Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
0bca76bcc0547e798b05c7856def9731_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0bca76bcc0547e798b05c7856def9731_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0bca76bcc0547e798b05c7856def9731_JaffaCakes118.html
-
Size
91KB
-
MD5
0bca76bcc0547e798b05c7856def9731
-
SHA1
e76abe9dc5eecee15ef16e008c96870606787d67
-
SHA256
1a5b7588910911fab742cbe75730cd2aeb38dc0fb1b8a380886e33979a5a608a
-
SHA512
b20f2d7db78b635127bd4012e2758dee23745d49513eacbd615771eb990342b58565ab32001482fd0bb2ccc537a8438fbb827a18b315b6a836ded94afa0dd1ba
-
SSDEEP
1536:gQZBCCOdH0IxCQs0qScMeGJHtlYdHGEbsMQy9WoPKm+5xOBOIon/9vIDKdNv4Jmr:gk2p0IxHvPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4075580a9fc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425440768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa850ed23dd25c4e904677afda67086e000000000200000000001066000000010000200000004cd4149caabe308ebe066737966218c1266764f73cc92dc00b89a90e2aef04ab000000000e8000000002000020000000f1cf7865d9ef9b7be5bafdca9ed879a35c1711ae35b6c25a62058a3b1afcb67820000000b62f61c67cebcbee1c3cd9b6e9ee0acfb5c9f85cbd2dd2e1284c87e18db9e3174000000076f0a7b2ec2f43523be90a9f2801faf4f770b4ff72e085134bcb1c6f5cba65fc64d76c22f7e65503d40be7d718cd2819da7df540599077be7e1a8f88decbc02d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34C54421-3292-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28 PID 1652 wrote to memory of 2184 1652 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bca76bcc0547e798b05c7856def9731_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585676f6fdab659c1568297b1c6d338fb
SHA166ed5c0f5e46a69421ab04fc07f1b08c15a1c5d0
SHA256da4dcf16871c4529f721ac657c461429901fd37a246c77e6ee103c69991c5ac0
SHA512f1a518ba01ca89c2ad2b6b5f744a016105eb86ffbf38301200a0f8f0457527a130cb59f9f7ed5df13f7025fab9216f7b3d6a6520b38aae8e22acce09a84ab49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5570cab336f26c4b64cdb2eeb735f1e46
SHA160c53f99a88736e1b036482aa1a08a6f5ff0d413
SHA256ebec5b2c1fc5625fe70b454cf506558f5a13efff3b503436ab42b722d9745e3f
SHA5124c856a5f7d83e2f0ae9ad089d19fdd60e76bfa292a5b0c0564951b596a6a9caf3b11548395ddf388f6637ec7b1fe190086565133f7e978927f00fca7b8ee7af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b0d0ae82674abcd322843cb23d6850f
SHA10ab3c0c085e51a4ed6c9bad5861b566596d5a73d
SHA2560a039ec1e7603aa0411233196616b1bf38c2fb102b4620ed25dce95e2af64457
SHA512c802ac08523370ebddd6f7e7af23c6df03dced4c751925ef99b1953800ea818e5e3bf287117d79cc22e802a01876a66c7b7df066dff6a03622736e0e3bd70b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5424a2f18efda0927a7fef4c3d20752b1
SHA187dbc2838969266d63cf73e12664ba39f86598e5
SHA25691b0f0ddc6d93c544b94f24bc18b472a3c9a780f97c598206ef2d9ce27070744
SHA51288ba24002d3aa6e889f72209a33cb65bf69bc88aa2bf65b40aa8d36300cbb20334a2e0520a5f61c03a6716d48a057b4bc995442d0ebd27e98d9a897ce8322b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b0e29bcebcd6863a548a6cd05582adc
SHA10520cba37cb083043b63535eb772c3427e2e504b
SHA256755ce03aef5e369313209024b77ecf08962700ad3a7b58939c72bc2e5e837385
SHA5123fa7e82a05354885c6b475fed22277215f12600a277db41bc4041c64af2dd4dbccae18582902bb0756e0d8e8f4b01f29e0cc1ef28d5a31da4d48fb6d15d93a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e57765dea32716a994db71b3342a0676
SHA165ab441aa367091251702202e66a2a37947dc111
SHA25681a65b7662cc4e940f6098d0031c27971bcbdea9691707297c5ef1282b9479e7
SHA512f69ff6e603782b58a88b5d0c4b85176afb066991f9e5a10038d893f0be0f1306e1ccde57d0beb10ae9f8f1cbdd3bcf13f36ac22808fd6b2ef0054e6e4a280607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f87d77734aababc69d868e46315467ed
SHA17d7b9ba6f098a057e82e840228d09da74e4feba8
SHA256366b616a2355d9dd048d2309b274459a8bf6ac5026eede98dc834c80f91156be
SHA512a00ac1077a44fc268a8259d053d5854f848c6f8fe2266a53e6d531f13de834d4905ef4ad2b2c2c9bc48a847076119b2b69d726c87b523e8f298baedc9abe6685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5bacc62096e1c0f5f567e6296fb99cf
