Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
340ed060edadf3791cd55c96314aa73e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
340ed060edadf3791cd55c96314aa73e_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
340ed060edadf3791cd55c96314aa73e_JaffaCakes118.html
-
Size
39KB
-
MD5
340ed060edadf3791cd55c96314aa73e
-
SHA1
b8a66d94fdaee5a7fc08b555151db7b669eaf7e1
-
SHA256
aca905bd323f02f167e3bd656e933ca772306cb580e5683bd965d25c803d4713
-
SHA512
49e77c61c898c7690fba86c13a366bcef0af7d91539c79e33459f91b9029897d075482d3dc9f73f6e6f8d82959f675928fcfd04a601cd1925ed2f327edbfea7a
-
SSDEEP
768:tk+wuAofTpRQb0Q5fxN2YsXTleyEb4VcvmzCRUp5FUOL75DA27vamNwnab9ju19H:tk+wuAo7pRQb0Q5fxN2YsXTleyEb4V4l
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421584157" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D60D79B1-0F7E-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008acae314f139eee2d55863b694c804a5279f3ccd9141c0c0fbb145c55d3f69e6000000000e80000000020000200000008ece0b8952aef4c2c9d5950c8e3bd2a24cf42cb510bcb6b4860bcc196c81ff8f20000000ee14c190f779dd0f1a748b37f185c0e0bb555937547b302acc3e7b7328b5b2e140000000257f6d6179fc9a57dd7a2cb85ca72bf78a296ff4001ba1a0ec6ad0cc4e7ed42b6dc80698d311a5a28c2de04866d375f80c3bc7a998c181b1c5ce70f93c5bcacd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07a06af8ba3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2992 1964 iexplore.exe 28 PID 1964 wrote to memory of 2992 1964 iexplore.exe 28 PID 1964 wrote to memory of 2992 1964 iexplore.exe 28 PID 1964 wrote to memory of 2992 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\340ed060edadf3791cd55c96314aa73e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df92067825f9a7dd7295f460f3c965bd
SHA1f83eda54c515152b8b90fba446b7956a7b39e560
SHA256cac5e633c4e6619c5f1c561715e29efa08573d63e4b6966d9a43952a98f8031f
SHA512ce3bdbf4d61eb5af50258b18f3ef161668a150423d80b041617e9464117b7426f3f32b5b04b561b8b4fcc0523e4cf0ead78c534ab097de8935ca7f74688c4729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a90892cb0385983c2b774acc45e529
SHA189d7bbd5b9331001058f952f106147819bbf5986
SHA256363195797dc58b5a67e0108d81f063113ef4927cbe8cffc56f42f255835f0e36
SHA512efbc7d55d78a528381aa8b27c7929d6f305db7ec6b6b77e1bad28c3d15ff1303482835ace425584df69fa6b84650bede32c2253f41f83a81b37eb71377f2ab36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496c45f88a81a6a1d4ab8ca9220d627a
SHA19c95a945f8de061ca25b592f037c63969c748500
SHA25636d5223e30239191b629482c734cdeada8bbbaf41b872bff44a53c835da6cd81
SHA51205ae8a30223b65f441c9e2338096e48a8a8121a7d1f6aa68f5922edb2405ba14d10a387c11242fd02ac128b5ac49dc34e4901e86b3737723c21b17a95db9080a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dd8b71718a34646647acbc620d408d5
SHA1dee07155d047b154e06f055e6c5b7435316b54ff
SHA256e42858cfaa86646993f6042821d442630754ba931e1d9a57b40f88ae0279c28d
SHA512e64c63690279b8c56a8ff9c95b2ff755c7ce6b3f40a855a81c23baa98b52103b88a9c92cd7b98a25354793218186fb3d6c243457d5bcb66f1e878a1d523062dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541eb0a03e2c1cca7440fdef44b364093
SHA18db7a1d3c9c175ffdd2bd1e8ea88cf6f145fd144
SHA256e01e9af6e7c0c5c88c02d3727176c3a19a3cb2c4ac92f0e4db2343d68cf44eaf
SHA512f73dc1c34582b66a0230360dbffb5d640b3d1418a8eb1ab44823234560e0b312d0e7bbc3ca8ddd86360851080341f911db24fefd24f5e7335c0b5355ff3be714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c34eae9dd34860256010846e858790
SHA19514b05cd14dc2271f499e670579091c873493b9
SHA256bc6a4806b1d73b4d8cd9c349a7108748d0721f9ae5b6a6c4bb7b186a0e433ef0
SHA512377abed2e213c710ef539bf1341f2a3721680ed5756f3956fa07035daed8167ad7a09554fb03ef38031f906b22ae69865127c5b69bd2b8ad51d83e86012537ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c55a366beb34c06e2ffd57fd9fd8a1c4
SHA137ea414e0c324cbc40f5911924da64b60a4c9904
SHA256fe3b57954567ceee0ac91fb1f7309717f62738ceee3eb5471901913939bc8b01
SHA512cd01fd7a9a7a8c59f96b85a01ce7c02f4e0d557a6f3dbdc896b4c2c7d329552ef45457e70f0ebbdec9aee2ce531868027cf5ee744394fd6ef0f118d21095a9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f05f6d4f4379cc34f686e76665a5dc2
