Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
454bd7956138360f6cfd51134b88d914_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
454bd7956138360f6cfd51134b88d914_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
454bd7956138360f6cfd51134b88d914_JaffaCakes118.html
-
Size
51KB
-
MD5
454bd7956138360f6cfd51134b88d914
-
SHA1
2e16a7cc7d25053d26a50accca589293c6709294
-
SHA256
f3cabacda5804222400d33b0629240e8484af8a98e2e24ca7f4732b071a774c0
-
SHA512
abeebc92b8776fb5ac3d842e6c9d2d786130474575921e99712a8524f80cc411a21cf655dd56e8f2e1abbeca4356aa2a8f92ba2d0aed25939fc1d84bdcd5a247
-
SSDEEP
768:SrCyC3C3C3CECECXCXCBCBCCHUnutLDEP2JYTd6DQEyq5dQgh/GKse+XRya5TQcH:SrLSWWppKKWWpHUnutLTYaGKse+t2e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421923163" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{255C1C21-1294-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000439bd424e622725619b1db78eada683a6b1d42c55d86177e56dc09f9bafea252000000000e8000000002000020000000a63e6292f495e53a38f99d302a2abaef154f3127ff0eacf5da0621f2c911b36020000000a225dc8dbfa7599851af4d004f27e1349eb096f560b0692a0204c5db87712df3400000009537f42982a594acf414099df3434e971cb8372f569449a0e1dd8eeb2c165a788b038d40a64eb27a97ad82a6ad8e59587745377dd10e139eafd960ff9f6ee756 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01eb813a1a6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2928 2428 iexplore.exe 28 PID 2428 wrote to memory of 2928 2428 iexplore.exe 28 PID 2428 wrote to memory of 2928 2428 iexplore.exe 28 PID 2428 wrote to memory of 2928 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\454bd7956138360f6cfd51134b88d914_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081d072d2afb01134554953cba676dcc
SHA1db98242484fddc9e981b690882ec91f753ade6a6
SHA25661acc7a396975dcbc6345325868706b24d39ddcc6e8ab399b82a1c059ce9ae76
SHA512bcfec65e5f3be51c081e4a097b259e84e418ce51d9a9837cca8603b7864a9d709cffe745f99f6f25515261890f84e2e83e6139f393f67d135ce4acb79b8eae74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a27334b488adc600b65cca02c81617b
SHA1703a8d6187d362d5d406a785f84c4aed1b1bf31a
SHA2562b109b19bc47d182258ca40b8acd57941c3d5263169e19dc4d07590cc93388ee
SHA512ec8d2cae4302990e1bcdd182b76b120f1285a3caacb2e11e95b53a8013eb3d5d4a5c4be3e39a24d64af373a81c711a3dd9050bbc3dd636c0cbd8cde99a007ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4199342aef92d0f226f5a530642e5a
SHA1d4b24937f7db6fb251c790c58291f9873e35bd05
SHA256f5fbeb61e477a77cb4d9f6756f38dd09aa1e0b4610fbe39aa99bbd0adcd041b3
SHA512e8b665fd2903557ba6c6d88981a6232ecd9206a3311fc181bfcfdaa40677c0a16a43fb46a81b71854045dc69c3be042d9ce80a12c7118acba6e31aa423c289a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b617326dfbc36f4b582b2e5501e0e7
SHA18e37c4f8ebe0be9e8d5255462eb53c00b9083a4d
SHA256426bd34783e088231e54fdd5d1a6c35359d3abab6fd98fdf1fe55a4d650b88e2
SHA5120ae439f705662648f950e096582d900b2382a70219d93f80211ac6f49f3818ffc13126d42dfafdf76066e2e426318eea1e5439c1676acab7b57c0f920232a283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a7a9cdfd22ec313f71b5287e63d38a
SHA157b32057433084e0f407ab2863d56b2b7dd95469
SHA25645aa7268c284b13c681f326ba87ab3a7c5db32704e1922787949a0cc0e167402
SHA51273076191b370d18d98b1d24e75b7e80cf639803989a71a2bb790295f22a846620a6c648697cc53a4346f4839aa89b8ded96bdcea7be34dd315123b58e4d28b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b80121369a61fff03140e9c57d2318
SHA1ce9f3466180f833ea7c7f0b6ed9cf51bd12a10f4
SHA25652709b128a1fc5ef2459ae7bdffdd0dd24390fdbe21262678c21c697aeb29a66
SHA512df96b5c02b781128acc9f0a0ba90ca6a8d86a60276608c7f50186a2b52cfa27e680c1a3c07c6343935bf21c1f5d7b765b7a7c2b92a111a326ebe8061f006649d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50faf89c556cfaf6916f0653dae4358dc
SHA1640550603ee59b086dc3dea482604606cda8c2b4
SHA2561546cc10687f854763dd814ff5eaff6aedab8fdead714356efc64a92ce548426
SHA512dab5453fe1cdcf37e971ed930d71aee0d57dd2411b5c29a12a11725e87c6e7e89987a0b86012f4c94e94a989d1dc007df3d147bfc062352d2ae23856eb72bf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20dc8dbc886827214f27bbe2c622b3a
SHA18885f9f78b162dfccb1d0b120c6b1911ee2fa4df
SHA2568e0a9a3cbec5b7662fb19e07ccee729059ea7c8350f8ae6d925be3f2d15f9b8a
