Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
ad4acbd3b88257465c83312587289994_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad4acbd3b88257465c83312587289994_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ad4acbd3b88257465c83312587289994_JaffaCakes118.html
-
Size
13KB
-
MD5
ad4acbd3b88257465c83312587289994
-
SHA1
9df59c0f572b0e0528643e46c17d8c8ba578af74
-
SHA256
2aff189ee484fac6349b8bf1f730e38a0e64ff947fc2c7c05c0aee8b50a72611
-
SHA512
d6457b49a707eca10575e154572769de9983d275343ad62de1a80ec54a0080fe242b3a036385b886e6fd1a052ac6f0f10c279c5aebca82d3757747ce3464d349
-
SSDEEP
192:CyitVX0EkhadjbXaCv5DwQFCVCf733y1w9MK2ViyzHv/ugelPYboYT:CyitsG/niQFAi7ny1w9MK2AyjWPAb5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B515A71-2AE7-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424597677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100ea412f4beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001427b0b35021bd448f5fe12afef3f36b000000000200000000001066000000010000200000008bcaafe4c448c3ff7e5d7279b65ba08e8eaad7f5d1813ec89ac68bdbef5df23d000000000e800000000200002000000027576576ccf4b198b1a1da4d31d0f43ae196aed3d7f367fa24699b4bd5cad7cb20000000034cc19048df0bfa479b7e824b8d0fce2bcb81fbabd373812534e51a30412b524000000008b259742c69fc40d498d723948208c5c9931c06028be6101a28f6696beb2464a118b39a673147e1c6fc36ccbe6f1b12cbe2bd5afb5f59794f681febf364033e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2912 2440 iexplore.exe 28 PID 2440 wrote to memory of 2912 2440 iexplore.exe 28 PID 2440 wrote to memory of 2912 2440 iexplore.exe 28 PID 2440 wrote to memory of 2912 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad4acbd3b88257465c83312587289994_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50befc44241d9c407428623f9746843cc
SHA15b77b9f5c0b12f0f47f31ecede8f1b49e88575cb
SHA2569d098da2380666835afa2ab864de949e100c9e31c202731b02b1e002c64e339d
SHA5120f2c4e8c0d51f0fa95b9c825c64cac556a36ef2e113b099be1206a29b0c491853eaac541816b49e043687ae414fe1f206392afdcc8c4385bc8d98d6d1daef5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ea21a1a0224c4fa7468da54ad5d5e2
SHA1c7274e2875df497125d2775dde46a92b1c0c981c
SHA256085633bd9f55e70f2621beca11b28bf4830e72d8b18eaca54573f44633952334
SHA51230cb81e675d1882adc9d8b86dcd773060da50cc3fc4caed8722a55d8f6a8be0a76727f1485b4b741b2c77fce30f4af47ac58f564cfc2dfee539dc835b6e0fe11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57602a640d25b9e6267bb6da36594680e
SHA120398a557fd9f442c69a1847a1930e0f8c1da369
SHA2568beeb42610fdb64d3dbea83f782d68282f914f268b805721b0228ee0b348c6a3
SHA512986936118d9fadb722639ee4c5c999463c422e1948b436497dca73fff1b179e87e0cd42b284fd69ab6f3e163aab6ca2d5d790f3bea6b75611888c871d57c7275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfbb52e1476dad9923d8762ad528977
SHA1ae1b4d9452666ddaba6be2e0d76459439823b334
SHA256cf57b727263a389fe6f2096d3eb51bc9b0f25bac698013a07f69c5441e666744
SHA512f7c6af5c7c286a8206073a78ce65833df302c507b97533cb174272e4e385bb43f644c493f9121fe8af972f8a303509eab06c844ac3aa756143ede80b1e40420e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd039e0e1e758aa57c0aa9fcce1aa30d
SHA1b06ef7f0eb82c029cc1e722f042b9e78d4380fac
SHA256ac7245570298aee3b4fa67e2718b3921e8d908cc24f661b67e9c1deb3ea64b27
SHA512d66b595c848ce55ed2356a62431145ec2cbb35e46b8db50f55937a588c49d9b3dc14c46626605fd38188a5ac1eba6306513e3dac21b4d573fe4957798e86e482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4af66b407006ec19e2c7ffc536eb6a3
SHA18b519da3eace597b3c068273632626fa1c77c74b
SHA256d42d27231a13bf8dfec5b01b4706f04f053310678785a65465c8f85a4d9ce4e2
SHA51283f4219c0ddca2ed963a3d1cd3da461746fbacfea2ddac099ca32d13bbd1ff653479a9f5e4275c9e5f7f99f8a99c9e9836f01e534757e51691526b0dddca6bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52404d76c2f8ca2ca17b0281d3dec25ba
SHA148c22655c63791fc7402f54f6d20f14b83f23d35
SHA2567fe52aa74d7dfe514ae5e5d0dc28be2826d3cf40c822a9d43299d92b12f68e80
SHA5128cdb39d3ef2daf4aa06cd19aa28b0df805891d713ce13a40c3a77a0af8d9d64391c34c4f18b1e700963be59379b6c61e976bb0100f3a099afd8dbe8c795ed0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e20293e9ebee61fa6a2263024ab45f3
