Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
175e8b011557132e9e08eabf6f0011c9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
175e8b011557132e9e08eabf6f0011c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
175e8b011557132e9e08eabf6f0011c9_JaffaCakes118.html
-
Size
30KB
-
MD5
175e8b011557132e9e08eabf6f0011c9
-
SHA1
345cc5a5d57795bd4b6867e8c9edd7bf7296cdca
-
SHA256
cb5c00a59362f40685f7814a5b0e10c417d046dc1a8961ead9b2776b0d8b0c36
-
SHA512
690df8047481d81dfe23bdb9a8f8d9fd613997433b39a1f17380666e1d47e765366ece55d5f1ac3f35b73e6687fdd2a5013f25d91f3c6fb7f2ac9a815c471130
-
SSDEEP
384:sMlIcktu4/JGTHIbuCiAt49MaTGLtdIa4t1udHkxiDt78r9O/gY8B4Yrnh8S5200:sDZpgVr5axLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425680983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001723030a8fe3644da68f410efa619e8200000000020000000000106600000001000020000000e827312e125d43fb11afab27cd2f71334dae544b93bf2c60a349beb5f408666b000000000e80000000020000200000001c985c0eba79be5b14d63aefa2a4fa57071eff3a8e04ff38542e60be955c21b020000000923f7b04099082d695ce4a803f12cbfd411b1ed306cc662637f697048356462a4000000009f9d4c5b029974e12ef10f0f69bce9a3e1468d9c9722d91caeba255bb78717cfe1f128f8fc4ffb8927a54e84644fe88c8b267a6696395c463deb8dc55a0acc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F7A4A21-34C1-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c079cf6ecec8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\175e8b011557132e9e08eabf6f0011c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca4f7605bc707eee171ec442357cfb5
SHA1b06f7c5972387e027058c7a2d9dd6a9377661019
SHA25603143757a7e07506440300d04ca04ae43a09e881d26f80a0006e559c46c35d2a
SHA5120d2ab8ec76f5aafdc390c35f8a941f416585b092072bab32dab4782b528ae6def5ed08151d35e9ab2272efa911cfbdd70f856a97eca72bf4f55cd2eacb9ddf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69b1f53d45d4122a805a129d885d56f
SHA1c19e867a3a0a00058b90ee56d65cbc53c16dbe39
SHA2565ec689c35a2da1d0eb1b7b62f983b8c3001d479e0dc51384cc1ec6329f824aee
SHA512e396f62ea86c8014a334afa0224b912ff423c04b72cdf3c4e7fe33602424221bbe758d773df3ab74785d6aa2bc23420901283248209e0eed458836aea6452a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57518ba6d54934c11891ec2f8604ebfe4
SHA107cf11b0aa7d3692933cd0730e8be93918fdcd92
SHA256cd848b464cb4d1d9b9919a3bf4ef7f0b5520ba76ba5e3304025ae20a36b2d2e7
SHA5126085f0548926932f3c9064fb2adae45b34dc635f9a3d1240a0503e80081c376ba35245ac55f49d236ef1691034b12ee6f43f43398de5cc44dacc0e4bc00309d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535107509cad537d6e59c7091c4688b99
SHA158165cc6f84f25fbe9a91b5ba099a2b2ce8709ca
SHA256b0c0fe63f5af654de38b1287e2f83525b24ac834b6a38cfae9817a284ccac755
SHA5127816bd4016b81436e0a06557a6ec51b670f96d8968fa83f96434cb06b48b601f7eb782a51a5b05eb733ea099c649d4f60b59bb3a3b0a49d45fbb52c6a81bcafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b13775124f4980c78e34e884304ff9
SHA12024d38cc9035f28d05ff6a2918e3f9e51f7e806
SHA2563ab644240e9d24f04bda8104beeb6b5d9402c9eb585b60e81d3d07c7b737a7e4
SHA51287b28db96d7b475579825645318b299e82dd9d38a5be91c042a3a2ec62cc07f8e97bd8406205363ce73e38fc6c30211920f7322e3fee2a060c92f4c12c171871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07cff1dd28b39370d7e75677e711506
SHA1ade4daff035a493d31fa7920be741170fb591a18
SHA256fd0d9563a62e655426f5551e4d5a648f29bd9ad9ce2acfd9efcbabc72ee29f06
SHA512dfee70d32dc2142e803c56d23d59552a1c9fb658893f985ea22e2cdb3d28d533a5b2c32d38fd0896a2648f43fb30011683482b33df13ce5b07182818981025f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facd426aaa28b2c9dc980f25ba689fce
SHA1d5ee991bd3d602de82de7afac0691c0c39522695
SHA25603324cedafd319a4bffd1b45fe4a13eddc6eb6a9ed0bdb2aeef91fd000d003d6
SHA512b177f208b7a3d844ecf0c9783f04267e69a6da37cd39b0ce45b43dd6614c3dc1f36121ba4bbc6321a944b0e0281a1ab0b7f9756b55741bb8c03be9421c79a037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0fae06bedc58c9772743e062aa71d8
SHA147da31ca184ecfa4c56672cde472fbe4fd2f70e1
