Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
416e69663afb390a8b08bd325667f3d3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
416e69663afb390a8b08bd325667f3d3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
416e69663afb390a8b08bd325667f3d3_JaffaCakes118.html
-
Size
4KB
-
MD5
416e69663afb390a8b08bd325667f3d3
-
SHA1
42ae2347fb5845276aadedf4b4f16f46eff33e1c
-
SHA256
9d046714db94944ff3ed9e376edd6ac70cffb416ddf992b1843c4ba2002a8919
-
SHA512
3ad0a5904137934d9ea9ec29a0b0f38c2fc447ca5051f13065fc853693a6265176cca33d1bb14fbd6c6cf61e87e7e6b2824cad064ef4b98c5218c02375ae5555
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oUwjd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421850348" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9BAD0E21-11EA-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a7b114f5ec6ac6b427c03b02bcf1370172f3852820cbdd38080406d6cae847d2000000000e8000000002000020000000b28767bf158d29e54b803b1e3133144ae35fe4f538320da116a662581e6ad5202000000035db2c1755e9c65f478f4d37fc22a73fe6da28cfdfc05e937aeb25688c8120a940000000bc8910db2cb68235e47c3409c055d40d08257a689575ee4725f4449ef893b4dc0e04e5df470484e51be2dfa45f9226bce5037e049119b4fd31b427a6df01d51a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107c5270f7a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2532 1508 iexplore.exe 28 PID 1508 wrote to memory of 2532 1508 iexplore.exe 28 PID 1508 wrote to memory of 2532 1508 iexplore.exe 28 PID 1508 wrote to memory of 2532 1508 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\416e69663afb390a8b08bd325667f3d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce48b04d9e36b1c868e9ba0c3e0ef2f
SHA1f7134f143b5ab535c0084f387c4b2a8bad072c05
SHA256737cee4e55d79db7c8cd1ce1648bcd12b0ecbe61533a44e3f133becd72a6f7a3
SHA5129b87cdbefa258ef70d24bd1d84938ebc5845390b7f5fb156896e9129b85700fa38dfc1ffdaeb3f9cda8896e4a08b66e8b316dbcca8fd7bdd053a357c8684b48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228b4de20653b92bde8a40bd1433bbc6
SHA1430ae379ee14b8f106e79ec5b0550ea5002ebdd6
SHA2564798eb69d8c6791e1cb75e2c25d844fb53db3da8bc36e7871cd6a9fcc629922a
SHA512ce35949ed6c9a8acea0a6269367743b5955f1e79c3a2c599e4c9b625e774c3ce5bf252c807c867bdbb1f6952e5275cafee6c83154ba3203b81ef8db20fe34051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c56e66194e7e4840d2a03b1a0b5b9f4f
SHA1b23aee934da4d563a36751a2a65a744e16a82b8b
SHA256415068d982e9eaa3bbcd6efaa8695017909ba441948c29e7da8489c0b0602f2e
SHA5128d93c8e708b1561eafb9c9df7eb4f10e214535a074b2a0135289488e3ddb02d5efd372bf54131b12b55e63364c0ef010b088137ff9eead7b317043b3b40ec548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57795217d47adf02b57c78da54bfe5583
SHA1263f874590b13895cf0fa94c16d0cb00544d9f6c
SHA256c73e12d1cafae318fdb96e6d1ff3b5d422515b6489116d2e174a4ec171dbe8b4
SHA512bdb435fc983e6446974cea91883b4f19f9b1991b4ca128baf0ecd72c3676fb4cfdfe0fbcfca542e19f002b2e03d548d0c3cffde3473841543f95eb9e1b8b2cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0124e32b3ecdc409ab48ecde9a76b57
SHA152e1a2883438620c2636967f165ff07ada1bf6e5
SHA2562d7a3dc58170e78c71b431eeb47c55c8d09135a19f611d4e47efc31fa0f7f8fa
SHA512e2bb0419f0bedaf4e77f8d5b6392aa7158c55c2475669d12ef4028584e5effd474a6a1eeb23a7394343ce90056687c6baf9ce21ba893225d43c4de76d263e765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52156f3acffef76dcde13eac99c7f2b86
SHA1671c1196595022559a82d6aefd893299ee84c017
SHA256646a9d8e9996011fce60344f40a4a3377a2fa0f1d6249f060f8c88b313273f7b
SHA512730d3b56edf8f9cc92efe0ba68997ddf73193a7f14ecc5b21a747220d4e2c602d27b4d9de2089b2115d8f9f4aa3e492b97d5579e2a1b256b943518a39cf65d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56004e4b985ed30abf3d9235b908edcd0
SHA1722307926cd212f425ecf3c76add00c3d0ca4ba6
SHA2566421788161f12c1aaa2a2b16b81bf98d434bb8aa595213cbee54b723a1c6ba3e
SHA512acbb634e592f5e22903ecfca88dcf9a74145918ce835c7dcb3d2cb350916ed11cc49158535ae6b6b97d2d2c4817993f6b2a5b45153d5bf242adb7253a5650e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf58a0b5ab820b8f5a2e121a4d23c15
