Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
0994d15ada257c405a3a47a6a78573c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0994d15ada257c405a3a47a6a78573c5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0994d15ada257c405a3a47a6a78573c5_JaffaCakes118.html
-
Size
1KB
-
MD5
0994d15ada257c405a3a47a6a78573c5
-
SHA1
6c541bad18bbbc371b2f540f0fcc4cdf90b99d71
-
SHA256
0165a9afc5a92e335e5ec1ca0def474fad842c3e2e4ae8fe2f894b346c17c0d9
-
SHA512
e4ed7049a79a9abc3e965bd4d78d827029e34d44a7356d06da9890cd464d9c3b3bd1275bf183686cb6993ed71447ea458b2e1d06aac7fcee1d4b4c2ec628ec37
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000051aa1990a3f6d42a016494a03463d15000000000200000000001066000000010000200000000f4b38497980f291a5c290f552d62a8dc7f57a3a81ab5ebcacb67acc2e12c3e5000000000e80000000020000200000000e3b25cd3003dd004246c222674fabb7b137a5eaf14ea6ff4ebb1aada92b7790200000007aaabcbf1dd5af777f598321f7a9f752972c232a577e6324723e92baeb877c474000000068f8962e87930195d41abe2b3d19e552a0c0101c870b9c59fc3fc82f8dbd01af4e41de9384bdbe76ca58c73e7e37e39e6561a6a643c6a37e6dd93956c025e5a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b5125753c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FBEE861-3246-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425408252" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 112 iexplore.exe 112 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28 PID 112 wrote to memory of 3008 112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0994d15ada257c405a3a47a6a78573c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ef514553c5c45cea09e211dd24c1db
SHA1a72e4d8200e3335c021dc2007ad3446ae13766bf
SHA256fc76366201fbcec890f19f250d83cc7a86bd40bf4efd80ab9b16de599e1a4726
SHA512cf405a6f1bbb5afc7e19dae4d8fcba6c1895cb68fc324d7227741fcc4c774b0e6e6cb5ec95df1415902c735ce429e6de4f1ccbc98572115fdf96c2a56f49b52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504727bf1d2e20a868f18aedee9063a43
SHA1d824165868f1fa64ebf5c609448bcf059d1ccbdf
SHA25685dcf8d95577ec7994a2a5f84235905411cf8a551565e23eadabd335755b6397
SHA5127bc81b309ca77467cb11cd191da50af9cc792109b0a34e691a3ed6055f71a3bba25eeb84bbfcefae61d8c3774e1d5f2525aac947466b13ea2f4a3dea4aa17623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41c7aa0a3247c2dbbacf9443c7fb7b8
SHA14eaa2006e1a3f23bcac2c11343e0ebe5c270b588
SHA256be46bf8acb665f8944bd65d8d1cfa38bdb66ac68b334c5247739f3055ea392f7
SHA5129f3e1bbea319301cb4e9df9fc59d2986def46408545d5bcd6c120f3ddd7c203973ffe5f261038a1fa9d23089b6145b29e1543289f9509a7ef1ecdb6b3d6faa86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570adc5fd92ca516ae55e164a2207972b
SHA1374e079d695dd398b251ebfc1f742b5c986da9fb
SHA256bb6c6b973182c74c83a4ef4f22be6d5f13a2804b444dde383c47c03158e2ca54
SHA512b5dd26c66e16b0527dc153c4bac2c027d31c77469ff7d5e3e9314af00f1749850c85c16ac023d3ffb74b8379ea5af4dc2d8051395478b43597dbc24aa2177717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d854df31459e35915bf858bde0f580
SHA151311aac479f74fa4581081c455d224784e5f454
SHA256fad410a2e652fb4a8d84a53e07184559878be39d27d27c891986b2e0c1c12c0a
SHA512f5dce7bcef4817117d3a6e27f67b2fb6ecc2c6edb3c6246e1a532886f6b63eb5cd9c1ef2f9990df3f5c7b8fb7d928edced92d97800f2388a7e74328795143b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcea0927dfa5c75d45be6d4abcce54d7
SHA1a75b19994643b49c73c357b552c67bc375c346db
SHA256be1656d2d7f6f29a33b23bad9be0339a188fb0a06df74f83a5398b143e3b0bd4
SHA512eaea0f2a9a294a5028295d34f562c9c27ee3e03015645b82e569be140691b17b42940e68506afe1c819f083916eafd691981349c3996fa08b78d44855c2838be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549218957741876d2cb6c1bbf63848553
SHA1b24fabf09e1b6699126beeeb8444114aaffce314
SHA2562042e888bdc2e056fa1d2efe48333751ca1cbf83ecfae155c91eb1cca8803ff8
SHA512178f2967480b09eb5f9bc51855f20d9a2ca939c2e0b0b09dae4c08eff49ea0d4c4860195dcb1c10a659a5e785ef8855ae89b3667f76dc8edb5f1a5b8c4a4f793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a53983a1007b6f4bf1ad2bd66a0f2e
SHA10bc9a0f3b00662d5bd645d1b5aa06551ce581128
SHA25648de66978bd068a894d67fccd0601fa28d516d97e1ba34df7e461455da40afe3
