Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
274e83a46d03f514d53cc879190294b4_JaffaCakes118.html
-
Size
4KB
-
MD5
274e83a46d03f514d53cc879190294b4
-
SHA1
4bb35d47f42b09f302906e3a123a310c798dcb04
-
SHA256
1aeeeb2dc97c356a6ab08a42c352e133b3ea86869d44d4b43abb7fdb70f58fde
-
SHA512
aac3e9f135a97a2f93f28380a49e43b1005002b6634e08f633c5fc52b3952e09f6a90138ba001cf297a8552d48674650d9696de61337366ce7b433c2bf2c6913
-
SSDEEP
96:68TUdtUqSYniu9Z3otJCIbtlv8g4RCcMBctD:6hbSYiu9ZYTnDiJM6tD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005b77063c4469a0783ff2e30031b2c24b899cb1d58e0924c7413a608d503dee5a000000000e8000000002000020000000a8d246033978bffcac7a46321bc56cb9ba596225851a6ca6a6555784ffb187ab2000000026924201f0dd0cebc15efe91bc34d8d44689bc3aa61d6af65070d4e3832cfb5d40000000896fd27d3204f24e44b1beeb26440d07333ef34e0f1a00adc976dd5321a558505f1b51b41b8e4b055054f4a10beb7fe164c6817eaf9bbe0b1041112edef2d06c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a071efeca2a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421374245" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18366C11-0D96-11EF-A585-5A451966104F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28 PID 2392 wrote to memory of 2568 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\274e83a46d03f514d53cc879190294b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a365f75d5be6604e64613e133e56d8d1
SHA124958475ae9646dd4ed3167c68eb3525d51f5ba7
SHA25622030acbf6642b1f20f2d76e095f485f630827b341d73a9045dabe5dfb8a315f
SHA512b602dc45b30b6a4a76cbe66fe439e36bc02d81f3d4edda9c26bc5b30b784d006e22634efbbec994114b2cfaa995c5b1deda2e31aec0ad4f8b610e267c64bea31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554cdb16e6b5de7ee099ca43223e4c7f8
SHA1debe7527826eb5a0afc33b5b813ed12d325fc171
SHA256192e59d9d104dad701a6ea1ecd8890105f69c60fa9efb949b6367fd6f53ef151
SHA51279c07889c04fd888fbf30ea55e44ad10cc095e2755bd89fb73410c5fd477999826ff501f377c33a485e0c700243806c09f04842e498db0f230dde5f08678f803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596d13f5fca47c0568709143aac14eaca
SHA13a76a0ac7468e469a84b4f45f9091105f536c072
SHA256480d078b6958604ef840da36dd4cd6dd5a215033fc20dbffa122d2fda6f62cbf
SHA5120d75dcb2a9438fe3662e987bb7e58ce428e5761f32235bda47f18c2a04476ec8de62073bfde4476902933c4a2ee02676f9b52662857bb896a703a024d48ee28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583655b77f1c4ac28b42e480f46cc643c
SHA13f7ba1227d6afc952d14f4bfc0755166ea564d43
SHA25683bad888cdd4c27d2f14b9ca833010c9f28d5a6abeeca6582212c9257548c52f
SHA5129803e145c4d8b3a26c1f62bcc4e1c0a9fcc2a09e0c021c9ee4db07b64aaefc8a78099080f2a02d2988f64b65aaecb5a39f64135a76a8e14a48f2f365c67a204e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551c70e35f0c9f56fe694b7e5d8f771d1
SHA18ff19b3a8ab7890fe7b9dead028d025a3f468151
SHA256b9a8334c78793fe16b9c05f7a05f68ffe6532fd11e579aa861bf0822420e61ae
SHA5129cf9aaaef644706b16f7d391be6601a33a336ab8795cf23a6cf50f3e9d982196679769f96632fa601f364f8e317a05bb2b720cb3a0d2a72a20e037b217c30bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb92f7961554f0b5f628f1a95df875e
SHA1510f04958ccddbc020227aeebe25537b4803a23b
SHA2562c2d579263eec7cc7187231f0bf1a0fba7f6d1668077d34bcb6849e581f79a98
SHA5128121446c1b1c8be5e4b37826077fc12de36f1e6a205d83b575e6bc6d9ff35aafa94907d60504b0aaf23533e0d46c92db042abd6353eadae8c06127adc9ab8ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e213211fc31e3e231ca2a54e199fa7fe
SHA100a683cc5795d2ad6c21ff747c2183164118a7c7
SHA256e52632a89868a9c9ac77e6b7282304dcf9be1b8db0bf136cff087bdfaf9655d1
SHA51230671cd3ca94cac724b79d9c6ed936f96c9f501882586511fbc64b7f8cca9680f220fb12f13c20e6bbf3275540331df4e74687b9273cfc0cf374fc8b5ff62591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b92ce491aa642003c88ac87427a3ec
SHA1762bf1ab17f6dca5c5d5e1eef72902ccbd8f4d44
SHA2569707181f048169b317c466017aafc0c903da482a239a548257b295d471b8d788
