Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
05eca84f07afcc2bee38cb703dd1ed93_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
05eca84f07afcc2bee38cb703dd1ed93_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
05eca84f07afcc2bee38cb703dd1ed93_JaffaCakes118.html
-
Size
162B
-
MD5
05eca84f07afcc2bee38cb703dd1ed93
-
SHA1
8798b2db4627a77d0cb45a5092e1af3cf0e0ba92
-
SHA256
44e312ab6ac14c7bd437d79fa55249a977ae3a85f65becceecdd1b5ee4433973
-
SHA512
aaf7d37477f1aac7371cb1180b46bd9e34535810fe594c747b693b988c70963b38f48f1f3599c676f29ecc0bb81df54bcc229fe10525e1da89c5863470f1ea2a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02c69350cc3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425047847" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E24F041-2EFF-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000234c82ba17946b40b5b14be6ad6c11890000000002000000000010660000000100002000000061eaaa6ca5422c173d01eef9ea0c8c0f7f5639c7879709fd9cffdf1fdf7d4c5f000000000e80000000020000200000006502d6fd78ea2b518f6f6be7f65dd10dd37bf40698c6da0ac770279a337215c220000000276d81cfe20837d832ed29b62abe2a994abafb46bd176799a7980a02c3afa28940000000e57683a6d20446eb9c7956543c24c64e1da64227a9eb22a4b494f1a5abcaf780bfd7f8cea2b70340518edc23734bd64eab06a1fbca75fcc5c66303898cc509f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2944 3028 iexplore.exe 28 PID 3028 wrote to memory of 2944 3028 iexplore.exe 28 PID 3028 wrote to memory of 2944 3028 iexplore.exe 28 PID 3028 wrote to memory of 2944 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05eca84f07afcc2bee38cb703dd1ed93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55928c45d9bb3c1488191e3da7be9f900
SHA16553e824db43f76159f3b8a259aefa397bad5b3d
SHA256a3bed19023b9d0418b26018469da5e3aed966599cebcc569ad299affddcc6bf7
SHA5129cf08cf9fd0fe03fccc1eb678d88f07c2d9be813c9165a25baf121cff7f5ff0dae08328fd5369621a3e4004dc5677781bc6ac5bff2cd36f585ccdf5ec588eb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c2083630d5a33a8ea709cd92ab220e
SHA18444cfbe6bcf7d9cbbd9e4e0347905250f10b7e7
SHA2560b6ea21721a7806444ccc3225048929a768de2606935eec036cb15a4f81a092f
SHA512bfe4554d6eeac039143147258617561a9de3f105870fea779e8bd7f12d4c16dd6b34f960861f5b17a07cfa9db26346d6d138bfd13bc77b087c81ed44f7253b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52127f9bc3f4730a01c3de8df32acf0fe
SHA10eff21273321c85f98a6c60377350f6d2dc9a48b
SHA256193a6c90efa10e22dfbfa3552fed55c5637963a82fac25d34f7e904c64b26cce
SHA51205d3bc46996eb10301fe7a0e09d9cba1174c3d9fc9fe77b42211da1626fb2bbcc090bc4dfed4cba9b52a1ff51270340d51217d82725dd5728a8c64b9b6cfd0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545e639087ded73451d1b7f73c4c9156
SHA1425706ffc982e42eb1b8e835659d2f508e9905f6
SHA25663b3d3e4ca79efa970c8c7be1d9ac18b5fefbfc9776486f8a1e1c0fd1800d506
SHA512e0ab15d700b79b22d0df837f9ce1e853c2c25cff041610e10dbe3fed3cad949ab12708db4c833881a53682bee05df057d46cfd99a0dc33ebbbb423202d3b5cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc95b4838aeddcc513d075945b6e784c
SHA1ca5c8d7865d730f22b13755bb6021b8441e0d520
SHA2564f9fef18b5055055245ed47121deabe12bae9ea828e3a7fc06143936161176f0
SHA512cc37da7917d6bd584f82ffdc36dd79ddae6bf438b4fdba57f75f3b5298d72f335110a97c4aeb772ac5fe70b545d77c37731db02f3c7904dab4a018294745b642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d7641a3f8f851bb7b6124312787e12
SHA1de24267cedc731c8bd23188b6d5f3318b1e9da9c
SHA2567ecb54ec39dd54937fdd07d180e5176479606e70371ddaa45976a62661de324d
SHA512d09540f58dc1d175a221d790aabe10b27d6d6564396d8a8f58c9e3ede48c25b893b7a71bfb9bf7cee9e1556afdbc46845f8697db7b58ee04a6db9da8df073432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbec931012fdb4efbe338f8d63a4298
SHA1c5ebc96b0a86c6189a400ce47b652aedb0800c28
SHA2562ccc3c0d81e8c1a32423f09adbff818bd2c23ac521948e67f1835b183f1d407c
SHA5120d4d9bdf21963b1bf0b9ba852e119e52b771166e33bbd926f7f476e9152ea8e04e29dc1dca03169332b7d054f96434629434934cbe8bfd8ddba5a64da3fb668a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7d7b817c17cd03dd3f10e52fc1e083
SHA1f691206682e349c5548165c6169719d541219a49
SHA25616d9bfeefd35a0874f21074b91b9616d53d4a6f83a140d40a819695b18bc4a0f
