Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
2ddffc0977881de7367548029e39cd6d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2ddffc0977881de7367548029e39cd6d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ddffc0977881de7367548029e39cd6d_JaffaCakes118.html
-
Size
461KB
-
MD5
2ddffc0977881de7367548029e39cd6d
-
SHA1
d365e0a0338996f7893f17372e45029deb8eec85
-
SHA256
e134e4c39a5dd1dc153b86b58a9cd29dd8b7a4d4b9428b3a7288b062d3340277
-
SHA512
03405f903581700170a841d15e86b0a689df00eff4dcc434cc58e722296e1526bd626efb6e059aa3887829e44efdbbfa8c3977c34200c22892d5568d5c96b452
-
SSDEEP
6144:SdsMYod+X3oI+YRvrsMYod+X3oI+YZsMYod+X3oI+YLsMYod+X3oI+YQ:05d+X3L35d+X3v5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c54e72e506ddc3dc5ff5b3579a48d186e8536ec7579bd0944efc41bd64402965000000000e8000000002000020000000ce8d3863b6bc141dbc2ab64404dc0c52926e95cff4304622742176ee94061b4d20000000cae99000eb9069d79dcb63c803503f28ed63f9ce243e57891446c634faf3e04740000000ab39a288437579d8a4b7db5e8f057a8287f2e1f71a3952ee0066799eeeccebb3b70fd952298b75662d64b260bc0483fe3bdb17f9941acbaf58ad20b1166c7628 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0998674a6a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FB13A41-0E99-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421485711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ddffc0977881de7367548029e39cd6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c1d0ecfc8d7c50920aa04fb1f6dc71
SHA149d3a359523b8cab0f909db3a053d9f5b553b3ff
SHA2562859b9e9c18efa11c89c3595582e51061f359b5e7aa3c0a4c9767b13d5216cd7
SHA5128da7de260a9dd0449ab0b130d352b44036fc5e4b6ac759bff5013c9f8278787327f68332740d337a9067cf750e29fe90d56d999705a30f213328490eed56b864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53637369f8576214b2898a5fee424038d
SHA1562b97935b0b0915ea2c2494d5188705491d591c
SHA25642abc2fa0e8a09f626c51054b910081f7a4651823c708bedc5ae0c37aa8cfcb7
SHA51253fa81bd89c04977d04f7a22781ec4be6f3f6681f34a1f475f3e22e954a988b723ff490038805e13747bc2b4e246f4d5b7b23c06f757270f3c14e572139c8d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8619b3a6451b3eb5b4e74e0c2446a4e
SHA128f11849fda37302901c2c504ac7b8d05f98e6c0
SHA256479edf12ad63da374a122153cecf91b1ef4d625223afb5e3cfc25cdc9e8e5490
SHA512ebb193f1e5a0c8ccea3e550a57e97f96ee3ce66b6d2cd224b969e445c082c3bb0c2a0d5b574e30704ee9be3e2fa38431e90a9b0524fd43fcb8f30de3bc061137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047ee2dcbb2481dbc4b25e2ba70cf329
SHA1da3dd11f25221edc1dadc7746b1142a979138586
SHA256c407161417c9248c7685e1734aea854b062e90bb10bf7e900767cc360aa5be27
SHA512831c6c1f0d2769f476201ed424f7ade51531145e5a1d8792c84516632df4030829eacc49b4c5aafb6f7a332b82cfb7e98590daa10657435519df0aeed0e4fade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c51ff65857f502d584777300f86ad66
SHA19e7802d423063583d928e531417b1548a0e706b2
SHA2567c0cb5d087509c5c3c92fca69381be87a741e9aa1d04376e839b883c790b2c27
SHA512e9c942cb17512e191f495944cf958ebf430b7edee38188983da90f817f4c9dfff6b6fe56375c2e628c5351bf7b6c6e28bd7395d82048a2254333c5a19a3b833f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb26cf0a25abd6612ed7b014af4fae3
SHA1802f35d1cea4f7b19ddbec65bb3105096cc43c40
SHA256ef39f93e33d7fe5b81fedd5eb3aceb72a09cdf4dc724be54b87de1b8fbbe3256
SHA512e3e3e89581ecd4d313ba218f5a2366ab86db2c3e0fde350e67c07508a4841ea923e1b6ecc9041551aeccd6134fdfdcaa9b6587ceddb5651b393bb3e3b4f65667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc135663090e341b77f1215b020d51bb
SHA1c4739c6aa524611b43388a2388e46c801d2ae86d
SHA25617e8ab3dc2df6c87e6975bde3fbf635f3ef000b832805d54f610afcfb03d0e50
SHA51249bae47b51da48fd17a30c57b15ee7b1769e582a799fafd0262cfacc018c7db10b8c934631e46b0cc4ef68ea6bc8b18c6508701114718237946aef092827c03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575cad6c618a69a4db012a74b28a34f37
SHA145118386a27093a3dba3b8eaca2c4d629683be18
SHA256582c8841bf4921dd3fd796bc7442a0d7ed429d7cf0d70bc2ecdcc4f4618d0e2f
