Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
50a5f90aee3438e6c738f2fb4b0f712e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50a5f90aee3438e6c738f2fb4b0f712e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
50a5f90aee3438e6c738f2fb4b0f712e_JaffaCakes118.html
-
Size
4KB
-
MD5
50a5f90aee3438e6c738f2fb4b0f712e
-
SHA1
b29a0430f5cfd333274f44b7408286ea27ed628a
-
SHA256
89e4781dcbdf3c6020d65866544e54ad99be684bd20a3c9578acb85901f44e49
-
SHA512
56d53acfedf5499d4571ac2945a4007513d7f8453cc9b42f2cfb292ae4f4ecf0c24e36dc1e8a2686138e33d01bc8204fdc62c46d7e34f7ac0727f50d9a8fb698
-
SSDEEP
48:ImMq1Up0d6ChKRn29RBN6rwvNcQy+eCUPeuyvzoyUtdeDs:SIyARD/FNeCU3j5deDs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000074699c572a62049bf54fd38a042de9540ae1de1fef85172b42e614f082d5ccd9000000000e8000000002000020000000563d721d3e66bb6f4d20a46ed50d763b36b27224cd563a44246b1b58a632df0090000000785c31c9d308f1c7062d0e497e20aa4c0aebb525a680191e56dfa235aa818e49b93e3a739a4cfa6242b702888447c71655c8a40a3103a1e2817e4db6553e9579fda23ba09c182cc3ad81eca3819d58d302f9d61043941b278ef2e843f0a206145e1ecfbe30d84c3b9d75be366dcff1331ba50d662c0aa022affe32f2fcd1716fa7f3fdb16d99dcef62780ca17205bfda4000000066756543c22bf2011495186fa7d0ed563b69163bf372a1282da0354eb38a51048d5ef02fb21346746f608f44c48283803db24e2ea2a79ef4de148c43bbb42bcb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422128868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ba72d31473bfbc79ab736cb83f4fcf0ffa4136343298be908086a762fe70429b000000000e8000000002000020000000f0cfdfb18f08239c2421621e70d66525f9eb069afb61cd8a21fa6828abffba8b20000000ee9ccc31c1ee07f8c24f54af99e115fb829cfc0350994fa87c49641bb5cd17c1400000005d3bc02c9b7e1ec358f482eb7c52b2dfb3bfaf6880732a0d2601a669d4b280ed65589c254ddcf8269f37146c2f728898d26a8a5fd6ef2e839727ebcf9c235eaf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ea9feb7fa8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17168891-1473-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28 PID 836 wrote to memory of 2372 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\50a5f90aee3438e6c738f2fb4b0f712e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b340bfd11b55e0f3b4471ea8330e0952
SHA12caa2abd6c9ece3f84b3c7b9c99480ffba55bc95
SHA256a9e5ff90c20aafde9edeb4f18c01e8c93c2bdca78bccfca1d66cd65a3b8a72e2
SHA51247f489101f3ad2c40aa13dbf9fcfbb76aba9b018a5fbebcffa719521678a5ee9c8aff874878dbec1a7a37dda2cc530d25815b3deb24d0bf4ee83c9a16a5b001e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5042d0faa2f3fd994cc53a5650e54a5a7
SHA1e0511b29b03a058bf912b50bb46ae9255b2e11e1
SHA2560c77e72f901e510b914bc0fb20d6d2cc0e076c1e74c40cb3e63d5be5c2939aea
SHA512fbacc65cb63095ad23e7b825ef5fd10a961372b810ca4f69cc95f8908751368670237b1c55521cf159774a73695b2d5127c21b559c3bf4951da322fe10c5c586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df99d31fa9af50f1996b5beb1729b38
SHA115d8450d49550664b0ad49ff18f451ee6c9c47ab
SHA25605d5703addc79c6e8d23c4c06282cecae02490edb2adf1b26704b5fb8d303614
SHA5129001558c7b4de256a51129bd77e7e4f2c1ab02693072b2d6ecf540b5178bf8a48946eedda3cc69bfdafc1771b8cf403b783a331802be6e1f001dd576fd62cd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdf9dab62aa0fda03d0f2f6844df570
SHA18ddbdd833704d522629cd91ad0fec6107429e991
SHA25611080715a451b1ee17a1dc23f672e5aded42dce99b70f2fd10d941f5c80c3eeb
SHA5122edb0e732af84aaace80306dc204c558bdfb0082a64ff58a3aac42b6c90396b331ad7c9440ba399df2e6ff8fca55571f829ba04f7082bcdebdae98d9ab93ace3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507bc2db05412823e5c22d683568f079b
SHA11ac7bab61195882770351e4916503b33231c231b
SHA256bb1ba7aceb45848375c08a2f965df3fdacd1ee4a12161a7e3ac463a2e1bebefd
SHA5128f8857f820340300940c063a86cec156716aaa6cd29437251f9a458a3131396c80868b878efc5b36b5a0a756fb31028016460edbbb2e91e105231a51a1872987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffa5660821c74e2a908a1bbcd8871e6
SHA17c19f2e2fb413b9f271283e3e283a0b2db10deef
SHA25615421e8ffe1c79cde5968cf605c4df6a2a7830e3b09b22c99c03988c4aef29d8
SHA51211a394f3565093861e916a8066b9a60870cf0169006ce9740ad558bb86d50ed3de66f180769602944a3463f94949b1bc79109b5ddc7ec4a093496333fcbf6986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a39bec87b2a9be19aeea18fcbca62da
SHA15ad53b0396301afbf9f8025feb4ecf2c6ff6b321
