Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html
-
Size
70KB
-
MD5
40afb6515d0afbb59193e3e804be7e01
-
SHA1
f5b27b7d17dfa84a4efbe8bcbbb153bb539caf98
-
SHA256
cbad1b2565d826ca7a3c18fa859eb84f084d9233e7b790dbd1ae7ce9f2681268
-
SHA512
6696af71b95647d4d95811ebef1b1d06ceeac19b2653d93c5012bb07360a3df646e54647c924d21c9850963daa1e65390f8220f9847f7ce015016e0b6e0d6022
-
SSDEEP
768:JiDgcMWR3sI2PDDnd0g6rVdrZqdRoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:J9ETvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421833659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0439461-11C3-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706ee494d0a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002b89d41516b73e49074535048711cbf5ff09392331f609111aa960284e595224000000000e8000000002000020000000d2951d73b28a894851896f6863925f6d5bb751172835a0905c7c96721c3350712000000042ab283a061d2855b0ffa51c49ef894e59ca399d695121275a2007911bbfc3f040000000ee84d7089653a57131bfdae82b64fefd2b7f189f4a14f1b6c89394d4c3b78361f8e403d320b6457699c2bfa69ad60ff10e7de2b8319fd5a7a8dec9383d128e40 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1216 2252 iexplore.exe 28 PID 2252 wrote to memory of 1216 2252 iexplore.exe 28 PID 2252 wrote to memory of 1216 2252 iexplore.exe 28 PID 2252 wrote to memory of 1216 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40afb6515d0afbb59193e3e804be7e01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a286c2299f64e68fd19db9cb2c92cc
SHA16b777a61097698b3c71bcde6f1db3c67b05748bf
SHA25693c97dd61d5891decb35d84c8696b8789dd469739b40ed415d9fb07c867848f9
SHA5124d927e52a217bba4b85b7353b12a7e110e8ce8b58897b37d1f2d3c92589232807c6ff04ad8216ce771444b18b0ad933509a7da874370511a8a5e8fbe83a00e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c244db7ae724390d5f3cf8c82074c2f
SHA1bc386bb3a1e5e96c07b21430991c35051ad2910f
SHA2565acecbcf406e32c18de334569a1cf367994bd1797dd5a5a11441462b83731918
SHA5122a7b507d3f8a1238de3845fe96fe242e0515c5dfac6c9333436cca5d88c54fea64447a6bc76437f652565ff348330064da2af76863137e80fdbc17782a7ecdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c1fd3147bc69fac9d681d5e5c33aaf
SHA101efdbdb176ca1cfbea24b16dd3be06a6f914cb5
SHA256f952a5743d35f0ab88b3b0c39cf802acf44ee309797505b89efcd1aac961795d
SHA512fcc7c84a8ac1472b143458779d54bbff7ea4aa11202eda79413fc49bfd300f447086d59d9d7fd3fbc1ed32715f052038688543a98a2cf043d9a55db220eb4e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80baa0114d971e33579132b9888b491
SHA1c4f1e43a12566afe87eb87aae55b460df8377b32
SHA25603f55b87db0de6025e276132f4e5b539779d46bcca7245b36d390fb4f888adc8
SHA512f5efda1d99706750334c2cade48c6f6f30831c31cd1d9de664951d282a471602ed78df714d168d18b20401db50673ae206f6441a369516ac99bddb7f16590dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdb9cf40b11a46fe3565060f4783bf7
SHA1adf1c6b4b115217a73dfe24ef61389b62275be90
SHA2561f9f5cd329814d397c42eb0b6c02f26b1ada26d0855077c60aac6d52017089f9
SHA51219bb9b8c3c5d95334eba1b19ebe50884963b3a57e9829505c9fed46b2e3ee8239c160e5552a1f62217ee179c66e5360bc5e07a18e9f30138b6fa9cf4b1593ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d25dad3c1cf902ebfd86d9c54c7bcef
SHA18deba7141790ff3b5267774101b9d2931f8d5c12
SHA2563202cd225c27de7542bb2d9f0e5b5243577ca22e911eb7fde251872995489975
SHA512560f62d0563aebc0262d4c360b19186902bf5087449a44e81a43cbd77160c6e7d9792e3bb9fa931ce6926f606f0fdddc365829d8df8127ea5d2acbe80255ce16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0ffde18315faedc59cd94343ee9738
SHA119316b8d1626f5637bde9d3be44ae3d441eab857
SHA25699f74cd57c08ee54a3f88e9ca168987d48ca00d3021d64698f0f9977f860d6f3
SHA512a3ca261642db0dbbdc3756d6fb4765ad4c4b8e5167af335bd0c3eec5ff2eed4e6268c8181edfe02253c78a6160627236ac95dc07ba2f68fb479997b9d321b28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1eaac6ad781378c361d1721b3c30cba
SHA189982b8b73c2966c765b0041c66ce1527a7a2baf
SHA2561468571624ebf45ef84649c7c28e1241325da30c343f7d374ce1b6edd53accdc
