Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
334288f50c80d1e3f7c4beda13c6f8e2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
334288f50c80d1e3f7c4beda13c6f8e2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
334288f50c80d1e3f7c4beda13c6f8e2_JaffaCakes118.html
-
Size
466B
-
MD5
334288f50c80d1e3f7c4beda13c6f8e2
-
SHA1
f4cb85b98c7658fa48fc4b0597b796aea8bdc63a
-
SHA256
9dbd6ebc3c9853574020b52c79dde9fe512b5a6a1708fd1b705a959ab9fd5fb4
-
SHA512
d90e2c44c40607c60b4324a80db31b743c5e3593f7fe9e2cd1ca3cd57ccd84556c62464b39785ba628c3ad3762e3b407fa9f2021ffe9b49edcad8b0164e29577
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005c412dc63cb3eb144590cafef80d22b3b46ccae42c97052c5c09a2483017119f000000000e8000000002000020000000fb32a83409d5e794ffce23290fd3d8e6a991590f8b044d74907ba38841597f9c200000005db60ba7d6589239a1b67713ebb5986c3cd5539824b6dd6529809b5fa8650c7740000000563b069c84e1f95f7dd1e1a7c1746b650ab8bc503a532a2f8aab4a2369452c59ab6e7c729170e50fae7ca3888148ac23a3f80609f2d13ef2f76dc23383972a07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7078858f6ea3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421571653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B911AB51-0F61-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1500 iexplore.exe 1500 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2372 1500 iexplore.exe 28 PID 1500 wrote to memory of 2372 1500 iexplore.exe 28 PID 1500 wrote to memory of 2372 1500 iexplore.exe 28 PID 1500 wrote to memory of 2372 1500 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\334288f50c80d1e3f7c4beda13c6f8e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eacb0fccbbd674dace37ea51ce85e99
SHA11437f8e443d1ec10320e4ce2d755345c38e4bb3c
SHA256bf75fe6e88328bf876d6550dff4fd1173ccaf7c29c0c3d7ffd0f18e27735a930
SHA51255553a6ebe6db6b13588ea5a4398d870070a26d5ae79f4a9d9b62db3903ce39a47e4b417b41dad04867a549058cd4763f7db9c75ff1cccb552956b82ef5928de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db557a413f8ccbd19e789397b298ca9
SHA17ec68de439e26c7d20a77222d86c9f10f2d4e2d6
SHA2568b048b88863d06825252a47067e6dab43f77df71324d136dcadf131e6d077c9f
SHA512026cfb71e96fca96d11e2e4b93ee909f64bb07e97417d1a90207509659feb73914c2a1f9dcbea02b125d82359d015133c77b015dfca7c55eeb13ec1d98b857b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1410695fb6bf9cda7c8c1e6e4bc7f64
SHA15e2b4987e30819483768ba3b25dd5445d333aba2
SHA256f0ae4031467abffd524b4cc287d1b925e0139970f988e7393569f9937b119230
SHA512b7875a4e89b1c06b46264bfa7bfdbd5f5f0298a87e5c858bc0fc2e19c908188e9e3c3dca695744b4e022da91b0daede435f4acd0dc542c40e06f83c182cd5c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e693087652836fb3026efecf601e26
SHA182a3211415aff8225f8799e3e9c55e0d478c3fe6
SHA2563ec2e94ba8020d914c16710742a2602c3dc7d18b319b4bcc40751801cfd30168
SHA512a71751feff043fed58af8df4e78df87859b7a2e336366ec482a33b9de88fd47f753f7953021caa9a50c8290e90cd0e331c627fcb82574924bf057fb1d96dde11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6bb86148efd8d35649eab366aa62c4
SHA11a4971630c44f6433dcf97d4fd250bf1053ee04f
SHA2561c8f6d018cbdef07d64130deaebc1ec928ba6c371c65042cf671eaefce937813
SHA512bfb9e717520669ecc32827a1e9c46880ee08d73769010a20f077a4d14b62fef24e331c519dcd108d33a14a3cb9253b64115394d5e2566bcd1697dc56a8149b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ea147c953b55b90e59f360e50213a02
SHA17e31a75e1be1b53f86c027f185bc8efa8499e5cb
SHA256163cad994f705eedd350f100e2d9d367c264468513093d06ec337052ac771110
SHA5123a2b2a734977bf75e91c3e49aff86c6a89fc6f58d4fed200368ce523656fdd5b525ac22b84382908d9ba5bbcc9d1a9cf05268e0ec14769e0191cb5aef6fe99a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e11ca7780c34aae74a08768fa3fb49
SHA1d23b17c666f33d37e1d7d814e545491ed57ddb85
SHA2561696ba82c02a0f52ab894ccdd19f8ad6d9c2b6fa28fff830878e76a2cbc470ec
SHA5123da59d559149fb1bb2518dd0fe19fb5331d0ea1e558250a5d21902544267f3588660079ff6a16c0029a102f3eaf5c754542d7637141ed81edded371fd162241b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f7d63e23d6216da5bc37b9c0658ad7
