Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
055789f7c82b9ac9419828de07624d36_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
055789f7c82b9ac9419828de07624d36_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
055789f7c82b9ac9419828de07624d36_JaffaCakes118.html
-
Size
460KB
-
MD5
055789f7c82b9ac9419828de07624d36
-
SHA1
0d5205c7ebedc4b5de11acaa20209932f5f862f6
-
SHA256
3c6ea3a23ae4344fd1b93ec6245e851c109c89aeb051b0b4a1e8ccbed9a6c90e
-
SHA512
7db2ac742ed4dcd64b3c4ada92660d8d3985c03f816af04f24231528ce5005d5ece37327c61d6069693e349cba228cfa68f7be86a6f560f3c5f8f7156961e52f
-
SSDEEP
6144:SaTNsMYod+X3oI+YNTUsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:hZ5d+X33i5d+X3i5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420474513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d533177499da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d6839f65c659497919d3309db264a95ce9e7c93d7a04d2be37fa3acacdc9a802000000000e8000000002000020000000502369244ec81d0b6b1abce24eb45160374a0962e151e83fde5f8853cc1166032000000007bdae69051524d120cf198884f989c17cddfaf624e90e2520a3dc165fe3103740000000449d1e92a41b644d734790f380667083608a7483148b48183bba1242dac101c237854a314134136f0bb3aa51a5c8c42f58c2ff9dfe75ca97f2fc3dd9ad7d5e07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EAEFB01-0567-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28 PID 3000 wrote to memory of 2640 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\055789f7c82b9ac9419828de07624d36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d9ffd39ff4811ea640f1476f6de9c3
SHA14f492465f472ef51b55d2d9aaacd00719c0e8afd
SHA256312192168ab070a42ab472ae6e13cd2b3d3ce5dc71697f975619f0b85ba90e0f
SHA5125fed42d468b2c546cc1551a34b6f09184e3aee5f0523a237b8dc512bee52229cf3bcd39f7ea419c3a1d3eeaaefeebd4742311e7bf8de6258228db198af558da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5111b6098d1a1c649a3462901195b2517
SHA1c07f41ac474a295e90fe527fc201198a70a2664f
SHA256142c07fef71be449d222de97ac1ba7b2b59febe0ac1947d34ea361838fd4bfc2
SHA5122b927498a47245a32739f3731a73fa470cc5374ccf780af79a66d9693292e5170746df384f0ac7c616a14ca044e65385fb4fe65a915fe5d7f7687f9a32b12c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d7f13dccebce54af7c00806931edce
SHA1e6c1e3520bb52e8571369a8c8fd39f12f7e84e05
SHA2568ba018f95c86470d09709c9e7e9214e918b113637bdd78e9624b3c7a1869a12d
SHA512a17f3cd39c2274ac278226affef9cec891c9c5d38b2c957a1ec5ff85cdd83920164dc5a49b16e16eba1c7113bea87bb26e51f6c4f97e09f934f1a3328b62387c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed21aa9597ebf0d402993e43b34c8a2
SHA10470d6dbe5bfc145899fad7fb701a4e295e34eaf
SHA256be34187032f336866eb115dce91efdeb29113def4558a98230bd38f804cc5ad5
SHA512fd0a011126b28ecf437ff153d554c35dbac316b2ab6a8d9bffaccbdffe43aa4793ad2724000a7d671194a3d74107d819b93a281e6f147dd8a5df4cdb7b39c8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f859763e3acf12c3dbfb41684dea3177
SHA1fe2f1cc6b57c339ad23447f97ca4204989e87619
SHA25646a86e9ee3c7e65e640988f4f1944064f54eec69673b8f873054ff2dd4eb7fcf
SHA512ea39cb484a403412d9f5a1954fb3d78778e3f075faccf1182877ccd2fa1eb1b473f2e1654026de21c41d1acc0059c5521c7c39958e9e45e0401c1b1343122816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8306bcd0c3bd10600ac935109df63e
SHA1aa194524d9f60672d07a3d68df772ca034cb8cd6
SHA256e0650ccbed78a89e2f6a6880d743fa66215c40c807c6dfc3e884963c43d3a25f
SHA512b49f455a21a014f4f0bc062d0ab6d44185555f7a05b7607c783b2b1cf9d1d1e2226dc40c11a8c7d0354aab23b7c4c0a6af4f7ba966893b4ee1f4722200f653b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c57b4763fe567d6c012c65e9c34e90ac
SHA1bafe37305acfbda18cd461a17ceacf7130393fed
SHA2562cb321f3f545accdf4ab4b632fc4fb342896991b20aa48517a36d913a8d25805
SHA512f5d938aa8d5f1f94ef3f7a55cbbf2b88cb6ea9d6c27a0f71c3d152c989a7468ff198ec19a83f242c0fde1bb2889d5952fbb1e3d1c8eb1a207e326590ae81df76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fae7eb5e32d4204bd51bd5c03720d1f
SHA1b8731415c74f99d88b190af8cfa4357c50c0f569
