Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
275de9fb3271bf280c4abd1745595cfa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
275de9fb3271bf280c4abd1745595cfa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
275de9fb3271bf280c4abd1745595cfa_JaffaCakes118.html
-
Size
10KB
-
MD5
275de9fb3271bf280c4abd1745595cfa
-
SHA1
0910c35bc259c5c98a60782f1d9e4ed31d18fe90
-
SHA256
1a4f1631a09f40461cab23ab7dc54c344b49573c6b54a542ae55bb9bca4ca146
-
SHA512
97e7db0a1bbc60a6935357b3c3db31d7b8eb78471b4c096f541bea60bb5821ec22e2f5fd193197348eea73198e882b1833fee79857be96b58f74a8dd96c26311
-
SSDEEP
192:2V4lIsr03dDdg8k/w1wvqVkZdgBdcd3nd6vdwdWddda01SZauBuLbdU8d:s4lIcuFG/gYiBqxnQviYbk0kaguLZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93B9BC01-3B56-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000698529bbcccb454098c86722bd5d588600000000020000000000106600000001000020000000c5e63a1e05fbea2c972abb659732fe8d162ac68c8e2efa3b1890e803b44fd1f0000000000e8000000002000020000000e00cc5e01efa9e61b5674d28bbfd0d17ebcf077c62ad27f38253186ab84b77be2000000056702c272cc1c5146175a200cfe6ac6c12f25a0bcfcf83d59481069df7028b31400000004f74797ab2f2514bf9978ef07ed383931af998cc4b023cddbf30bed6201d2388247d73589380b78d8b259539c1feb77377b0fe734fb46066b2955335bc5c46a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426404718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0122c7763cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28 PID 1660 wrote to memory of 352 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\275de9fb3271bf280c4abd1745595cfa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19e7c6e0269b008ab94d24c5948ba7b
SHA13730e32d61c1776649d71e09f79da82c1dfb5581
SHA256354445441f5293652628d2d22b6e66afb54eba46741d9efb46107545a8022e90
SHA512f51f0bdaf93c3c94038f7e416a1efbcbddb02f4fc6b8254568a03a38f79a86f1f7a890aa372e7039ec828a36dd3dd190603ab33825227bd8a7303b927372f89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f37623f4ba8f5ed21783d2d01cab3c
SHA10ee6ce222509f25cbe59193101d6e7689fbefcb5
SHA2567196684a9ad74cd08783a992bda0263a12bbf5ed988f0ccd3d8eb9c46bf89a27
SHA5127ccbc844e0f1c3ed8fbc4387ba69f5f58bb161297dc7662c56248597f2707bc6f3c0627b7cf9f32b2cec36d34152c982f1f0ec95fadcab6688ae272c27a563d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff8b42e66dbacd98be3236822217b19
SHA1920e5a38e90d8f969a2669f39db100649da7c955
SHA256b57abb05a5a878da3a2ecaa943e92d60fe9163e7fb46ad653096817ac5bdffbb
SHA5128e0f37e229648906caa2cd624bae63832a616cbc86197c02db58e2c00e8d9098e3dc6f445eb8ed7ceeb2d5083b5f1d3658f79a2abfb1059dfda33cc0c3c568ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0fb841be222d17f35284959e06a42c
SHA14924f88919a4e8d59ba943ed76486fd66400c244
SHA256aac6f30e3ee217e11a02bd51c62e2a8737f378cb2c17f226e7ee49d5fb81ca1f
SHA512d41ecb766cfdb9906bc98a5efdbbbd98a37d50b2204d9f7dfde4ad5bc51b48e90cbc449bbf46bfb64de66afcbaa41fc66d72347e26d6c8d1571c6008e902123f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595957493ac573e64ec80b5298c75b641
SHA157b4948a0084c8bb587aae08dbd45189dd5ab233
SHA25666ae799accf59398947fa69bc8311c48393b59503923e44959d7ff29c2ceb6ed
SHA5123a2ad69308acbeae0ab26c87e7dbde460bb8b368dde6c1cc1c9f485abd79d466cc14b65a6f2104ab1fd462a70dd72773b5dbeb9c114630ddc3c2a135ed76825a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734b83abf26bfea43ce7541c553dee19
SHA1341b4b9ae0ae1a593ca45766a4653a301c22ed60
SHA256a376fa0a853d1afbb20eeb8dd7cab18f6a6f3c6165a77aee39ee832e756e35b8
SHA512ca8ccee1f6ba74fe07f3d3773032b1939c82228ec63a53d19eec28c3d1d6304a1bddaaf65b03944f6bd943bcd40ad42e6e03603b6c5dea72030abd043c27e2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a672cfc0c5c78596947a6bbbf320e9
SHA1174aa27c507ea079184d3b068afc5f5f3c634aa0
SHA256defff0776a8e022c69284223969d587332df39c0786f35d72b13bfde185221fb
SHA5122cb3813814090db7ddd6d76cb6e0a99c32854afd3712d39895716f82edfe1a70cbd1f3d728ce919ec495a2b613f40dcb4b15080e8cc58ddde23becd8bf5b3ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3496af767effad745821425ef45730
