Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
b513b65aee7e4486ca7bb6cad229a745_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b513b65aee7e4486ca7bb6cad229a745_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b513b65aee7e4486ca7bb6cad229a745_JaffaCakes118.html
-
Size
2KB
-
MD5
b513b65aee7e4486ca7bb6cad229a745
-
SHA1
ed8b25c0b6ad048bd67ba27de3b3577ca88fb505
-
SHA256
27e6161adfd7b3ee3eabbfb995edbcafec3377df76afbe516bb43ea6d696e77c
-
SHA512
5c1a2db03d67850fae79f6be266c6b6312c61f59cc72da15394d33448765bbd15a60c8986bdffda6e0bcf9252cd226735bc746391c7a5506d979e02671f3fccb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424731936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000018f8765b7523e34d9c5d5abb13436a810000000002000000000010660000000100002000000064e6a7dafbb6118a9d7f58bb575d09ae8140518263a0e3e3f767039015f7afed000000000e8000000002000020000000cf345e08e6102f26a7240fc27aae480459a6386ca1dfeb37cb9572109b91ef2690000000dd18ee5a08959df90ae97d21587db3db8edf4300b97f16b4505461153d6e3d23e8ec2a83ad49940b81d86f9235649ffd5d2d32aef5255c0fc61ac16e65a5fab07787966cb5c7d94554d161a140b3dc66632524a45a1191fb75770ba70c926587eccd92d4b04244c7dbd960f5b185ced4048ba3c3f2e1f3b6ab806c0b9b7deb00d1694beb219eee925f6b6b80dbe963a1400000009325b03ade2aef8839dbb019fcdcfcb346d6235e5fa57dd8fac3582b4d68800c84217614d905a97ed2976bd5909f3beefa7a968e9c388846d3d7ed1be8034197 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000018f8765b7523e34d9c5d5abb13436a8100000000020000000000106600000001000020000000a4fa377abfb9644ee0f166fb7ca803bc81b5f7f48e1abfcbd2ed8019151693ae000000000e80000000020000200000001d9c25e62719f6be890b0181ca1111d152648406bf254b6cad1d7fae733b19d620000000d6ee537fff14f5ee295e1b9395f49e3c639e58dbdd2f2fb62886c946e4b984c440000000638c489dae50bedf49303e293cc7b05bee2d9b7b3d36c83dbd96d31d14cd615639eed5d6ce63b3afc9962cbb39af1094daf9c8b5f2568acad1e7c0d58b978dbf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dca5a72cc0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2C3CB71-2C1F-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b513b65aee7e4486ca7bb6cad229a745_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513952057e6b3cf3855c6bd1ebf0e4850
SHA1e68d30c0069609c929f92287a9f582e78d6f77a4
SHA2560a128c1b790358f337e2d0483378cf143697573eba213c6124f7c27534aec71a
SHA512a4d062de9f12d9a51d7a129686d0af5b96269ebbd196062d9f158e775e1394d151c9d4e367bd4db2cb1b146e4336d8e8f70b211be2bffc704898b7886eaea9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54637256528d719416bac9f240a4b6523
SHA1131a7b4f7bf9339efa66996f9e87816312872870
SHA256b542e0732fd47fee67401751d4fa964c6d060da47ce6c3705c31e3302a301651
SHA5128e67d69198b7b7f49b884b432d6341f413b94561d074e5bb4eeb48791e16a16366dd43580f13dc55488a1535ecb3ad2a3274485a24e3dafb81d33bf95d88514d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374cc552aeddeb46c5533a8eb09a73d7
SHA1d46ee83098500909aa6ba5c56f24820d1ece3e2f
SHA2563777eb87b0efa99669b9d8b858b5a114e5aa73e76563ecaeb1be11b86b4772b6
SHA512a4401924861aa6eb4e9effdbc7c4ce49400ae7022442f1431c5ea9aaeaaa13251793bd9dc07eb4e45a7d556a88be0575d1ec264509d133238ce2cdb53f213134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3b792606df8d4b46892bd6bddc55ac
SHA16bd7dfd481b1b1f068f942fc8e927a04146f2ea0
SHA256a7131d5297f84e04169e4e6f849f3d30c44e8bef944a33d6736ba2d261cb5a42
SHA512d1bc0ecb579a6c5b992f80b71ba054afb60ce1252e115a81ce0c0bfdd77893a0f929d0222232480951d6d8ee47353d0f2b28aa058713e38a035675b78de5030a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da94b44835a2328b34ba744d54b92a2
SHA121a41bfac32a3ed7a28fef0d6bcadac68538217c
SHA25655ff16d2cea3083a94f8c02b4813db9fbb5da88a7f3ea86a0a3346430cdc0f89
SHA5126e5277a85697bca36471626cceba6407c1eaf512b97052a53169c0565f96f25588b80aa761f440ff5c1ee938401023407ceffa2bc7bc4aea8a5bca51f3b9cdd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6bb2bdd55f7a49aecc18b1ed67fb20
SHA194b253426b9ee1285fca3887e7df2da4ac19c0fb
SHA2562aa7134f9839b154908fd0cc12f6e5f3e85547e30bf10e4ef966a142880176d3
SHA512209c4eb5d0b7756daf8585d1fb516c3d6eeb67bea95c838f2ed427b9323543b72656fd360df3ae696879a2c226bfbdfaf99277991c02e052014dc9023eeb721d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59baa730cc44a5ec636495490697fa487
SHA1f4a2d3126743c256a2148889d6cde6fdd31a9307
