Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
37a1deb6a039c5a291619221d7710d65_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37a1deb6a039c5a291619221d7710d65_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
37a1deb6a039c5a291619221d7710d65_JaffaCakes118.html
-
Size
461KB
-
MD5
37a1deb6a039c5a291619221d7710d65
-
SHA1
153b521f9aca9ef3b7b6f7b93c6871653c4d78a2
-
SHA256
cf781dfb800ff73579bed63aa2027eae0977e8efc2326280841d36136cb0fb5e
-
SHA512
5f9919c200b4b92497ad3cb601e66b29b4b7403af974702eac49e3eb93f26d380adb312b222a1c1cb1c629427233d4ec4f5723ae6dcec6c76afdb86e5c6fe46d
-
SSDEEP
6144:SdsMYod+X3oI+YqQisMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X385d+X335d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A4F9FF1-1002-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bfe0220fa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421640617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000024fab18f9004cf43bc2fdbe7340598acf163a6f878b49c5476d93fbae85a9afe000000000e80000000020000200000007f197db039f11d3b019e7dfbf5a28bb6e137749a0a386228a128acd3c7e8f48a20000000b632ca5364f8a27e213d24c597b0ab1eddae5e7583284b0ec983e3e5939290134000000023cede2278c5724a8957b93716f95b9ef430dd34a375ca57807e1202db057b85a4511ca970716eb2243673850ad5368e1130a499cd0c7b5c676ebb6931c2038e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2108 2380 iexplore.exe 28 PID 2380 wrote to memory of 2108 2380 iexplore.exe 28 PID 2380 wrote to memory of 2108 2380 iexplore.exe 28 PID 2380 wrote to memory of 2108 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a1deb6a039c5a291619221d7710d65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cddb0b3e2d1b29d58faca6ead8d5f01
SHA10458459ede8166c1229b20dde5d0f44c6e6d1ab8
SHA256f60efa9b41daeea9ce753a38f39294b69da8dbfbabc488a21c260f9b173df8fc
SHA5127930f512081894d087fe443ab29ef7bf3551c3214cd4c96dc069d21cedcbd5fc5a6f0954774583ec8da5e478954f31478e30bf524ddee443d835fd36321adc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746722ba5a281c72716e8f213f648c4d
SHA1c020e2c47366dca17d98b607b2ea10ee3f7ed920
SHA256c9c169d70ff879811e427b4e9dba82455b701a04a711e10c0aa56204e939275a
SHA5125d424b75505071b7588df607afa48c6074991f4129b5a10cbce74e51fdf8cc1def44d82b6c025e2b6b5c1c5ade74fedaaa28e939f2104b6670f1307edd5e2ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52685b1fea27571d9d37ed8beefa447af
SHA1ef1c0d24f78b3afda6900d2963d7d7b09e7dd7d2
SHA256788c4b7cff073b3dbe66741267ab4cc6eef505571b562b54d70bcbd06e5b21eb
SHA5122f7015d8f67631c2e4547eb5d73c64bff9027083d735636c0feba765bdeb321eb2e349da811f033277fd1ff2bcd31cb6a8c3502ca14d724ebbd39f644b954f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031fcdb6fd82888d2d540077f1cdf2df
SHA153f420672b3a0d32ca768d72d5b9bfdfbdef6b00
SHA2562766c6a670228bbe25b9ca9c65b53ad9e46b8491f2d8142997d47440791c77e3
SHA5129dbcfe1550dbeda12fe1487a9d78730508aa16b6467b943ba9da477cfeb8e3a264bac96b275b9dc23640ef6071f8692e5b62a398c4016a808c9ff443fe827207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a534f8b676f7a187b940bb0cc3fcef93
SHA159077c1fa4b95e5ff6519c096a5414b55ea49971
SHA2566aa12e3e2367641371600088c2240c1f5a44ecd2bfecf351f2baf435f04eec6b
SHA5123b9a75dc63aca814e66a00d22723ebf9f208e37b87bda6e0f715d6dddb87b177c9315f3abdf03ddee48d6fd6bc537ee12abb052f5747af9551091c2cf2391e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c6818595a3e1d8a53cf145e87a1588
SHA122f0f3ed23f34eb8e88bc1002a28d8971c26e901
SHA25629b163b29e75caaf22dcf42e1d6291ec62422e24e195df74055b85c7a3efd891
SHA5121a6eb3c23cc3de57fc6a338871f5864acf262c69819f2449f5b6f8fb62375da18ccc49e38df495e26b7917230efadf4a3b29d005de015ce1efe6bced386c41df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506fc7067295d367bed1177fdde7ad4dd
SHA153e6d9602610e2ea32fa809097e13e2eb371b605
SHA256c6106601ff12d8bab2b03a0c61efd05b4180abc9838fe1364d0ec692c3f5c888
SHA512f5772cc59bdb35d99eebe851d4b3af9bdd8645152aefcf2e4131b57664d8889dea4f0ec90cb6431cba1269615d03d299625ee89205c1722418c008d2eaf3833b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ac8725542e43ed22ceea399a86124e