SHA1bbfc80972d65afa796785945a19a853200414c9b
SHA256c5abba40b630716ea60a81bc8104945e652ff92140854cd5fe5f8e65050816d2
SHA51230d95b2fb28a2922d0927bcc48ed20d0453ce88ac47faec596cc3fb72f2959ed9e860ef2da56585096b42d66160e08cf485b5a3a5b4e97180630e0ef62947d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c669c8ec0b467ce5b68b7107965dbc5c
SHA19be6f01170579ddb56875d326acf0e376627cd71
SHA256edb71097fdedda45d1c4197f391dc45843cf436c31e137773a07a27a0a59b7ae
SHA512af5ca835e93e719e982b082d2b4664d58db8a87f5b736ee6d64a26e250be4c7c590d9b9ff230e412034e7a9ba5a0397738250c4b3f57da2f3deca7085602908d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622329bee2400af3f89a5338d167f0ea
SHA1ee42529fccc71df7ba3903f2ffdca4282edabfeb
SHA25653b6100b9c87e90904169c6351c30b6683c203763e2d5563f4755312839c970d
SHA51250a105c689abbd5958ae934aa415ff4348953666d8f340d36ad83a553ebcc0108ba3647fcf9c960ffe6253043f1035aa72765a370fb1d6d59c91363404b3a03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515aac50607a9e1ff1de6e4a6d83eb215
SHA198b48753e0f7c3dcc07ca028f772c16d8c62688e
SHA256da31677284ab2dc54ee20e31a3c02474553fdfd196e8cb59056d57125c18e57d
SHA5122506c020967485a710c724ec1c6cc2203d80adb1a5b659e876c30370cbc66ebc3505401b6cbabb9a679eb7f8f291ef61e222ff3c500ef74adb35dc50281cb17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fef51a389ed77ce63d858f98199746b
SHA1c0090ff7410c288da7b024e00f4337631476e82d
SHA2568a9e5c48f8e29781853992c931113da97ef15595ccffb4fe6c0fa8a68856a522
SHA512c80a1d11bb5702e3e744e2a72811be33f436c2a564a9312d201ca28fe349096ee5373e12cfc67cb37226bc6f39998efca9beb2223a149312baff7fedb05c7a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22ef68a40b5e3681d9229bbb53a307e
SHA1bba33ac0c2116a596a4009754e82b7dfab4709ce
SHA25676c63b3d66b770cd0c46f7e2f05973779aad71afba403decd32cd8d197bc4cb1
SHA512d705f83c05013f5785e23f7a3c411b93de35000922e5a91e8d3182032612b055f00011ea23f9cfa18aa7441bf709863ea900baa0df67095f7c70de8ddeb55d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f95a128ee739f68050bc1e4efe655c20
SHA1856f6f1bcac0078d2727a174aa273de52698323b
SHA256f63ccb41d7b219bdecf7635a2fd3217b49c71a6ddf9534893dd156cd4987658f
SHA512302571fec8a8f8d299d916f0315b50d32ae8cd68963676bc7a0b02ba34bad18471c09005cb93dbc30512bb0950f5ba51366b7c6d4117f6523f233f4861a596af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3886e471c5d581b7c42549eeb82bbe7
SHA12f622ec39f7fd90035ac0ae730996c754b076c06
SHA256e698f19695bf8673b9e596f6162d4b9d5d87488a2410271e59604eaefb0be885
SHA5121aa7511e00857fd689d053cb72b1b860a7b6b9900877c2738cdfe24cc8e0f84c61be0520169a5c4cf0c45ffedee347538f91410b3cb2cd64432865cc4e20fb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5decc89c23c622b8781748133f1f1ad9a
SHA1d60f89933263390b5a47c253dda7264f418e59a7
SHA256e6a33ada277c29e14d1f04bf8ecc47a756d9db44f20bf81ca4c6add6c6b55fcb
SHA5126c261096f322e9ec74861b72f38d6a42f06b1ad773cf020047996b4ac3347475e5f26058f89824e0dc59c4f3c8bfaad1a8abaed13ff770d81cc346385ef244a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05f4445fc43c94ede82b7cd69193859
SHA1d34c611b6619bdb0f9975ec6038d53d36abffa94
SHA25621506fb3bfafc2d5c3d82ffbc84321d9a6df1577c0da8b929b836b63c22be791
SHA51259645cbbbec2ff9da1a6116a5f61d1f331eb2eda2c92472f983e8b413f9b92d9296420c906dde3211eb419ca9ae745e4e04c39a10ff5a6db3c81e78efa5a92b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51746ae8280a06d342ebf42996fca76e3
SHA16c2dabf26717f214150d49b4ff0c7c9b652da2d0
SHA256c4e30f4c48686addeffaec67b095e18a4515dd47a1a493fb381056ff6c3f4380
SHA51295680bdd01376ad70b9f52f6f16d90e359f348e59fbba4a3ef5ed060c5dec0c54c931aae425d819060134cf39bd1caea5878e342dc6b6972646c04cb43e07657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531446e0315294576bab68a82afe8d992
SHA1b3f180158ee7f210c75728e51418b8f41d99f380
SHA256fccd6ed4738514866771662535f4e0cb0cf556318df2d7786ab481bfdc099680
SHA512dbecc3874e33530737d0a1c85585d815d3301bf2bfe9c9327faad5b35b8167c2650cfeb89071ed43f018459ea8c4025ab2a98b87f578257758d1147217510015
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a