Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
051cba7c3397cabb51c98b10823bad66_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
051cba7c3397cabb51c98b10823bad66_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
051cba7c3397cabb51c98b10823bad66_JaffaCakes118.html
-
Size
2KB
-
MD5
051cba7c3397cabb51c98b10823bad66
-
SHA1
a7665dc1291128cae926fc81c5a8976f94ca6411
-
SHA256
22c39172dfd7d8f818198d6222f3ac082f02508c323ce4624d195032b23e6ce8
-
SHA512
3e4c49f2615cd1bcbd2ecc94c8038ff9149c38290b5edae4c45671fe9049e166c36d77b4804784ae23a1cb77b0d20e1547176fff9a41204ad74bb9a89c87cefc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fc54f8fbc2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425040836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000432c6cc13253e04f8d8a069fd67720430000000002000000000010660000000100002000000018aef4535ee600e80c1566c2d0283d32015b2cd663520b5cd7f57293ce31e040000000000e8000000002000020000000fd5bd0a1a30e0610ac23f837a876ba8ae5d38bc1d5cf6a686b0189eda8505a2e2000000067a5289c9cfc8b95c8c313957f892273d8417e9baef10b8cdd9c4def1522e8bb40000000681fb057e0242cc62bd297b36ff8289a6a85e86a5431acb049d88a3351042a0c8a0ebbf5e0fe8b96c53f7288a54ce501821e6ab6f4f04df998223f8294b61239 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AAF3A21-2EEF-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 3036 2952 iexplore.exe 28 PID 2952 wrote to memory of 3036 2952 iexplore.exe 28 PID 2952 wrote to memory of 3036 2952 iexplore.exe 28 PID 2952 wrote to memory of 3036 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\051cba7c3397cabb51c98b10823bad66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525370529a48b84da606f618020243000
SHA15e4a1fc5fef4c3f8dee1f07406fd1e82bc0b9def
SHA2562fdc0c59a3a81a064ae689451abed0661821a53105979f8777d82d4f489de712
SHA51238f90e1854a72d3677b30e578573f1aacbed7d5fdac955b15ae5d3c8f90ba407361d018fa944b2620533473214eb762714aad1a733710e6ac442322d3cd81598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edb306597f43655ed6538c93de5d3fc
SHA1057b3d1c7d01ed0abd010211111206fe893e977b
SHA256bb75a2cd0429997252974a877e33b81a6670a17c3c82ae70c2b33da4cd551efb
SHA5123e9d6fcf99c3e4b9b601cd9b0ec1f321018647a3517058c356c51526a4166965f78d87fc3e32d71428b2a29a83fe3b84e92af22120ee05862bab10f98cb9d229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b58ec74e014a32ad1d7856ecf25b8e
SHA1969fdaa2a1112f8e9f0a88d2fb2ec5847ff7a70e
SHA2563720d30f264947bea4118e9159f7a5bb661048c0c08dc3c32959a20f87b3f804
SHA512c19fc16f2d8aa4d0f73b20d3d53dba6e1e23e3049b65d8917fef4ad3de57de0ca96e581f8b3f924a5c4c8c5f5d270bd58c6f54787c2624dc017541508e389bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b9191d6a8b9a9b82bbcacbb7129ed5
SHA199e6910cd0b5a3ad5540152a8502bcf153fb6a9f
SHA2565be6ae3e0daba1f40fc2ea4893d118e9f1d1b2f196aae68f829834c4fe8e104d
SHA512647cd302e6f89835483b524586d0a6eea7f357fb55ffb0620c5aff64c5bf2cb310d71c266029504ff40d4b64d3153deff7959337e24d619ec308b16fd5ee9f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c82ed55ff446306762d859bb8a58fea
SHA17dc3dadc43f14731e5263742e8ab6a423417e688
SHA2562684298a9e23bb132767d0470856fde2fe04272bedfbe52bb702089cef7973d7
SHA512ebb56b113eba199cbb56e3458e87672aabd204b16c55c3266c8e1b5ac48c06945a9839aa7fc51d8e438c82503c39a4a57472fe2435cceaac964227d35825f235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886e94cca247cd78ac66b1244fed5e5c
SHA129c8a9068d269e5d7f6b38f73c1ed5e862f8c58b
SHA256d408f4c9c9c44dcf539256af70609b84039d6556f2a26ce4f70316005c809157
SHA5126d8bcd1392420fd22050d45ef52feb400d908d47f8f0024aab50a6966bdbccd3e6714344a7944a6d5fd7d309add7dde2e2ce532a4e9cfab65f64a797668a0b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf99a3d3fa2e05f0c064567c6e80f80
SHA166aa188bfb22e0bda38df1b7a52e02195391c334
SHA256d3abe5a51be1e9c8badeb2c5263b455302c77b0f119581eaf9cd3c7607f9e998
SHA512d32cac0f51284f9c98f76b1e1de981e3e8a459864bc725e4fb004e8ab42a397f831885d4281aa014453d7b0c78d855518de7fc034dfcf80ddfd0612eeeacbe18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299a43b95f6c5a15cc54f626ab35725f