SHA1353901c73398aed13b26352376ee3659b37166ae
SHA25652bb689ed2d670e7f54cd29cf9872616e2b22e5a06f0d2bef7b1c803774ecb7d
SHA51227d91d87de11dcf239c605c5ecfdb7188d4df43cd71f1fe78fd9754d3c2a298436f7d61f91bbf3ba2530ddcee60449eacdacf446c51821d62c5c1f6370b8787c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef65b97fa401d2797b0262f14b65b989
SHA1fa0f973647301134d088b2dccf5e22cb91be1b7f
SHA256f70502501fa95e3a0c481b8414a57054ba6a5b20e92200bebf344a28bf8296cf
SHA51231b652e1af8e3cbf488ad84409476cb08be1b50e7f667fef027bce280559976dfd91670f346f28b31182f91e542ad200ac294b064f60a97d8cff6399ec94955d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8957cd0a2f1c616b2ac47ca64d900b8
SHA18ec0fe47e72e23b0c64d04e6cc458fda6946bb33
SHA2566404f33ad36c2b83ee5248af3df3662aba7c4747034366105a0ecaa06e23ad6c
SHA5121d98e227de108a729ad6964d4707a3752fbb8e3f90c54443d1d324003f9886e6032047c35a15d4dbe6ac74940ccf1716508028b21b1652feb1d3b1367e076378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2758f67fdfaf20ab46da02df9e545b9
SHA122b20350ec7f5da44503160a45a98a0ffb7cdc3c
SHA2568b8360fb7b2c72b92a8ef4da918270ddb3fefa3029a30db27de6359c52c34c43
SHA512b3b172f280da90bdd6947a181e57b19cdb61b61bc0325c6ec19f42f9b44db12eef9ba4700a8912c4410f64f7c6f112ba5703f3f6954d0bfade39cc0871c4b8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f0cd5864875ad0888218dae7eec140
SHA1acfd56d50335baeff22f8ea8052e7583a03c0432
SHA256807afeca6c166c2792a01b2502c12845fb16352d9f3e7fcdcaf4963d853cdf5f
SHA512199f0e9c5a36b50fb8d7a3233c9ef3391e13ddbd1ba5417dab41e881695ae1422ff2b09c9068202aa3dcb67434aaaa0deb22a812d2b98f76111bd905f6dcbf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27640318b377b2cc0e28ac5e11ce90d
SHA102d3756e6a4ce75c486c5d8b53720fc95bb21cc1
SHA256fa37514d7b42b0a6829e93cefd04510ee53d1cec0be6de171674f3317b173bba
SHA51297c2b08936b638253f2ef8c0a60ee60eea6006783c593ae4fa599671225a0c5957962c4334b35ec414897fafd733bbc4c3f5705157657846e01728a060e78205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8261e4ce5d2ed0ea68717b126d207b9
SHA1cc6aef3a8c95aedeb100599887adf5310dc8e33b
SHA256ac3ec45dbe259eb0f92728b82be19e4bd34d38731d5311ceecf22976435fb82b
SHA512cfe01da21fc1a489a28dddd3ad5cbaa53a62dd6341b8b2c6769e5132b606265231b817017ff9872ddbdfc70ae10944438411c2d0496cc88f277ab1d2112aa098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02c14eae4893a5a834f4ba4a7027587
SHA11c58f4d61f943d3daefc2ad93bac1d059bc26d10
SHA25654ed22b3c2701500589382fef4b3c93ef8547a3f6974fc5a20ce922d65d38eba
SHA512cf534e128499ecc0b0004bf525f9b38bc9d4e0e9bcd06efbe8801996c4dc3fdd25f7a08cf43fb98baf7b521371c4f9ee29e000f0a06fb821d4a6e88acc85c16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4e1385f1fb594fc56fa2319d2af656
SHA1136946287986b2d618a311df2bc8d7fd6f97658e
SHA256c66fcdbb4d74c2bf12cedd8b3ccb700d6f62195fcda0b502ac13aec3f270e539
SHA5127d1cbb432efeb20783e8eb0e1690239b657bedf9a2c8768c585fdc24f7dcd471477cf9269d2be5368cf98634528835259571508d1c7834c60324d1633892f9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960af312186f27ee4b8c693aa4684545
SHA19de516a0b6183cd8305c062759ac1977c13e86a7
SHA256cd352f2d64e5604b07ef244e1a2d861a1ef6f284cd9da49b0f3c95727f6f8569
SHA5129f7fe8850e6a532722546bd61828d9fd2afa63e5c3f20e0d29367ea9dba33e01a3f59215791e8efa21bdc8108850fe83e0201e1cc9ab6ff22fa8f40bf993afd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b056f6d1b396f8ff96085d0c8f5f0a12
SHA1b833148a098029df6a2d731656feb391f0965bba
SHA2562dcf991f0e0011fd4b699e7807fcee1101c355af97c205803c1ce29f1423add1
SHA5126f30a523040cda0ca65cc99083699ffa3b8980b0252bfe14adec55b577db75ade5afd4a099282a136d09cffda5532679ea5aebc0f8bca75dd6d34a3529995636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43593a11030dcad5dd36711753c769f
SHA19d41e3e6b17aa345b32246d6ce4c2ed420759bce
SHA2563b886319cbf2b0777f09d6be32d3c146d0bd42e14ba9f41523380b5999183124
SHA512f4ac7cf63ae31790fa708ca53ab946c01762ce3b37836bc796f0132f469decc60b218f22190e809f0538c784cc63cd964e97900ac97e59350135906a4837afc0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b