SHA5128deaba0ab2925302381d692d17ba362ef426f4dd238aae0a4f22b20275e8dd8ed6c5f82be3041309d23230bcfec4c52addb7e511a8883eff38ea8ff9ea0ff0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57584de77170aa4d44cc9e5f2f001a426
SHA16429049c773e451913f50a31caa692e9095e4a55
SHA256eff53b3495b09bfcfe6d7dd485e0d9556acaaae47aa839c1f48a4fbc547efa47
SHA5120d32275615f3fd081ebd355a64198fa6eea3e4856dfbddbf718680e00f3b7fa8e138d93f92e03c1f35884d3b0d53bcf2ce9ce39b1c4dd99a544ded43d9e943ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098ed4eec248ec7338f14f00421ab2ea
SHA1be73abc9ab5785d6a0cc5d1564987f98b36d870a
SHA256e93e885100b1cd5017bfe50033a7548ef77689868805007b36231af35bc07a10
SHA5122cc079859002287f2b60c21a0289c2626b871991711f6e617d6851c9a61fad11968eb27a3fdf520b34f5124a0d30c528307ea9377997dda2d58854e2a6888504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541af9c900a452284862db27db4b4b4ca
SHA1ee229742a4c94faa54c908ce0e0cd62991556285
SHA2563fb3d8676789040e26cda4a12d5c4df3f603e4c520e785946190f4f57625d6b1
SHA512201ecf929d730d22886d179df79f749c28759f8ddfab9f85df0b27275a7d89eba2c9ed01a98caa42b764d59b563065ae6d261ba9aeabb7da095468a47ceda164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d344f5a4494dccaa47a2f9d5cb92298
SHA1188332e4c891eefedf08558935fd86cca4fda8d8
SHA256c608dc2138bfebb6685c0fdaadf3788813e06371679c9373624d2fd8c1b4852c
SHA512f54ae97333c86a2ea6e5939529c38fbddc44cd7b6c79d719e271aed9a779800890625bc2ab8b3929f443d46e6b100a2800b22df910d7b3c7350dffd3dc843803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768ae758e6618f5780e52327ff6e0a35
SHA13699b57b31beaab37c9a2c244ab1835de2afe4d8
SHA25614c8973e96f50877a1bb1ee5308e8c5ac5c27c1052fceb24a1380c18686a0701
SHA5128c4a0a1697902bb80263db37c98fe576c1b5b929692ab118451210e105020d18d41946aeed194ac017c47da52985d46332817056d1b2dd92c2b51deb66301a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162b4dc8eda004b3b1b22e6960b6ba1c
SHA1c0a5ca824d9259e241426d85b1c842312be5aad0
SHA256e56fa90bfb14d2254aab906f1bdfa2c602a73b1831663b7895e2a5efd6c91287
SHA5123b6560da2d21c19790cce1a323f5581e66d2fe54166bf4a382a7d68a5d4fd4795d6d5892a906535d5bb2ad06e8279bf131f19c28b63a56cf2eeca551466d2ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491add5f441150fdd8f7d9ae33e015db
SHA1230d9e1dea74a081df1b39e3632f77b018714ccf
SHA2562e0b6003572cdb3dc8aee94b135d76adbe04514ea0b938b3719726df93a3ad4e
SHA512fcc60ec5137dbdeae90e416b5af3c913dc5e26cbd90ba016d5b8b15a06b89a3ca4b031f398b96ebfc9b6b020ae1c06f1795c2df5f9262beee9bb2e15678ec80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcff6f69048f67dbee0d163682925013
SHA1ddc037614f15645f8b9bb2310c4e3e2c1e2a77f2
SHA2564cbddf19db533b7d26779c832f8c72e2fcb242ae9f92679777ccacfedfabc1c8
SHA51277b168c867a56004440ceac76f1bbbc5a730c9d3461df19cbc154f745c278c3cc8ff68cab4c4df607c9fb88f93ed571171c7b1320c5812f3d968a51c9d91914e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a708b8240cec77795fffe82bbeeee5e
SHA107f0ec2f4a065e28dddf9d5c141e9fe618eed23e
SHA256b478e7b59301b514bb914981f1e03dd63d401a93afecdc5db97c417f1f793611
SHA5121dd5dc4186c3aa323a90a1ad8e0a58ff9aeb09d0ccceee3ccd18dc7b7ebe842b2637a5c95ebddac81af44d15f041500aa3bdcad837c8b9b30a6afc083770cfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be43da2231cdad1006da3604dbfa68f
SHA1a577369051b59ab3779c8c323e13ddffbf506ef4
SHA25631974063109b501096ef44193453858d5366cb8dcdf484dd46240ac1c8cd1c85
SHA5126414b50ee8307cd1b6d2f84061925375e84e3615d6d319462c05934231292347fbb5f6cfeaa91971b92599da4a9ca949e8b5775309193e73f4cecf5797481af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51424ae3723133f794d55aec0c4f761d6
SHA130283e378a8ba025b90e426c4dc90a51263b1677
SHA25624560f4919081880935df30d60baad51a96aacc3ce9ea29a498e51590dc737fa
SHA51253ad75487fad4630df0926088b80e0530d4fc10b06fbe0536cb2a42564b9bc2cf1291e3cd0c14d6fb8139cb009e6f62af1a8bb9721b5a66dbcf752a301b4a9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455d8e4165b19b7df7e5970df0c412dc
SHA11126fa41e9707719c7889a81aa5720b226a6ddae
SHA256d0bfb1effa6e990ae40ba4e9189976bddbb4e7224a4e5b6ec8bee279381c0c10
SHA512fcf5c5bbb43eb9590aec87e692cda42fbe718a127d6fed7a6d69c99565b88970d5a1262b71155b0b37531e5490198dd4684e4933dbd76ad8857db7b7102f4e8e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b