Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2e85ff59f02104be71e57d7f27cde885_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e85ff59f02104be71e57d7f27cde885_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e85ff59f02104be71e57d7f27cde885_JaffaCakes118.html
-
Size
18KB
-
MD5
2e85ff59f02104be71e57d7f27cde885
-
SHA1
228dfddbfb9a27270aae1df10daa993446a56637
-
SHA256
58a1e41e08268717d9ad10cc21424673aaa5587e2bb68902811e6d31410dec61
-
SHA512
d8659bcf6cc02c06c5e38e41ff794c8e52b1869aa84883f869f722bee1daf573e742cee93aa45e72c2dc8ce0a10d808f559980847cd91254e1ce445f03917e44
-
SSDEEP
384:wRdf4r6MIL61oDu/JG2q9xNv9xI6IXNbFsmn1DnTZFab+I:OM6JaJG2q9xNv9xI6IXNbFsmnNnTZFav
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421496166" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c205837ef3f4074ee6ff0f87f9950bfdb6e16e0c7894d83b256e69e495498a90000000000e800000000200002000000073033104c1c1fabbe702a2b7b65342677f5ce5b61552ef8756a05ef9119cc56720000000d84524950e1d80f37fb185596366f5bf85f8433c5f9772cef802a679682d89c14000000027553004550544be05e9225589498204f4bb1af0faeb5f7155081043479c0cc443d976570e700d862cacb31e26450820b779fe5c24325081a1d9a56e92164a53 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F756C591-0EB1-11EF-8FA5-CE57F181EBEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d759f6bea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2536 1668 iexplore.exe 28 PID 1668 wrote to memory of 2536 1668 iexplore.exe 28 PID 1668 wrote to memory of 2536 1668 iexplore.exe 28 PID 1668 wrote to memory of 2536 1668 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e85ff59f02104be71e57d7f27cde885_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2aee55c09f535a3b02ff562b611ad2
SHA105e01ef0fd19a744fc1d77904ff63b262e74666c
SHA256ba17c137883bc71512c49b29148f13119dfb0ba9374e9c96ffc21d3d1e64db17
SHA512ea4a8f49d4ade2c076ebed9e5321e0d14029397daef9a1f50375fe5e79ce3bc4c6ade2c5a83582e0247c889c0791d0fedc2d474fd14e6da2a5bb34a093cde029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525707a2227848fb0e0ba38e0a75f7387
SHA1f0dc8b2a0cbdb92521b0cb869a3451e650879246
SHA25642f62728a2c5bb82499b4f8f2a2b45b31c629207caf9ca2d7c7e2fe9c2d15e38
SHA512b8ef1836d3fb7b18d6ac4dba43d425eb14790a93df7fbb6cf085a8c18c536d1cf6438b6e40f250804156c9bf01d33e348b5b3aff7b42698f931844b8c1038f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d85a15576ecb40ebc5cf9170dd3a65a8
SHA1b51f30aefa0092ff13f14a5ea7d6b7806f39a9a2
SHA2565037d2943b4d72e1fdfd67622665454a8c636e24ef58210519c5213d5da9cfc9
SHA512e1cd8b6f127b55388bc96fc62abc95b072834fa676da70cf8bf3dbe6081394f48bbf2d224cfe6ae32cec7131485a4866a85af9fb6e6392c24dd5ec0ae3fe68dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df314f625197294e365bf1c7e5a8e34
SHA1284eb26d9c0c25a52742d1f24efae2a5983987eb
SHA256395e31b65574eb3f3d63471fb2d517b55362e8de2f32203dcebcf02d5e5230eb
SHA5129a39baff58cbc668aeeae8a12e7b5db61814a52cc0253fc82932e26c635496e735ee45f4843e4dcca851577ab3b0effacbcaded2c1df3a4eead6f634d92dd972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52caf22fcf8ffd81edbf33744ce139ee4
SHA1d1be74e0243a0d5b679b371bdcbd6b30531f9842
SHA2560df722a6360ae2dfd161a6278b182fef30aecf94a039df15782bf9bc06671b16
SHA512e97056e3eb906cf6382d20bdc9b6509cdcc2e35c9465ab1b71b0a35df569f29005c8d569a107b9022312eec569cdfd7e7fe36e9b0fcecf76350f988304b03277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f98f0a1e2bf7d6eecfe939e5d0a1e94
SHA1ff25c213cceb98facf2cd22f2b96105350c9b6c0
SHA2569dd34847040e881fc9581bb877df02d0892cceeacd2ad4abc20ac127732572af
SHA512432355e8a790a734fc4183482334f474d21bd2f4e2fdbd20b1c92861d6bd891247d48d8d6c4442589aba92e7cbafd9b6e72844340c2ca6e7d1bb01dbd732bbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51618b23a51db4c8b48028310d52495e6
SHA14ead84e458951dd8c7bafc6b30621042234717b1
SHA25646b2ba985fff8015314d40e93622526847cb4f76864888ebd704a52afc671103
SHA512227b8f91457c5b703bc6a84788daed67b0eb36cc5ae4b1907f4f22f6daeaccf94b30e7647d585a147adf5ee3950a429755951dda59581c11d8f40056cf3634d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1fca4ee4204e73f3127f338a51f718b
