Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
0905f877840ece51d4da0fcc23c32b06_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0905f877840ece51d4da0fcc23c32b06_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0905f877840ece51d4da0fcc23c32b06_JaffaCakes118.html
-
Size
53KB
-
MD5
0905f877840ece51d4da0fcc23c32b06
-
SHA1
1983e46fdbd99a1ec34b8b6403d309820a6fae5f
-
SHA256
452d018878ce30fee89dbd8aa363ecd9f845c14153147f0b2f36b2063868ce05
-
SHA512
bd174aa72a7b6abb9a892c8e0f535c9634e761b4a3208aaddd96233de5746373bfa27f94da53f5ba31ff3bbb09a105127e7a5c6755221d419351363c06994a53
-
SSDEEP
1536:CkgUiIakTqGivi+PyULrunlY863Nj+q5VyvR0w2AzTICbbxoN/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyULrunlY863Nj+qC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425400767" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602ffee741c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1243C731-3235-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000375bd5c2b03d3442bb7e89ddb7aba55b0000000002000000000010660000000100002000000076717ff40016dd03e27df270d03db2bea0d1648a13d3537990cc2cbeb60905b6000000000e8000000002000020000000657e7a9a7b1f3f45ccc47f5a07a048749755c08be99aee949aabea892b8675ec2000000027a12dc5f4e3cc5e2c9615502ed5b1751747e99bfce940dbfcbc222d25af7487400000007433e66e028b706fcd7bbb9439e872712325b0b8092c47acf40e950d57eeef5af8f5e910f4c7f9919050b4811379ce716cf3c3fe2560c7576823036d54b36b3f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2112 2892 iexplore.exe 28 PID 2892 wrote to memory of 2112 2892 iexplore.exe 28 PID 2892 wrote to memory of 2112 2892 iexplore.exe 28 PID 2892 wrote to memory of 2112 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0905f877840ece51d4da0fcc23c32b06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657f5548c9d485df5365236761d32f77
SHA1540df96746e089fe56c3fe9fcebf0b20e3cb7fb2
SHA256369a45f3c26a677df100b0512cea6009ab9255fed99594a1d41cafecc7b27b66
SHA51290bcd62c83848fa4b9db3400f22016e8807adbbe5e16d866b4a751a550159a9e717059ad77f0b18f6444895ca0557d65c1526c2d83cf45ce6c11bfb9c7e49bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea721859f03a3fc1766ffca8b70e425c
SHA13b0e9b25f5dc254dc6397303f1f74fc24f12758c
SHA256ee134cc0255bb75ac122c1165b199588c9b60957bfecccc34da35990ef690df6
SHA512e26fe52196e4737f45b465df97c9bebcd7e2a38bd8194310c9c69200d5ddd6840098b53919290e8ba79e900d2be120dd89c88090ef57364ec4e169a3ed704dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6273fb72702d933290d2dc1aec86d4
SHA166490790f2be38e0f34e66acf628f82d6e73a552
SHA2566629a6e47546c6b999d1490b8d22f076427a31fb0bd349db1b97ee65d2c7c6e9
SHA51282efd3fc96610d5ebe3c2bde3247012bc571d19b4b5926307874464e9108784721fc22e36cb6f8fa78927768bb424e2d9484aaac002d8977449614ababdd8c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c25547bf9c961292b6880974ea346a
SHA103f76c921ab4634d17e3048921d9694686242501
SHA256e1f20fd6759789eb80946589afffffa2b4139763ebeb419f1a51009e0f0b1673
SHA512a5de8c966b74097e70a993e45a8d09890899441efb5966be3b69fb339bd0fd5633af58168e16b525eb40412e9e13c9037ecf50da554d43ba8a422276bdbd2e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7ad3be1ab7b3c41a0306a58c5a7f85
SHA199b445b042664297c0874e4f5efb8ea0b8889b83
SHA256d86bab8e40ee16429575103cdb6ffba4f3d5a2e3d3af311d2732da4ec0001d1c
SHA51294a130d69163da9be54aff5a0ddfa6acad32811bccced493b73076f7fc1be605d5b58789f6b57994c15fe5caecb83c4166cd971012e8836b23d6d6e663e54cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2497d3c88feb8ae6f39d1238327c08
SHA1e746903ac900a7551d5d1d65b3c0db588fb20fe8
SHA2563e10859ad91a6f683947fc704d987400adeb99be1327ecf599043af5a86caec6
SHA512670875b89245baa33529f056bbcbe30b7abc1157cfed026c7ebc1a0c4cc68915b486ace3669bcf72bde5e6f48ba1f046f098565ec4c13d62f0839d11aff06cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65bedd1e0ff6234500411be4c32598e
SHA1cf424aa2de0c269551fd07b54e387e247c6e1188
SHA256d6dcc4e9a42c4c7455d2e48d11ac9d1f92955971ba86b7fcf05854d9f2e92800
