Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
0dab7d626e4794909cae23929a56ba06_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dab7d626e4794909cae23929a56ba06_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0dab7d626e4794909cae23929a56ba06_JaffaCakes118.html
-
Size
7KB
-
MD5
0dab7d626e4794909cae23929a56ba06
-
SHA1
dba43c5cebdf75791c85744c0054f0a64bb1d2ad
-
SHA256
5b4b614b4ce2ed88fdaad9bb4e580c50b0d31e12d30335b928d671f08c0c3ff2
-
SHA512
ee2b7798d63d9551e179807115ed5378b7c5171c9859dae026e05f86f8a810dc36fa7e9cf077a0ead91070afd9b1d02f47eee07044cb782b93dc0f821f9fa8d6
-
SSDEEP
96:SI3i2mdiGyT6Lc2bFxXx888IM5XKjl63GL4X9+yGj2wve9W:SI3iGDixXmdR6olPaPveQ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425472000" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202528dae7c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC7310F1-32DA-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000052f0a2fb68c1f544b0a89044490d166c00000000020000000000106600000001000020000000c21ad425cad259883bb136266fd1b1baf171289188da037203ed9291c594dfb6000000000e80000000020000200000001718d6a5e43397c04f0c50fe60d53fed1e72d32d092941aa904c64bd06fff65a20000000479102da91e739c2125524e3af692d007de34517fd4ed73a34baf683352fc6e540000000eb9a1ca94476b686431e339f13e42ec032532d79c786ee5dc688af48bd248b3671b00c24ae843d5aa71beedd32fa4bfd3b3eea24b02a3a82d8d6289bd92c046b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2024 2144 iexplore.exe 28 PID 2144 wrote to memory of 2024 2144 iexplore.exe 28 PID 2144 wrote to memory of 2024 2144 iexplore.exe 28 PID 2144 wrote to memory of 2024 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dab7d626e4794909cae23929a56ba06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba40134711e873ee48c4d428d27da21d
SHA1d6a3437a918d8c556b460dd40eff4f9ed8890687
SHA2562ba4210ec349a0286d4884b40bf370c814772f83b9bb4341c056cd7e1428b6a7
SHA51231b8e6861a9df33f8a127d0028afe88ac7786c72ea03bcb733533642aa3ff03857184787ffe1259faca5f9aee4026940b3de6d790959b10d5520d37c5eeaf3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee4570b47cb593d8c912ced9f0745a3
SHA1287ebcadc729dc16bd358877420d9959f2e167d1
SHA2563fbddcac74f5a754c3ec8587b2c1fc1f7127eb1814e69ab82289b40d2ce91d45
SHA512721ee82ef0b1079bf0dc1ae77074ae3eac1e8aa36b50de3a1d63741106ff3090f5d1a74ff93814c17b36c927a2224eb52d9541ac2144fed9663fbf775ac26202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94a63cfd97ba0d75c3ba9ed7c737fce
SHA1806dcd05c130bd6fbc895263aa1c14daeb8d00aa
SHA256e8b809e3d156e44c16c569f7e6ed9d6bd808f30b0305b067537ff24c33d0c53d
SHA51238438937a3acc3184f7f2144ff407ba4d0cda34139533ceb042bb64a4c24881ca3c589a220bfdd2b120c0c957c8a2855fa482cde6fd1adb292c8dbf9d8b88348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb65a55d395fb4ab7530bd862e85307
SHA160f22d9b0422badc4a2d28fc27e254d243a53293
SHA256dcfe23b09506d6a1661c3cb0802bdbc789e35858d23d0f0abec1df8008eff3bc
SHA5125a0b018971b034dad861184d44544609f1b4b4a2d4f6ed542ba6a0b17c5504e5dce5b63a1bee6c727dcc5c8ae4d094c28b1db0d1bd2f2c62cc090d0aa223a5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f30b779ed955da26c39ad304378a295
SHA125c924ea53937920fa2e72be1be668d996ff44a4
SHA25637de59027e32f91038fb769e16078bd76efed6ceceb3c3145e6ef79ce7b2a1d4
SHA5122e7865c9dc55a3418bc127d908ff0a08741e192cd0fcb5d253d2d390e43b27d85a132482a5e4583066816cdb40a3304f05234f25124ce995937f253bc7e336e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03193c45e350a3c627b9cb1396bcf1c
SHA1e3d742de146ad9caaa4e6999dc9949b5ba3e67a0
SHA256169f9af0fcd035269f44ddc3994423874a54eaf69ad222c890f7b8b84a2d523b
SHA512d4e82585ba6aed596dc95528e36d14e95d0e9163174a7da337b84ce3378bc936340b3b3b35b79723db30c19479cced52f0b8e12be1266dc11ad47df0c491f01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee0794893e2ea8178e15bc1b7bdd35c
SHA14bc16ddbc069eb207d1adbcbb1cf6bf2b1a9e6a3
SHA25666f69cc03a036cdcab602b9979a1fd9fef74a91b66c57a64b1bd58e8b5f30395
SHA5126fbd7f7151fdef2d153bc3f67a178c76804269d958bbca905a4467bc703766d12109764b9dcaae85fcde291bde8bb2fdd5c9f42a14a0018b2be0b7480ade04b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b93b238f54e5a42de1263435e38ce2
