Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
32a5f14faef8ff84412fab9775427abd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
32a5f14faef8ff84412fab9775427abd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
32a5f14faef8ff84412fab9775427abd_JaffaCakes118.html
-
Size
990B
-
MD5
32a5f14faef8ff84412fab9775427abd
-
SHA1
08a9779c8547fa6c31f9337aa348c9824ae7a669
-
SHA256
b9a4c67f9d6179edcbd1203c7b03cac2c9740eb66a134ec76b3b0e87705939e4
-
SHA512
d644daa60954824c6ce7134d6a69afb0e669a92a4a6ad9875719ee030a0a4a2ff4b1ba475571577cfc6698e9afa966fd48410013588304712cd7263bae9dc3e1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000ecfb1bddb9e5307de5057f5bc422a86a01c60bc6c801cbc6a94067ddc51472b2000000000e8000000002000020000000fe98ecb70a0d1aea7cd588b394223887b170d7c671a4538bfb7b650b2fc3147220000000816742ada55b1a4194a70936eb2768d0407a3bcc1ee0d3f64e1d5c9912b2dcd740000000fe717ff600f0e40afdb7b0b828f9869da6cd2ed1f0aa1c37fe0b107f4e46b12616f1a138f6fe916a83fe8b53a39985d1cbdc48a1b97ed05acbe76265191ef428 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421562515" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{726AF4F1-0F4C-11EF-9001-CA5596DD87F4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e023dc4659a3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2532 2316 iexplore.exe 28 PID 2316 wrote to memory of 2532 2316 iexplore.exe 28 PID 2316 wrote to memory of 2532 2316 iexplore.exe 28 PID 2316 wrote to memory of 2532 2316 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32a5f14faef8ff84412fab9775427abd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbc8cfd1df34b71823769e92ba40e382
SHA1fc63484e1c0c7f133120150d0c625ae948a4b68c
SHA256a532a48f4b9d6c2a3641fc6ce515a5c77d469e1f8b1749ebe0e361a1635bcec1
SHA51288aef249ca313051e5b41fd9e2c8b57200982bbdf5c228726bcfce731099105d38b820372f9bd09609805d9b638b9f78bc21ff3ca5e92e1a0677d318f2efc51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d09d304881c87589686e6788a05ce79c
SHA1697e1e81aa72e3084f276ecadbe965bb15796dc4
SHA256b330ebdd177a7467614827a51b60fe635f1c0596bc8344d5e9ec2d65ac45a453
SHA5122346a4594f14670953a9322b1502fd4ebccd2fdbe8fc8c11bb6a4737347055df1abd0b31366c1c0149b8ee3e742a3f3ef86479eb60b5c8fce7fc115b801c8a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222e3fd1c3c5563ade37d06c2f823579
SHA1f9745fd4e9ee9d6e3ec184408d9aeb7bc2e64ed5
SHA2561d1024f8ae646a3b827d3a0f61c29db74522c1e1596ac5df2d146316fbcd4727
SHA512c51bad481b88f1eaa64fa482f1379302bd97d84160f78cdd024e97ad6e9cf76809574c43c79ffa5827c117621b2eb2877307c5f6a075fd7c41971babbe3eecf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d99085ccca97629d8ba31a7e6898d61a
SHA1fee58fba0623ea5f3f030235c3122989bfdb7b4a
SHA256f1b32d01b934026f4e5f71a0830bf2954f52eddd17d299e72f5f3abcf0c30123
SHA51283d080df32e60cca17a337b2f46f5ed1afd51358fcd089e602aeaf76057591048971da67bc7b072a1c87543a9a2952cb248f0a201102a37fe4c270a88ac8715a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2d9b4ef47df751963bef7411a5993a
SHA13caa9023a1cf81abff4dc8721ef5ab91c0610992
SHA256b24982db56e853668e676870a6e189165eb7c96140eae8e028b27060406b1cc6
SHA512a636e7dbf4b7320e69a53bc816be508542db3be783eadf7be1a450ea7b08901b0e0ddb556cd6c0f05648e367adfdd06bd503f1e2162b4372e3e556bde485fb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542f6f97364100e602fbaa2d1e4e9eab9
SHA11691fca90ddd1d51ba4c071135e3d09c8c572399
SHA2560a4df51f8d6cbf41488c93c8f50674f40b657f449eab28c0ad58ca78fdb7266d
SHA5120e43f8a8a2b42054837305e88cd8298ab8e5e2c5e816923abb60ed3564c374b5b6e2a7a0764b96366712411a08a4d73da52bd4d9f5eacecde42e525ba1099d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b714cd767e1e316d0916b8a8d06936
SHA1e14a6dec0d8aad12f36b85ea99d1d5b1cec5b651
SHA256fdbe68467f11bc9599ab7604d1d926e52350a70491c848afc074b10118a0bc6e
SHA5120691fad6f79296fcaa4a6f1fe93c0b38ee051586053a948f97a674deba8273d05c8a60d6084d462480c784f30aab76cbe95ffbe8a46ee9e9099bef807af5f36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f57b9064f1ca3d3b7320be4916953a
