Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
4574d38b2cbca6eb45b41a9bb06ee8f9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4574d38b2cbca6eb45b41a9bb06ee8f9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4574d38b2cbca6eb45b41a9bb06ee8f9_JaffaCakes118.html
-
Size
69KB
-
MD5
4574d38b2cbca6eb45b41a9bb06ee8f9
-
SHA1
2e8c3b305a4fdcdebe6493f40eca38e5ea8e8726
-
SHA256
6b7280f5f25444a6e7f3b18e388fd5d914eb8be160a8f717aacd2b8df6b64a48
-
SHA512
d45678df3e1899c688c662ed8c2ac3b37989b9e59bcc7e1c2661f6bc0b9e1f533f1cf5fd4d7cc0a075ddb4bc610500569343c9e7af85e2d43da9194e78cf829c
-
SSDEEP
768:Ji+gcMWR3sI2PDDnd0g6cO37WEoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVGN:J+YiZTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000008e84cf06b9068b555db8713f8256d9502691f4b4f7ecf9b6a7075aa41a3f163f000000000e800000000200002000000079531a6363e14e6febb7a0f6cfe59eb5a255f02be008d777562ab14d4b0a9dea20000000d2b79a36736366c7e6ab709883efb443c1f17ce2963338a410b6bb3b8c505b09400000009ab041f35c683ff65a0957a750dc7dfbd40bd42aafb19ac04fe2bdf4f52f0b218a2bc3cdba872a78b80107f361f6a942d39d4008d2ec0ebf195c11f70462b767 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421925825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{576A5A51-129A-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f052022ca7a6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2148 2764 iexplore.exe 28 PID 2764 wrote to memory of 2148 2764 iexplore.exe 28 PID 2764 wrote to memory of 2148 2764 iexplore.exe 28 PID 2764 wrote to memory of 2148 2764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4574d38b2cbca6eb45b41a9bb06ee8f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52089eb84ddfb31298b97b882a3de9d7a
SHA19f79065f6a60deffdbe9993a0477147bc112bd0e
SHA2564315a72e877e4b8022c8f86c53abc4377c7820a72a3fd33db035e8d5e593b4ae
SHA512b52e7ec56187ca90258db4a8b0046da25e26bcdc7d1b10577217aa03a9ba11d0f4408d768276f67426b8d7d224f63b65e667df99794cfaf5ad74c249a11c3e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5903322423fba42b82cc4ab99f2ca50
SHA1d63989ad1a4ca4cd1c15ee79cbf414d980460144
SHA2561e7c88745eced44802af5204ee45c83cfebf9e25895ec827c81febf60dd015e4
SHA5125d7eedd2f04e0c78a406c5d8e87f752c6134e0e61202133628f66ed5b512ce75e5281a20c474c58395cd56301996143a96d907383da3ed138d42fe06de31430c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d017cbde9e220d5bb01bcad7e90c38d
SHA1059eca06c7a412199d83d93df030046c82b6a641
SHA256db31d74e734ab1c269895c40b0308be0ab9448f29bc2e71cb069d0613a254c4c
SHA512d79ea71ffcd6445f6b2e9fc130a82ac0f6e72f9b53524be381080c60e02c4b9dccfe5f269bd5c7db1b6cfed4e0ea1f6f49dfae120155d2f2e9a86d4f5ffb1e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f39a3b92903a2f750068ed118b2a39ae
SHA16829f0ae3e2e337e6ab3c74e10f988784f1890a3
SHA256f163e81952b29d0f7f344ac1396972871759325f60bfff67d814135e4991153a
SHA51252170a5d176f911170f91cbfe755c9f56245d521ad2104a44bf87f732fcd00f6083d378005a57bcd30f4077ff0c2a5574835dc6e65078c3c8e65bfa412cc04b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f74c19ac3294db8468ec1b81a9b10eb1
SHA15fdfb6a1e1b1a54e648a943d49304f12a1f0e8a6
SHA256b5b2efc92c99a9919385fab254d7900965f5d0e43c8c0111135fcb95d3120d43
SHA51215f8b1d2bdc2faa20e602e50259d6b092a87c8fe70b8f83f745999a539c7335da41e821eb289616c60a7502fad7bbb0d988e4847d648fe4f50d9ad3d6700ebe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d73fd199a3f794b68a4e4791471ee7f4
SHA14662d895dd6755fd1f0c5a8d7d7ed0410fcb0571
SHA256f743fe5a172383e1700daef8087111affefe77063e45b519c01dd63c5d97cd57
SHA512fbb8871c22e3df12226b900150a2c966401f3059fee4183aa7a367b8ecd5eda699b0f2350fbc8fa5c11c28d05b77ec0ede386c3c81949f84573cf2ecf8c53b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc8fba0d30eebea0494b302b50a8f5d
SHA134de4ae2f9e51c28d5324991b33da39440a2fa93
SHA256a1556bd6368b3bcc98b738b7ff746a7503bcb4661a5518f790b41391116bdb23
SHA512747e874df800d49ba42764df020241fa386ee1c2fc31c200b4afcde6e2abe5f111009ba9a2be7ea84197c9019eddd4fa136c774ab69df1d946005670e63778f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2b13aa7e44fabd25a4939d4f9d423e