SHA1d80ba04b9cb502b35530f82fa31bbf2b774d231f
SHA2562db6138b7a128036666a3c7e45a41018a8487e1a6858026742de8c5afd7f1840
SHA5120bc8a6d08fe26a48dd3e3e6771eedb9669e9b63367df8a18639a26117233733627e5f06b626362e79c1103c1ce590165a18beec19e57a82ba873a076fc959bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5870ea737a9d314d4418cdb4cba9874e4
SHA14555e871e96e63e5c923e3d573fe5937075a75fb
SHA2560de8462ea8a4a204d92c5891e8ab98e58c8416c6d23778d7018e9b062ab059bc
SHA51251ebb01c873c0b3ca5f85fe8357c51306121f64871776d0bc98d90620539175d76c3dbf2bad6b58c3b5888dd33a69c52467f56243604ec35cacb86118a7858f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7055e333a32adbdebcc4b3a921c8708
SHA1f7cacb0665ad2c28ab0f7d24ab59e6f20f54656d
SHA2566924c9b83c7417d4dc9c8a286bac3fa6043fe69b8910ae41240d35a7a8b64ffc
SHA5122ee4de24f70b2f330e9758d95e1f517085a275d70e45dcda6bed972512a4e541ce21c54ae77d5a6abe5d4c4ec39ec3674b67c6ec1774c05945f00a5ad71be3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f49cb3ebeb103c9c845c0d7faddf601
SHA14bac9871589287523641a3eb740e541fc07efdbc
SHA256c70389f85ecbc92f28f01fd92f90578d23823cd756b02daeb6d1e365a0fef3c8
SHA5129ed7e1032b02334f5b616730faf15ef2370cebdde0db19b676661534dcfa308ea1f86b3ba957caebf5446893872e8d04e9c196faf6842dc476d970cc14d180d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50be9fe54045750dc132b15e9995e9b4c
SHA132aa56fdffd2d78ef1f1c95dbfe79463c03a8348
SHA256edab49911c8db691f4f201ea4035c1205d7d7d746a4faec170ef816ca642702c
SHA51299d316663cfa9d3ea8334c9f283316a00b429fd8188359d0299ed4ece124eb490aadb5131b0c699ca5449f930961bd75217194a7ff4024f0270ba3ecfc937aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fedb5e86c4aff454bc70c6eebbc5d25
SHA1d57adb80e80cf8feebd17491f4ee948cf1df3671
SHA256ea28eafe8d62afdf48e5f06ffc5a2f764874c9bf8ee4b49ffcd02079648b700a
SHA512cd332d994bf0aa90e5a4cf10df39d303aaea657b7778f7046d8aeadc87a08abbd550cb3ff409f250af104f7fa0b991b836d1f0e6500e51eb22592dde71d241df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50170e8921e22274cbd8a5d8b2e211bce
SHA1160c352e27e36ae3a4d00fe12a14169eec0b4f56
SHA256ab8b86519dbae38627e6d63767af2a6145f459557bf7f6361ef33404ed880eb4
SHA512dc66a9a44b14169eab6c4b578183e78f6a0c7b569779f263f4d0df60e8f8d91504897e8ef381006417708479d86ef24aafccb2206b2a4ff078ada94895a73386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5c5a1a4602504def79ba7c062422977
SHA17bdafcf0df1d0623b12dcb7d56ff6f0255f4aea6
SHA256cedc4f34881b8bd7f3c1feacd411e31096c5a6721b8219ea65829ee3f05036ef
SHA512722b3b41994513a99b89eaf631f53995026cb8f5beda8e75d214043c57abbb6ad4df5b0b61abe83911b6cbf876b1a3c619373127f6e1afa37d4c560d0f2b723e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ced568c5ab4a8652e7283852c18f1fec
SHA132cf903de8c6d9fde892d5f87550b10dd149c1e8
SHA25682a8addb99d7ee0ee81156237fb1725158556cfaa6c6d7faf9696e88067ffac0
SHA5124f47db1663a0a4acfec51491c8d6ae701be4f974ea9c2e1b966e18bb57fd4c98818b0c543b82f48a60592995043a88946d518d3c5d5d87389a0e16e96c8f3807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a932d6d8835217bcdb7efec5d24a2ccd
SHA1698109cfd20382f88432fc366745394bbc16d3a4
SHA256cf50dc9216127725dbf9cff22a492af8d0968602392dc89ec5dfd38d42298778
SHA512f5c07799d0358259ef989f5b6956682bf3f30c51f1429f21a9876af1c651cbb561ebd20aef33530518333c380943428d5b9422ad090cc7a3edab7604b5277937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af095c62a10b7ecf08afbd95aa8b33ac
SHA1f21d116c06bb1c78dbbf10c9c1bb1cd707c5d272
SHA256c43931aa00646fe8f22aceb148dd7730587f1bda2a235229ceddb907a9285200
SHA51244ea4f885aad8bc3ff2d6778907bc0f1263a9429e1d3dd8082042b469141ad58f89f18a546f8661d369787a0fe1bb94b08f20f2f73b2b6adddf9f9d9bef3d413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524bb1fac02d70ddea545a440aa1f334b
SHA150154952f063e08a82f40e50be7fd1f73007d295
SHA25670b5574790d502c45192452af4d598173f6f831d1ca8a9211b85b68a4ff1d4e3
SHA5129ef132314c6ca5440f832a74bafc4a6ebdddb7d46a40b93c15a177932279047fe9b9f8cd8bb02f40eff14e3270f35b38700638f8ba36a2fb28aaaa026c4f9b2a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b