Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
acb8949128fc19ff5f90866cff9246b4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
acb8949128fc19ff5f90866cff9246b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
acb8949128fc19ff5f90866cff9246b4_JaffaCakes118.html
-
Size
94KB
-
MD5
acb8949128fc19ff5f90866cff9246b4
-
SHA1
c650b96a55f3d694cce5e12ee115e8bcaa0e82f9
-
SHA256
cb5cf488547cf3d071de83dfdb988fd726b8bda9e54f4a772c1583c55deb0177
-
SHA512
32dfb9ea2fb352b0775f3582d013e7cc9d4768120e9f62f4c232889f01455f9869f97f086538f2c2dc8602ea846575544fbecae2a4182a77f7e4786a409a8764
-
SSDEEP
1536:WMLiNagE1ekCxfN7LCnDEd+VL0FLIdbomZ+byXNBdkrY8mgHC+qpEyW:WAiRRWBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3012c9ccd2beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007de314cf89549f4396556f7bc3c2d4e000000000020000000000106600000001000020000000cccad3a10ff5d79b0b3c50e8eabcbfdd61e85758460718bfa68903781c58fdc7000000000e8000000002000020000000893a1f4d2ea66a73e02e11df39e19857db7474fc3b3920c6a09fdaf42e8ba64d20000000e6e65751212d2138f3afc73c32ef47f4ad4325893609c241ab006c9ab35b13f6400000004ea7e1c30178e38cddfc0810832f1d70da82b45a3044ea51e21d28c42f3a84796fb1c7cc03d3e6b32d3e43be4e14616f3ca891023b571c352a6f2f059e4684c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424583388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007de314cf89549f4396556f7bc3c2d4e0000000000200000000001066000000010000200000002022d90a54156977d3cbbdc4cdd840dc07e3996c98abe47bbe97da68a866ce7a000000000e8000000002000020000000fb233fe10422f42682e203b33774eb04d987d24371608b8cb4976df4f59512c290000000aa25340daa51d771ff42b91cf61cba3ff59627256f25217f7dab7b74de99ed0b984141cdcd717fcc8d1ed9776f794d5ad29c4f78163b1f74f8afa683b21c20a42db76d164fe4fc7a50db9c7138a7db3310e34c0958bb3ec8df83b5f2513f2ceee432e4314cdc965696ace7e7010b5efe699327bb657161a48b6cfbe17433879803570c87f62a3fc8af5241c7248c22bc40000000d57085d4aa6c10b094d437cb9815f8a23d4d72f577063e8c7905a65277a5280c1a115e21c426464ec3ad05182f7314d6ea89afa85f0a0458eb21bb44b45ca3b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6713951-2AC5-11EF-BB01-66D147C423DC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28 PID 1732 wrote to memory of 2192 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acb8949128fc19ff5f90866cff9246b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e3b58635669c1ff600909a2eedd991
SHA1d62aa0031523c1192bda6e4b12549130d3125205
SHA256594b343cafa00716f044b73d9df9ef6afd94c1174a5217ec08820f205ee221d5
SHA51254043a62c55ac36d0d5e47b771c51be8801e1a9edd2d9242f3d0d834fc994cdeb5c3259b7180f1e2622179072e2fb1894cbcb6ef8ebc2c88bdff9b92fa3f10df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ff3070b8731d245e4ea14d31814155
SHA1e0beb4f4b975d3a2a76300274fcc36ed091a89a5
SHA25675adca44afad22b62855390ca64581882cff9c9274bdf4411f05f1d5e4beaf8d
SHA512cf0d3a4422644f4229fad6d7cf9cb699641a44b5c8d7a0f62356b7eefd4084033d427e125a66d3c7958ee64d3954e140883f8b8f81a852752f9d05c28199a513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2cfbe74caac48ba8eedb2911f12e7a
SHA14a2575736906d91ec9189784428e4be02d33e210
SHA256495ec308ee28cd255411a6048d2de7bc2e976ea175126d7509e7eaf57f54d08c
SHA512ab6a7491f173411f5548af966b6f7f243a5145fd5b6eddd70cccccb8074eab2149a015dcfd1ff7c4ef8c33a8f57cb2357d0e69b099166908d015f2a054a0b154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212a18d7068a5410189743db1df4e831
SHA10f57c1ec783aec87cb3535da85b303c3fd2fad0b
SHA256da255025ce1f2f5c87e40fb311c8b8779fa868dc8b73646f3dce6c4694a10a47
SHA51299b9f5551a4dceeaf3309c2ac0588f1e26422dc4a6a3366b727f5e04e078521d06ee7f5549e67f292197c11122a979097575074fb7d31614ef52516c9f4e2a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4cfd729a3b2192d6cf9dc94328aff0
SHA1ea7bf84e0b80dd29efb809b03a8fa94e734b4d60
SHA2565840be58eafd2d6a2979d9733d787337ab1926f38cec4dc4b1f669838a0320fe
SHA5128efb441ed7e70f860d55fd4644c2891e6f325a84cc55dfff128b1553a4b4fb542bfebade46d4d9e0fa0996c4255b2316a22c74295d31a41c30878029a09f02a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d2d4bdcea3fb01037ee302797b6b62