SHA5123a1dd0ba433ee3c85e555679dca41cfbe498cfcc57774046793879f2ea9384997fdca57cce38251c01a2499a6f309a79e13be85de120dbfbbc5c134f95429e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee2197a63256fbaed3a55ad6801615a
SHA1690a6b61cfab75f0412b001ad91bda0fa18bd46e
SHA256be4a35215002c082fd3a0a39c4f5c278b4f4fcf25f6ab4b838acf0ce860c048a
SHA5123ca062f61d79695a2934ebaa6c13a6ecb5bc5bebd0c44a0858316949d5b5e926f3463962843a4f17c1ff4e3a3e6fea2620a585e82222f1aaac95773fadafe21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5647d88d65f35c08e19df12b106659d45
SHA138f058b98c5daa883709bf425e15119bf10c37a4
SHA2568d84bbacda9b35f2084beda381ab03c86ac87b78753f89096a65968c17be9e66
SHA512cbcf6d4fcc3485612c78a9a3297c814e17cc997988394965a77b91cf845bed03668c1c2a408201f0dbf545389f31317baf4310b6eee8517ace0d7b7808124487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569fd8e8b8ea857115fda9c84ca349ae8
SHA1e5803f71bf5176efe61a439e50d9c4c198bed93d
SHA25613e6c79136be1c322a7b85ccb90ac347770882981d6938bb85a23f86ab08fd23
SHA512291ad20ab79206ae791a2439902e2b0c1cc19ddba2cd739a0cbcc04ea09636277fed660d889ba5876000bd8ef31ff0b73016f09966e51e795b9f71edb25cab3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c96cc2cdd9c2a06a75a08b2d0559bc
SHA1d7cd8ab97cb3ce463cfa292c020edc014ffc3246
SHA2567d04bee27c06985c897a0b1d2d3c98afe78a8ee0131ba106fa8156da1d654039
SHA512b9b32c719fb130f00aee435c74f1e2fed12a6b873e5f2ec5097df1b0c96cfa5a48c7d175a3e4b021005f6baf470bde03829b47b052eccc964f3884629aef4f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc401d9d8b2f1648f7242fc3b1f6f1c7
SHA100923e2a79d1b8f85c9525cd3db6267747ee8650
SHA256f106a5294865f7dd71994cc25e0cb9b521d9c874648bddec8b1c4286ee48390e
SHA5129dd66330e951793ec7e65d3f09876de822969f95db671f08ee44a01520674aee8195bb46724a68732579dfd5617b7d4959d96f4e7b05fd7806abff4a06376d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de91a0f44a2fd17e068554b0e97b8885
SHA17a1e3c1755eb694d2149b0c1782f36c8877e41c5
SHA25634f266f2d78094d0ad90e782f83b0bb372b9b236484921b6851d82c350848bfc
SHA512f309996f9f22f83070b9d59d1ba4de2f72c1b1d5bbc54149155f8fb0243ac093c7dcc64cac36598e8eefce44574c71ba7d73855c9b26a2848859f7800cb8153b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2a5e85914b4726e9e389169a934f22
SHA107b1dae0ccba52a69d8c109b15d2586cf6f40b13
SHA256a3bd3ba50e97df3ba5b7230bfed9579f54c7f8b02591ae1898fe2fe19a00e9be
SHA5128899f9d2a0da7eb18d33db86598e013de714c861f866f80fd07987c33922e4648a01600afae30c74aaf1a053524e2a4576e639a937331b6cd3c01c361836adbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f11a12efb4dac9450efd245048877bf6
SHA1b9b892da98eeaa89113357ca7ddb74cc5a293a03
SHA2564eff7665535d7d6d2b5eb38463a5d56c153a1b212eb73389245aa56f45a87b90
SHA512018d66ad44b0d6815c050686cd62ed51a9b9c0307efe1b8c57353525f5ee015334b3e0036156ef0d650f81d5653ccd702fd87f4e3058a54b38f300dd8e179f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30365a13829df858849f0c885e33fc2
SHA1d6f67ad61d447695b5ccb54a73aedd352a021429
SHA2562e6d5c2687221ca260a8ffea41e906813c2e8fe2ee4f5afc1bd08d33f84a09af
SHA512fff502ec49c5c65c99d8b6b6c0043cc4633e509847b6f4466d1abee0e464525f9e95c4091722c7e37ff79e8ce3c47442ead92336f33071efa72ccc3d20e852d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c43433c5b33751e711e371a892e3f4
SHA1962450b8ae739e8a79cbd51a1e2999e9336354be
SHA256e375ab4f79b961150655f5b4ee974ea0f7a5cd7a03612e5f0a0c2ba19c980c43
SHA512ce52d15653a0b178d9666ae16612e37cc7d23235e504bcd41b4e29e5c04fb7712e40fa80b7bd50e7fd5c3dbfc4df0673eaed5e9b207c7d6244593b3b2d674091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e103410b855cd79aa203c7f6d1d4df
SHA109854b3276e71659b87e7f7cbbf05909f9cf5c90
SHA25661276e008612c9fdbd3d72b6342dd05bfc8dd7fa6d074de62d706923b5cc6675
SHA5127d0ed09012b53eda1e481205444a95229296f953bf48b598410c70d397d3d2a9a14fcc6989b79ec597d1047d17f70b80d32557c99ed46d3e9276c39811eb5d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501bf8b8db854dc52a8605978728a8923
SHA1bb81e56371f7222ed4d95729fc9475df456a70f1
SHA2567935efaaf2234c4ad74894fd4d9f4222bc596878c0f800c073f285314ce7362c
SHA5121251b1cb7e0e592509c13495536d95c656939bdcfea7ff8612bb075f8dd7eba94ca868e07bce318638892f24bf31cce008eb5e59a14a626b72e197d614c01838
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a