SHA1c58af201e411be44074f00235212a47a261d0563
SHA25684eb09c8d9052be9ab2060927e5b4541b55eb4c8d9e2f07710a44d728d643751
SHA512cc8acea3e998d9662f37c9d85c2f3b459b3166df4e10ddd3968ec4d870072e716b5e21a09eb55aa2cf326a90ac54175f9cc901db26e9c6d75ed91ed40e61f753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5545b3107b509ef7f9dbe28d028181447
SHA1db45ad0952596e2d9773452554211e2426a721a8
SHA256e2f9ab59296720df8afc8c0f879fd02770f17af991c91eb74380051b18b211a0
SHA512cf6c85bd1a6cc42f4a2e28664f555366320eba09687850140e6a0fa488adb1df2990f3c3f5b8da7df44b0a719570457820e70ea9df3bf933c50b6f010660b969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890f406854daf35bf55962cd1a8b2cba
SHA126f75df20392c685c435d016c95f0ca4f0e916b3
SHA256f26ff359ae938a9e160b7395a540d0f80e1d297c3fb57a30f075c36036080c0c
SHA512c33d60d476bb70643ee64d2defdab15af9b84752db43c6858cfaac6efbde66a092dca9f7073fea86376493791ea199be8c29b11158020ba187c56c193b478d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57241f7dd99c014ecad225c07f5205e22
SHA163e30406b7944ff4446f1d49182f02ed19865abd
SHA25636cf129e77b633af30d2e27bf8a4e9644b76c46c64328e3aab1c3bcdaf7a1747
SHA512bc3eb756874673d0164d356be878c8ee5918b737e7f9568bbe4a1ef56cef4d8562e97608fdf0e42c86a95f28f2c0957ba0d132e6686be64de1ac9cb050404669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9a9deb3489eebe5ec959f3ad52f8c05
SHA1531bebaba4abe735c11015a9c33fd70cdd5fd2bb
SHA2566632525aa6887eb9e4c35c7f0b7823a4ab6a1dbaa2df5e6d24883a19dd58e0e6
SHA512333366781449d1e85daa41c3db685523d0bf98bc3269fa037a61c625792bd2cff36e0e05d23746ef9cca72a456cc6ee2fd951fd9714170e50a793a81d347e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f158734f1e6811614501ccaf6f6c289b
SHA13fb2373ae92acf041d0884fb7a30fa933a53f73c
SHA256d6b1b75e4de514e86699ff7de0943413ba20d03e7d8969dde15b53e9e4c139d3
SHA51256ba4f32019530b16ff0b695a12174052bd4b1db2636b1fa1aaa601761da5d319f8537fbf175761c28721af714ea8925c92394055e3a474b15bc43cf6f8ca141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533fd880948d41721c7ec2328648b39c7
SHA14c8358a8c4c981a69e533e93cae43df268699714
SHA25672daa96a265f28c42cf8095d2e323c1ca327a03e6afa9b8d388dee63f2b4781b
SHA5126b158d90dfa29aa80cd836989422e4fa37eb806eac567da97d68b8b5b23153e439ab93c5d38170ee8e8b108fb1ed502f30eb0a4db419fcaf3566ffb8c50ab77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532639ecd74d3b12c978ee7d6c18cbf65
SHA17ff80b5cdc2f6e66748544137b13f6614744afc2
SHA2569f818b7719a92767ca966178d004f6bf094896fac90f83d77b58e81e7ce01591
SHA512660ed8d5742f31c7cf831e7df73f44db4861a98714216bda0627b936e329a4cb1f890c9dacedeb803aa54fed61fd7e7441713062f445a3ab50f59f1e72c16de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbfb7853d8d95fe5566daf817e6c1b0d
SHA1d41931c148efa5875f1f3974456903bb8f5db4cd
SHA256972c2daf2e365a398a53591d516974bea3f3741ceb34e799a8a1eccaaeae470d
SHA512d0310338d1c8e3efca364856a959f85c7234c87b9709d3104286e9b2c4e8e493db75c216e1c60d838932542ad160bb1c40656d12ff13e3fe787fd291372c45dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54180e3f06b679626c1a33ca328bbd0e4
SHA1f81ca9d744960f74902257aef4aa522fba345cf6
SHA2563fa2ed6bc61aae6e159987928222f9b72d3ce9595c26e3dfc64f36dfdeb143e5
SHA51246fc4ecd9724860125e48ddd00aca9b0b3c3b5bd9f206738b996464a779277e053a470b0a861ea3f4f1afea4d4e25a96ced43d31c870fa4259984215c59e71e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e385abfa9d4c3034bdb415f9e34243d
SHA1015e063733203c1329ff9a0097d95f9697d9cbbc
SHA25685d59b3f3a000263e51cf36a5d18dde785af4d3713f5cff10ef8478768448e84
SHA512a540107ccfa2de12c319daa436380b929d788c660e6fa0b2c05c65cb566e9ead7cb69aeba84d010d70417dd6bd1d9e44061cd6cdec6d4383aca4d347d6b114fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156a72626c75a8332259500f8b0eb0c3
SHA17d517d223ae9e8b8b7c4626ab2df340b89e5b7a2
SHA256554015783229233853e7a7c887868b2bf1c1f45f6a59d7201ee6846a75c531b4
SHA512e10471845e5c4ddc37c9b12211e00eafee75bf51d734e950d884179f7e27e801efab17945eb56d57da04a07e139e9c679862f40b1ed466b8fdce650758562e8c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a