SHA2561e75e75aac94854d7b93fed0f57128175ce7dd23d044e66a7d6405824380866a
SHA5121bc1a8f4803bedd92005e552dc943d779f0bfd6359efd5bc58c03d969fadea2257c54b85953557c5c52602d42230eba10a493656fdd4474b4153f78a26c4e713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f83cd47e0f8c5d0b1df7e7a43eb024
SHA10b9987a0c66db688baff1bd6d59946544e51d051
SHA2563baf9f2c0211f3b94ca656c89cbbfae1db42e9ae33324a8a4a7003d002cf0de4
SHA512328d2dfb11e7ace2c36249fb0cc7af27bd0012f8b03d64a7ae95f67fb7f33a5bdfab1605728c862da68c2d56e61bbcb212e7991f517c17bee332d325234baadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe69fa334de85d3d8f89fbdf44d3b49
SHA123201b8f6890addb6d701e1a7747761b6a0e6c5f
SHA2560cab43ae8cc6878e389cf36ddb0fd2b239b016192c0308a9a1fd3087872da94e
SHA5129f3dc630beafb663344e198fc5685b62d63517116a9924b967cc55c1bfa9b58cf01e9f64982589b60312326381e5b5bdcf3a0a54605f9e9032e00d5dbdf90c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1783f56aca518cac7cb66883dbc6af
SHA1990fed4125348b4f52178eb7e0abd77b7ab392d2
SHA256d2cfde78ce7cd0129507a42e9fd1d51919c31d7c12ac8efdc4cc91c05e4d31a4
SHA512b24d247de8b807eb0f63862e649c38e1a00978a31861d8d01a3ecc2178dbf66369fd67679c10b06f9b791c48ba2433253322c331db21017d00bfd61c93f07e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f641c5e606d700163f21a572db74b09a
SHA10d768c4aacb3a0891e7b45ad645d603923b7a110
SHA2566ed47912e59cbc977de50dd3d5daf2a221354b192a91687b5ee668200a9f0b30
SHA512f378e1ad0d7dcc23cb295884a63f9b3f682dc1be350eb545131a037e8249b7c185675ee96a88b6b944edd7f9a8415ea7644c24ca8493482478f3f4a5531d46ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47338abf34da3d3fbf0a83a79892526
SHA1ffde77e1f84544b3cf4549e63a238d9903254f1e
SHA256ede6d8bb101032490d695339cfa624dc84c7d4c77050039fcfe30cac82b9f838
SHA512c7fcb8c3c0b376dc263081b54b13914d9af7b458ead7da49959cbf0ff6a853286da29e748f8546e5ab291ce1f0898249c29ab6a0dfdd08117198f946133a7369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523617ae84e37d6902d793014f9a7b52f
SHA16216cbf97c45bc15949570025ba6dc2c2a4d0d2f
SHA25632fd29a151ab61c1b33d8764b48ab77399abaebd6fa4859cd8b1a278acd18720
SHA5123fe0cbc69d798715a6d288fc460a62790746b92e973ec88f528ba5096a505f1e7ed40917d6f447ec20688e5f9213aaa4c27d7b1ad93bfccf3f153477c310e996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3b7dffd97d822a2aa1b13f16b78f5f
SHA175df30481b7fde6fcac721a575f972ec0f54f23e
SHA256f63914de163d70e134c4f269421b2e0f04be4c65b73f1d0a43ba3036fa00c7e8
SHA512e9b15628ed5ff891d4dc83586b63fb55e6a5e022e2a50d722900f5a7ea87c640bcc2b263a2e20d6430b02a993b9f8368a43cbfd59f5e1f98bd3c235c07d7f9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa8e4498fa1c9a34a3d2fdeed5292da
SHA12a4da4e21a61b2d402ab5de39772f9780cacef2f
SHA256421f1e908b2161f1d40779b73d7ddcae1e652972025d36f6b00ed9236d797b60
SHA51275f5275814fe699443cb0dbff2de539c85f8d6f7f1ee838eff00de202da7b72ae8dc6d914381cd61695ae43378163cfd81382e050513e5ba4fee8b6e51bd2e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24ac173439765c6c63253434258e7cd
SHA1992eaffbaa8f4d5d576eb551b49f97484e70c626
SHA256d6c97037b725fb0a5a3b9e7de60dd2fba9d73cdb521bd9ca0941c47634c323a6
SHA51297ed2e1a28795843c4146b8f4b992215744e5fae6f9244ccf966e4529713039418ed2cd4ef5e2d3da65b3e25d564fde84a8b8cce386dbc9ca0345beaf442cd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5113ccaf061fda1cfa2270572787f7d
SHA1ddf109b66d8c0eb9873f2653f52261afdf1618c5
SHA25627878b29f7ab87983a7aba5e38837fd46b9c904fe22b81b846f537bc7c0a3ced
SHA512723aed929a2fd35171835209e3b760eccc804b9f72bf2fcf9dc75605e21d0b3f8a355b3792b64816f2f20aeceef23129d0c02bb6b3a9fb8911556fd697bc6c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef34413066c0c74bc5ae3ce7b6acaf4
SHA194c5c9492042523b760af038a58f503978a637e2
SHA256d7dbbc393a484e5665799f6ebd613bea813f3c2e873633750bc5613787f4dbed
SHA512f6318ccedf10aec7f502c23d8054b9682b605da92fe025a082689c565151e7e285cec1aa310c4cfac27a90cb6e269bb40f53fa3fbcdcaeb984fa5a4d0332806a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b