SHA1375c009a4c0a9ba2eca71a503fcd906864412c71
SHA2564c3327f9309156542e44069cea821d754ab952fb784b6918e3b05c194aa8b0b3
SHA512d1fac4ad221f6eeeb5690148797549f4198fb02bbae9156e304226aa5f953f4c2dee74d4dd0f428639be9541142d540a0a01dfa094ef5a82c7604850e79b0915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba7e036f25614ff3bf8b9e0da75b828
SHA16aa4d9c51a739a2d0a5543de169137c1fe7331d4
SHA256879c83e79273a5a357b0952cdd0e7977e1a2487149d4c7d6d582c3d6b4cad331
SHA51263d03ee52a1c4fd35bfe2df4b67fdf22ce016fa68fae01644801956fe4e8312de3588018ddb6cf7a222d82112cc3ac926086620ea2ef6461cfea947244c3ed30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe18c8046a787bc468b374cabcbd5e9f
SHA1a83249cc28e53007f10f36db46d1b8d5b4e92a73
SHA256852d2b31fd1be0dc8115368bfe81173d0b87a6a00f9102472e9c46520f802288
SHA5121c7235c0b7c1d6531b5621a5fa53f2a24305672fb58875add10e3a522b5a27ae2bd74ec1de798b554c3ddd8910875eb6958aeca991dedcefd50de2836d1013e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef29cc11b2031376bd6384947b7a7a9
SHA1df40cb83efb884aea0f0275e4d354c54517cb003
SHA256621d8b45a316c896d268e11e00395ee150c7048162a7bdc058782db7c141e6a0
SHA512841cc03705015ebeaf59f051a133cc09848f586eae7590286460f60713e05c2377921c802282281c7b70d7c39d3e498f31f6a360c0784575e55a839fa823ae60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c08b5afb49f6d00da821159c768c5a6
SHA1fb459590953465f1232f6c3c4267a153fc955383
SHA256b8d004eddd0213fb31ec0b51800666c212c8954d53d046a86eddf8c6e8c004f5
SHA512edf471b038c687f5a9d496192206750c08130caf9c7ec759474ad0d90efabd78b94b0a4166af82a41631a3034e57926081637847bb84d525be339534b45d6d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55352f84108503a2e7531212922dea921
SHA1a229ef19fbd7372b536052aa1b4fe95289e4889d
SHA25623fc8422053c657a429e93c9a6fa7ccf54e20a925271e6e3f285592421d0ee91
SHA5129eb3ce01e541586e4b242ef499d77466bb39a358e7205eeb8750ce82e9fb2be213c8a17d993f3f28854c8d3c5808713d4b06398c3fe9beb218e874d71575aa8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57386b1a7ebb247a97f27f4d280522b9e
SHA1a8a3fa76ba05c407bfe9fd0fd3ecb0ab57c58ebe
SHA256f354027e5eccd76df35c7488699fb5030e8a95c246421a89b1e7d2f62c3da9e3
SHA512b969c11b75a58267f07ea99eba676e0620be5aa228774ff6ae19f63f250b3af76b3e55965896044429d0b5c02c3f8774a8d35d58a894bd34c2da7e58872cec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5167bc56114e06c63e9ba90d1311297a4
SHA173b992f2b30c4ae9987fae2b894ff53167f3dad5
SHA25679a0544a48662a70beb86f14f9e2978ba78ac8c4cb923b7bc15b888a1f456876
SHA5126bec7e8d1af1fff6d08ef37a242a1cadd3dad5ad16d7e3baf54b982a8e0fecde9d2e7cdc36a3e1da83231e59f06e1244e3784ff0146a493c1201512d50185ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e92f067bd25233e4b6e53800b90b13
SHA1dbe3b7c9eca89ff038ef1ee6ee113e6db832fba8
SHA2565c844d8bd9f13bf946462d351dcc86e64dde13d8e655145de4986c1b23771ab5
SHA5126d29c03e3f81d2ca1cd5d6184d01c6d59fdc9c3032b1db29465ab3e671a349a6ea09d4ed99ebb60dd5cb2b4d89da324674f082cf1a2b0908d5e6846c99591366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9ec9ea9173a2dea09a0e21031963e15
SHA1523f57e2e3511aa546690ba085ba9a2fbf2a0e32
SHA2564c43d7299a6bdc9cd49e91c9cdba78af1c2fc2fd06b2b97191c5f820d3cd134b
SHA51255019d4f85302111b29b7d407872f19437ee7ef99efb3b8f1211132ea857a90a1f1d4a7cd89fca452c7f99f01dac173cca2a9c7e5aad1962ca1768d99582c6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f62b2197bf66f59e020d4813c6f268c
SHA180739e0f41f2e62be01fb6f91fcdb51cc4e9ff10
SHA256f907258d63f6210c9769c7cc22a565da8447019fc7ba5289c6dd5702395a052a
SHA512598118a8ab065bb8de0da80d50567f6d46443b5768d9f165747330adf55a5cd02c3e1ca0feca47117b23e5cc9af5cb5dcd68b41a1a2e2bafb807c37baf2d5cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504791c749aa7e6d3b13016ecf063c1f4
SHA10a2521ab24b9b512660aef604352e4ae356d9eae
SHA2567b1d5962637fae4abf6f8d4e8ba36b3f1d39ab473bc40102616f1cae782be3d4
SHA5125e68193050c91e27c6bc11bef12f05bcc37669bf8378f03717be99e13db81a0757fba7452ae77bda286580dac3d9da28b53cd705022f2eccd063fcc3af71c917
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a