SHA1649d603a471443a28be84645528d4938ccd33bee
SHA2565e13c0eb0e517076bdd2975cbc54888ca176b9278e57523908f4637fce4ed6c5
SHA512d8b626002afd0e0e674b4385a20ac554fa9915a4dc11978a929ac64502a8abc2ccfdb14e71508af266c0d5f079a62e5d7eed2ad2721657bda098bfa76085971a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a361a3887ce883d337aab7a361b7fdb0
SHA169b6a9f9a2097dbca8df90d034056f7dd550b995
SHA25687f670929c20c32afdab83acb3bfbe67863ead7ba1f09af72c8ea4c8b4d0ee75
SHA512386322a78cac1e4368ec01192ea55a4f0c40907bb47056861d1bcbc0cce6f6be3343f90293ba3373e9d895080596a0665167a4cce2645dde37a697acee44ee2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59ac9614fbb17b907d52d2b97565196
SHA18573f2398d3627b4795cead1778ad8f94565b28f
SHA2561541f3802e902a0c9dd0ca64a878ca8d3daa8e5d6899b3619c7e33eb1610021c
SHA512525dc37df9262028c03866ba43373ed014873f82efe6fec75159be560f006f337a0ef68ade7ce5161ec7f753fb486e65cf9f283557169b244109a3f6c0b0eea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ea055fc81bf8d457f45832e85ce1d3
SHA17e4552b275e279457ff9fd545a7bf910962c8567
SHA2567acb44a7c52403d828b354feadc3487926e67c7f873346655d8886f99df0e8e6
SHA51225f95825e5f5777c708846769ad59f77d6a57a9dc268e6bddd37d0e2c8c0ec8714678b45499f3346c235b5aaeaab1c3b1804894af2ffbd33fc8b2b3b7f891602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9998a2ffb8c42073a5ecd5e1a3207a
SHA143209771ce0506d820d0e5551ff2fd62c31a1c7f
SHA2565bb3b07565c1c2dde475539e3d8b7e956c6d715b4d6f5e8e7874bcff5a13073b
SHA512a447e5756eab941080d48757b34af0d1067d01dc1715a7d1e249c1ad524f10167716e24aae41593e6ba756969ba019f6da1d494391a2b6973633551dbcfa28dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27bf91827f5b0ffac57c1f87804c243
SHA199bbabe03fce52e698f0aec5146acf221b06f8c4
SHA2562eac0c1a5e4395152ab44e21c9113a5d81141582864c6a2a78ef6c8659d491a4
SHA5120b04d42a9a72f7ca5fcf6f8bd926b02c3bbb2969c61839b005d51fb9d4a80730777c3587a316772ff0e2ca0b38068a7dcd9fd852bce03c8f978a4dd06ac9201a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d4398f19c614a941a390e0b1631a47
SHA141ee7891dbc7fe6322633ea35f01042e7194a32a
SHA256d228a6915e8fdcbbf73980a4c55ad8bc0fdedacee019585a43ef5e22622ecc78
SHA5123aa197788ef60b470ca4962417c02a128654ce210bcfb523cd55138a5c316b41e8d65673380228390000d27e3530a617f2a643f92f8950fc82d12c748c596901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afda90928d70aaf86b48c269e1891304
SHA1343ef7528657324fd0fcd43eece53e3cb8241a44
SHA256514456c422f2d5b9df1272bab0464a06a24bccdabe89ec385d1161888055b785
SHA5124d4abd3f7052b0348d9ed9a9071eb0f4e0f84b143c0b1b5025258e6545fe5c938b46ef7383e679d68594877405e18277b3334ba34342f9161b6a8dc4c9d88a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a996157d0eea721e1b846930a34d5de0
SHA1e06f8cf226578dd464041d0b43c530d20f541aec
SHA256d4d2608db30760109e6f26c22cc344757031f47846f5fca608c9d2c7b977f511
SHA512b78c7819ac6f78d202097a10f1ba739a0ad5106f7f426f21c4d0ea88495aa44a0f7cdbbdc518089f7e8aa612b29ef7970883df62c3818c1f9104cbe4747a220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7bb2ba9d665f2b877790f6faa05832
SHA156fbec741844f0d49fde4ac00cb6d3960bff74c6
SHA256b28d13c5eb662c6876657b9d8528d4a0d99e8b08c35bbcba603d9f846abd72e2
SHA5129152e202d72a81c4cac1d61bc3af0f0314bbb417b467baa5875bdf4e93d385183014a4d3c4e94a7ca6f946ce007ba92c85241b29088d48077cdf5c18d8370709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532666e741ae7692e6060e269019e80d7
SHA1a5a0fbb64b7e99612930b25f0c805a0e33612f5b
SHA25651cb703fb492441f34316a763f341c68d94c844ef808b03cefb92d4603107641
SHA512171ad25d2af19c025b8866b8ff763a3d98aadce5a6b02c82e83bd9330bb589d7243aad7159d97a0324ff6616da11cc0827bd1094fed3be797c2f2de7d53e82f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c3ad7959231c137ebf03afe8926c3b
SHA1def71b042bc2a78c7749d7cfc781a841a9c8c154
SHA256b38fa381acdd894dcf336c7e4f0d83bfda5e619d1958720df5f3758ef7540330
SHA5124745945921ed0f7692fddc28884af1584045cf7b3bfaf98cd444a09f2b74f977c01a73de010afa41f7827490bb2f306c2bbf16a54fc954690c7f0a85f8f2e9eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b