Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
49f5feeec44e577e16e217d3720dcb3e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
49f5feeec44e577e16e217d3720dcb3e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
49f5feeec44e577e16e217d3720dcb3e_JaffaCakes118.html
-
Size
460KB
-
MD5
49f5feeec44e577e16e217d3720dcb3e
-
SHA1
fbf9d122dc860bcbc035b1dfe2b3c867effa86a3
-
SHA256
0dca265cc346467f0431fe37a774ced4e2bb7d09c1921424384eee138696098d
-
SHA512
d5d6b5e8c76c4cad5cb372f95951ef2f3cecdcea50202bbd832f4395482c51187660fb6bf689a25d0e1374b43fe47bf8c1ac5430653c1c25f20cb608371bdd90
-
SSDEEP
6144:STsMYod+X3oI+YQsMYod+X3oI+YTsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3E5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000096b0e36e6e103886958f7c8c3d275c520ef0d0494165ed69d5cf778329e62b61000000000e800000000200002000000047f71b7c131b396b147897a5706fd03ec66437ceff9b1a6f9a72e0b1a2ede82520000000d0a35675c047955dbad791d108a22aef377458fba90ca73fa4ed6e25e7551bd240000000b81765e373bf23a75cc2a17b5b3f7e902b7191689e3ef2973a38e1c37ebdbce91e7a579c0029df5f04081d152a48d77453b94aa1afb81546589f533041a966d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A14CB01-1354-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422005689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6050a22261a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2560 2916 iexplore.exe 28 PID 2916 wrote to memory of 2560 2916 iexplore.exe 28 PID 2916 wrote to memory of 2560 2916 iexplore.exe 28 PID 2916 wrote to memory of 2560 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49f5feeec44e577e16e217d3720dcb3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bfd7c453411b2314f252f621a77e964
SHA12d097a845ed6b8fb8469590c327c82935c812683
SHA2569ceccdb8343cfd2025e17707b0e25716485119268eb92aa4923e8248f4a75ceb
SHA5126faddd2f4152f533afaac4539d105ab5c14497f4d2f4b680d41e23d3bffb5b6d9a135f73b06efcebe3f80e32a9898d79177a475f62f24f4a48f8aff8cae3b4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59046e1ddb287bc95a5c22631e2ea6eb2
SHA17218ffa767f472c9a0b4c54c20ce5bfb33ae9e05
SHA256a7052d904dc6016fdb59ccef60b312473f53e0096d7f9e819ae19cb8e3d8a23a
SHA512e4c4ecc8a9b9ece4413c91095459a7063ad8c9e4b4ff803347a4ae8f10706894542ac5c913142604d8be82ce4edd97ddc62ddc94fe8e469f9558eb2055cdb6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57783cb32f0a76578f4c56b332e5b50a5
SHA1146f1671e13bb83a43b9dbfbe84789aad79c597c
SHA256b2a8eb08a7dc51e8de111ce910d4a85821ec5e54b33136816f0ed62bca5cf893
SHA512434f2ef73bf091dc2e5d7a2c5663579f6901f7f5318d8edcc5a48952f3d39633157bc565dcdea06df74c78633832b08f450abe0ffd637a339d7d5508ca793977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c5560d3afe4ac469a9f85aa4af0ad3
SHA17c89b8a4ac84e812fcdaa43c6fe0150b7e31b119
SHA256cf62fd5d9697a728a3cae06c180da874c06a34f00d1d4e3f785a7b523893fd58
SHA512622b1c9258d8173dc57b2f5dbaac8cf890621d811f8158086d75650741d1b22c564a503554f0578f29f3c614f12afb296a265ae7fc6a06e06f05ffd8ce4a8632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbdffb223dca2494e2366158f074b4e
SHA1fafd14e8cfbb2105ab189bfd1bda275accb9b8d1
SHA25612d3485845b6261d7bd0956008fdd6d4a830ece9490bc793c0c49e25f4df19f6
SHA512dee328861ee44861a966f90b75185344e72e03fa091115a58e1a9f15ccfd02c06cdff092c5cfc14192b61d80b8b9e91678af1696e5897242496ebf8bec0c9411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cc4defd94be57b018e30dc0df5dca11
SHA1e87f383387cd6e583cc0b733a0913f8592434fa0
SHA256605979ad9efeed9efd4f1adb3d17bc300d4c034799687bcf037c2bf55409cb5d
SHA5126d47fc6861287c98c7656017025bb3f56f756b89faeca0bcd8e9f66d3f81f0d87e8dd9a496c4a5d8481a05fb6e8ffd74b146b6186ff6fe55e205a87141061851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e9a9b812251dd5a1cb29b93b9169a4a
SHA12cd480f5f0216896d80d9395b8a6aeea313ca49b
SHA2562ce6daa55171b2708d81fe8340cfd56a3e805b2f3449a4a2a068059c08f56fb6
SHA5123f9c10058930ca6b13b972bdb3f32eeefb247aaa9f94ae6b4b30c5f736dec24b0edc3e40aade5b932222ba2b1ed2044ca7e559928a447ac24158a0e43ab3252d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aec0ceb0b0294f3e3d961f961248adc
