad405382b
SHA512b16f596ded8f2fd61f7a74a84168fe4759c2d2c3ed4b1d7311a8b99661f283723bf17ccc8caf83942f7a7a2ba9abd69f35fa15132ccc7e6766f6d151b5d6298b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe1154a0bca79fb8c0df6800ba27e04
SHA1ea6266c470bb10710cf66eeaaa5d579b6d60aaaa
SHA25681c73551ac8fbabc054da55e2d85e77881dd975d81e96e8026ba989255fd2c18
SHA5129069bbac5123c9d397af904f365bb34c45efec9589b6e4b5634070921841423a81e3072d70d13c750e09c66b366b147644067c3f12ec234ebedfdf810f37b0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d1729ddc3e09a9048e840923214137
SHA190958895a59c9cc1ce6d3b956f8a25cb7475845e
SHA256eead1fe64d50089853783c5efe2181d5bf47f42ba4e7bef299b054cb359be28c
SHA5123031efbcf33274d7be74efb619b8801eb8ed60432ff924a752fa1f9f1b4779c4db04d33e30e86f2fb2f3909431f9bf1463e4aa5911f6eab57b11c694bf62574f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca13e3ac52f6d94107461845eb32a5b1
SHA17ec92a8eb822c40eda4d538abc5beaa5ca7cf886
SHA256e8a2074b803bc12150eedf03d9aabe652eaca976f56f11cc134d6f082a8f786f
SHA512e1354f114926ac7ba972606de8d4e13c2be418d9826e73a1d1975661c14a1340296a908121f138bfac5fad006d1ffaedbfc7c4e3ba4dc84107e56435e73ff1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb56555bc7824caef9a28d334848824
SHA19b6108c0b6c22c6d7e4bd654f620044410bcb49c
SHA256ba8b7bea4805670de74105b0228fdaad145b5b183f0edb9c57715d8db02b9483
SHA512ae2e46a52e8049ae6e35d0e1a993c68cf2fd7572d5923885850df480c7fb3206104f01814a974909700298a7e2c745e310817ed8bbef476a4ad50d1c89da03f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54406df579f958230915029cd51b83468
SHA1e24e3c06462b534bcf9427608704d8948d8c3cb4
SHA25673670626fea1f01d6aefc5fba9812a52b652998823dbd2d8b7eccd2ad67ef664
SHA5129a931a5ac049491f41a228d1ad4d0351c9f53a9b743093d44d8e6b6ee7382c1e29aa8f526ea567916a84d90a36d7b53a607014b5a23b085023678f1ffee3a926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f4cf266d64504b235f466c2b4a865e
SHA1dea271568de459f23ca0fbdd2097bc9627754596
SHA2568902a27cfcc0ecfe121f8714244b8dafd6e9ae909eed8738ddebba23f5ce94f2
SHA5129a357c248d0cefb8171c689d60ee2713c86f411e788b55577d31b2b5617971adb2097ef270e04e581100f669810d1a8a40b31df04c0caa92df26b310cd60a8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ff656603dbc080aa70c17c111d1204
SHA104ead3f7e78e9aca95f88b92cbbfa8f9d4b752e4
SHA256f3a29c68454e1692989a03414183f4923f65047510b5e3b6e54adc3bb1dac8fc
SHA512c327f1f23ae6ef125028987601577f6d733e29f575d4a6bc67ccc3c090d846a8f7ac448f5104e8497a341237c1c3ea2f6e2fb3681d06a018f707da8dab6d78b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5ca32e6ffdc063cd671bc42fe0d0d6
SHA1400bf8ed2dfef78e5561650188f2ffb710104a7d
SHA25610eb6a8de8be99d1224a25381739a8735863c12ec5a18b00665f59f20b116aad
SHA512bc6203a0597f865548c51f41b83906763a3204dae76fe4ed1d6518b05a762bce10a97b4f33d22d41d41c3adaa51f46290c661e9a11d12b01db06377ce896e0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cff41df5bb60feb3f78627753d92d8
SHA16b7c10020ea0c8744b1803622ea1cd8cc22542df
SHA2564314c3e20d45c553f2989346e9cd3e713ee175f8ae1da2a99d149cfc18ea3682
SHA5126dd0722612c6d6da278689b86af0c90316d1ed12030c001be9d0038acddc3662bd288263e88811bb9b94096f6681912a770bf2efe1ff41970537622c5478b0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b3a44f303d4095fdbd6a3ff8d54649
SHA18dbdd3ff975c71c7261ab17ce97759822ab7e975
SHA2569eb50f67e497c00dd73b57669fcdc5587e57f87466ef1f0dd7b94651f78c456e
SHA5122bc6f19e117ca64faf8962901cab73b379ecca65520e3525143e122875e0970c9542bbd71660f4f4560af6fcdea6a70e7d322acea2acf0d8cc86fb03ae70d068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a52b644e803eab7f99bcfd4fea0c78
SHA1f6b56225f6a8bebc037a35c681960295eb8ede85
SHA256cf2afba67fc689beabe105118cf9dea5e187deee548c167fafc0519600b62f06
SHA512b23a611708cfb828d0bb57c46a04fee5d635a2e33b191b374a5d668384b2f66577256db377e627dfabb87a98a473a1e19a66ccb55138884bb795c43255de6098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2b9d3e0b8e9774e9a9545e4e0b20f0
SHA146b6713af38982165b962bfc38cb0cdf66fa5f39
SHA25665868eae8995e846a7579583c0c5f538e04f92073b2e9146667cd439409e577d
SHA5121eb635ce8c80b15c40777e1962ca55d05e53c06b4d70a2dfba44e1fdcdee6ef7f0c1ad9e7fbd5427bed1f14e965afd5cf37a7ccdbb588d15eec2a14bda6a5a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa80a2c54d77abbf340188903dbb7de
SHA1693857402d0df9d4f58b5150ce996eec9dc64209
SHA256f27084fcdb98676bef9d268107b28516e3e7b48654fff24ad0ba66760359c19d
SHA51298af3d8bc5114d9b11e1dc07830d25ee65ccb1d58cb6e30c1afbbb5f19620676b00841b5befb11c69b7a1505620dbfde5f96407e438b5654a612ee9179be3d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af98673fc3579e45c6c7556e96a7c808
SHA1ae78c387af37ca64c7c1e5a710e74573a5658265
SHA256e50f259335cc967ca1bd43ee611ae5b2f2a8c587dec5b1d856157e7392b2e0e2
SHA5122f055d1fb1deeff182a2ca6efda06ecd6fdb05f830f30b327e1f65768fc71de7fab4a6114afba5941fa2e1b5e9347e9adf447d13f6c81826459842b1acc61834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce97ec1a67c14bfc60851892b1788d82
SHA113d23e6f6ea188477ce0b46f7531f38b7eb1079e
SHA256adbe8a61e6700ab4cf449ef2a4ebbf3f87a0c43e896111dae7b451826bec89c3
SHA5127cdf2da5b3cc5b5d6b832174e5ff09d8238cab3c2d0b0189ebeef05b5043a287fb4909869e5a3bc080a9efca3e2e9daff1e943310eda3709b0d638c829e46801
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b