SHA51253723cc53bd7afaf1ac8223ce0e36bf3ff171e94159fb405034f4ffc5829a5950502095fac5e70b7619cc1fb41521257540df4e8421d36cdfb750d5828854776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f999b2bde315eb93a79096d1526e57a
SHA1333edf0cb6db067b8009a9eaf41b1909a299fc92
SHA2568d7580405f83bdd5c60f5c48ed8d8038b0eeae51a01fba49afa5d4bb4bacc85b
SHA51284ea4b2360ba33b2b8fb1d46f1b6bbf20fddae3027c608d4b20ab6b86a74bcdae88db21703da3d3510f0e792c008ac2379ebdfe77afbf6100b9899d2b1d1671d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512adac439b011c0f9883e02d16a96850
SHA1b8ced60df9bd491fb61551aa41064607df884d67
SHA25610711e840aec574d3fcbc320619692ef54c84d1e001596d1a2ae8f689f759035
SHA5120ba5b9d498b57aeefd419bab2aee3ea27f960e73c156629b678a4010480f3184b1defecffa5e3eef784ae6ba6d6e486bc664272f2264890189ff6eaef35018f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54644fa89733ed1f11244e1fc1d9c6a84
SHA1c5e1ec12a2193966de5ee0edb7f8343f004f04cc
SHA2563826c9bb4755c8a87c287c6080a635fa9f9286a92010cfcecdb5c52fce58d185
SHA512ce2c7d1bf306a13f0e5e243261671f0c99321476db7abd4c3c6bd4169b226d90f7862f4b3b6dd06243c3adb33ac2265126eb6b45efdb76fab98bc32e8bb5c234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599af33a424d7c47df321c81f05cad9c7
SHA119ddfd709c381ccd415844a7b1e50cdc014db9af
SHA2567c77bea237fd7b151e652f494995b6bdf8625ed022441d17fb2c53dd4a430c53
SHA512ac67b6433ddc6fef8a13f1789eb53b6d436bd2678c69c4b2965f6ed0d31aa837261bde73422254ae4131b17f1bac24d7498669a62343da5920bc3fe47f2b9f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fe8d9906ca130657847cb1dae94d2d
SHA128776e9b3769e1a9fee7bd66925ad1bf187dba45
SHA256eb8bea1b1f31e23cc6c7599827b47879844d4cc1be2bdae5f48eabf8b46cd051
SHA512e2c5c164193bee69b6082fe240ff937500588bcf7f1c8e1b3b99078cc5f4c0e237e8d1ce669456441cf66ae4595caf09cc5f3c36e9c3fd4b46f3b379a0f948a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdbf5fbfcd3ffcdc404ff1034b69d3c
SHA176a92ec07198f1d2ca8e33497502cf174aa05c8a
SHA2566157aac3d8635faf754c1ad3a32c185c2510fcbbe6af4e052ed2601c95e03b38
SHA512b98de10738be7e68bd045629a4b6cfddb66a171d7064fd15cec290cbdc6fadfd7bb72ed1541f661e93fd46b376b205e20c4d74d6fdada6ffcd2a73424b2f805a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8e840911a731088807ff6c5ae637a1
SHA14dcc880df86a4a2e42900af5477957cfe3ee22a0
SHA256dfb7ddb52c5838d22bd1b107e90d77e37f07c1fa9cfcd52f3669100d64baf4db
SHA512bdd5844f50e9b3fe23b89311d683dc90d16666407ffed66777f7c9222ac174859d1389a5b8cb3f7706efa88e0c6759f13fcbe5e5b7ca944cbbf503765d77c9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949eabdf3a4b701c5c88acd944aa1263
SHA1a72f4fb96878776115a2f4456c96077f9dc899fe
SHA256ea14e7f958f7bd256fb1ca6a3b410fc532a52c215f587b6f63c5b9108f66da67
SHA512c6257ee7c9477b24070208447d2bff82da9424017873c1963d560ab13f09760988d3a7dd43c01d69a579d582335f1717e2a489d7c448c48a18d46d821f7c6ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56437eb1b01e0abaa88b4c6ac1f1683d9
SHA1a25b0c74e887fea16696661c54a1555a422483eb
SHA256042e0e37253a298432d1f86ac8d2d47d29c9437fc9b108e24b1afcfde23bd22d
SHA512d34c90e3701f37c924b2cc1399a0f70a473673b8237082061391e52c746aa4828f04fad86ca0f138dffd090247f795fff1baced2a6329ef84b945dd562894841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f924f57863fbb8428501d89a61048b1
SHA19bfd76f86d9ea2d441955dac5131588730225ca2
SHA256d246e5c21702396e2710266d44b5cc7495fb6f2ae8f317f7d9e0cd9486f5d8d9
SHA512565b89e7812c962deafc23255ad2199f576aac991057881842b395b9933162ec8e63a01b6e8189cbb0cb24a97c0df76b353208c9107c0fa2fb4cd614bea75841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce9fe90a56e62fc346c89c0e8a3c9db
SHA1f6aa832722730848d088f5db6e43d8508cb900e7
SHA2562520926f7947d5ab082d2330b0939cb709a7a5eb05c738367051fd464bb92d9b
SHA512500f6507d6be8d997216ffcf3030814eec8498e186915d4c0342f64836e8b5229d50572cd29a0aa2b4ae1ce972d1931b9c21f0730288814740746d005d2aa778
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b