Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
4aabc6e6271a29cec018de78647ac453_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4aabc6e6271a29cec018de78647ac453_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4aabc6e6271a29cec018de78647ac453_JaffaCakes118.html
-
Size
461KB
-
MD5
4aabc6e6271a29cec018de78647ac453
-
SHA1
eeb877f9525ad7974e5f8ca1d131a44e7bdd8e8e
-
SHA256
317445caed3d60d4d92786889df02638a81b07ff3e2833817d3381a2e0f93967
-
SHA512
343c74828be19a1113b51ddbc94b7ad222b7db062cd18e160c5dcd5f9e13009d82336edfea52ede2b9df83f4db4f815915b5315288448669e0758fa7943de990
-
SSDEEP
6144:SLsMYod+X3oI+YrfsMYod+X3oI+YXOsMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3V5d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000046982eaa16d7b030ab6980e1e6ea1a87b129490ee341f4f9a2179b7586978880000000000e8000000002000020000000d0cb52bfc7de4855e35d3ff88695c96aae4bb43d30e7507c449a877118e9b45b2000000037035c407919e39ebdde0ba41fc8271e37a4a34c898eb60ed4fad8f8770d05b5400000003a39b696522718378b90a259221283e32c56a57b78ef819e29cbfbf1f6ea80caacb796dba6f6f83bf5512074bd19118aa6d006735affa8f4f432cf330020fb4e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10506aac7da7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422017946" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3DB8A61-1370-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4aabc6e6271a29cec018de78647ac453_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03d8625f8c0d99b9153372173d1f733
SHA1bef1eace8962e858d67d81684a0161e094984ef5
SHA2567b364d42d6fc074b9674e8700e2dba80ff50e2a4683edf916b00204e5aefea16
SHA5128aa813e36f3f8e7ec38d2bb3bbae8991e7c80a8a569150370d24d7f875139fc55996667462e4d6afe7747dd45f3540589c3b9e7f5c0dc931b94af05a93018452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52289dbdcd471cded1c7ad0c63e45d980
SHA15bd58dbc85754a41255f547df921262761ba4004
SHA2560391f99fb3f83d4de2d5646d384a5bf5fa9aedb446c24c96bc4e7ca3c39f1ffd
SHA512b5dcf7b048124857f70f0da2926d93a4b33de785992cda4640ffddfd7be0fffea87c40699eaf94d6ceeae4e997b7b09b5779ad8b313d210369edef584d1d1550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5021e5ee9e53a222f77dca7fa440b19cf
SHA13187a294b1218649d8d3635cdab71e36ec227012
SHA25616f6f41e0418fb66f408b9d50d70e6b175023a7ed02ad31d31bcbf672ca5f31b
SHA5120171c16f2eb3bb47a9b513708b64f67ad270ee1c5e7556c115b41e79270f53c2adb9a065d67448c5832b18e4ba7829611ccff464119ffa6bc22084d5ae0eaf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d3937b3ac0539200a7ee2fb0dcffb49
SHA148b42db3319eeb9a63be5a2a4816a31c552a81b5
SHA256c32b573d789fac9ef1c04af99a3c5010da8c4f4d81f049147153c0a40e834f31
SHA512535b89fe59bbb4fd8385136f5b4288b0030f141d0da1f7dc4e26fabf941c6d8bd8829e7d54adf992883b226c11bd58ef529d9e37dc4489173b2b3e775b2ea86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941ea0f7cc70ecf772474fda17e3b074
SHA1478dbc4a7ab7a9c738f069caff709122cd6f4860
SHA256dc1528646f611e72f12540717c6372ca0555718ec84ca9cb1ba7dddb17b0d52d
SHA5127ad6556f6e43dd4a2f8af3288e08ee427596d2a2ba030c86f5551f16ef2eb9b2699dbf5161813acaa87b441fd4e7ab78e981b5824176979955c9bba466fbd1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5912e9de1dce3ecb0f58a03098d7bdb8c
SHA1b1290c6054f4c2c325c3af871eaa63831b1434b3
SHA2565a47e01abd7627ae1737b00234b81637b47aa4c8d8dfb036eed428b5a9e56a66
SHA512abe13e150dde90a5386f4b7ddf451b59dfdbe42a1e85068176874e1bb6bb872e59d515beb7103bd0d67389ef38ba52504666a171931d436fd51c898ef37eb98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51612c6c7900c866212dee9ee58d2a7c8
SHA1fc094a445383f001a7c6e7e6e35c03d382b08ecc
SHA256fdfa070da5f9aff9faef04241164bb06fdbb8070255f9d9e74dae465efa72791
SHA5124d72ad8c3b531da62fe798159abc51aa5ef30e6918cdf2aacff832a53afbd95beb8005cf6e314eacda024bc8fb2b6e7891601fea205783dc566ec31d993c4c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913e10a3339c34811df30cd7ad7b70ec
SHA162d51223cb2f4e384ac350da15926ca9973664e8