SHA512c10639c224f1aa5cae4ae028c44c65e542e393817038c390b44d83b0e587e04df5aeb164a69aea8ff9cadf9cb6ef2ad0661af05734e2944384d4b62762a1f92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d4f5e9c1cf77fb517b72ff9fa62053
SHA1bf2b56ba9de1621e5b59295f0cb5a71d9baa60c5
SHA2567bf560880f55b18435d4fd43ac04e14632d167fe23f4725b79ef832e8612cd03
SHA512ec8ac956cc8687dd723eef153d7d651ad66d4bca317e4e6ee729f675bb9de7b5bf3c601a194db55a9840dc8559fee71127a7befa46c3fce430151957a61ec759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53151af4a4aac11f19617f288f440fb68
SHA167a2fbf4cb596a9393be905fd39b17170275b7b7
SHA25650d77c9a36079f2f4be06f2a52df6100d8e8e273146ce25fb637e89f41504ca7
SHA5125bf4ce57106dedf76801235a44a5d72710be48dc349e0d8751ebdbf63b648d5d1966c240959b695736e94c6a09d9cd07695d6d066b86d2f5cde3bd198720b484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b675b8fdbe479873ff017434de010d8c
SHA166d7a0eace46d7f92146e580e61d3fb590c180fc
SHA256e978845dc6a0c9d7b18b8a271b0d94fb3e2a953104fa8ee20798f090396ea2d2
SHA5125f1c007392699ad99eea2bb0c1624aa31a40fcc44aeebab8d63c33caf588c8ca6d9efafad24011b462e04292c315cad4626ff076ec66c33ea56198658628789e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd74ba80bda70cd00216963aab8f00fb
SHA145ec0d5da22edaa54125926a595df2335266d131
SHA2564fe68176cc7c2a277d8118d72b4f3b04eff28a55a608155e9570eec3da3eebf6
SHA512b45a2dbe969f54930158b662e05b411f88d459ebde46f6576b043a4437773f8de094a5f202610519989c2458dd9e28f61d23cb5679920562370cc4d9184f598c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520b5e97fb306a5302876f855def654f1
SHA1ff6b844d8f014c26142b8fc85f5e25f63f897b89
SHA2569e41ec1a54cd01658f9da9ec25f31e56231f1fb17f368dcb4a0535b149850d5b
SHA5124a2d26e38800a9200d7c0428e5da11cd2e930fc0e18c85a5034262216aad26b6ea06ffb7353be79a343b641b2f32bf8b863b2f47a5e5b02adfa095573b80b0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dcfb7b4b35abc96b621614c43530807
SHA1315efd4ca5fd54f52d81ba3431c05b4027af76fa
SHA25654ff07c8ad5e309eb47aa951cdf98613f083be32f23af7352f97b617f895dd36
SHA512e8e94202ee672aa845722cf3eca90e7651c6860b4a9664af8b2b6cc29165586b313a127d225961633ac08a4844aea64b8032c8238148c4a7d637415116d8d173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588b11d4f66b592125906da931ad405a0
SHA10d93b19fa1c2a1e6d7131391c36988f4e5df34ef
SHA2568f219002c342af815e28dff885d0e22ff3de5dfa06eead407329bce3857a375e
SHA512e901dbc83cfcbcf5ca5d2b1c5124ee5d6875df285b98a57198e6d23cdf63b74f743c1bf3fdd6680a4a046f3b268782858ccd6ccbbc2181e776e6bc999232ea89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ce323d001154286a732d1c4e4f0921
SHA1aa6eaf908c6400977646dee0b67b697ba28e21e6
SHA256902d02f5058ae2c41771a312c76f3b6aeed29722d93b67713ea315eabd7a2d90
SHA512fd3d5637094ab9829d1c347c949717aadaa19231becf611ca8a992af9cc6a5216d251967b1590d821eb8ac6b4c083f925d1b1b84ae52dc08e1bb3c16f3ed5746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad1ee3aa9f7e8a3bde931e693dc71490
SHA1126b58a39bef2fd982e2b85895cf4c4af24a1f30
SHA256ffcd65382579f09d2ab293382d1ecf661f8871e3253b9f48a50c5edbc8ec0fbd
SHA512e48cb27d09e7c6e11fc92cc4d07be20c7d8ec5ac19c125d5a4b27717b0eb770ee03b64916f278dfc942802d73d47c5145db6f09326f9dd73edb464399bdf6495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac55a69583186e46f70c9bb3fdb0f367
SHA197d87698ab9d03ac7370708892e3d47f11b63afb
SHA2565dafa061e131ec95ca7d8bf15bfb3104395c95091927cb19c1cc7b9f55fb02d1
SHA512ee4b26b6908fd16394e509ac3f34b4ce071a7970245688f5337a5b6f1f3b7814894f647383a988dbfd68e5e9a3477369761b5befa1072f0a6ea8a4129bab7ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b931486e2cfa076697d7d6dabf6ef2
SHA17be1f63ce97570480dbe3b72ea96f28d792656ea
SHA25632982139bdc68c70eec0440c8d25921027742c5916699a6c38b2d0cf3804abf4
SHA512d52cf2bceaa5667662f2473d5701902360c68ace27c61733f9500d66a11a35ac4b2ff78976b2eeb2ebf157927851e3bb0d2a9ec1f59c0aedf291fc8aa80d29b3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a