Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
1ab648b47c2df4bab06727fc63c026ca_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1ab648b47c2df4bab06727fc63c026ca_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1ab648b47c2df4bab06727fc63c026ca_JaffaCakes118.html
-
Size
58KB
-
MD5
1ab648b47c2df4bab06727fc63c026ca
-
SHA1
8889f381424faa1ceb984811a981c1d9a8612148
-
SHA256
943c60cfbca2de467cb4dae1b2fab3ce51af6fe7d617ad611a923dcea2a51c5a
-
SHA512
9354e888adcfdaea881931c3e84659e09bfcd05262bd62310d978c27ae218ee7e56f84dac26bbf9143e042b9cbcb9c3c4328b4b931737183290dfc808c6ef178
-
SSDEEP
1536:gQZBCCOdU0IxCFdDufpfufnfhfFf4f/fmfLfx0fXfDfKfFflfrfYfJfTf1fWfmft:gk2y0IxPxm/59gX+ziPLCNtjQBb9euas
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4063bc6196cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff51666970d17c488789760c5c2f6f7e000000000200000000001066000000010000200000000fe5da199c200766a45eca010e438b1b7dab7fefa848ce1837b82e5ab83716c6000000000e8000000002000020000000a3a5a71a7e51c1832d3733c608a61f69ffc561e183bdd469708934bf2122958820000000562e09430e48c52150c16e57693de95dcb67c1df9c335e6c1c63968ad04dcb0240000000a4270ebb41f0d0f8cfce9c3c585ea9e56e446d68ecf32e64ac25b4c54176c290d4b0ebbecac181340dbcd70406b57b61a65a1577b27fadf7589ed4805b8dfd10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425986785" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8039DE11-3789-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28 PID 3040 wrote to memory of 2988 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ab648b47c2df4bab06727fc63c026ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e4d6660d0c6671c77c7e2871918e86
SHA19b01ce8a466f4796abbea43389de275232a0e45b
SHA256817adbe6d0ae4af85760ac165af51995f5bf716e923d9ca6ffaab0865342db4b
SHA512b2e82d0e9205c4b3677fe993c5ab7dafac2a90f54925c86e1e16145d5d279ab9684a5c7d12fbd17a492ccd3122920b3e3f3e64e74b4afe687720ae6fa417afbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cc89316fa2d1105d4d459bc23f349b
SHA1f85ec55993ad4a7c78e2922565f05c59d68d374c
SHA25671895e7c25e177a6a734e8f7de227abe02a7fd1486f2f9a8edc79f3ee3074e84
SHA512c1eaaf10c071ac6b5154857bd58958590dbb70274f25620a518b6903699aa0bd777ccf1ad1da6a8635d4adce6468b043310b268c7e80a25d5c7430984e689b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70ba084664634f0261118e7ce155343
SHA182ba134f47bf1b7b539e01339370d07a6cdbf463
SHA256ecfa1b8f4270a8b060de107991380bf4c20768e66539ef3cc5ab9eaf1b3188b6
SHA5121156362c96e91da3f5b474883cc3c1443d0bbb04d093968686482df7400c64ebf43393f7336774e605436d6833501b4590c77db342e0e0467c3a38bcd56844b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79efc463415dc59e2eda3320a662706
SHA1c19a46e9302c201a75192ec70acdb5252dc5cc21
SHA256ebd0d46a0772ab0592bf2200030c80fb73d976bb47c022b73afd14ff9d8697eb
SHA51208361e518fffff6f91f857b78a4cb582b73c56153eef15cacd2b8240e2f139216cd5bfb1cad198f1deb8d4b6217b6e82b6e57d719e8b7a091d40b1f0f0be0e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd020ef4fcd0a9e7593e1a1835384ced
SHA1705c9b8aa5cb28a666f5ba77906a1c705ad50447
SHA2562e5071e1e75e94aeae1b1be68353081d997cba919209a32f071958b0a99b9989
SHA5124306034e95a1342f13c0ef94dd342bff4fdc018fd0bcc585d0e5f21144741e9cb8bd2172437425f6d22ab8b5abfbc6c65b0feb0d5be08b2f14a2975a967d572c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc24449323a54783dd2c3a5c61e7c47
SHA15b8d3762fa96943a5a62088d295ece97aaa3d03e
SHA2567f0d8d97be22ac5c723e5149de3ee0de5d581451c350257035805cb92768140b
SHA512f11c04be93afe4af3fcc8292f342e2cb60d8553958fe74898a061fbca706813ad1336fd70d8ce2c983b9c854a935097e5b3562ac1b640b28a34c5418aaa2494c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288b99fc6ac30258280e8e094175a4f6
SHA186fe8f8846ba845220ed066b51102dd31f76b330
SHA25688db84c886492104e28f377ed06287639b1981b35cddf7c06d0d01efc6fca691
SHA51226280d5ce229713f44d3adc635e1ac8dcbed78f4b94e30db2aeb236827d7fded6a0609c353b1b7d3474b5a448954dbcce12a4f5941e7a096ed859b33bbf85575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10d74047460a2cb4c91ac5087c80440