SHA1189f4bed3c3d1aa6f16353dcabc634d3047e1650
SHA256580d0dbcf6ee707bab9aac5bc9196be761d81bcfde6fec50520a756ea29a0582
SHA512749656ae4475bb60002e1b6d355895b177084ae703627f1d1330e0f936ec7b9b0b1bc85930389cb2be5a4fc22bb31db22f7390621561db5f676aaeeed0b81992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afcc157e019e4ff54a51480aa245766a
SHA12ecd7d1b92bf06f5b536bab26807e925dc3b83aa
SHA2566ff885df731a3a737943e18a982e87a9993956c0740f90aecaf4ba1b67653b32
SHA512cb363e71d588e5d884d5cc8afd5d50424c0b35a58e9c5897107445a9059841f14a681930ab01a81f37e98a19777b4ccd23d19a0618727df10a7c7d9ce4216849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3959bad4f5f1e80cc4bb8b6d079032d
SHA1ad45c9bdf9874ffab5c68401c25a5c85a1a0e166
SHA256ab67e865a31074f570fcb21e4e0af675d4b5af3e70f76951da48c4931386d1c4
SHA5125007bbc0d82b491c4d7140568c91d13c41d4988533754eca324de6e008c50d81036b80656f72f103c52110f6da4ac14111387ca35c33752b25175709727fe84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573a7895498e5bba0add9a695dc86fbc
SHA1ab22a6d51c35534db76bc95d8b34718868168634
SHA2569fa04b6ecb53834b95af937d3f72b97767882bfe811567c8d47440a7f571e7d7
SHA512cde9f9fe44036b1a8010ef8f52f0b65ab4b19a66497d316b8707bce37ab3e20448f9351f8ee5c68cc34aeefcecab5446f95946cd67291dd4032540241ac4a6dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584035b2ff3bcb051f1b15815a3526ac2
SHA16200e47c941815b8f40fbea8b205c6cfd976454d
SHA25656f7ef113ed0ab41233b36d95493c733d35a038951c6b3a96454b66c8ea38725
SHA512c71fa70948811b38775b22bf522214da58b03a11431d304d876260390ce6b249d732b176feb055219dd1651f6c9485e75df6226562a3722dd9c088f1b3b5d6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c966e29759c737fa1177434c3541b068
SHA11b12e347d6414f180c02cc5957d032ddec0d8a2e
SHA25678a8f193e37b972dcc94b393dd9a1d7bbd5e1ce1304b4c200c1ddedb232cb7d2
SHA51245b66ee1b7caa10d68a1b53ff0b13deaf69f86200fdc9a3664c24806763b4b48f70f2c78e7c45418d42cbc3f1431dc2ff550f55203946aab8d26a771809a67ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcdbd94b92b7172d3271192fbdf8736
SHA1f1afbfdfff702888246c5fe905bbc4960c606410
SHA25638fc13c352d3f053bfbac2232fe241c69a6f08f1fc6cb1a66d00e33ed3d20afa
SHA5129481091d65a5c9d32ec75596932c6e8a866e50c918442936d2da6ab565ec65d7bdd4ac1f76c25de2f7efa972795e4a9ab1065d040a30810f19d90bc091fd4f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7259dc6e6f39b3682bd9e5d70d20271
SHA1aecf706e601cbd32734dff87c5c892ff41d9fcc2
SHA2567f62b1c6a667f46f719248d721b5eef31f83a7ef3626ec2ab05bf18aa424b3be
SHA512086eb686b84076c5059666d4140f5a0049c6c02f8b01e4dc5fe8ddf1ca20aa167efa4debc4d311350387137e109d4043d7eee76f85aae7130ff2686c4fff431b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663d20460da47008c4ecb9839846d9df
SHA12ea8de8954fe154dff16040d793a04ddd8c79203
SHA25604e2f415109d8e07d18812d781bb18942c699f79165b0016d6263278ae9ee476
SHA512395d9a35ef323adf1fb4391c19a798f6a16f1b7600dcb98ad73d09ff56aa299d8797783ff16668de381bfa4acf2efd410dad98edef6d7a2df245b03e49699b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb77c87b8572c05faf5c003a04d2ba5
SHA154ca63cca372f33a4b9258a2d83afd150195ce98
SHA25657abfa82366dcc5abe5295a5e5185abcfd7f8bfe975cfdad03434b23de6efbe5
SHA512c6ff7b2820738d197d209add6fddda2d736aba3954fd96734e462deb7222f2bcceb2063b1bcbaf35cf6fa84a53ff68305fbf481e5a46c869ab9867f34bb33622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad0ec0e6e7901e26fcfef6916010e1a
SHA1792c23ba588fc520dfa034aa5aadf11e73d0dcd8
SHA2565590b570642943cfdccf7c87dd715df80aae58ecb893ed6ee6d61fdaa24a6b02
SHA512e2f2e8d11221e8204cae2b3f6d87001404e40594daa528249a0add62a2e4c96045b5d54ab86581dfa06bae0df95edf909dfcefd356716c75557ad158b27f4fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52d8b4dd060c28365fb81f32fc6d94b
SHA107f0bfa91e7aad9ee7fe2b09c4b715b8fca3df23
SHA256f79abb46423e7fab5bcfa3351ca600bf53d0b651c3fd3f615b6f8d3d3e62f9f5
SHA51265269acad7bdb02bdb3623b4c4277e70cc5cb4e390a54c4fcc6ceb252f6614eeed05a8732e2905f5902b80a54f5a40a3fecfed5f4bfdef07e63c224c61059310
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b