SHA1780e4d55727031553387061ab6a4157fb1de1f63
SHA256413ea86d342ed5fe7adb219b2538bc31d59811a1dee1a50c62f982916bdb0603
SHA5121e81bef4ab8488e90cefb5a89770c05ce25b703b7892e654e6cc0d478ea57b023c183dbc3d2b2506bed75db1d2db071c44772a87a78ad48d9464fab30e3ef4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506303479f3efce47ca7be900b11cc873
SHA106722cf894d807d850d631871b4592a59a68bdd0
SHA256f52e09603d70289929b08eee4904ed27aabccd730e557a1b198adff4c78a545f
SHA51234c91f07b21cfd1b5053cc887c58383e386bfd1ae198b0af1bb2a470585e1ebb29c60b8bfc01e90ad85236a0134dea96b8afe775353ada0bd7df51a804b9176c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d82c2e84fe0eac5db49ec54fdc7a993
SHA1cf2bb9701c9ec6c689b7f1e5201ea6542db9162d
SHA256813dc6d901d9787d51614d5cc7db45c6d900092ae61cdc10086d5dce2cd3d144
SHA51285c6728ab3ae815284099f3ccba394fdbacaf5576ea920b71173360804e59b6895b84b5421fc495ebe9243de36e21ac9d443cc7a450aac9a9f77e463cec2f34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c571bd8b1b51ada54b227d9336b66b6d
SHA1d04939d93d49c028f4fdafbca978e840fcf6a3d6
SHA256e6f79df81245361a281d58208cc43b8a22ebcd15ddf6a95996cbe5d918befb40
SHA5120c485f2dabee1b57f55de11c20763cf1b83a5d976c677e6a92c5a63a9c0eb4c8d5d1e719bf52ac0fdae0dab8ae95743891b23c9e1310050f13680bf335bf19fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e93a8684173fc52cbbe3b8a0e7e4cb
SHA1874890dbe8c7d40d929d174e490d6a8ade80afc0
SHA2563e9bc7a7242a28d83b526a482c2080419e4fd33b763a02bbeac795d4a191a789
SHA512fc2c8b1507b9abdbbcdcbc20dc8c0b76763f56b53565fb0ed1016542d1808d7484b50a4c54a6380798edfd3796f0be5508bd22aed238cb1fe3d7683f2cdde032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf9c162f57e38cf23fdc0dcd7c9d3d5
SHA131de45faf37bf7aa7cfe47d68ef7e979c4802a33
SHA256ceeafe930b1933b0525b080892db2ed938f4911f8d5003722f026394142c0056
SHA5126e61701ce51d6ccefb918236b8f6c2578504dc16b3fa1f3c04aa5fc83df1481e237217d00f9d179dbeedc6639ad95d87527d48645177acaf5d60dbfd2c9953c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57307457e4c6a63f6acd4c0f83b8b5f03
SHA128deeaca345f0ba812d1006d65ee028da2526610
SHA2563906de76b3ad309467b7540bf17105dcc083569466dbd11cd6f53c92ac876d5d
SHA512e70424112f3f93538c85cd631535426c23b4e1cc1d9c1b33a237ff8f95be4b43455ab543d25de62236e5e8671bb2ea95a1365f2e1bdb9894d54936f60d240e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54069c87f60fa487278970fd13617b358
SHA1a9db1ff4ac021f616bb4b0eb3ffe993bffdd12cc
SHA256889f1d0baab93ef0e27d37871654542caef7ab6462231a22d5c107f07718bd9e
SHA512411a90cad0954ec592e11b759f41912143dc7272c819c62061594136cc35aa4c27f937b88ee094173309385a1b60d6ef59a0ec1b69f84e6c211493df003ee941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec56cfa14304abc0aa6553019664255
SHA1cee70c98d11382bd08334a9895af4c7d2ad4a6e6
SHA2560cdeac101f1b31e6c2e7bb45f8a490b565be5764477ccadff00fc328c58641ba
SHA512ab4a4c1c6d57b4db55dc9b819b747bb7aaa4d739d39c9212bc7ec9b2cc103d8bc505f5c46deeb69cc2fa5824597a4f3be8415282d657d45aa41965022b32072b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a977f01505d9aeb8d0ac65afe10ecbf9
SHA1b88b1bd078e64b065bc9e6cd6f7d24691367c671
SHA256105bb0ed6e6b7898bae48e9bb241da577a5ddf1ef114348ba06c776e79f7b4a0
SHA51296a0fc70a3596c64eb65d3a7aed33a0521aa5d04e7f69564f6ae5d5e421f76a8700249adce0eedc278e9c909ace065bf6fa2b6bce8c0d0f5e75aa44a5e4d0ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54f479ca957de286f539909c74b4d20
SHA10491618252d7b354622840e3fd0843328f1ed34b
SHA25612b2ae6a0d7950ecef1363f96bde82d75064f9a2929f49b917ee7aa99505646d
SHA5128119a7cbd1495c56e01ab3d9e3da328b62543422a4647de879177494da83524741989527442276501f9078f010c5efad3c18fbb768303de3aef54dca784a87aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae3b7d2d1cc2cdd26275f72d6c48e24e
SHA1629789deea133aff7d4165a2ddd91d428cb29c8c
SHA256de9726b9ffd9fb41242a00ea0d35c2fe927cb50f4711d757a287a312659cfd15
SHA512991ed7b6de27c0ad8a58b1b26d92554e0c9da9030b74848f57bddd5dfd3e06808f9348e8efc85ee890ce55cc08f16281cd74b001af1eb2e45d3f6171495e4d13
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a