SHA1364f21bfa4857e366ec29afb116fbee0dc299d87
SHA256ccdbacb02edd137ff3ce88e8902a8b51114af41ee9a9e1f7e30cfbfb60b30283
SHA5127af9a53c7f6a687647aece85aeae52b899f5bb663ec068f5210ade38b8dd1fd325278ed2649d7a5340ca00f102e5910d75c2552135c063d044d45a1ff1eb7eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d157848697a0ee25d882d68f7936e7d6
SHA1575f24cf8fcee255fe2f280d00a8fdcd0d2f002c
SHA2569b6b424ce98feeb675b295981e68604bc5625c749e8f13fe2db1ce0d97ab4504
SHA51226e235631f749b6599f77f71bf3aa53ce61506f8730ee3fd07dcf7558596cc9f2ee4ce30fcb503016f1bb3e645978016b8bf07c563cb2bfd215128db25aa3c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad80f8a25ba481b8bcede84de556094
SHA1eaeb0a52e971a1a764002f1782e311094088b694
SHA2567a8f90d1885aec6691922148cbbce05878c26caf0eb8bffc34542547aab0e898
SHA512fc06cb41605b9cc4939ca8b9d7a2a65fdff1a030a2833f7da8baf46d21c02e15d90b5a2efb37acfe7cc84925e986e9a7e14f2fdec60404b5ba7fcbb515032117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b943124971a7f9953b3256a5664abe31
SHA1eb896cd6f8bf839cd8156e8f5b9e700c3e4b8ea9
SHA25659ebc16cd3ecd5fa566bc4c47082a4a8d51cc0396384ae0df5a723bca7cc907e
SHA5123835ba5815a27b11b99dba3c3bbc490047da8fc3e4e2f6d019dcfc0d9bedea79e6f5f1aea3aba52d7dd494133ad84db29ac71c439efb04fb1ce3c944c69fdf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35591aaa7f7976aa4f961fb0ca76b84
SHA16ea520bb9535dca377e3f0a932b10f8868941964
SHA256bab16069249e9587f0d77f2f948e16f68cebe60abc944346b40ef024d6085931
SHA5128f365849cc892d9c991882b70591cd670dc970da76208b650ebcb6b455f1b0ab6fcd7bce010825c0e37f1d7ab2530e5c5645c7be3eb671a23878872d8e49e0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13dac843d0c8288f0a23aea37c891e1
SHA1b416e3959042e9ebc313c93e4e214d8df201f5d8
SHA256f38cd0cd461dd482024239ecb8823ae88658e6d5d2600f624fe8a4d8c7aeb9ae
SHA5128bfc2012fc78e69b92b7b291a2e5ab33f2b866a950ed19c6a099249230cbe28117f9b543333e3b9bc992058e9f55264d0f401f5b69abb676b4870bce270024e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b635e2c531872b53a19665555438c98
SHA162d1b96e3a1d188d129bede6cd61017783c564c5
SHA25661ce5ad89f112b68a56a4a4ba2e3dcf949d6164226271179a9e1dab834ba28c0
SHA512bf6713a6f9cd7839103941c68bde5f508177185aeae0a3c392d0bef3e7057d17e0f7f90772051a71488e8037d50a2f1a2ba7ba2c69db8f186d172e9ceeb20dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4d623df818bea63f5a87c786ad0eee
SHA1b4257a0841ea6e37d7b5ae16d7a55cb3adb390c4
SHA25638342455fcd242649aef95a7adac5616994f83724a2786fe3d0f1a37894ac026
SHA51212606f104435d7bfc1bbd54f56ed7b97ba06df86bb3706fe9049ecdbbdfc10b46ccfc0c43d7672adcd2cfbcf6c229b92f2597faf917fbe8034274340503bedd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd59178b24becb3606035c3ceca9bb01
SHA162aac67d30c7ab32f367816a0d989597a09966b0
SHA256366d647d173818f992815e1518e29f2806a33ffdb6d85c3fa4aebdfcdd825d39
SHA51236ea42e71abdc4f06d59c6b4355d40b26aecd58c8f8a49129af5c5150c8da9c54f2976d11647e7367e42c34d093f3e1d0d822e60b1196240d47b8c96cdffc911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e033e8516d43516591d706e4ba552f5
SHA15af283b2c248d940bea6ce18f5c0cb534139acdc
SHA256148609f9c21e09ed910250d8f7798b0ceaf25146b1ec9ec272fe4a6fa1a021c1
SHA512d208d9c23c4699c807258bfef600fce82b257afd34227ffb15245e36324a397224098e0b1445e2fe44e0042ca6b700046e25352e4028213b878d0f45c736f84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59364fadc386cf5d4d8836d47e28a6b33
SHA10d16f4e2ab4f01f9b3e4c91dd3009a17a03e4d82
SHA256edfca1ebf1a253c0c37462b49925ec920cae32c0811e0148fb205f39dc7b7b33
SHA512d44c4051deaf77327b430e25bd03fc0140fa9f62be8623f63d6f8b19888f1421fedbde8eb84f251de5220f413c097637fc72af58267cee75d6d5cdc1b6ef77ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54451b8a878eb105033e47fd0ab655450
SHA18578fc42cf8ec7e3fd8458f6b445b3ceb3b48a8e
SHA256ca895d402112e401a65865060c975a068d53f9374977e3a199460197bcf821ff
SHA512770e81060817e6434986a2eac0f0b419f46bd28778ad43da75497cd4f043ab9894012f8736499135a35e6f831e4fa442abab19f1a0c976536ff003c479ee8a73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b