Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
43b523df645fb3a7eb6d3ccd6613d3c8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
43b523df645fb3a7eb6d3ccd6613d3c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
43b523df645fb3a7eb6d3ccd6613d3c8_JaffaCakes118.html
-
Size
74KB
-
MD5
43b523df645fb3a7eb6d3ccd6613d3c8
-
SHA1
bef0eb894408015b4018e0b8dff6e6295b162412
-
SHA256
5f08263feee054e5d5bbe77e0446580aaa0f55ff63822524217029a96b161ea6
-
SHA512
dcafaa4c079dc36448adf2093cd5b6027c9f5c7bcbd6077e6d6ed35c768ef76e210dc9a48128d5c9d2a1dcfadd9994f5ff6db04652426e218dd0651617c7cb76
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sZ6OVfJjoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3QTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73AADAA1-124F-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421893659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000065e9bba2bd69c42afd26e93873322ded9dcca0224278863b47a88b399cce5f29000000000e8000000002000020000000e98db3c1e6452e8faf7b2755ed7edaf60e62085abe496432556fb044c2dfa1dd2000000094aafa137e7be046171894a719b1dad733541a42308058023667f2bff54f9ed140000000c966ac70b986a64355f27ff2ebe252e86c971e07f16fa5e97a151eef6995e3a7aa56180110d8b5ba7168d16fde35e772c4aeafb76be877b2ef73f12bbb60676d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309270485ca6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43b523df645fb3a7eb6d3ccd6613d3c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0de207739746c8295b7e325b12068c
SHA1aaa16c994823bed3cde70df38ec78885a39bbaa9
SHA256bf0996f11d4831b845fa5f20c3358bb8547db1b58550ffe7ea7dc4876e352dd0
SHA51270812e3258ac5ab8d825303e5354b270b7dbd8ed28d7921b70282d055012b5059df63dcf9e26b1f973cc725c13086b29782df376543ac04f212ce715e429b446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ff2a19bee292bef6ed93dfe96b8f46
SHA1603a991b2feca1429db012a137ac778434b45988
SHA256219d09e1a4d7d9dc36c17ccbba123c16b435d0aee1c4d96986ab718ba39f7fa0
SHA51236eb841399d1a967c77e3a6fc5d6ebd389306cd771e35b51b874540457f2d0426000eb3dc637a936ebc891545fdccfbc3068a5e0412e13dae97c2544acc9d9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a40481d46ad8e50d17cafe02234a276
SHA1272b952816d8c36bc13515b0662952595a6cfb3e
SHA256e2ec9afb829632371caeebc51416e0a771107e101f38308031db08e2da546464
SHA5120168e7795950b3d0951277c286edce4c881a97ba371b435b5270666f67aaeb7894518da90117643084fccc1108a57998637882f8aca2030d8f375d2df0889e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57784d893d0d8c99c16d11c825e452f23
SHA13c106605218408747198efbcd3b514820e6deb68
SHA256ae9e20d796809a22a5f2d6b616f5bb19d31a25379cdecce3da56988fca15ee85
SHA512012f9f614258eb26ba2069e5af633a6d43068f6ce0a18696a3c97f4c0307f33100e84584c7db3522731a3bc2ae15de69a959ee2d061899b9ea07c115b998fe90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad78272500159c164365b949573b7cf
SHA1df88bd64c64e43135e4ab015d61b55afb6f70b26
SHA256175f4d4af7bed69e73e6cca417290adb6624c52bd9c3f95722e43c07e8730afa
SHA512a8404e4d6365f363fb09aecbcfbb817d61eb424c20c2c417571fef032a09d49f404d0ab64d19a89017455fb4860882454efa885caf45d8ccba6f5f6b5f04d261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581db2a63c77f39ad6eda3580dc58084e
SHA1921339ca3f1333f8874196d90f4fae5b8dc5cc22
SHA25691128df40cdd256a5935f90d0da69b15e89ba88cd9b3c62a4aef4428b960740a
SHA5123da98fdf103430de1d0563ef82b5a7ca5962b0e443a7477de9844239be092e88add318287966c57b8d102f45d3dd2ae3137deb297d1b3b2db3f08674a9c59e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686e097ed15d74b64a14237bbea46e87
SHA115b6ccc2c29ce2e581b2b0ced5ffb77f56a2351c
SHA2564d12cdee6293a0e9965d3b4bff273cac466134b96e93c25290693abe6ee427f1
SHA512f4900f65d31b4aa47f2d6bb53791dd3b9ac9d3dfaa48223900b488bf88d200588e28ba3fdaa834e8fdf9e47b64073953dfd9d3ccfb5dc81185156cb86d221f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed0371980291b27eb7cc01d067616e48
SHA1e513e5ed0153cbd8d14706c34c4f0a5cc0240088
