Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
26ea33d04937f90cfd97c2b994d51a50_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26ea33d04937f90cfd97c2b994d51a50_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26ea33d04937f90cfd97c2b994d51a50_JaffaCakes118.html
-
Size
461KB
-
MD5
26ea33d04937f90cfd97c2b994d51a50
-
SHA1
36bb0d5f1f517b2e07908796955327acfea3a7d1
-
SHA256
f16ae8b6d507f438793ced6a1c4d781b5150ee43aa7ac8cffcff2b8b77b7c70c
-
SHA512
188f3b0fab8fa746e38fef9345572c0655a50a68fd1f63082d1329e79eb6f7c54416112ec9fbf9ff27a9227fa5d6ab6ed16ed40375880e5ab3ceb91915e16f4b
-
SSDEEP
6144:SgsMYod+X3oI+YxsMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X375d+X3q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d74a6292a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421367133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005531b2c771c4bb69fcfe534018b36d5bdf06f319d3ffbca7bf8912edbbfcc3b1000000000e8000000002000020000000113c3187cb2b33478a8a143c784747e0f8d9ca7c1decd2613c549509c776bab0200000008612d266648ab17c6f1b94793e5f0e22891c3c0937c26382834c83443e9791cb400000008b7d81fa8393a0e3d37343f47f11f2375196db2bf80789bca1d0c20af5600ce640edf78d2deafd00429ba41cfd840fd9132d00757adb03964d5ddaee6c7eb645 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89AFCCD1-0D85-11EF-91AA-4EB079F7C2BA} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2052 3008 iexplore.exe 28 PID 3008 wrote to memory of 2052 3008 iexplore.exe 28 PID 3008 wrote to memory of 2052 3008 iexplore.exe 28 PID 3008 wrote to memory of 2052 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26ea33d04937f90cfd97c2b994d51a50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae34acde09b8aa7b65f938f69c053b8b
SHA1197682066e9f37b302819ae172d0acc52391db8d
SHA2560a6f6478a38817d2ed3f5057776a9677fe20e5fc4513ac8f051a7d0ce9d90a24
SHA5126df21124c066cd1e9e3d78dd6ece2f0dfc969f9a29c3456bf0db6ed332fbdd3c5d6278cb16bb135df3aeca5582496c92fa7a9e1fe8da869025752b3a712a1a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774c3622802fe6f9022a64bad040feb9
SHA164681b43df0680e2ba62e2d2d5cdfc6abb1e9500
SHA256a3c973537aeb8a51ea25aeecd446cdcdd2a2ead63531f5f4599ed89b0df049ee
SHA51243fe29b93824888f78b4a1f88c3c5da51eaabfadde6b737e8db0f9162fec19680e00d8e0b70d50f8f60ab0b6ff7cd3dde70409c32f191826b8b9557e85a262b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578c426ca373f92b941d91bd4af572801
SHA1bc96ac97af98ee2911d6fe895f535549212dac9c
SHA256555bbc6d8d9a915f2b71451dc22f40090705296a334c0f503559f98c6f828a34
SHA5127ff3357f124d4de1fa0ac77de996403a3517eae53d8a8acd968d14e258f481d7de5685d61bd6adb8a1515b62c0c5f6a4a14ef86febe916ae197dba003b965074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5990ea8981dde1b59d044a199e59d29c0
SHA1d5d839bf4796115cf5be1e92f8f05f2c75043e63
SHA256bb401de21881cce7916425d3cb9e23621bca326a8322933976cf8a04f4d05f9a
SHA512269e5c717e85de8188ce02b038200e97282fb7aff44c3d4649e039a1c3b59c16300141805b5151905abb76fceea48fe636f5607aa6b3751e95b58db841f560fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f15cdde7721b8bff28ca71f9766f63
SHA1905f81ecedcd14d29d7f895f073944f2701e24c0
SHA2569181c048727308c61c45650b6662f18fbac958fcaf7d5c6ed7252453d5a89cb4
SHA512b67cb75342fc02b15010df0d0d534b54bf10f4a0386c18cbcad1538796c92d106dcb7018d38fd159e83e026d9e2a931a115f9864ad0c3f1c8088ca0ddfe839b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53450354585eaf6116c34b213834db829
SHA124380d57dc3e64351c7646dd934bc8e37346b424
SHA256600106fea0547195dfd269d456cc7d17f0cbc5dbb6686406c4031455613db445
SHA5122057496b4e97eca5bca520496423934ce6dda47bfef31c50f3c9e58c65cd019268cee88e52b671bb7720c501a055db90f77a395062919a85f89a458764f6e8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7d2b2d70e9a98772325646930941e4
SHA1e7dfaed5c880c2e7efda12f3344d392ec79b9093
SHA256f4d7f25bb9d88022777a94edbe68c30e270c56949325d9abade7a112265fc324
SHA5126d0353f07f167fc56099d6bf3df46b777795f5b8a6cbf4b592d77e7c955c2f40a53c3c7e05909a014ff0fa3edf3ca79e3d1656a695212a6ece3dd69300746e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5916eb75058fcca74b1126c8a5b5babdb
