Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
1803e63a75e8011fce6bec4ba963e313_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1803e63a75e8011fce6bec4ba963e313_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1803e63a75e8011fce6bec4ba963e313_JaffaCakes118.html
-
Size
1KB
-
MD5
1803e63a75e8011fce6bec4ba963e313
-
SHA1
68fe6dda94fcc12a16a472b18b2b3e0a15e1b423
-
SHA256
d38bd564fead13f1979b1a734a7763018e02e952766a9bd4db9e32d296334c3c
-
SHA512
8f5333d6f656542b7ff648685efa0f37cf00b5b24fed55215fee982101e08e78a805c442397db3b50fe64492d3680c810611d4005c4dfd187348a227dac80f65
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fda14cedc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425694219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006439819ae93c734ba311233ebeda607900000000020000000000106600000001000020000000630637a09e4c872418668a2570e6ed830af36cd069b8180d0dce6d87feb45d59000000000e8000000002000020000000e090a0094481d63da31319126864ab2b292e7d04b5386faec519c0f7ecb2a8d520000000608912eab87139a8f74e4d253980744f74e7179a65ad82fdbcdf9d6c9230376a40000000bbff5561aaa927efaa93cada415cf6645fe331352fec36ca3491bb8c5452fbcf4e2553849036ca35cf0f771fa1cebf8c0ba0dbf337fee29f7376112a6ee680e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5147B011-34E0-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2988 3032 iexplore.exe 28 PID 3032 wrote to memory of 2988 3032 iexplore.exe 28 PID 3032 wrote to memory of 2988 3032 iexplore.exe 28 PID 3032 wrote to memory of 2988 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1803e63a75e8011fce6bec4ba963e313_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d760d187b9f004a395f0e6b6a3315fce
SHA1767f0d108faee2361a7d6b6d6513c5527be8c934
SHA25673620b4c29b438a4222d5347a2c7cafbdee1f0b5bd2e834dba1d7256e8cd617a
SHA512944ae7175c0c8504ab59f23aa953f957c7c10d4ccc98e456c0e1220a157f08b22094369d8784c531ade0195186266595155aa792327981d4d2d84b134e195eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565eb60f019ce9166e4c18df476074113
SHA15dbad384a19e64589a9c8ca97b106d92e6d68ae2
SHA25657fd63dd9a882fdbf131a9d370c59ccdda144f33745dd8a4d9e480e313fa130c
SHA512caff49ed37911bcf2cedc1e3871126eb379030e588f3743e81123305a57915df3f90d416249a182028fd861eb0d690235ba98f1e7c3a4be4d0465ffb0bbcb41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505baef8f096cca6c567ecd44e8b4c16b
SHA1aa951292e185a2ea0aefcbc6b68e74f43d28d229
SHA25605afe08127f0a09c02223f4bd314f6a5aac387ea3acb9c11eb6135bd3f54b5cb
SHA512e522f418b7d1403bd118b6b094bcb598b081f78daaa8a1d0f7e49d56c7024ed27440e57bda1d33929c1f168db69c55c0c42303bb01f57946d026dc2bf3cd1722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0d7d02b00fab3d38c42a56edda756b
SHA1690e1bac6bba09a13702a7eddc8d13c334f265c3
SHA2560d2df2df29ba25560cff6f46f32cac48e21340fad76f3d9597ea82027bdc68b1
SHA5124beeb86991253d0e9525aa5cee77a3d7853efc7a2264c5de3b1874ceaf9e66af9c00be9eb307c0f991dd7e240fe0cee90a31dd3ca7b14f0ff2fb263622e1765b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2894ace8b56cc821a6103f0c6b4c69
SHA19dbffcbd1774151405a999ba5ce3a10bd67155fd
SHA256dd580c6e5c32ae3d9a26fbb6cc316a7b8106f48c57f3612f66c36dd8449f153a
SHA512cc0cd1d99095d9eff46070bcaf1535c7d0d34aa6846991480bb6f0a4d2e38b7857f0fa47bc8b03aa517be8b678e243cd67009678cb6aebabf9885b1ebd133c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e5eb7ded61fce87ff09784f5103a39
SHA1d4913d528f33bc6cf1a44da44b80b4c24d05124a
SHA256ccf75df563793087a17f7eb41244ce5dd819bc63dbf6a726a0cea1e9ed13bce8
SHA512da40440b63a19005db899cad606c81c22a3fa8e2e378f9123aad4aca892e99c3e6b09b506f25934365be9f90e7241f3f36bb84aa0a676f03762d56e542806271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c9cb778e203d2c045950a926d1f3f0
SHA1f05b37909503051f974b4ccbe39221ad614056f1
SHA256be8644dc115c435f863eddfc079eb84d1e3bdb15ff4aceac1d169558c2d2d2ab
SHA512f75b519a56111dcf906a590715f271e9122166bfd894aa0f944706849e2bd5ea24a413354578ae03b0a978c389842b6e8e5d57fb995d5fea3765093b31c2c845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d9e080d488a216de12e7bc8d164d36
SHA16ba0db6c30572834acd54a5450ed476d63069ba9
SHA25623218161219c783917cda1c5436eaedc77d8342a3622633d25281e4a5e07c9d0
