Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
26c3e1fb2622d27fee2b97046b8fb894_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
26c3e1fb2622d27fee2b97046b8fb894_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26c3e1fb2622d27fee2b97046b8fb894_JaffaCakes118.html
-
Size
80KB
-
MD5
26c3e1fb2622d27fee2b97046b8fb894
-
SHA1
c853a06e572f89e797df43b4bf71899c51555b8a
-
SHA256
d06fee415a6d77a2d3d427acea80594f58f98352e4e2d54de158b4cda60754a0
-
SHA512
932a5effd381b15dcd7a99c6e9cf110505df626bac7fc0817530d8c1b4f5bf75b5c7c389ccba07af2662acbad99e83a0c6bd7fda66e8f4840066ad2b1f778867
-
SSDEEP
1536:SGS/FzPKjh8WH5AVCszZ2wQzRqkpFbN711cX:SGSBg5qVCvTzRnFbNB1cX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E28B771-3AA1-11EF-964E-D2952450F783} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426326944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000b3c4dcb526c1fff4a661b5af48e6ccbf237054eed100c1fe5f211a4e6862fe8c000000000e8000000002000020000000116f924f588e7522bf79b843b46cad5311077e6c4a3bcfbb414b97a5f57823f0200000006f7e0b369272433923288119c602d6da945abc5c30d6622bbdd627ab69f9d76d40000000246269d099b824a4ad83b51c7d0f70a527ac4283d870825b80d3352558d73e13ce8d8e87828fc3e8dea9efcd447850df97cc32d3686ff1dbb679610580ee0cfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fc0b59aeceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2604 2072 iexplore.exe 28 PID 2072 wrote to memory of 2604 2072 iexplore.exe 28 PID 2072 wrote to memory of 2604 2072 iexplore.exe 28 PID 2072 wrote to memory of 2604 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26c3e1fb2622d27fee2b97046b8fb894_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf059937567f1978999009b446e5e000
SHA1b34a5d3decd34d07f1aa1edaff151a67ca5bdc77
SHA25652e8884035248581a7e03469bd62cdd3663c8438055bd5081f7a2aaafbf807ce
SHA512a0192496d5ec4056ca5c95b03785064fd8fa6794f42bd09d47f95e5631517f468426361eb9a4656ebb7aeb0a55082f76ace0313d49f367867bdb04827739c2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01fbc06cc3e1675b622ca6cb7671d1b
SHA12237c84d1b85d2ae4bf9537fa019c9dc899d4ba5
SHA256b03fc9eb1d2e201fe16984ef18527327544799b84e0b1131623c42f15fbea354
SHA512b1f393f43fcb882de5d8dbe302f5eb0a6ac4cdcf6fc5575e802dbb77567fd15f2f06eb917d59cb7e76478300f35de2a9cfd63918228ae298f8a00247c7dfaed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c681cf11237f1fed4dee30e832037a8
SHA15493250f799a8e8ff1719eafbcc5984d7be7f3ca
SHA2561abfca4e768b988066d88ba4dcc93e31ca709b56ba1e36357e21f9a281dce44a
SHA5125bdd03e1e8cf88c41142b3a0a98939717882a92fc8316525ce74447055f5201343ea729bd691300ab887d917a1d9eab986afb95c1086c6a399576ab1ed7d8bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898fd8dbc1b715b066b5da6e6a83025c
SHA119deb5401539b3780dd23be64b9eceec726acb64
SHA256c776e6a0519c6711991a37bb8627ead49c39185897d11b9aa4e4be58cfdc5db4
SHA51298687f4f2cbec8dfb096a3bc70e1e71b5898250113ca623723c200217a2bf5dae26881bb3b3dd1791a8c90901a13ae88e293979d75c3a65ef26de499711b2879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23abf668ae7b778224bec2e7424d9f5
SHA1dbbe9be5505fc7b3e09e49f9c0b4d6da27622683
SHA2561300a70f08a2ffd1d03c68a98148856e3c43b0fb7abc775f91d9106de7ab6fb2
SHA51204cab2819ca58944c0dafc63cd2ee214032f2b9f0f53c9edfdeef8cd70403ab80fbf4a7f897445779a176c06826168f2f7971ddb0e4c394683933860387b4c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce8239a8335f7886a1a4a0b576537ae
SHA19c458e519020133545e450c6890fea9b16f8125c
SHA25638e4ff16f66df226c28f78d8ec4307d9a2c2e629d3e70911a90673459c0813f7
SHA5126816329eff7d970121d0f9f596705c7c12cc08bb1cd93e3031b014c760c4f3b06592eb52f060da4f401aba97bb3850724c0f54eac12a7cd1040dcc2e1f8d66fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fbf925008ab459362c31d9867d3ce7
SHA193fd3c4686ce9e69aba512913e234be4419a8c1b
SHA256fa48f42e1987e456d946f523ec2db8b79e9cecea3f102ffe79bd96e21addbee5
SHA512aa8ce934b1d9a5d7d0da163d948766a25a6402dcf73542c3b5250999a97fea5d43d4f90da83e48e4ce1d9b950cbd56fbc7b0561120ba4e4346182b07d6b99d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce519006b295b37b5ca19f5cd6315739