SHA1d62bf1d1667d8694898a2f506d3f97cec770733a
SHA256c91210510e09c33825abf36a758ac5ed3b99d014ceeaea80787de8993e45f825
SHA5126dffe601b7605405a8a140ca02fcc7b9ae8f8051debed4c764ba470fbf40aefcdd94be733e5c61737bbcefb7fd69cd96583eb34a22e8da7cec6acd9f25753deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d8aa49f5745c63dfe9365c9170aa77a
SHA1c2d3a4ae0e81bd77cafbba96a741af5ed131d821
SHA2561ba181ddc4904171b7673a710786c747df8590a84d7318d175620a2a09440bd1
SHA512324a01931d8111ea394857eeba6f6dc18c094a379f3b6f2c0f549e1772925f37870e1e100414325da606dcd3b607aa219bdf936513b292b7636a26419d297c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b424cfd6bc7abeca2cce04568670d3b
SHA136ab73de0ede1b7c0b974dd53116a04c18396a0c
SHA256c9ac0138be8e6b502b51cf411aa51576b3724e812be0c5d7732a76eba900644e
SHA512fcb2cbd3504b2d707deb37d490a1eb55d8e5f3a7a1983bc39ddca06398d0156c9cf4332bf84404d09de4e911ff70eae2e551b2a7414eac6cd898cbe18c5e1327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2f06ff095081b0440e0feb846b9f05
SHA1e9b5a88f19bba3c3941ffef9a4cd549cd6c87596
SHA2566c013b0162c2642c52da31a0cf5d167dd681fb39659e0d4a55216e47be06bbdc
SHA51222fe64af7da35c80993a0b6405dfa4f78af145c091cbf3acd0f1aa581a4b5026e70e6620327bc3256e0b48540488561f7b1a3395740c2e82166583e4f475619a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ccaba539c310cda1f5cfa8afc3758c4
SHA12d322d7bf0725dddefb53c0b3adf9326b2755948
SHA25600b3c4abad51eeee14ee2aa51a365a71d6a3446a5d80d8de6c72b8952e01ffef
SHA512bfb708729fa19b89f06544c06f4da422fe5da67c12fcbee541c3ecf3525c1173ac905d8a947f51ae0f97dd8e0b559ff83bed206a5869b61f998e070d743fe1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231101651ad6845919a6976c9aec5846
SHA18bd0b0d710fcdbc9f3e35f02928a076fdeaa4c04
SHA256bf2bef2a06c437831aa7204b9633ba181195fc055c876b96473d59afc7c86e8d
SHA512800dcd012d21b9a41ddccffb4c9bb4f538329b6af4e74d8cc4da45277e3f8f4902ddc1a97c74daef4e743d137960341d6f2b881091a90538843fd746817e09d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5c83a63673fa105e9bcd99757fc6ee0
SHA1cefd798b42f6f60f46d4b44ca40f51b7757aee7a
SHA256b6de7419d13ee7a9cc3a62ea6e67184565f95a8eb801979710e1f85a26a2bce1
SHA512d0787b62ab7e6a24daec13dbe7d6b25eafe372680c37a9fbff663207b52f9ae436c8afa312eeb9f932fa536ba4b4ef9147f1f4341dad6d283efa994fb4370d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfcaa53d8ca4e7a648ad48e567893511
SHA197498911d6db3af513677d394f0382baa9dbf0df
SHA25692f232c5bb50ba2b43f40daee71e5415bfc89592ed3bf206af41139781983935
SHA512236964f7bcd4f78aa9684440d6f59cebdbf61113ff120e1221799ccbb28f4f06da6498f9108b80fcca747db6cb3e16ec78a1ffeeb6ca0cbf3696f7ee494ef46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54511d96faab96a859c89315173c0e146
SHA10d8e93883db3feea11fb56e320acaed86dcfd80f
SHA2566196fafc99c230b97bfc811d880833e6a3b5cbe01e0bfb15b971fd27d47d29f6
SHA51214b97257762e372b9ac7218dac77863ac686c0d8603f2ee164d3991b72e5b9b43870fe167c0db2be687c35bcd569e62ef6a91bbf04e3d045cc99d1f8ee5e5abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efc0db6b94d0ed9c586a23b7ea058f1
SHA18fad930b9585b9232a0dacd60d09d0844b657b0a
SHA2560c01ebd085383d1598d93d6ef9bda65d6899f5f96e22e5d9a8d1a8592a7cf239
SHA5126669cbe48f60eec0e3af8fbb5bb4a7c6fc78422a9cd8838f9f0fae0fd543964fe5e9ffe48cd8e42cb580046abab78cc51665f6b1fb1d4c7ed92d96c014439461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d9b26c396c578c56eede776ebdb7d4
SHA14fc70c3afe11f0b76428c5cd040146f1b1677069
SHA2562c58f10ad76dc9d6b87bb43ddd7042c3abb6bad3bc45dadffd613c5f31f4a41a
SHA5125f66d83cc3651f671fa15fab1a3255df6225cdba3d0239b352b6f0c70c6adc9be5b11db6f6c9de47105f448d61f689c19c13f521985b5655596e72824152298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5472e135c867bdefa97dd309639d735fc
SHA1d367d05b0df54597ad3f29b343232c14d7a9a0db
SHA256138462c50fe2a34a68e50ee3d8a81642f14110398a7fde72f9624ec1a2998ec9
SHA512cca516b90e52049176f84d10bc28c3bd0dc30a764a741cc476a787de7d7340535be054002ab4b8cbea1b3387ad370c890b5a177e86660101126d5fdf44e0d569
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a