SHA1181163540de3057bb4e1a2b818d90fdb682cacbb
SHA25670055078ec4b82cabcb2ad56a66886e2b5e792d477825acf73d97b58a5241e54
SHA512049d198e9c3ec86c781e83136306a95139d94b0b9aa4fa32b37dc5ca11de028876aabcc4f1d71b25a210a9d6b6121e81765bed48053a13fe3623e03bec06ece4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564e22301017037f4290c1923fbae2029
SHA1523575627944f36dd59cda9f91a671abc7f54339
SHA256d4d1c97b1a200d6450b5c8c66a9f7aa04b61da5e50c154e523a877a4becbd5a6
SHA512a041ab5911dc6a63a9fc3213e21ebed93f048278ab77930631126fe4e931d03889d47a67c4857419f0699e38c87bd966b2ae3b878074680ab035117d07d3adcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358e96785c2bba66865f4b009027b5b6
SHA12a84d2dcc2f00c49a42932f6f67fa6417c704c22
SHA256cd9a33754a0372dc0bcd6461aca289ddd68dcb9a14f7c17dce9ea3c0cf33f68f
SHA5128f6c8d1936203134af5c6c2c7d03b7e60345476e452fc8e04450a32edc9473cdcd2e6a4a6dd760193297fbba90557ed674f2b87d7f514d85a55ee16b6b3f88e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559d05262314e8b6f1e9410a0c8f7d75a
SHA135746d7c3fbd0bed303d48dd1cbe1ab7a9f279cb
SHA256696aba4417d5a91f2821718001a6661ac1bda286647c9ede7569a1db562b0ed9
SHA5121b4bb8cf79cf16bfaaa9990640ab853782a6fa3ea89a43b9c0d9f430573c6db05d03110c6f9875976a197341eb030464f2d31c810f238201480b096c3ab3dd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562357f4e1056a2260204cd3587e4744f
SHA1c60a4cf6edcfa65360fefcddacfe34f5dfe8d2de
SHA2563de29cec6fe7e095f9ed1408884c078745ceba85717ff8b4745222ec7108c869
SHA512416365b48c2f74371a9034fb326825d7554da68385278731ae3e92673fc7b1ed17d6e347d9ab396487ac4ed8b8c2d33a8677098f9ac9ab8f63755a218773c7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517a0fdafc2ca5c1d458a4f45970de9d1
SHA1c4f8146ee923accb3297ee2b3c6d6ec84cf49670
SHA2568798579e2fbf7d38b9068c7d22b3a819771a4908420cd6be703b2cf81d9f99c6
SHA51244f4929ff4e2d5dcc7a1fa6740972d73f0d5db16774d4752132e7701e117eb40145f32cade957682a8e94b442647854f8f4811a535919e246f17ea5e0d8e032b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552fe62036a54b2fafb38746865b8d411
SHA1d91087a27c7be6793aee1dd32f11f89943d36faa
SHA256861a9f4062da7572447e3d235aeb81804c9fe043444adcf73c9eb9309e8afc2f
SHA512dfb3604495a1ec5f0cc277f88f03692e4e2d6c226d4d073df58ebf6728dd3237959fce6c127bd58e224fad685c60e3eecdcb3c1cec9d511149694d451be34206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2cbd537fc21fcaed4ac27118c23be7f
SHA1b3805cf88a49723d833649d53b1f7e58015e7f0a
SHA2560d039993376f7ddd0d50e2c6e1bbf93c0a98f072229a2adbfb04ce142f535937
SHA512bdcfe9ca38d7582ec2430733ea99d1129b9cf027979b6b6c0cdd229b570abc0a5d7e1757a980f59d8ffec26b1945c9e8921444955e36e5d763af182cb6210f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85e4893b6038dfe2f12a5501a431d09
SHA16213395e8446687664295da9c9e3b21a25906dce
SHA256ee9cb2fa7a50f68d76fc5bf11c0b3f70edbe6a82f306fe10cd143d95091ddae4
SHA5126d0ca3150bb2c4ad5d355f382a3f44205e90e173d0775b70537e5bc38fe03bcf2996debbaaaeea7ccc3a9993fd29ab9e457809fb478e2291e786e1fb8a8d01fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f7ca3d70c37a6161f9ea6e27631d3b
SHA12fb0f01321967233a144c71fe16af7faea00b4b9
SHA256b17a73328fc6349db67cc2be4b0b53e5d2acff624a09dee5c127f3f7df92eb3c
SHA512b6898e159372e1ce9d82f8fc32c26048eecbb07c1645f305d2e189e03e60c78dae49ff1c1bcb85bbffec7953e8e81ea1a68b64212340775c3b6fbf725a19e223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ce45afef6598a95e6263ab146ef5ea9
SHA1d1e0a5c14a89fdadbaa82762361536021159c383
SHA2569804fd7dd086bc5719af67c5e04eadd328ce068f91147431e6b97e7ab735938f
SHA5121f3bf16a23bb45d2d499ef311bdd7d00ac6e57e37a6a1f60d29dcb54d5a12b274d6a516dfb933015dc961e80e9fa4c28e6fbb08c22dbfd1df742754c4ee88f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e3d73420098070f4dc62094709004d
SHA12e37d876b736426eb8c9255b618dd3fe95794e34
SHA25656b0181b54aa43216bb6d7040dfa32ae354c85d6e535ca97600b24614b4150ac
SHA512ee8d42146b55b7f91ab6f58908ae6f2cf557327bece03dd3a42509ebf5e9c1403ecf34a2ab3412f632cc178fe7bb7edce8c0260c51eccdef0ea35df07bdb7752
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a