SHA512d5046a7c9baa6c4195a5b4ebe25d9f5db8dcd9992c3b9bb9eb0143e8a5a26a66f3603ca954905135164020c40fa12eec65d2c0b35246e9e40c8564bbf9891f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d0f9dca14848077e0071c3fdd772dfe
SHA11049b57dfd86c1a384c6cff01375c623eb48a059
SHA256dccf2dbd0bf3a17b0e4089b9695674a9080de9fe88ef116fdbb03c5bfd3b564e
SHA5123849fb9c7f1a675ac603b06130637efa21c3a32c6e5bac4710564103839428970a6cb757a7a34055016f39449e738c5fc5df6e037f1d0d65aa72e8da507426c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c497173cd76bbd7ad72b8ddb8c7044
SHA1a211f8b66ffd0e03ac02949b0899c7fe883c074a
SHA25645a13f3e54e277751c338ec0ddcddf3bcd52b409b985e761899a0e4f9c547dd9
SHA512a4adc85f886deddf35bc26349d7e3d367b6563ca121cc7dfccdf5f3bdeadf268ae430fca1e61958b84af0a908854bc37480ade1de53bead15e72f4f31550e3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e1d1343747fde7de16830a51a56b90
SHA14d3ecdd7f800f7ba0f07bb55528a62350f33113b
SHA256f469b58d459cf525b9827cac8ca6da7db5b7586c1bdc44b87afaf6bfdc3d17f5
SHA5121a983a5b92d75157192549a52f53f8f529d2a4c6a724b10c653b8975910fa9ea6074ee09bb944770e838e0aa358e048e76608e7edd6abe0461e60859aa858d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4f7c1addb4d920a30a53b7d8c84f19
SHA1548c7f8e09ce1d91ffd368ea1d0d8018cfbbb8de
SHA2563cfc356edd5d325def1fd8997f6689b80cb1c36e88dddf8ac3c9bdf75a6eee53
SHA5123c99668bee48bc209236f2f23556f8783be58704b53c5a746777c4a33f5130aca8dc84d3d50aa8739c11b95dd0a35d2be582c85b347e8fe973063495bb4dbd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd2f89fa5d87ea8b34a7efab689b76e5
SHA1e8d2b1244e90e19fa89c00aa670e451f7d408a40
SHA256ab1062f763f8ad9625e1960d8f71dc98bb09e99d124f86ed2049dd7a9441fab7
SHA512c8408aa3efd886a6d2898f74fc64b5c972856a3ee6ec3247e5796d61f55d721d2380ceda707e44fb19230420e5a721f562e88862224cd632863b63e8b6052280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588e597637b312a49fcf6ee71a0fbab4
SHA14869fd1e61426fd2aa28f2f0220fd0ad481c1603
SHA2563a308a358a6c970c0231b6d8aab439ca14134d080c2c30a32733504adf8f364f
SHA5120d5d2e1fa425498c7735a1f7b84f39829b781afa566162e0acf25cb19b78411809a1abf7d5901fa85e091404078da3b289005085c9baa9da497ee27c35928e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900175b060cff2c7bb28addab7b659ff
SHA15e28bac24368a1bd14063d6255db4e1091b20e2e
SHA256a4c81cff1372dd718e7fa1231477fe5c420277e3fcb63e4fff557a8b363c7d6b
SHA512c59e5a09a8b2efa13c71992dde20bb811e01cd14fbad05a2e24975db8286122f266533a1643636db2d0325c19f08253389c9f1e9f675d3ad798d2112f9df934b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae3e2d64159c5ab192eb645e74b5b515
SHA10a707c11f381f09cb8c0fb13328c76c3dc4b62ae
SHA256c7c10e209b4ab1e2d0c2fa00e8e9c67dd90a7251a42bf7a65f60ce79c3adf6bb
SHA512718ab372b9e4cebaf0dddcb0c671f91195116ef262df7d28323d9611500525f5b0873f02b7b5b68e7a6ee7111f99a532050ab38e9210df12cb7dc01ffe0b6c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550eb7ec543f6b168f62cfe668c7fd15d
SHA1f16923f7cb3373e76dacf92f83a4f0f3c8c0e5f2
SHA256d1bc3b7e9421ebbff2a6fd85fadbfcc15270816330940dac72605477d882d83f
SHA512aee7c9311166069840a08b638ec8a169ff4371a9c68123b55e6d70da2d0ab22c330048621109f056a76dc709d403f09916f74d7784140298525854079f57e3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754ea671732f4ab533836c5763cfb9f4
SHA1486f5d07743dee8470a4d44f3f5fed4aaa99574d
SHA256ce6a2bf689b71971d193fb0eeeb8f0fd43464fa4926eda960c4ae2b3f094018e
SHA512d52ed0fb842c1072f09034de85ddbe215d21a243ba5f7a6bf38345d38f000d682059b4c867420ee4134dd29c6fe0b0efa3f422e533ee62165cfc5c0e959b225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73a806fa62c23cd06ade342e4085fa9
SHA1b23ad9f792497af1d56f3b50357c0208dd836f9d
SHA256556af022856d454068f66da42b8ed2c829ce95a74ec07bd3f5f08e0357cee58c
SHA512b107091fb622eb186fc37f2330362f510e57c8860d3618116c1b9218e600d3d5092efc956a54f55d915b3fc359058904ab4c6ecc0fa1c0d7a2e33a36ac32b3bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a