Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
462633eec7b32b298d7892044ba7803b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
462633eec7b32b298d7892044ba7803b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
462633eec7b32b298d7892044ba7803b_JaffaCakes118.html
-
Size
19KB
-
MD5
462633eec7b32b298d7892044ba7803b
-
SHA1
25c2edb398a750fe075eefbd300775fc03b24ed4
-
SHA256
8e638d1d3f5cd776adf76b015343581779392df90dca0f848403d04440992bbd
-
SHA512
855ebb8c748c216be80ef608e849b72011c0ceb4df5b4bfde6273a5efd2dff680bc4a19bea31dae26242ffa38c9cd7f59582100a33a386a1005e6cba72e88a8a
-
SSDEEP
384:npQCs65hOG38bNblyYSFR9ctjoRinxG4g3yRjl9at9pzMfa9LXcr+kuo:npQCLJ30NblyYS7mtjosnxG4rk+yIAo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6919D581-12B5-11EF-9BF3-52E878ACFAD8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306d9e3dc2a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000096a6543dc3ede7d7f3417f57924efae11a5507faf534859973e51cdbb21509aa000000000e80000000020000200000008ba4d66e54503a94f25d0ea9ee3bfb5da3730208d7dbe2452e81ed0abe76a38b20000000293fa0f3057ad6c203d999fb0190865f06a970957ac3fd4b8bc718f4720d111440000000fb81691d820b8396c537032e4ee9881f41a1b295786a9142808993355bca4a0ea465d8500fcf30783190b39f5ec18b665495f3a1dd05de49f5a622cd2874a5bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421937451" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2280 2176 iexplore.exe 28 PID 2176 wrote to memory of 2280 2176 iexplore.exe 28 PID 2176 wrote to memory of 2280 2176 iexplore.exe 28 PID 2176 wrote to memory of 2280 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\462633eec7b32b298d7892044ba7803b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51298dae59c9578735c9316facb8fd8cc
SHA113b732e1573f2d9e65d69c15779ddc13e07ad511
SHA2567f0531d92f58678e8b2c86e8fd00e42c25f41e57ada33ad4cde367e4315e8fe8
SHA512ebb53ad3334127e175b44c2812197fdd6bce8711cbe7bf4b6665888db8e434ce681e1a29bb20463dad9ed0ebdecd353f801f873d8eedd24e2c81c45e6ae6f8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d2baec2e335ed2404da3ae2e82140ac
SHA123167afabd2c0d703ba9b28ace12cf5e02a0cd98
SHA2564e2a6c9181f8f00ecaab842382a5238019d6123593f4965ded4729eabf895ee0
SHA512efb5c8e3ebf3c6abf49688b77511cde18cb1b0b6421fd4cb539109785fd657c0de61876da087b6a847512c49865dcc04793ff6cc4091062e56e2eb2936c2564c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b6a7c68b8c83ab30592c1125e3365e
SHA1394e2deee02d70510516ece0e00f90bad0e36b79
SHA2568b2750e7d9c8399bea9b2fe41d978c9fb88a4b88f685a1d1203fd3d06fb836ba
SHA512127f42c18373686a14c4dd7f890e4af19b76df23f44ef628972a30bba47d9627a0215cefd6991546ef1dd7d2dd419b639ec1a363ec8fb046aa596c3191317dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e76b8f0a0e3dcc6c1fb4f79d0202801
SHA1cdac4f8c955363f9f98db83522a5cb62a2d288b3
SHA256af3a2d6d5e25d36a2b74fd5d3b11286b22514ce232ad5559f555480ecc69746b
SHA512825e3665052b2ac3d3d4cededac6d6863117d824c349622ddda6b17d73af191144e764e573cdda981efbcaed89489a9c70c977299dd267ec9657a834318ff1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7b00ccd5b99957d57edf50dd28c464
SHA1d998f1c5209f481ce10ab3090801bcc65643b257
SHA2566af15da74652b20b46dc84d406b67d4c73c8b54c9a55fe52f8ae13ba445676b0
SHA5128160e9a1e79ea3dced4dc1570ea939bc14a481d69e7a86e7ed893d9e525b833efa07947a2fce180deba0318efa5394303b3249784656c69059b55a73ce207585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9313dfb37087343711415c65e9ffb63
SHA15afa8fcd68a5dfceb3b74dfb429df7f4f6d40d91
SHA256fade3c58307f403adec153b52841fb034a8b40bb59a352910b06aed4892dce65
SHA512539bd0a6f98abb82661e45fefad5d837cd6e5b5d39572e0cb1bc962670ac079b1cb81702d4e656aad5f2c1be8a71cf6d99b99e798bb591fd5958f141ff142aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4c4b21b45036c7955c8a69c165c8c0
SHA12074740cd1c3a6f8d75540e6ce367aeec9c4bc7e
SHA256aa8daa5ab118403f97dba9494057ac84e3a2d1e57357889f7dd1602e4f082b87
SHA51211acf3e74496c5aeefe00ec616a56a165a0a690652c8eb11a57c24482a3a26671e25ed6e79808048fab8beb990b6e255d35d42787aca3ea01cfc616a78ea4ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5633cd0369ac2328041b08d6ac21d3555
