Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
401549e9e45f4b20983f555d2d08db5d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
401549e9e45f4b20983f555d2d08db5d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
401549e9e45f4b20983f555d2d08db5d_JaffaCakes118.html
-
Size
1KB
-
MD5
401549e9e45f4b20983f555d2d08db5d
-
SHA1
b8834fd7137ae641446b92110ce779daaa9bde21
-
SHA256
d78ebc6c96d986502e2625718279f174e8afb19b521086e20ffdf7fb7f803263
-
SHA512
a76e19f0854a2eef2f966350f070e86e4b5129c322a519ca59961013183b4577cf442798fd3a34e99904225e38db3bc478b0795ca5ca28016cb9424406c74398
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421774735" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ab4a6347a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e61e18eed81ba3ac2545cc7e11acabc966590b60a6efec0a7e21798556f91aac000000000e80000000020000200000008695fc46097538953938b14402654be86e3d114d7789e09f490ceff0c05e69bf90000000a9f58643f680ecd545bf5d2d9456fe4733ca54624d285994dcd40528e2b387775072ffddef676c90257a5f7e753461b1d5bb2db2f7e8fb284212739ca0f06072959c66041352a06912592ec8fc3c5c00a2735b9f4118c540ddfedf0bed6f57cb12b8e90f84610ddbb8f80934d89a8999b45c65801a67ce2388521145a0f0649beb4d138fee924b88957d20f00e52d016400000003b0b9a0794f7fab1b6af139b04cfd5ae7cef9d4b82894d1446417384b57b922b1b96ac8f3ad17e40ef5f5388272f89657218b48f07a75dc80cf5a62bbb4c2132 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000eb06ec8a1669d04d3fc22534e3d27301ebe9976adc2d362bfa840ce386bf6534000000000e8000000002000020000000c3ba316443793354497ca0b72a0732adf00f5555b6007f60d3a160cae166b81e200000000244d6089bd1c3611e6029d8a2c6c282d197bbd3829fee251d887fe3b9aeb253400000004d8a33625a79170944af26acf9d8f10a0d89da098a8015d01eb974d149f46d8e382a2e8bf612d47d6a45eb07225b918d7f3a82009a2f86753b83564d5bb75e85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8ECB4BF1-113A-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28 PID 1084 wrote to memory of 3040 1084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\401549e9e45f4b20983f555d2d08db5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3980cddbc254794c505e59452c8a783
SHA1ba41ed49a6eeafa1e69862a490c312a72ea712ed
SHA2567d03791ba4ab46d69d24e7d982ed7b80b267cea2e5325fc93007c8378268dc2c
SHA512c5e19ae026aece31d262fa003198747f202b8d2547ae5e8a6040405b5ce9bbaa0ec02a77030329d84a66cbaa9ded80ace9e49e559f083198487e6a9a03031f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8724f9cea8c6dbb4d91ecdae33f37bf
SHA15ab42ce99c011353e5c7f143a86c8b354e3961eb
SHA2564d8cdb4aa1fe0fc71bb57c994e3b5467727b276fc56995836cb4ffc65f803986
SHA5126e619cc12fc4a0457974cb182d2377f3d04e1ac3e0376da0e2b0d4d1d9b147436cc07daac2243540119d2d486d101964e9762ec8c78a04efe3189271ab3f7ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e879fb9506df80855b531cc58ee3fa
SHA1745179cf6e30a4011f64b0c46d93d3f7e408ceb7
SHA256d5b28c0e25fc7a69d62c7bd4f0793a31cfff2c8811464f71108c269e385b1133
SHA512a6d65ebad123baa3ec18f5ae2f92f5f87e731d07900b922f8d4bbf6eddf155b995bfd9408a673ac4746ca28c26b1074d8364174863e4dc783c1f5ace9677533d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85e8a05eaa35315ded547d1cb0eecaa
SHA1907cbe5cf401f759dea07733e00b7aef4989c62a
SHA25662cda372749e444d3a0455876b559b414efbeca2199f798663ac6bfa796d84e5
SHA5128b3712acb778dba45aee5c5e98985d71220f183cdbd89b7b5f731fa2c8f4b031664e7aa09b4e00358b640157bc037c60bf93feb80d472180649cdea985e93522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee48ba6531f1164db042d04d3609b13
SHA184d7d6639c995efa762b3712ff57c80533a565c2
SHA2561e8640b1a8e6176a22fdbc286598c94abf945994b8eddf77f2c62b1982b1be2b
SHA51240ead8de266ee90bd728cd425badddc55074dc895d84e3f07ef12e4763f50ea3c5c9ba8d57900d4cc574ab85478eddcc279d1920d4034a190b718a5ff0ca4f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1129cb7f7a4367c687165d2bec082c
SHA1908ca7a2599eb27d7c5ae400720841e086ef9e1a
SHA2568e027e207b3a127ec4405192847fd408522fa6f31e560d2d4120a9555eead595
SHA51296e058f125c805bb30922d6fd78d5391301f7f73cf47b675062d549fbb8e015223c7758d8670fa6eb82946a9453b66c34f75e4b683da42043023150021f8b80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8826d994067d7a719867b40a91ef65