SHA256b68caae63d6065edae339be39bdc52aad2ecfbe0443942f4c03ee793611ca52a
SHA512fb328ae78fa8e2526f5c6d3a60bbd4095e91aeb3d4f810b35a013fbf532ad4d88b821ecefc1befc25574c7c721c680cedf95e4abcfc69c70c4970b8b8a948c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f45a409a3f8067d44f2c317d192974d
SHA1952730b925ca9d0373bdb628291e8436d344002f
SHA256bc53d84b5fc06c36f707a905de7257d51e3cb6723e6e4e0317567c580c57e7c2
SHA512b9da095ecf5e81c69266ac72ecab166045b525990e5641a8e7b29520531f54639d0a27d0680ae465f90d101f157d44542a4e0d5e9d545585351156decf7d3037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c511001088d5bf479d79afb33c665e0c
SHA171d24156f792b68d2c62d702f9b3c77fd4bec85e
SHA2566833370942d280f871b18c94ee3988147cc5b98aca0a3537a14cd21a4bdd8953
SHA512a0930e4a2cd5cb69c28c05aeb0bf540f7f068e59121ed77f74523bf3d52521bf94ba1bd829265cc438d4e430075791e4a581362198bd41635a7c129674230865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f98e7f94ff4f7a1f17afc2e6cda2ade
SHA1412f5c44e455bb014453c84d5f5b283f2333c0be
SHA256f3eb72af91d2a510a5c6c5539939240f3c8be67026bda27c4a4c141b1749060f
SHA512fe1c4683eba887a69ad3264aadd55ed7fd1f8c49397166028507323173a415e4353042091f0d8083b395c37e19cbc393371ae46c302d4559d662555cffc1de99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f5fb284d07c13f8896e58b8e533202
SHA1618805a39e987c33ba7c2e859193ce09aeb0c034
SHA256acfb8ca53211d43eec335ee0a50e6e1dab5475fdd72846f57cbe9e7989895731
SHA512aa29bd873f0e7dc7390d94f9041179094216c761e5943a0a1bfabd241c3f00a5e651ea0959bb141b7bbb77c7a33727b9e8a3b043e3357997f905277593b30ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc36bc1ae9be9d2823663d771840c4d
SHA10f7510d77a08810874badfffb7339b2a706c70e7
SHA256e63865dde36b811abd62bac1d6178961589ea6c605f295b68e6fef6b803ed5f9
SHA512d901976f7c69466bf93be0c8d16e7dae31d221e66fc8510b8ae0cfc2c13d3fabfbaddfa380938bb1036662745cac89a4de2b6bfbd361ba917e9081d1495f8089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8947e0e7b79e6ae692f40e32ce8e99
SHA171f946e4454424acfcce2719bc02bf8b4b64b431
SHA2568076486dfda1d2e43e9417d3f3a85e3aa59f9eb417699679a25e3bca3c623e2f
SHA51263866e81fdf2249afcdfbd1ea705e626cf530b56362ce8c4a60f1add2ec653c255e6bcea9e3147ebedcb623f6a0ef1c778eb7971a29574b5cd2d49a69ee94068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a02fe91f0f592e3fbc8d2fee4873e79
SHA145f82abe864889a7f92251c4e0c0417b133ddfb3
SHA256e1869267b8532391e8a0673a3eee3bf316eafbf38120fadc234a8caa9284266c
SHA512e3e8e1d9163f0433b2f6c6c53a94457a18b71f4f1e9d1bf1ca65bc2da80d0113f5d46651143da6075e23249fbaf06548577b8816e0c33baf1db30a9c17c15696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6d4f94647a69cd29e5032b5fe08251
SHA1500d17326d86636fd1daeb0dd0d8ac04564ea1db
SHA2565877c9391bece45a628d673fdd5d41884fcc39c6ffc71479f72d1d2eed540b84
SHA5122f728a371af06ed7d0932f16be6b20ef67ad4f4081180acdb4488dd357b274010eeb1ed2e0b6e910835d171c9d7e208a323c276742d326eaa347123c4308760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8917d462074a01ae27b466c107df942
SHA1b07cc98b93e3782205c9edc5d40cff4712929438
SHA256268996aa1e4112dbd720f275af4844a75291a42559ae5e204795eedcddcc63d7
SHA512453818e8638b76acf45530acc296b978e9f9181f4b7b9014749909e32163049fbb33041ca559844351f8835636e3c68fd444870712d17808f73e70d543e0e0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548178686acaa615c85d6df767e61e176
SHA16779ceee52d12c802cde9242784b28e9010b2070
SHA256a24005cdedd277b7dddeb286407bf9286319f662ae59438dae9dd7488a9b897a
SHA512e7789389a3b684ba7adfd5748636ad57563d93f67c53b9da533c016f66b165789f47970e1dcaceb9e002aef3b56d1af9fbfb321ed3c9fcb5d6728f61191c0fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c87e7e5fd3b08c0ac3768d7b007ecdd3
SHA19c4d049299dffc7c4fffbdc80b342dcd12c3f721
SHA25673065a688ca1824d018a0c4d0d1f84e34ebd3defc93fdd5149cd84098b35175d
SHA512aa8c9a48e8c72855aa266ebde37e9be311eea4ec9baa8cbe2ad808f08118d73c2cd20d3420725bb9357298389384e2658c6685a0060355a632628fe342a168af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57605540346ff93285b4f2ab1997a55a7
SHA144b1afad70cf390de4fb3c0c6727c4c8dec0e056
SHA256bda521b15159dc797601b760b1f9dcd0378ca6275a1441acd548c8b16692dba6
SHA5127fd24e950b3ee890f62ddccf00a39fc6b9d1464dd87c65b1fed138dcbc4b72645bfb76466c6355c0165073dcf82bff983b14560d742d38d8477749ac5726483a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b