SHA256a0b294f3b0b97d2940558d32b766b65bdc52c6f7137568a8947b1231f2a80462
SHA51202b366db0eb8b7c7c079ec048ebd80cf26551dcdae3d66aed91cf3452d6a8e6099dfb4fa956b63d7762da31dc097e58fd54b11aa3ca89e800802b137c01f8da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c71b5ade194667e5610baba47f02f1e0
SHA1d16cc80e470a47c1efcede50e289698078b592e7
SHA25641b67f681f4e729ad164168f96903f6cb348301550b54509235a67e95d3cbd48
SHA512c11fef7303a918e819be120737922790e17a75a876cb667a53637172e25e3a06c82b93aef05ec6b6a9785485a5b17e03018e8d32b6ccb70483db38856b387c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f83a6b0e1be083a4a484f2af3100f6
SHA1af6183663c4ad349a0259da3dcf6cdb83879b22d
SHA256ff0496fc5978adf4fd31af159f47e990f2671cc3775c3111e4bdc69c073c9736
SHA512ee699a6b8e1bc6ec2933f2012a977a82b546c033f298329d4ad538775c4141653d59081afa7287c616d17cb5dce8f12742a7df970faf59a8946c375d09d84479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c538f13d917ef31fd992d74a1094d363
SHA1aab0d4715ab33bd2c5919f749182882c341e3075
SHA2565cc118aedee78943d43192eddf70af8c30f95d7238b1649f8807fe2ff6e8feda
SHA5129ef4aa76c4fb56132372594cad8334095bfd21095ee51e7526a98000cebe039fb008e86d3f207435e1c0b266858842e8491d6a4ec33fa50e55c047066d9af349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaea66b804f8a79c92578771838dd795
SHA14e4a6cc3988f8a8d9ef701416819e390629ab6e2
SHA256c2ac8215964c488aa553a79b6448f25cc90f27c9a4445c7963b8eb228a2693b6
SHA512884ff6f6e13c298fb2ca21337831e96dfa8b4a0d8ce0fa31b491561d9cea381d31a99f9059532a192863d671893bffed016f5bb625ae058b22bd480a317727e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed674933f75eb4eeba52c57727c0600
SHA1fa3b73351cb3c8d8cd38235ee1e0cf1ccb1d7dea
SHA2565edb18e8a82ea386879f4cd988a59bf0147e009ab0de286628fc71b0ba3b1c16
SHA5129210631c1f509a7c919d625b33011450c5c2d4ebe49971f958fb18a3868d6001406f0ab25d51c8dd36cea1160231ac7a1c187d3e34ca89a967e7f424ec70d764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fb6b3eafbb55cc71c619fb142608ef
SHA126ec1533601f8894b15dd517dfa5c57a94633483
SHA256f85fbbd7e83db8cb92cd8b19273c2b901f2b4f03e7dc027a803c2ead49b95471
SHA512ceb04cb905c7df1acd4fdd6511fc65a83303acb404a1c6b9e7189f81de5f59e7d9b2f851263028fc666d0f367a88e70841f56beb926dad06b8d04e788b20015a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0916361325855bee02ecc1759f51b5
SHA17b1fb730cb14d1d759ba8edadaac72af503e1fe6
SHA256b40acb3b102291d3501e1036ffe3f482657db0412c120ef521647a0f9818f39e
SHA512bfde56645a252cfffc999dfa08c8471347f84f4fff3196d72251bc37d4c8242dac76694225eff6618e17c8172a227e1d1a3d2f4fe99e973d41b245b1c032ffbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564d1f78b7b1c4dc1b8e4e95234b51dde
SHA1d801fe5923c225efd5faf8e1acd2a4d4eb2abb1b
SHA25661762b0fd8948b55503c0c283b4d08e34efc670c78786b2ad6dce43470e2086c
SHA512ed2402f45fdca525ed8618a094300d4a828449de4b31710c9f5db5b9995d8b2061c5bdf3ba5239b17fd73a657803c7af2041e2b6bdf9a1b603fc847279dedb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b86f057341e0354c13aacb92c9e822d
SHA155add3e57a685e8f3c3561cc138f6948aa22859c
SHA25646eafa14f7786e6a301aeb3019b42e5f40751cd9fc02d8d8d9eb50e74bdd5365
SHA5129ab30b78e054ee950d6d19f6029d6960c2280fb75da541e90eb90bfce0bf3ab3d26cf3515133c70f8c8da4f434d6951fb8eaa2d9e2aeef96ffb8087e242569c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8e3ad281ea351c7663aaa641e95e88
SHA1201743fb29b33615efded39b33d06a304e01205b
SHA25694fab9faa098360b17630ae7e29c84b710c21fc9f23a696f579c2fa6893037fb
SHA512b6763f70bdab80c4c3e9ef456d3d9ddfe6b04a357926a3386ac76bf07e45c434058f18f41ce2e96cce63fc24b9c28607f661563539eb1fe77517d00ba623e217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d42fdfecb15a7b0fbfdac9d2f22ba0
SHA1170a3125b07ad28952e1b330bf07597d67e39d7f
SHA256d503aac75c6d0e7fff292d7252513f424cc4b30bddf80768c4400dbdce9e852b
SHA512487822e726229fb2128e8c555575416ce006278a86e7ef0e8c2d4a4bce3ecfb3e1b5f2b89badc9a3cec721ed02eb0b3fb442aa1afd4cbb9049ada866ae79edba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a