SHA1b8220a8d58c3fc355ec98c20b17b7293bbbad593
SHA256b68da6fec01c45649c77af4d6c4c369b71cf68f5277b10f35bc086d143fd4171
SHA512eb224794a997c825991f9afae2f2fc9fdcca5b81a506c8ee3c31c83c8e384fbb3047d5a70b7a8658259d0d2704df3a9976eb012eea28468582a18cecf5157a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd45e987479bf5bd4ea3ee4c919e190d
SHA14ec335191e2bf67ec292ba5f31ba89c8fb795e26
SHA25633e91d01f27da0d1f1d35ff0f55751e3630c43a1543a3d1ad929e8140b33a47a
SHA512283c20f1a8afb3ee70b2098b2ded28c0f2d5c41d0d014431b269a0eced755cff582cc8ccb0f79f18b2d6ecf0e47c21285c2e2878562090dfd8f5070dd05ff5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370164e2d6bf514cad2beba1f0705ea8
SHA1acc7170aa3add8c61e16b0a3355748bc6189de5a
SHA2567999f60cc72d87e20ced437564f09cd34229581920589b458d3bd77be1ddaf5f
SHA512bcaa0fe1e5d14c32974374cc2845daac215db96380a4c9ef5541a0ed0e6cfc1270c983a6c0e821662cc6d4d4fc6e6e2d6753a0475c11e4ce25de09cc3e78320e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4ea48115b83ab68d8128e28d1e5982
SHA108f70140c891c22be4b1ff3d7292a1bfd061874a
SHA256085b08f327b0a87605fde3d8779cf0043127c2a850389af17fc02ee72aa1e012
SHA51237e6f27a7fd20c0cab4e5a0b8db39cee1a908522bd3d2637d604d95ca2cd835dc43d430963213584d3e42905d4e12b6bdf9bbc11c14357d3ed202f2c2886cf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef02aaa61df06d014c75846d81d835f
SHA177fb8b1bd0249ed5318496f04a4a668713733cc3
SHA25660830107e8dcdf6b6124f221b3c8567fc5c18cb47bd7da6a3325b8f967bf7299
SHA51241108028ecb4ea92a7fb8d94501366301fe8d63a73e12432f4c5a72b32a8dbec5d2c973e0d1588ac5f0a501735bcf714a110c5cac751241c057b0e58d2a394f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53499b193328ab2b605d60d93c3e880dc
SHA135da9409d53e0111f9fa055f238f737a877e122e
SHA2562ce2b701dacffcc933c950f94925ea12769668f2758ed3469e7654189129e628
SHA512ec9220bb2b52cb9f251021a3a02ceb6a4e3176ecdd06ff221e6516d3ffc812fa29adff9cb44ba2bf35e6db19b94d4e3efe539392b6942a472515cac5352a31e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50122ad3682e4ff7149590f986afec247
SHA143481bfad6a4e2080b98bb5eb46a337eb36ca08e
SHA25611f087e9eaf7fa91d93f70c4666ef123130f007827c3160ecfa11f98a885dbf4
SHA5120fd8511bc8fd389b340a444f7cb63e3c46f4bf16f64d4bd6604b396190068f6588925bc8c2f03564c012010811ac422f903a1362a735be297baa9ff7b8bb6aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbadce7eae7a6c120b5c389773898a7b
SHA134ad36540ebf374128829f52b40f3ffed5796352
SHA25631adaf58ccb9aced1a2d3c005a7b244720e89ae828cf226ba8766fede12e759c
SHA512151fc06bd8345f11a920ccb19cd6693b5ddabab1b6414fa3bd68b5e6ff9ccfe23b74f3cf523f2e86551382a71d45fd1fe3609249f1d01ed2093e99de4457a4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b903d6e02113f8d6628a97007194e85
SHA154314aae635912a2dec36d7dfdbc5adc677c09c9
SHA25656f62311a6b0a39e124171f7327538bb256e024af56a6b6602e08ffed605ab39
SHA5124972077b33c846c52b386fc98d811514db9d7bc50bb70f4b4531ea93834df185e690ef009ac0f7f2b322bd54fdead7ca2c85f68d61ddfb3ae32e46fba451d78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480457290ecef976e2d9c5e2101a2d53
SHA178ca940084f5f83ded2935965882941d77deefa5
SHA2561b3db9afca27617395a338a09ffec7885be77f910dcccfcd093dfb18a6fb7f84
SHA5129f6fdf61c514ea768f113589876b2ebe4698be055751975766e48fcfa4fb183f34f7d23d5d152f599dbe8322a4099b7b536c4b3c68bea39a4fffda9e28000678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df8a8352ce1756b9a217e70b5433862
SHA11bcbacac5247f21bcbcb8dbe68ceae833c128ed9
SHA256b02864a4be4c0c134286ea356bd7fbe1cf8eb6c2bc6c559ab5980d8a28abe26a
SHA5126b0fafd63c1c438bcd8e1562c330d3f346ec0781a05f25f9b7ba0b0bf9e41493c6a5f4b50c2fbcaa63eb7be3888cf91de27c9374380afa4f4f180706a925b23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85623a08780fd39a9d737f497a33e7c
SHA118ae880884d7cf9467d6100ab2d0c4ccb473b575
SHA256e8c378436391674b9652c5ea95e456c7e5b0ba1bb723ca76552df7e40c8b9995
SHA5126502f7aa330be927a116dc7b335ca216ff4f64de1c70d6194a7b89e1fb595784d6e7641b7b36bdfa0b331e5d7384918e447b56fc5451066c122730c709c69446
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b