SHA25650eae4fd5a2005ec114eb0ef658be7e01feccb567ac31734dee3d8410c809f06
SHA512519fec948f867e3dcbce5291e1497eb117be72259817f66d7a0bd9b47def6cd32b3127e4aa5a75a0e4167c9ebe8819da7c0d7839d38896ffc84d06f8b5ae0a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566810f133ad221ce662ac28f3fe0cd4a
SHA10547142ccb13c5ae90ea4a8d9a8cc681279eb624
SHA2566efc32888842655ea0075e87986facac52a2725c4299e51aae4621f09ec1cb94
SHA512c254a0dd9782a0ea557af4b57c98baa5095ef78d4f38c945cbdc070982cbfa4fc39be0fd67e1b62558f5489faa7e166e2b2de4dd5d38b7781443d4d831a90238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c98bf031f74259bafdf040716325e864
SHA1de0d01c2ff8c41954d10916f58c1c809cceb7cbd
SHA256b07e5f24029e7f304e420bc9e3c819670a8b601bd343ee4ade53eb6e8ecdd90f
SHA512514f98aa147589490b11b4a82b22b5aa58ff014500e2120bf4e86a045cd45a12f353ace6545938fb6515df29f2e22492bae569ab9dd8a091b2fcaba86e73d969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f000bb366192e994fa83a45b49621a5
SHA142d89a3f4154d86019ba5fdb3d6922815a6baf6e
SHA25641d1cb80c89fab8cba661684d638a30f5a3ccf092b4f617aa79a21ccb5f99c1d
SHA512bd9601d8e54d6df8c1bea796ec1f4d5452a24fd2962e1118051de4c179d2f02bc4710de1228ce3c65d31ee5de1fb9eb0831e0b36b6f3b80619e7a8af8e312a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3352c2577c3276278b65c4f823d525b
SHA1bfc3dea84a23ad3b26e0861807a77b48d2344d7f
SHA256f50a1c1c889d87fba6064cfbcf8202c89164c0e6241db417a610224cd8d72fd7
SHA51219d91d8c12eeee9bd1416f7884ddcd9642895d15af0b3defa069d9e5b118fa0dc6fc3ac168efa446bac3f14cc9c2e0a8cbd60be5aeb38855be5525b33dea5695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2b510949ff0ee44b0bc148916905317
SHA18444e9a0027dd9c39b14d5a81041ea9e77794257
SHA2566f7d5633a434b23f88c84390b874d0c17a81f562c144f8d8ea5891456741a37a
SHA5121fc12d3f110a71c37dd754010004c238c69dafaca91e4c58493af812550d487546f1d4348f89c9ba6684f66d3cedb59b588be3994761731edfba761d7c1b66c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f01738d4e408443bcfe49d05f54d9a0
SHA11722521750825b3a9d833cb45e406ccc16f8e9f0
SHA2564667ea72665ae3ec418b6419d12fe950ace2a206e605f0fe032b0373ac624bcb
SHA512386b7c4de166fb78b86bdaf3dd6512e66e54be9a0ad86813c26cdcaefb64b48bf327177acdc2c609a8802e5248c8ae0f8bdf04677d15182f5f26251e715398bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ae74e0922e0ef2b73ce394737b9d9b
SHA12434566ec8b13e07c8a11ac805ed6d90e57d2dbc
SHA256fa1d7bc14e14886793ee7a6bdea53d2d27ebda0bcd2e7b1eeab120168b846461
SHA512a2eda7e2dc532ce5f981b0161029b76547b7118d11eaa1010eba5843a4de4b0e3c46c749a8aaee1fbc6fd8a2276f2bf955822c8ce631d5c46262e23e3ed2e0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dbd35c0659922dda13a8926ef8a4a7
SHA141d53b76ce96c141cec920c1e6c4c7585b5b1077
SHA2562ec18e4edc0feb7c391b3790ec6f06d427e07cffe3a522a2bbac56aadef000b1
SHA5124cfdfe1a21dfcc2bdd75b70a297b97ee4f170f17435ae425d39a4424f34124de124e7223f98c303d915f4fe86f0a2534ffac4b1bc81e61dd059ac4b37b9eda6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599dc9b044bf1f3764d656fa107cd4336
SHA1c311148b757230979e1600bfccc7bd7f69853265
SHA256fe71eb85f80b8b81533379993cc7bd0d78b694490ae4ba5559d4b579303b3060
SHA512ac994c9a460567394dd8e61b8b01700621e7a9db0bb360c265bd41e419d780d8b36e51916da0167665285b729f188906c980805473630d2cc9810f80c29217f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd5364a0eb69e17aadfc73fb041fc6bd
SHA1c7439d94b2afd49946e3afc7f4452776ced36dff
SHA2560384cfbdae5eab00d7fa2cf1ab7cd5d339307164244f3db466b0e757f2ba2634
SHA512c6b1a7ca6c265271b9e6bed5ed10af0a05503a13ca30f44c59adf2ef3c1d94f85d32984be779b607952b5db106d1dad99074ebd2314d13f72488ec8135751647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c27e54d78908f28539c5e64553632cb
SHA1f2f608d351125bf93063d2d9c0fb2873a9ba8bee
SHA256ca945761fc72215ecb2c9e49d4e1b1ea23151125ba0ccc260eafb2279d75dc63
SHA512ddb193e32b7beea55487d1ac0b16904e1cca40f2cb595b6067a228a345e352c2d22832b443465b31538315ba157342a13b58c1c85f539a53545c89ffe499c2ad
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a