SHA12cf8ac024599d7f627c51a64d1481329aad1902b
SHA256447f9da24c43e0ee1b7f852cbfdecf988d76a8ea1c3f8b86b9c510614ab5452a
SHA5123b2b9fcb4a75cc5223ad484d194d96947bb73877fc348442e1398f02f2e03d1b67bc4198c2bfa3a02305ce6acc0906ec6c766a954d3e8d11ed386b8879f8218f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef114389d3505072b042c590f10a201d
SHA1dfd57774efa9eb098377d7ef58a3329526774ec1
SHA25635ceb1bdefa4c5f62b2afc8fc6e231af0fe455721d67b037a95a748c0adeae22
SHA512e639071f11fc62979e6e83c314de3bf16409bc6aae8d46efd37aef4dff97a42e868aafd05968b101b82355dcc1d689db2e7e22c8879ef46d910268b5ae540b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51166543af2b2a0883d0573e2d5a181e0
SHA100286c5646096c43120397fe3fd907d1c630838f
SHA25631a54fe8d4dc346801c5504c3045a8cb4492999ca81f6061f834309ff6f8d648
SHA51272622a3da341ee45234f86c88b9aff62a5da5c91f1461a77ccaedec02a115823dbbe923cbfd194a4b27bb437e207097e28759322571bd4b034a0fff132ece59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcdb4ea9ad9df6603499029c81be7404
SHA10c67f4d4ec7c0977bafdcd3553ace956699283bc
SHA2562db7be22cae2c1298d27c0f8591b4a57e8ece37d78bc317b0c1633c1b970ba86
SHA512937a85d77deda970c40a146f5d99bb1cc981a9666a92bf88a33ea2ac8e44ff2c1f9e80c0fc525cc51d35328996d803c6e488e2cf64d4a083382ded2e81c541bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006a984144184c72644240bb6d3d4b84
SHA11e3c0362f6913849cc9ead383dca35832b63151e
SHA256bd5110a95a06c5735a3b1e53e4ce7376e6be9e7117a5bf5dd0cb24eb5f62187e
SHA512dfed7d8f9387de53203c65d3156cc39dcb02105992c189b5d02d790018734e53f869bcba3e48851f8d6362bc9b523502c86590f0056a96b590aec6c71263263d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f15d7b237f3302c5fb346951bec53f
SHA16148517bdf4ffcd8d762d7df2e23ce21abb2931d
SHA256ae98f4dc88e7b41a0744df44186e5dc85e0b065cd9c2e48645812a64eb51f1c9
SHA512e3e62fe636d68bf135d394f0a080e57dff7df704bf71f3364d6537ac03c37946d2ec1e663756e7781efa8a847cb897a412c4434f5e6eb8c533a910f6b817f1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573850bd88a9a753641dfc8796509107f
SHA1ca48b5c07c47fd6b09a6fe04523f6a7c7a001363
SHA256e481b92b861b875f4e0a68f2129f5c43025ba31085bc5c819a40883206063c40
SHA512541d5cd49ab19ed581d80b66ea4163445c1adf0a0c35c50bfa14d5d292ec115c1b67cd9f2168d7a7d812d7fa60cc85dea07eaea5a33fba62e35e1e04c9603132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acfe183a3e4f4d4571fffa2b2b8475f0
SHA14b8f7e0a4a0c853efd88e1d3d9b7cc1e01d09e98
SHA256367e51fbd11d264d5ba81efe60d3da22c6fd07b7a1e9501d7463f887b5590db1
SHA512668ba779650c59392640150f75d483251abbf50ff979e4e67a6973a0e4f9b5e899e7f4eaa1dde61712cf7068a4eaa84caa5d827fed2a1d25cb72eff628974aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6b356172d517d5a8406c284b0a8b74
SHA1678f89d39d53251e2bf7e1790ea779ebec8cfa7c
SHA2564c9927fe159cd2db8192d1eaddd12adb79fdfbfb55adf22aefbbcb32b6a71607
SHA5124a71c7023b12aa7e9457973326cd9d84e17ea178a8dfc1ca284d8c5d6fb0e74a1b657bb6f3c181a2c3496451772081151c6dc52cb9fdcac62e46cae5e48373e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc1bfcd2891ddbd5e2bfa42e4bae018
SHA1fe47d1399cd8936316ca9d1dbce74576858d74cd
SHA2569118591f1f018d55f0d29b23a90bb97d2d8a4e1d9cfcef14c945a0a814eb944c
SHA5123b514c35ef5421e6169964fbe9bfaf8ee3d43692e5c4c63679dcd572df3559c399b07901b83376331e14e27893f378ab39592ada3d2ee113e8542046b95e9afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500db01b1c3203f1170b5aecc85ddc150
SHA170f688cc48c94408787b15c3b9e6f3b2079501c0
SHA25697d7f20240918366a4f77cc590307ec8849e7e66a9d641552b3bc9efec5b96bf
SHA5127f713188e9833403ff2f2a0ad1a2d81294efdc4a5eb79a869f18c177cc663f2cedcdfb3cc4ea3ad367173e79c1476e482751399caffa9f478022efd718e5a65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6312e6ef83a9a3b44fd2ef337a0c8e7
SHA1a9b0f780ad155b95e0ba42176d4f28b0a64c88ad
SHA256e143a85322a360cba4e7bc2a87a2cc2bcad1af7f58de2420804c49e921c755f4
SHA5126e74213505cf78b872e0fe23d226f4bb27dba2b6f9e87852965af5163fdbf832fdf1eacd370c25ed472e67d0100f7bccfcd9bcd623e5596907e6efd6e18fbdb7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a