SHA1012b13f1ff1406ac1c07ff4632d6fbbdf2d82810
SHA2560b7b197f4c5b4268c048cae21f3f2dde47f0346e757e43a601bcf5fa555c9089
SHA51236c73f75e9605b6f1a1f57051f26bcba612974fc0b6453865af2ca951bbcb0a9715fed4d9604c459d8323a09c4ee28d73cab4997d925555b0dc2a41a38e132fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918404718f7133900dbbdf955dbd8580
SHA1157e9b94a114532614fdcf6bb86bc04fafa81ebc
SHA256a500dbcfa7fd5f23a041d8d4c83b3e797172052d97225c424b81598d8ac83dd5
SHA5128ca72061fb5f02071d2ceed35510d1ad58eb5768e8849f1cdec5f74795e6bb4b7ce3219178b741ec4d2de325811fc0af15c1f51780605f1362ae577968e49b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8185df236dba7b624352b1fa63b344a
SHA1931bc452f16e4ecb2534efe0fe311334fb62711f
SHA2564cd9619ff56d3eb21ae4239c53ba1922b0dc1095a729a0ceafa896500fd66103
SHA512491fcadf7b0f4e68bcb600c56fdaf32ba6bd691d1e2060b39d9972cc4388a632cdd7e61a1f364402b78af30a9f14d897ed155dbe2e000b770c7f057a2a7a9323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956991a08bfcdb6a4de58229710615b1
SHA14aa31e5562b5cef9b239d79b83545350d7ba2d2d
SHA25682b33f4409c63f5823d7e0f1bfce06b5164ef50a6ba57b395bb356421afaf594
SHA512fe907d26bdba1bea9bf576cc4420c1b0a735cf8f2fe2e426ba0e275e4a37ee1e1adf6c97c947b361f186bbe3318629796962eafc44c0d8021dd074b751e40b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50473eb5dc12becb0663ab84e9b88c284
SHA143ca3a5bc9dc8869424f7910a14886c0c5fa28c6
SHA2567063bdf37e5408db1aedd4cda1bd1e7ad2c258b20e151b3901dee26a8782ef88
SHA512410545d3081ada56faeb02692529e2919b9eef954cee5139402faa5ea3739b4b8f7794f01a95e411ba7b7599e240e24cd8e31ef9004ac0a8bc0dab4171ca2833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2872475dbc7fd66b9c77763e3a766f5
SHA139e37e38d034e1c23b54f282dad07496e85d4d12
SHA25698385ddf65b420fcf7e08942e593e7f7c8a3ca7732e0f5f59e158ffdfb3c4e87
SHA512862d2285c5a65f20588990a18d33f210a0502c1155e0eaf4231564ae42499aebc0adf71b0f22e85172a988a6f19ff014ef4ef5740bf676a9ba3a50e2b8070ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52204cec7185215d131a17361ffb1b76e
SHA1030c66a37ce315b3d1fb1021e9793bf4f01935f2
SHA25661f84afa7bcdfc68648dcf9b68599a32e92b70205f0103b08124b501a833b07e
SHA512f0bc1ec1015b4c046d8b0959ca6b600ffd078e168753296a01268befb96fe50f5c320f00079a4d15dba726415d0bb62cd5c7d9e9ad92023bb5fc07d32f1a77c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc2c7aa6ebc0bd7ea16aed7cb444367
SHA19d09a10b15b1510e2fce83cab4f07493d3fa7415
SHA2567b9ed1511f88455963ac555db9dceee5e3d689dbcb5f30063898dfa7554e73f6
SHA5124b41d623e885b2cb82d4b00198d95ef783eb9c3b8af9e5484d99ce10fe6a01b9d284fa86e73efdf935ed08ecf1bfee2e5c083d745007a4adb3f37a6a2f78096e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec7abe5039e135894ee7b1b609d0256
SHA125054db3e29845c926d0425fbfe423705a1cf4a8
SHA25644c2b585c85bb3c71554dc4d2f49bcfa0df3d7eb43562cf506cb2501d39b579a
SHA512c471d0811b65c75b6ae0487091e59076c819a3b5c6eb31ac87987be7c364dd60adf565707f1ec6b6262f4ba0cb16cc31c5e6b2a7c13e8c5d3966773261e85878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ee4ca7447a53fdcff6641e92955c86
SHA1a0f4307cff51921c282fe1bb999d01b9552ffeb4
SHA2566b9cbb6c1b0c1852a75ecbb376d3eaf00007beb93c65760e757de787fdff49c6
SHA51208c47b70514eccd72b457aee4a5628ff6cc31bdcfb3b1ba4ad36d156eeb17fc818c798734c821b1556ca2e45d22af153c86297fb8d52f786746061c33561b4d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ffaf286af01538f60da72ed0ee3f5d
SHA14dd967b3f63e4d43b15ffb52c415c17526634e84
SHA2562c51b78248ce9dc95439393c9e5634ed4fea7396111973117f3f4aca43700a1d
SHA5122407ae3da30469c97a032a45e67e4e1869e2074f3a7a5b4e3c21d41840d971e7eb212a4e237ec44340435f6161202c938d8342656768b6abafb6355c8f1838a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cce5d146a714e1603db9cbd5fc8b13
SHA1d722bff1f218e1896cafe14c247304b23da37330
SHA256a5909fc0152cf27368c5f9c0cd50edde66de18b5a89b8ed2b705818c5a9e895a
SHA512123b3b07d3284fa80d8b35f5edd367f9ae321f4b9320395df98e960dfa1f5b1f685b45114562ec0cbaa598f498bbd8ac992e72b6f51523dc7c37213121395c71
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b