SHA1a9326e73d4c2b41ac5b1b983365cc20b8321dea8
SHA25628977c54478ef1fc101c31b88a593a6eb7c742834ebd5f16ddc7db6f7dbf9c4f
SHA5124c08771a166df78274a5f77a4bc0a54b558a71f512842f46cf5ea2aff1f2da0caad24d7ab20a24a05e66534c8b6165f0906645653465b277d542f6480368b347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba2f482fa6c16d7f12ec1b02791048f
SHA1c810c7ba9f37b7362f6159086d36a262a133c5bd
SHA256995e5d1dfa736a596e063800d84b765ac5823564d4a475b2543970c595eda7d8
SHA512d08a6c999dbcc9f4560a31928e9379114ebeb72735082b69c90761c9e67dcf8cab55f0475ada2cddb15a88cfec4adc51760bde997907555da5257c968a091751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591100eaca8640015558d28b8b4955d8a
SHA1e8dd8b5691ffb4a97304eefc802686d60fc2ee50
SHA25671a9651b7ea2800ab063beeb9b407a69381c3f20366661ea36b5773e0dc83710
SHA5128cf33a585c2e66c9b616966be7f93f33e051dd4f1440bffff79452b5d829e5e567e20643e864489383cd66f6da43eb103e56d2a89b8c92ce29cc5a10b2eea9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef82321a93a977a608665c2cf0e42e9
SHA13753e4703e145e046a0070a9ef4833068c7a381c
SHA25610166684ab9d53910462b1b9e72742ac4ff7e8e81af15ac61766e379f7cb3055
SHA512512ca16f23106946f32a731fe15ce71a0535bd2f2c4358dc46e785ec680e958f1e2c161efc85cbb7f83b872045a897c56f792a9c4febd0eb3b70c95f0b9997df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e3745e2978f263b8d444cd5075004a
SHA17fb3bd3dd3773a7f99a1797ea5268cbe6beb330a
SHA2569895c34c18a20b183e927e385d1b476bf9ceeb67a6eb23094afbcf315bf3ac7b
SHA51246272f6feef0b8953d87587338fbf3f9d13f8924fd01006303c2030caa9a11998b46aeac5dbd4d3b0d81762a90b3811d126f777a55285ce847a1855f421ab866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53971c61a2fcdfab88f1e4fc3a85872e2
SHA10f5b1a97a438e02ead997a143c38692870de4733
SHA256aa6a722e6e6f25eb25e5a4aa485ac0209bf10694339a8cc1efb0ea72ec964867
SHA512b97ed3e46eca11b0ff8acf44859f2def993244ff7a39a9fddc3cdcd628ccd2986c13ff470d5657cafd2cf12deee6d5d068a3c3116fe477d18a7ecdd4f006596e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a02491283a72a63b4a3319741062bd1
SHA1f08e224ae491ab98790567e1cf9fa416fd1362e6
SHA256e615ab83fdc9f7ac9c6daf8caef06c4298f2e343fa9d7631b5080b198131fa92
SHA51296222c499a0a12099658c2ed0463af07e0cc4a21b5d2c580ef99284408e2d1d6ed165e157c27088cdefeb499a588f7f6d93065b7130dce45e3e9f4e2c3668d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1297d42d8cd7117334db2ece418c91
SHA1d8384c99bb455f88798fa37745d9ad76f530879d
SHA256a0ba333ad81b4ca98c180c9243556f894f1e277252c2e52f85217447cd1d3ea6
SHA512557404d785eefcddcbc5a1cd84c2f248684cbb8270eda3a86024463fd634150d2e736f44fb70af18e1ff9b0c0f717b534e63b3944e2613ad1f45f13284a18950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9a136227a38a15fc526787db0b3c38
SHA1a1879b8f402d842db626785127f79605b634e43e
SHA25645d768fc5b5fd73cb79bbf7b0f55ea7ce9c86d2e1f727c08d4493c31a0b8ccfb
SHA512f79a353b6a4ceaf2bf88a5c8a008594c43d3238f6e008a377b62f480c51b5807b0a9421edd03c983c8ddf4d4baf09ab6859c453fd9bee1c9d4d523ba22f305a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c912b32ce66475ce395cf7847b08257
SHA17d00abcbbcc102db5d7251c4d6387fdd17d838a8
SHA256afc329e35238031584e2f423c5084efa0099ca479e1b3a63ac5bfbd1a1dccb85
SHA512b7a94b18d2e878495ef529e296fd08dbe3b404c04e7c9e3da49a7189f46290388d5d0587b40f7956744f138d6ddfdc1eabbed6b0d922ee763cc61469d8d55c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd4e262e66f8a39bd6ce0a1d0afc4b1
SHA140d3f7db6d6d415651b4918ea4e8844ce4f608cc
SHA25617b07d481d8644bb1b3dcb8f149b2782e14aa51674ce56533ccfe216b265f8d2
SHA51234c38db377077db14decc5bfbde5a9d40a82c5bda1fab95d8cde1ac8441cb617b6394c919502992b1d872f2a229c405d0eeba48493e4fbb6dbe07199c8477838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58891aef1411a24be16a5105735284f67
SHA117962163f18e029aab7aaffa2be5a9c7dafb2985
SHA2566c30b31e083bf2d14cfcbe0b0a8dbacd068a3f103acceb10badea5113bcf4591
SHA512a91469052cc1171d64a3a576bc1045bf0b9ba3ead0f6c32c9ab2f99ff709d492ccaf5f9403ea779d83e14a903f0dcc031c9386a0da8b7d80f66ef944a1109460
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b