SHA18ca7a74aab39b0b8e408c61a6e9f1e82a495915e
SHA256e2ad46fd35cb7adf59d510351ebf3d9217cd4e7178ea1f7a1e1cd5c4046a6e68
SHA51298bf7402dd2907e2aafb94b0fa8f68109b0fcbc29e41d9417c01f4a8252fa88250c087508085323cb6fd35f344c78f166c55aa98d495d803c30d468c8ea654da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758230f6c8abbc600e8ceafb83b28372
SHA120691ba09819c1651b4edcf5acbbef88389f2615
SHA25683a0110aa565d0da4acf999087fb606680a6659db1311d0c0c7f83c659e41c1a
SHA5125bb7c761777fac5471212426446c11af17ca9009766e9fb654a0864c5c16e16601b850476c8caaa02ef687fef325f7b5b02d6867643701b898d0be7fe9652d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f96d8432ef9056de71cfc0860ed8c92d
SHA17bf3ed3296443b527ce7f86b9b3a9b13c97ba7c3
SHA2566d707f1573958330f3ceb9fd9c94c885cc6dd3d14eaeeba2a3e5006cff91b0cd
SHA51276f8698a71d01dd634315d1db72df8f98e344ac0a3490644537b72ee0720b8e40317e48252ae6234d6319dec5548a74f4aab00c6383bc984a67f75406f26e88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9857b7cdd478b8d15e10a4a4624f2e3
SHA1d9754cfb55b1d5d8bdee5925051f5278af051b82
SHA2560096639964c7b4d24dae2acb9f6be9eb793228cafd46984dc776d685284a4697
SHA51222fae9d5fa69c023f85aa6a04d338579d8e19fd5a8a854333b728c188f0b8fcffb043f7b7d9afe9b5da619d5bce5a50c6e29709fbe74e4ce0a9cc52b32b46d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52671d929e992a6744812b65417ce4de4
SHA12f257a82bd9777010a282b172bbe22636f30c4a4
SHA25653d9669e211f44b8b48df12c003929ff0c378cde80bf44619a3e82de57e7658a
SHA5124ccc5ea13023f57cfb7c8f3d1005a8e2aeac12a873edf1475ebf0d45523f06eff463649014e079f2745d48484d417f63145262a1509a4377e34c595484737294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5095e698c6d505a2f356a483d7b2acdee
SHA16bc7723fd2a27c9b3327f1e57ad8f465b17f4039
SHA25612b6aeb8ed836a72e7615e1288c3273b465e9413adf6f61f2e6ca2721ade789c
SHA512363a49d27f7eeb1b00d89d86258d6d9cef383372ad258df58efab170f87dfeb266acca52c2b58af5136727db656ad500e8e7515d0eb085ea25ec2b0ceb2c2459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59382ba0fa83397c491c00b41796033cc
SHA19f957669d0e524490d95e0ae4e80824efdc2493a
SHA2562b0615ffb1262fc01392d02cfc9fef981b2dd4d4d51f9f6e994e36e5ba3b95d6
SHA5123412432c018edf7c96a38901d9014584d516ee46b31577da34525d1f2cc66c7bf5c031842c501e13b8f35f4787285e24d5ba0f17d89eb00539f098ba405d54e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638693a08b33d7238203638309d746a0
SHA1b881c113ae7c516b6da08c64f4bd7a2f74cfe6a8
SHA2561906c95fa16c39dd708894d2d625dfff000bc365463d94501f43a21660a3db1f
SHA512948a19ebc4b88c7da5cfa40e65597385b1f69597c2bf7a7a4ef7052113fdcdeeb0d8b68c975196c6ffc2f8e223800deb0261053046e871780340260c96f36f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4687fd43aea639214a94d24cdcc9589
SHA13d75ba61fd3d4397daef6eec0bbc20a28af0b6be
SHA25604955a897ef0fb91645dae315cb9a9b6039f5da2731610fce5c3cdfb7fec5f93
SHA5128ff4bda7eee525e490f3f5fbd6a873c801f72cca3a6c10b240a15ef25d52941b10f8ae8bdf68470980085a0d61426ac3e9a648e745304a13226548f5a74a8a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feee554cf45f5ae6e815c7b1a6b77fec
SHA1220281eff7421a76fb3e25aac794c4f1d8fc7633
SHA2564b9609e74e8b866ec1a4de8989094a482014f941a9260d2fe613b1642a184c86
SHA5122b4af586d5245247f66bd00524835d74f20fcc06f5c17e3c29f03e798215b06ff60f73704ffd100b6752f2b3a13c29c0bf9be8edcfb569fca43427a4944c0cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d2767a920450e975f895d03d57e61c7
SHA163c48dc377b50c206583962a4f93fe3ed3877891
SHA256aa42af648b15a37aceffaee107a6faacbc60163ca399a6f9bdf8f9a3dcf6e7e5
SHA51275875c675ffa9a8e8cc63f3f0f4df2b0c208be378273917e90c1cc2ce58d0e2b189a2c3e2f1aaeec3ecc2c276cd3b6a02a9a2763db564e6f5a788ac33d7cf133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebfceadea1e828b678c4bc5c011b6e7a
SHA182cd4d92ab5c9de09002cac3361fb69e4c40ef8e
SHA256d965a35e57ecb9c0e8f510b4c80e1100d8b31f1f5024453e819fa15eebdfdb05
SHA512e4d553eff10eef024e94af66bd1c72fd28fd1e3e812d1420cb9bbc990252a9f973da962cab373a4a464f055b0f27b1dc8a59df4bc4e3a8acff1215c7faf3effa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a