SHA512f4106018ef89aa9fdac7a58d30979cfaf5677806fcc583cca803ac79a92941fc85be56bac266e408cae11b859c492b825f1ac7f3f4f9ae309850043274bb0f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae2d5ffdf7d83465ecaa116ed5b32472
SHA1acaa89298e03f1e5c7e3d18ad0567f446c9b1414
SHA2561818047e8fd079d386531f949968c662c56a26d3c7fd276c2f07e9276e8bdefd
SHA5128ee558b57fd71b9e05c3f49c64056f351453429d93852769dd0d58ad676da021443309e2ccd3a3964ba1855fbfeb88eeae092e68e0832e9869eaef5cb1b884d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581dc636820f625b3b9028b6a14f2e284
SHA12e4ce2fdd27f9c9320424c9f9bc346372c169123
SHA256349df18316189d2a16ef95129fae934ab02c5533f51fe984a0796140d350b0a8
SHA512f98ae705d4b6445622ffd748de09d740c987ba28fa3975b089d9dfd8bac5e5b85a129241c2773e55fe0dc200246bde6a2a7e4ed370f0b77241f2e9d4c8217d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f14d5a62a46972f1a95a42b49f311f5
SHA160726756e9a4589dde288a07cc81ad20ef22cf7d
SHA25693bc23272dd0bef963b6b09475fbcc28e208f959f34144b6a7802a3cf621b3de
SHA512f7ab7e9acfd3b8db387d972ccb2e3ff2597a90fdae3f4e5145415b90b4428abb3bb9f05a1e8586cd9d1c1d7454299849069330ac858b9f117a5c4e2cd99f848c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56382b1b479162dc9821b2f4be5492944
SHA1d826085d40f86ac1d7efbdfb66c9aa375d3e207e
SHA2566064ead4a02dea8e189922fd781114f378f215afc41d9c18253392a91b198fe0
SHA512ad3395de6fb6a87634fd4c171deb502861b60617dca308ae942747af20d362a16ca5d21a99cc10e0d20d7797793fc9f9e43a6fb49b795c323dd0bc8177600915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaae716db1d121053cbbc1e817fb8073
SHA11687aef0ddc9398cded1d0d6f04b9ccad304ae88
SHA256c61a36e72948047516d0af9854e398dcee45eef685fca02011908aa16903c303
SHA5125ea3c6db43c40bde4c26a92f0136603f52cb968b978555e58ba831faabf3fedeb3737d4397bf87f186f9911f78dc775249d24950b8d2dc38052ff0d7f107c159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b0543f694712d3d38b2b0493f2f298
SHA164b2204a197c973df133c4a8b045085b8fccb76e
SHA2562bb63cc941fcc57ab73d48388aab9a6a11e6875fd4bc2b2896277e623b346cee
SHA51266067ca9680bad6592993d65ca00b4de8a47573f83eb51c8109047a4dd9e0b7f3aebe5b1a98fb2aaf74a50b5d0731b82d5d4d6e0aec6abd8955a8b6ecb46732f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516946cd581c825cf1aa754e65b4db9e0
SHA1ee71f8bdf7d649dd0c08dbd6de9c739983c7053c
SHA2562b7f6fde86c01aa8ed88a9fb26cc3a7ecab76ad1c13d9e36cbca4f13ce37cd71
SHA512b348da5a323c8bdd56a60a2099eca1a68dff015eb5054e1c1530e6ef142efdfd0c85de57ec627c00931c1fd619a8025dcacdee531ee2d7f5ad8d4e259cac4e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d322c9284e5e280bbf0c7449fcafb584
SHA1089379b3df83f32bc7d900889f830f924accd1e8
SHA2569eb8526dc634794c81fca097b75faadac66d62a544517263b222cfc0f871d7dc
SHA512137a380533ba761503bcdef85637c0acec7815b6c5be47ec40677df34386aa73399a1acc50bf7fb6b5225c9149701ccb371aa974e5d747ec077dda8dce49ee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc38703c83dc2ba00fe59e82ddabeb59
SHA15611cf5280c5bc9ba6dad51fd0cf7098fd093f3f
SHA2563460c5323f483a5f72f742c9b2b61bc3e4d0daca18ed9bdcb9422967601111e2
SHA51282002338aeee794eeb3820bb2381d18e9b9b4dccb893415d6aa5ec36f7de58b0caf982143b7e8e22f954c08951e82a4951aef6319685ce5da475f198300d09e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dc68ddc2d2df2e4bc2e3a4358ee7df
SHA162c664b7d76782239854b1d217db30c8e46c6edf
SHA25604d945c1cd66171117b7b367f4706abacf218f997a60b5063eab427c852d2801
SHA512dc843190aff9a2108ac899e41bc1509a98f0360e4ed86aa8aa508a4c5923e9c10a24463ee60a0dd8bfb225d1323379e3307cb1251c33d709d1a3143a8c0895a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568de1fb98788f0ba1c315c8963dd4ab6
SHA1b96754d2c497ad697758de642a2c6f396d5ca897
SHA2569e9a1d4602728ca211a5ec894d74a26ab8517ec4a3deb30c0232e413f8e3ea20
SHA512203ee3c37e677e3b3d0186a35bfcfd22b0411d1a628546a33d4832150ad626e8bac05c012421a2dbd3872f9811d2d96bfb98617fa6abf8f6af0799cbbd68f6f3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a