SHA1ace0afc12c0023f64d9af90b0002f53a2f3fb2f1
SHA2561a331bc97dd6d63302531993aab414857dce8e6901a578b45b8784623526bfa0
SHA51293ad40e142eb29216820f92cdbe1a6e940e099002c6b917f40538aae94162ddde5d8489097254fe15d76379673fd3560350f04ef71af6706cd7f7322cf8bc026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cebb8190f86b4451ee03746341d987d2
SHA1956d3015e6b14169d0e8aa121d6c6622618568d6
SHA2560d6bad7dc5eb3b5ecbda24e7c82af01ad46f2acd1f472b64d1430046f827269f
SHA512c42da4fc24f817f3eef6e5aa999a8646683d82b8ac31bef5d610813d529b5dc1d4aa219244f2d4685185b2d2fc94900eba9335dea642f00c42470a983c7bb7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d5696a681c549ebd7256f57d2b111b
SHA1bfea1c2d2fdd514d3b720d68e25f2fbbdbeaae4b
SHA2567a736c9ea70d239b0c63aa62f6f364f01418122427233aacbb6b2c70d6303ad3
SHA512d8d990862cfbc594f68716ff6c5fb4480d87ba6c5944db67840108b4bf9799be2628cd571bc9105a00ed2d840f94cedc719f1943a48e76d7a2ff01f3a19047c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5374c759d00331ef81553a37bc03848
SHA1b527511240028980942bdba916961bbebbc3e3d6
SHA256dc9d62752bcc4e56ce4e17a5cc41a4f98314c07de2cc11a803d503bbf4ec075a
SHA5124041f5f24e709a40869ee210d30211aa536ac99101281890145ea662addd5a155c99cd1a07ebd47070da08d9c9e0b877af2b9e6b9be44258b6453aa9f3bd42ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db680dbf2b2a7c3d62fdf4227ef62b57
SHA182faf3cacdedd92016432f5d6465a2e968c302ad
SHA256ea1ea411aace3e0879127c01e97384bed54218c41e41ef99e20a647faaec8138
SHA512ae46f671ab8fdd24c4f019b844abe83e2b1a932d1c4b06fd64582eff6b5c7f7c304e245c41fe5e9c329bca87e3e39da2fb90b12fb3bfa451c022c6b634257e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d101805385e0780633e5d34bd255b88
SHA131192e92b024a7054f803074f38ae710f2c67fe7
SHA25682b0e35985884d4d9e9afd820157395100776106169187f456ffbbd83b8c33e8
SHA512c3ab8fdf88bd53de7ab31725deef0a254e6df0dade0ee14b66c9a2a613401ccbfc188f7dffddec1df48870875e77b81ce26783af2d80329191a149e27289b875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55170dc4b7516fc0052b112bf3da6fd3e
SHA1ce3681516e9c8cf011f8e9af560140504743d1e5
SHA256fee8c275c57f51136c86a0dc01a8d950a6ab3b59af6733d8605ce920858e0758
SHA512f0a65c6a283b7b7a0abec1ae887342fa3fb64fa2b180312c273922d624fa170d1b86882bd06083666f0751d3a28fc9080ec7670165eeba73762880073b5ef005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1f4e84316eb071d8f72ecc02904cc73
SHA127e99615bee8221edccdfcdd15ae5e565a9fae18
SHA256db7cb30c73224d5a7d5a101d578a229a10b8a703cf42650e0efa0f9c6f79ee33
SHA51266ea4aae433ba335ed4cfa79415b51413b7e13d21672f618452b47b3e351970de45772fe7e6fc77479a6f4933728f4fc8d36502838c6a3901e4ef7367abfeef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527402b5561f22549d7d4a693b68f0dd3
SHA19b5dac84a2394e18d617172af8426085d1507384
SHA25649d74e352740858698e7b454f8999fe884e5f651551046077124720dca0c805b
SHA512ec0c31296ac38e1c2d9d9a597b99b476a1495904f7fa21af47115fd3b21d56f81683f5d76e5982fc40f08c7977eff410f6cd5b8153677362232acd26cc938bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a2ac291f46a369d12eef6bec6524de
SHA1c4a701fe97b44a295746f9b6baafd6172bae6334
SHA256610de947692c42955b55ae4014f7a24142ef61ff9f75df9b45ee3a74d31a0c4c
SHA5129eb0414e51aa574a4d50e7501e5128a657026d13adf1f6ca3876f7ca2dd112262b75f981abd27f55be6ea23ba8174b3b4bbffc7d948ffda4d61fe65e22fdfbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e12d0be3e360b989d20953516b7b765
SHA155b9d74be93902e0934481bce36869ed16039a22
SHA256c23427016dd7d9e2f00e7caa80e804b12e3c6fd9a83c7e370608150e1e06b201
SHA512576a81525b568d3b970e6c37c0883842715e93298282ab5f9cf1d68f3f56aa1c8787dcb565317d488364c224e2415b1c9bce293a046d3fc87cdb27c9cadf45b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d566aec736256038ceb11793b1747ac4
SHA1c01890f01e8be63623eb9d5eddb2f69c443b3283
SHA256d3d599db817237609adf6c7570b10ee5b739a538c1de7aff773364eaed5cb94f
SHA512f9782c4ebb279fba28d2ca31d7b9bed45b90e967947d4d989c70612a869d04353bee8d6b03944c8e2896dcaf4dd103dfbf42aecb1abbaeb74d0b98707fb68193
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a