SHA1045fb7ff3d663695a8cbe582ce3b2e7aa7238b08
SHA256577399dea8337cfefe0d546a89ff3cb9d0a34a1cd923ff49756ab597c0f624d4
SHA5120827c3e6ae99ae66f55e554295a1106d478c3c1ab924b0bc3e4e7e1101ebaf5221dbb2109d7f102bd752a73e29f04d0cce657dac17635ecc22cba4dde9463e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f0f3cbdeb635b3d1b51feb7d67f14a
SHA1db6138d78a56ddb0a01d2f4eeded1c03b296db4e
SHA256850b4675a9968f2de4f49fa52f43ab26cc2dc10eb40af2b99b7c27c21365640d
SHA512dcfeb2b0cc035d3bfac2682c9bfc2f91c8dceb799d6672bff51197eb155ed372e82e31ec983340be697dff293eb286cd6821348760585fb80a595e12d0104e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398032a5b7e3eeeeaa0b8cdde94aad6f
SHA197893df0e62acf003901e9a6474f45e8c42cbc89
SHA256ea6bbbf3ce19c105c40eea54bb16991bc1383d55bb7b99e10009bbdc0ed07955
SHA512283c0931f8db4743f136b2e26292bef87153dc18d39988d41deb5c4cbfafdcd47fdc2e18f6ceb51375ecd896f7853b2c871ede177776c2a4c274979661cf7d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a61a269516ada1c078785c3b9a44a27
SHA1d7ca5be930b8ceb94768083ae1facda14226a2ea
SHA2569abeb75fe388f0eb5e396deccbd95997fc20049d86cd763c57d7fbd596829821
SHA512f94c30bf18ad1a694e27900a17baf1cefc115e3bd85f9b63f4f3c4b7ec1369856ee233146d2da956a984a656dae18aa6ebe3ad5e8682c09982ea5ed1e832b816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d6cc06a14fd7fbbd01444951d8ce65
SHA114343d65fc91d27fa0136d3cbceaff0135ab0d5e
SHA2568af8d32d80e4886b1b436807caaebb64b09caa1477db38974af9a9e256687c54
SHA5126f4647e9b374109b680f92fe1eb348f79cdb84a8d98b238d72ba33f6557f20d47e1d626389a8a5135ec0ece3c3921145ca9bedd9468e604cfd7631ea263e7304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6465b7147dc741fe7ef32a0d09c0af
SHA180b36bcd1b78e7c20b042eacebc45e428577ef08
SHA2566dccb5cb09c2c0fb7e1e52c5ed3d8a8eb5fa618200759bc6ac234a1349e663b3
SHA5128f2f4bcbd3a85541b043d84b74d1504b831597ba1db88699c83be285cb0d8bc49a5b54833527b4518544fdc835499eca8f4ed0d2dd9b8b3f7e7afec38a1335ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d623fcb0d205be8f63332c9fc516e371
SHA10d958c611459dabf30c884272db50c0fe2322465
SHA256c6685f67f85482a6778d1fe933f5d425da195d38e8c7fe11210f2e5e5d37c073
SHA5129393be0daa01c3a93466382f34b0cc636127a9aac4194af458971848cc4a5c99568bdca19fe5f80780a6d2e729028dad217360817433f06dbc4f85738ec9bb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832acc0119f33edf588855e06cca25e4
SHA1926eb611bd7c5729045acb6fb28b6b02766ba51b
SHA2565ca7113a50e9f1f27cf9fab729febb18b69e40e43db80cdef1fe5138129da5b6
SHA512809374d266a89a993d8d6c68965304452d7738829f246e8275f55edfa9d7b072371b40b38e013bb3a938271ba0dfe75cbbbd0f73a716c12fd82d273be8e1c5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5824b1bc188c2a86ad29267335dc74f2b
SHA13b1eb0b72cafe9495d6525b65f8db3872e12b7c9
SHA256ba8a3057e558415b3521bef8fca4bbc0beef855a4786fa935354a12843174f61
SHA5121dee525285045dcf86d7c0a68f562dd7a1613d0b82b427a1f5d59f01988b6f5f6b73483b9680141341559988f7728f2f9cf405622d7c5e0b1b4423101b8ac0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce100d1e39e317e4cdebdd53f503826
SHA10b2b1e94dc149c9aa18d84f6723fc60100b46022
SHA2565727a0543998a94fae0b86e3f6d0adfd045d067f4f067ce6b5e2140571f364e1
SHA512dda810f7207f56b18b57e6acc6fb20500d3a5b726c564593da421156eb2870939710a32eec03d5d9c926d917d6b7e1cd99a50cbc20062be63af7d5c8da0fb5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc1b6250ec116d07b2de7e3e2e047e7
SHA1ddd4102d32eb8a0fbfbc0a4904aaf8d8931c8fd6
SHA25647b8165565ac1e26f2c27ff332b7b43d82352360c759222a1f9b4149648d867e
SHA512e323eab4b08d635403b4178b714d460e32d41e2393530c0775718c73dfa975178c4213d15b71d0e5244c9c2c09fa910b5c664db65746a15d3ab6c2b063e80bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f33c1d1357e53b29b30438cfa1ae5b
SHA1897da54406a90a7eef15f547fb0ce8532cbbc065
SHA2560380de74efd62868d23737fbfdcc8a9e5d13b0760bc7eef2b7e5aa7545af2972
SHA512a0b836de24cdbcb2e039626c4d86dd4abb64cf734890ccff5beb7fca1291377a327e83f5905cc51f1c4c8a063a8c0cf7138d205d12cff2573136e01244b9a7e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a