SHA1d6c5963d6238bcd898710cb64a20f9509e556293
SHA25698b5ecb22e7ff4fb1f6da2e45e9314419400281eb937ad78dac62dc3238afa3e
SHA5129e8d913bf96b93a0fdaebf6e55372ba6967d5b2eb168f2f581bfb2214da215ca4024f59acd3fcef593c87af6b761567e373662505f77e645dfd256547ed764e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572531f1883818f7243e524bf8c56af0
SHA16507caecf9535b48c726a131f7240034c984c7ae
SHA256d109e48844f86cca6746e0a577edcc9bc7cb1ee0cc25c5c8aea22539efbd3171
SHA512a18a82260f308d51e1a99e1db140476696cc5f74f14d95724cadd9d4000aa38481d64749d869be91c75308d52c19ac1c8d8b4bb6ebc81e9c67cc166d42e5829e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99b0a0eef2a35bb3b9084008e77808e
SHA1788aab820d0a90dfaa5f09f88278ed79ba842eff
SHA256fb14989536617ddb0389de1d3f91d3158a16218404979106bf549886cae29a37
SHA512c3fc49cebef8d0e405ff18365f2932a857df9b3793237c2ae4e50922b418d259fe976af293454b7fa195f390d6b3e8bd4ffbf03907d88f15135ec981c9f44d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f521eaddd58e393cb967b7b450d55f4f
SHA16d5e57805040366ee3b41bcddc0d4a653c94dca8
SHA2563cc94ec8948693fd4628bb762ff8bc89905cbb074e71b4a5cb024816aab8b3d6
SHA5121925731f303ec744fc9b435efd10d60d7e03483758a232d12bc99bc3433300bb76837b993ef2d68af488c34353cd0b47865b8297f5503eac3398cefd2cf2fbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b376d4993db2b5bfb030b231f49c5d90
SHA135b3991efff5c07c0582e8f845a84ddd621ca538
SHA2561ef61ccf35dbffce1f7ed5e322221bb802863c0ba04ce41418e7ab482363e04f
SHA512fd5d0b639eb2bc8212651c1ab8a2629681fdbc4558139572f38a33d15096d63d4bc524fd4b329619ec9412eb4788c3b6c102c1bac147188d80334f47e35489e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f789bbba1444c6a1fb09effe4c874e1
SHA194ce53783aeb16c3b45f135f3ed673cbf32d3986
SHA2566d18d1a7610782b0fc51aaa341e3a37e4b3320213bee8335fc88f30501203a6c
SHA512c958e7c1740f65efd6536dc38f7636b712c3ebc65f937e010cec65a5f564bbd69b0ee6284e2c0bd432ec4006b7600865666d79d08e0fdb1f19a315b96ddffef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6cc0242c79c6c1855eddcda1bcb2df
SHA1b48ba3222917f7285d34b8483314835b86c3b0c5
SHA256f47662ec8bac452ca1c3965ab82633d69adf6190848c40296e403cd74fb05c37
SHA512d8404ad42b8116ddc9bfe634a13473161736010876ddfe543f7b658e9331d753d58968cf5d8ccf366398ce8c032bae342f6b3abce00765a91cc5f1750a5770d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0822cc245f0e2854f879e372ce15f3a
SHA12e9d096bf828166b34e8dea4c9682d6aa0e145e8
SHA256fbcd1f91b1609bcd6a2285d789cb040e801a9f1933af9cace7f315339b542bcb
SHA51279a0f633b8734ba30407c3f2ebc65b16caeb513be97c3d8cac0eff2d34add6733ad6c3725e07ea55c32737baf32b214cd200818dffc3292aee11d2549676b2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1414fcd034ce803ca5935331b6fe38b
SHA1dec681268710deaf1079e9d54b4c381067baf9c8
SHA25686c3ad77927b6e7bf0fc629011698af8f8bf45d32e442bed9f22cc6d5cf8728b
SHA512bf852b2acd588c8cfcf1550f197a2ed79a8afecccf07a21d234258ef4e3f71ad2b952a2ba96e28ce29a8d5f17edc86646de40305e63751bf174ab29722548ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53960521de4af009b6e68ff6083dfbdea
SHA17847a05e89a5877bab5638f3fe80fa0403195bd1
SHA25696d5f50c5bb9598ef3b83fe6a92368bf3ca1fde37819d1c4d088026b0ca4884a
SHA5122faa939cf24a349f9285c6bd141f40265e46ddf3a1e631c0e6c777feb8ee4dab29ee11c6741a721be4cea4079223b4b261ebbca74fb4e4e7867e60e6e77a8453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbea3e2d0c58853cf850c63c1e69ded5
SHA1765512907a9296dcf43ae757969770bc6baf9d3c
SHA256e6a43eeb2484c3976a4f988d45eb6cb47e6af3b2eaf3d0f827d9a6974d017397
SHA512fab14939cd1ece9cd4d737910b5ebb34640f0c8c0d81ddf545eaf6bc43415451f6cb52223ef5b3143f36071805d3c32f480535f52653b6913a7e8d2ae9d68cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f1a6b00cbac212db960d2574ecf9f4
SHA104cb53769df2bae56700494a349c5e6ddb47367c
SHA256f842a632374cc6e71b87d6820bc4ac8bae1f3347cc41c97df502082b6116c342
SHA5128ef60c3dc3309252e37bacd8ff7e99a5e2f8ab1d35f1c2e7f30c68dd7e47c40f9457a7590811947664a638b77f4baa003bae3107cf441a940525839df3cc7198
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a