SHA5120b8c44c1f4d858bac218375c7be56e6091011f321ba65567992b776eb84281c507b3003bc2e6daa30587ab304d80cedccc4206ea9d6ffd6966fbd97f6909e645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec49a54bc8a716274eae91dc47f200be
SHA13ff5169d8c24acf63a1a10eafd0e19d73f741158
SHA25681f423bd579236a9a66358944e4b4bad71a969d0decc9a377e7422ff93f96b5e
SHA512da6f892b464ad892d2915365aea6783cf679caca8953b9047fb827d2b648f5697e50372f0376f1a66c6b472355a3d79b9aa24213846d41da4b5f3994eb76ae82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54642b80b081fea69b355238ab76e647f
SHA16696c4b651dd6fff7bf1a41e362eeb0d07eecf8b
SHA256d695d35cc248643c2b869703d7fdbb3be887b2d7bf1036595ba0c6cdaaa533ce
SHA512494e9badb183b245ece77840176e37f63f7ca14afadb2b3ffe7a7b9f39f04f429169cfdaf5ae1ae243287feb5c94a6d7cfc6f2b41d116eeaba396648c3ecf539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552327fd3d980d47714b7f65fe0b47191
SHA137f02cf30d7c31e30b77ff3fcc347442e289035a
SHA256e3c639310f8fa3c82e59671621dfb73f16a757697416c70d69667b14f2ec041c
SHA5120e456f857a284180ddf8eb375119e7c6a313760ef0a6fb9b3100525ce3a0d103977cce2ce5d09f8864ad4f238491ba4d258e69f3c5b619b225ce31eb8e728ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b490c05098eedb99300b26727dd2077f
SHA13eb7b6ae7f111aefd6261513c3d4cb7c64172679
SHA256486dc9f5858e76c8ed4251220060c754141015bb23751f37b79dca8a1b8b3853
SHA5126ac76635b87725c35c1ebb230a33c7e5e8866f7cdfe1109d607dd150838d7c6210bd4291e84eb356166a0016d14ff076c947d469a54cce9bc205e5765851f784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1f6e6c9f3f5337907968c7b35fd6e0
SHA171e5f84380845890cf88f1aabc4182a3644ebd7a
SHA2568964b584165fb672b244f6c82e0afd362c730287f4568a66f16a33f2477e7dd1
SHA512ff858f942b8af952346d4a1210b2072935f48eb767cee8baec528593790a795ada88ff254e752754191a068baa5fd7e77c2968c126229e39154ef8eead4cb34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a669eea8ff9fa502324c6fe1cd8e93ef
SHA19308f7e34fe2a32b954e5af52cded85f1c5531a4
SHA25667cc06f5e02ce2df0cdf0f53a888cf9477e07ab6cb684dd8652708211a735255
SHA512aa4f3e8dafb89cd06b60090780b722059d3f9b7107334cb4ffd8ed998fcc2589764b5eff0316fc6f40005f2a70fc05c8e0888c35a7010fe7ea9d10dc075fc785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539edc0addf287612915edbefc3536f5a
SHA17877b2a1f2cda476015d627b71820a8c77b9f04a
SHA256d1a0ea669066e2e7f165a8b47cba8a70f0303c411c464ee6c79fe17171172f49
SHA5122fead668a8eab903ad606206c156917d87f31bccb012ce365b7f3ef3ebca812b9026f140867a4ffcd169fc31d846799678ce3e8b17d05f47c70e5ace3fffe118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdcc5cdd3e0e668748c6b1d787801d6
SHA190e4d922caddd4a36b6107a543dda5d2cabb30c6
SHA25618801e6894aedbf681a45548010695fd4c8084eee7de7f1ccaff2a2393176093
SHA5126e6bef475b3baaef97a04826d4e438d5e543a101ee064ce7b01808dcced8af4657aeb936b6ece87f33f7bd81d09eae901c5e2de87d72067f82cfff74af4f3b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30119d5201911fafc004c5697733708
SHA100f4f1d0b71b1874d31fa8482922a858b0d949ee
SHA2564acebeb38ec0af24a83650d7a4b7a96046f2e2407ba5894fc38f49288ce1ee6f
SHA512bdc50cdf0edaab4ca946f4b62c69ec191402ff86fd9041a19e7fcdb5863ef0f0904578d78e4d3c8fafdad5219708b76bc2ac51e7611a9e4ddb9c844d5e0231da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5aff03a6cc2ccba2eaab90696fb74a9
SHA1be6ccd100901c883ff63de25aa66114db0f3a083
SHA256666b70ebedbfcf46c7212658551a4bafc5be91e8364cb7999e6dcb142f4d40ff
SHA512bb2b25b8678860251ff45625bfcc9011bd9f2b1288f1e2479d8666c1aa87939ead5dbfc60e6355835f6c8701c8362963ea359b082e1039f3f91fcea4c49b6ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c427e9436b8395367a7bc59db425296
SHA1c12f074771d8a16a412d3c8dac2035baa4428f9c
SHA25652104a4f0b9abf1925751bfa05537e8070a4f78ae2ba4b6cfc9ab31a9868f5b7
SHA512748d5fb90880a27ecc56b255d106d59757b5cbd05733c4b40b94f022fa66815811a5e8a0b20d454fb0c7af7e9f54cc9a0e1f853bad8a64c99b7521b03dd89d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6fd66a88dc7af9158f69da2b54576e
SHA19f98a607b2140d76519cd8c5562b418803fe2e75
SHA256c7f83426ec5309c8cea0b6fd1e41bde919ca4418ff88ae42992af45fc4fc3bd9
SHA512a16a468b46ccd3729b26f6bec03d6ae8744031d72c696d74181d222386bdf6c87a8ece01388a2f665ff05880e7222d15efa8c78ff82c6801fba605a4e7e230dc
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b