SHA256e1d63bb7583232ca63dd7c8be43a9aa14965f373be204d0a7c74aababf2254e4
SHA5123a7091a30498a9fff3c0fa355c98ac6e5311c006d513c5225c86f50b8ab538c024ca780433a1a0707cb13c273025460df2bb412949492caf17e8f947bed8565d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f364a593aa9df74538111c94f7ddc0cf
SHA1c27acf8ead0e1ebe2115afc3ea1b75c462728069
SHA2561f04a3c26b91b29426cb2a0832d1abc9a238010e9e150073149f47c7f418c71f
SHA51267ef57c5d5af23a31d56821c74c8c11926a989a9bf3f34ef427dd754c8493a14850290421043d965ee7c2ae1aa9708d8a5c9e0c51424983fbade3bd8428c9b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e0dcf0994ec3e51534f0ab0c7053f6
SHA1fa44162ae042cb941e1eefb93d6f50e6d22e05c9
SHA2568602c421249becc33668a78246fd00f217de8019d5192d76fe661b7e7a6d3578
SHA512dbfe2c61a593e115583a6c31ef5f4a70f8e13d85b7b2be58d547e0414a3bbb0bfc18196581a2d20fde775a534a57a7429e8e9e31bceca9ef7c66f87f5b15b633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1178b590c2cf2318156abe44aa935cc
SHA154a5ba5b8c19d9cfa38646e40321d6ae5f841b41
SHA256b7b6de79edac8de5335f1fee0901c01b4f46539f248117ff3daf0164b1c7f0af
SHA512b7650f69ebc592350ceff86f1a48d66119dcc21e7c00deb1481949adb23b2ef1791f26c2bd4f1ca10202487c90e2b828d3b977b4da93a6736abb19c87d0bf3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500179e0e47a4d8dc537b45a853c8c5b1
SHA187a89a5c84e471cf0aef11c19c4e7ce96078642b
SHA256442042df23c928b71c689777589383de8b3bf21f5e0a9a66603ddb17eb857d6c
SHA5128bd2b81f05abd00c022a13bef364634c93c325b39c1bbd39e2c1964de2fbe077aeaa86a4ada9cdb0afec2deb127a4ef144fac633e029f1a85d9ee4bf3fd780da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac247cbcb456a0fed05f90258dc76eac
SHA1170e5815425e068d3c7342a06299a4ba9981d0f3
SHA25606782ae13c2cfca8f70e7d103b12566502ccab6afa7e8f38227f303d1b818462
SHA512500cedd379d833e6c5374ea796b1a3448e236b701cad3480d2db0ccf99f14026b173cf4eb0170e979f31673e750d896f0c6d79ddb0b9456f0df24d4754fa2f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51edbca0e7714771639193b1e9153aa04
SHA154d353ef25b9887359657a85bfef2b136159e556
SHA256dcb1d1bce91a73594bbc3e8bcc08dfecceb8c4708630d9c874552e5cdd9e1953
SHA51267c9c261b7c3ff11a7fa5205c478feec93503ce8c10ee8b684231b4317ecc29785385f88d155b7740cc9418ca68e53cafd2c87587c0892079a3d77500875cfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dcd5ff7fa834cdf36dccf469496d3f4
SHA1c051d4fea52d065cf0454b6b7aa58efe7c33f16b
SHA2563561d5342be0c2f341470ddb0d07f0e756701f40028efbab496700ac21fe0c0d
SHA512fc742c0e090517d09b54ef6ec7663c79219824bc3d62e0a0622053069a28503721bcaf3a4d82702dddcba1a8216826288609bf6b95ea1b8d15f71b59f2a337da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56edfe29297a68896745b1627c85f847b
SHA15b577392f901648c69383ce1ef4a936b33ad06d3
SHA256100a6331d737e5f91bf64fae02a8445c1e3859d3664a5dbc0dccd822652b7c24
SHA5128db6024ce6a9a4419c3324104f1d8fd6a32e77b6a09f82d42094319123939a0e85f47ef35193d737dc42ad17493c7ce572165637e6b76c735d973d9a1840976b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53915deb60b11d5dcced68a26ec9c166a
SHA19c3bb0ef9f3998d01209370a93adb94d30d910db
SHA256aa47e1cb3486339ec84f69db39fde76bbff8e19f0480134d142864616353f6c5
SHA5127744e6c5e6e8c659809a7f0f935b792bb900610ab41bc10b7fabbe111d7947f7b33ae23182f3dc3ce5d83a69434bb48e1ba59d1fdc50b20631e2eeda5091eede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323bf8f2fdecd9f41e991916f9095d39
SHA1309130fa3a028e1096101d7622069c027efca48c
SHA256398908ed069ca2889a59ed9b44b580fd7563face39bb7af0c01470ea6be4edf9
SHA5129e86f7e81db333b97b7a739c302507b216022d2326a9985eeac4201e824ec2ba14d868c76cdb172fa786a17ba17242aa597f19298d7df8d1c5962c6046bd0582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eaad79fdf08040322a9057166150276
SHA17a016a96a33c0fbf630e3b8d4ee27503b581668f
SHA256c99492abc845896f5e04191fea0b5c76631fe2ac439d971ce58eed2acbcfd5b5
SHA512ca201a4f8c685263ae2da252b19a0715ed13284af7adcb75ff56da7a8c4d558adb110fb24a20cf973f4a0aadc4ad2ca820dd3e4081376aaa15fcd74059e82cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55728efcade7f7a9434c3c46e8daac028
SHA15fd0cfba1450b21175b07274c3eb2f841e714ce0
SHA25621d495fa9501c7f83ee9757931d559b6a71a5cc245b3245e16fc3506a44012c4
SHA512552b3d71c58d8043649060ff7a6f5a07382ef5d0b63b7735074a44886b0cef8d8f884abcaa97fc5c7573b77b216eecd0f656fa4af44b093320051a1597489553
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a