SHA512e881cba3780cf0de90fe337d6d3dfef3e74554ac924cce5571bb77eace9c0b57e3e90b4207f76838b9c6529bfbbd86f534f41c2e87b95a112b97e0fd9bdd4a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60cc145d1156fe2f66f77430f887386
SHA1e163415e5e29b5c443c1073660281e184ac21de6
SHA256889287e8fdeaba926a6ff5836f4f59de219e36ec6d0c6480d96f15c2de27e5bb
SHA512aaa8bda0cdf28dfd77f04d8933765d7398e5ba798d12aea6c623af53e207f7429d32bfc930df6935b5968acebfdda7fff503f1d03e9236ce667fee56fdfbf60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e50cfe7e3c5ab612086a413fd4fe76
SHA12fcd0deb2af8c0c479f3bf14569358af9dcefd0b
SHA2567741d219da1dc359ad20ec146577ab826ecf378b656dc659505fc47a2f5a5b3c
SHA51295c95dfd86ffcb4fc0b8dfd02baf9495c00af3ced40658b01bb830613bc6742c19be8cb04c4e7c2a8608d776b49f6e6c74bee62d48f8b501eaab4808647a0c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e3b3c21132a13b9dc1b11a84632cec
SHA1724797ec8af30e3d9ee9b7b02370641c98f00c48
SHA25630c3baaf498972863318b0181204d676d696a4e33ef9a2171c6e00e434b8de1f
SHA51280fdb45aa57b2a789644be2ca02ecb3c12abf3dbf11a23d6676cd2c742a8077fca32edd33093ca19ffc507bd56e34ad84783760ed9e222b6b4d7a4c489dee8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cfb4769223852ac7f849ea771bd12a
SHA1f20f5daf0de9fcdf4e3bdbed4eb8f89e3cbcd53e
SHA256c093c69df786772c5609728eb7386b58b9be1d403dcd8e1a81ebcae36359e39f
SHA512efc0a9539190d770707758d2ff5fd1b9d9384c34a09bfaecdb206ef974a28b11a5d7c2a2e53ec1b1e5c1683ba6ddf5c39a42a2be274e6d6e10c6523ae40138ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f124844066f9f0853672658282444d3e
SHA1815ec754f1140ca606dbfa62017cb23221df3742
SHA25675de3885ddf9b764ce8e24f0db52244474bcf2d6c21ffb0357bde943ce51007c
SHA512824c152de7a2b4d73d6b0b513aa5b92f99d0e119a3bc0c84b486fe10996aa447b7b4b4770f36571c6ed79299d2e1d0377e0e6c0240b2a180d79221c9999476ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c11523d22665cde8dc2e0ce1ecf428b
SHA16b22151a9f0ecddc1ee6b07014b36088627f613a
SHA256fd24b44bdd93244072841cb67eb2e6c42045187875a1aebad9f806ff458d4608
SHA51229b212260cf9b9e296d84fb311a14946c7b93fd40954180d2180d3335a3cd9add33a40a27316352ef1185d21bcf4ccd09baf11edb6c7b8bda1a5b5119d1ff456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560626a95f777708a48c9a05168d817bc
SHA172e80ad3fc0e8e4dda2bbff98452f9f45022d69b
SHA2561b0684deebc55082cf49d2bda62094e9da30d750b741b580f3ce5a53a0cecfa2
SHA5129609cbf5a6a332a2c399f2ee5d903a1deac25ff64dd530c8fae52afe62778eee462a290709d4edc4cc70aa03a3b771c13a99a4a03fc8c1df8c273c70df6a7d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61209f39ce55bdd365dc7b34e8d1ff7
SHA1c980e6a09014c05e1781b9845717f186aa24c3e6
SHA256c7026ff699b1396236422da73b4fb037ebd07a4ce3bacde5305cbb8cb9ac1dc0
SHA5129c04173944041f244eb5fa5fd87671771279ed301922d5eb4af7eb3a5ab13d8230131d874b228e53fde8e1e32258080e7655dce2149bccb670a467a5bd8112b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c2d37bb22b077916213d8f30e86b1e
SHA1d71fef4a325c81802bc0d2784062b4eca6e61922
SHA2561188b348b5480782dfe17dfa71d71a14d6253a9e874882d6ea6c6ccb1713f119
SHA512d3e969d6a0229b44043daaadffb541376ab3ed0eee546f58a1158f9afbfd3e149d5203439343a0d67d2b83c0b5d6156fcb3ae15b194a0c18c18a062a260bcc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d019705bc42eb0412aa1f8ea9c4d411
SHA1c5cb4c81c89d856432ae5b25d5ae929a1eee01c1
SHA256bf2461e304829b0296cc2028c55ab248f8639a4ebda06189abae52f3c27ac872
SHA512e921ba99f99cc94f1713a7424ae44a244cca2bc69e6fadd367386458dfbc7e806e4a5550ddebd665ac8b7bdd1a81afe411814e7231f1edb3de21da11b2b6b310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592700a78ccbb866ec0dbdfe6de924542
SHA1f40e538726ceeef94351023fdf6e437ee95dc9a7
SHA2561ba1bbe5def0f9f45a0d9462dc4dc0b6e434d97d79091e7c726de305944964ee
SHA512436f159b79a8ba843048cb2c6349ca7e206786b19e916ea089822da99d34d57393e097610b7ab8386cae11984cb870dd70294333f628bf32c96a046a7b9bbe60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecac3fb79b236d9b0a32b6afdb7901d
SHA1caebd70e64358b60b9183c2f13d62fd7cbecd4c5
SHA256da853cb79a36d78fd1ab543e5a3e02954fcbe11228f8accb41dba59427521bef
SHA51214e396c66e1a8a087446c46a25e277d65a49584670b2db33d94bfdcef400773f6bbecbf0be2363d7cfb41d2f285b338e01506a6cdeadaa3439065ac659b9439d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b