SHA256907f91238a56e11079a57454731f6d46a8253b25792110047bdbbdcb00ec33bb
SHA512be7488610990433d8523d5c490298ea91324c06526ad2da1752076d7fac49ac348e4081541127a6cd388d90b2edb295ebc062b329f4b056642d0aa3f5f5eb579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54428cbea0509356f2cdc8ff859f100f1
SHA17bd9fc2d67bce219f26543d67be26917b54ba8a3
SHA25614eea993d99befe2bd7705045beb095110bfd1fa679a921216d99b6a1d241e13
SHA51294fff41c008b459cd96291b3ef806e8411e52565d9f6b902a2d0559f224e9bac09930ecb6a119d3e679d243db34d00608294a4a8f9d130e69ff92311a7a69082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f68bcae1c3d16cf8d9520cc9134c7fe3
SHA1042a45e7a3ff7f651173007789f5e475395c7e35
SHA2560528fc4d8e518b291e961d9fbf428f1dc2cd6b5d75bdaf2045afd282c15afbff
SHA512224830e9ecdb91fd350e99fc805aee066c24dba813a3cb8617136c65f3a2a2fea55b7adf0c2e78dc2921d96bac32a4e8a56bc8edf16161a60c7f7b12ff58d09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360126ba32b7eb24fe97da9e81de2221
SHA1fecdbad705212ef1ecae46865bea459a480c9b45
SHA256fd62a5bc6b69aba1e0898440e68ef649ee5a693eb9fdb822c175c202384791a6
SHA512d708a00177c0a5bb27e97f62844d9727c512e7070513887fb3fcd61c926c079c220e9686680e60350236442dde2732ce5448f775eeab462b33bddcde82ab9734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a530686f165478783ec26419121fe322
SHA1b0fcf913b35d6b61d1ce43d1e0afb3b3ac9acbb2
SHA2566949f4c6ccaa742b57dd8c7287cd3719e6b1a26b2e6a0cf5009fc1b996d32e24
SHA512b6c2d40b2d0ec31ef4ac816b4d748aefce9998fe392f4c5cf6e437555d4bb03660261358b053c10910c89d291ac6efea7d5c80152249f2f05178b2606a0ddfde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e97a457942a14ae3f3effe4a22c4b84
SHA1b1185f9e7ff90a38cb1ee967542bd8ec1177db60
SHA25608f9edb32ed9889f8b69ec25f2a21f998a3b7fbdbcdd68c67c33268399e74aa0
SHA512b0fde31286e252430ed684cfc36f67f43c3b867ffd5e36ae4b03087532e474a91f383c0d6508bbdf3b575971f611f1eb5976eb3f7560b78b7c8a535054db61a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e6f0f141cdc9b3354d8f63f748d501
SHA155e6c24a77c40fce8aa00e8bc6e1c27588755774
SHA256fa64081853b60ff3dff3391a783690e799b0743ff1d6fb42ef3571e457f6068c
SHA512f52e6dd4a3e6c382239c62137ca47f5049cc94dc2db662a16b3f5e9b4eb5c382f7c90ed79ad0e5b4f0b84b3cbc53621e93ec72328e235b35f147d33e3ad1751a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415634ac947286aa4eadc36500fe5e3c
SHA1cd7d33a920f519dc5cba7687795116fabd6fdd9f
SHA2563f7f0fa891f642f2b34891e073d3d443fd45b696e68f7f9cb667d728cf9c5c91
SHA512dfc0940013e69d273273e4aea73cc67237d91b61f1e5d554f4fa8026ed6d97948f621bd75cface0d83b3600f2a9f976fc07f588e723c231ed01ffda47c986fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08e57405df2aa62b7a2f4ac4227adef
SHA18a8ecd1f5c4fe549b3811994b49b943f4bdec01b
SHA256bbf6c268a7ad788998ef055426956473df86edaff12e24f46eea6ab00be2c4ee
SHA512cadab7f58fb98fea93776fa56eefe8e7f81db2daacbc635566fd9dbad696addba011c8033d748c05de6d69f36a7fb84eb9afee62036487515637c9505b593705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56542a3626c7377c100c0f5973e7ffd4b
SHA1cecae843a57bde04dbfd85a22ebc1ea2630ccd77
SHA256c82a70235bd27e0cfe8b58835908933b70232bf2293d12df5e1ec7172c669071
SHA5122dfd736536cd6120dafdf97a3b34f0f5d4452c75af539323b1320dc0b9a040b3c8ae3ae1f63e2978a5926002d57d92a026da006ccef32b05ac73272cd68e8dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53608ba09d5b04838ad2d6edc875e6a
SHA12eed21a2497579ef28e27ab27fce44d464c6fd82
SHA256a9a254d5323e027af6e086c05c9ddcfd0523a8904cc64a0c79dfb75ff1aca7f5
SHA512e06e94fa9193589656c12047b69bbef55aa3dde3f10994734a356e82ed06f8d2e4fe5e2e74de8ca62be07009d3443382dd61fb58645ee765da62948c8c63edd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c613cac832419fdb7ac27fa314be39
SHA1501bbbef9aa8aa67abca7d35f088b4ff55fc7bf7
SHA256e56cd51fdb5ed3e8afd3183ad290e5da65a22c03473262bfb8a007b2cdbf90f9
SHA5128f7d59366ccfd3b7c073f33d536f18777005fb973f30d6e5fdef4706f527bfdf248976c8c8a4eaf3095bb76e9b9fa954178dd3d34d84e059d7284e9bb5b2284d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a