Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
5bab622bc3ac27d67f4463cf10cffcb3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5bab622bc3ac27d67f4463cf10cffcb3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5bab622bc3ac27d67f4463cf10cffcb3_JaffaCakes118.html
-
Size
4KB
-
MD5
5bab622bc3ac27d67f4463cf10cffcb3
-
SHA1
b56c3e4c87e5e741bd31b169da647e90b37c8376
-
SHA256
d26a550a168d100f26d62b531ce12f38e8cb413ebe8e556df0efb5479a53ee35
-
SHA512
7814c9a773d363ad37a79ea491d934ad32cd058d3be79d0105843d4671834213c1ed13405f7353b6c2f69450dc5d32a8e22427ca7bb8d9fb4f71e4b85c06842f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owNxmd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302f3d0537aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422317461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30B6F1A1-162A-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009de6761eda04da9bf0521b7d03ac45fda56cf9c62f040859a369ddbf52c7c9ba000000000e8000000002000020000000cbb6bda2bfb2abc18d5804da19f7bfc175e78677b9f11b11c96b71e880b0da1320000000f2ba43dd88527e41ebb52311829a2ac2ce97eab7220f1ceceda54d314393d836400000004e5f9d6d03b53759b2fed72e2b5d910a3a3839a46d413c710e7ee01685dcf95157d640bd5ab87a4228fbaa62dcc39aae8daac944fbaf4c552c76e37fb9258cbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2136 2928 iexplore.exe 28 PID 2928 wrote to memory of 2136 2928 iexplore.exe 28 PID 2928 wrote to memory of 2136 2928 iexplore.exe 28 PID 2928 wrote to memory of 2136 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5bab622bc3ac27d67f4463cf10cffcb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbcd635992c15401e6aee224f02c63ef
SHA10787bd4db1357af92d77817f32ab6d17a6f95ef7
SHA25635d960821f11779643738d9f8c2f6d5a69ef779ee39f8c3eca78c67b78335b6f
SHA512da7a2b5f76f90d1620cc642805fa5468dfc66dcebde8a4c315e9007d0e9c3c4323184e64fa66180bd37b50050caf51b1bffbe6c7100fa052bbb100e6512ba6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56640664d99b08c7523791fe4862e31d8
SHA110416b15282531d63f03a90718c37f084076c9ae
SHA256e3fdf3716d43b9432a03a56ba8b4a034cea0ffdd87e50362e3439c46c4378fbc
SHA5129606b453b0308d6e31ff91fd59b2c1f7e9e8911ab5b460cdd21fe734a25fb319542ba7357f4cad5aa1deceb9fd2b48b3bf5712695d66e5224c04a587aba60383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433d45a610eb0ba3d260258e810a3e17
SHA18d5c6f5bef630d32b6f4c276519d6b6abe206cac
SHA2561cec7d7ac8f3dde3f41ed83827013a14a0fd3a035ad7b8072772cbf91e24c95e
SHA512bb781f4cc2e8237665b8eb5ffb3b568e9d4210b6289935ce63dba4443b4419bd2bd6621279eda312b0538228bd9901ae11430834ddfafc21ead8df4907dfa996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d472f803d15d10b1b5e8c5d4bad103
SHA17f08affdd01979643ab17493c745a08ffbaa054a
SHA25697c2aa47855054c424e7d12ee32e5ef22d33e4bbcf08c46aa12e9be80c1658eb
SHA5121c8c5f2bc32b8559479faf36694668a0a4ac536bd0c76c3252dc8416f4343ce243e04dbe8ce3d2e02ac05545e4feb41e3bfd7e025b336b0d613220cbb361b48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64c8effa0f14d0864eb8e462477f14c
SHA1addf7f48c4ee3c60b4d2c763f8c282e96534f742
SHA25651a38b17b5becbe6cdec3f9527e7e11cafcfd6f744f5d52f95eb53c6c991e399
SHA512ac00c56a10123188caf3149092c1df0ca7a98be7cee18a88f2ed9f295f508c8319bfa05b66169c9f77b815511e0a8bb20392697bbb02b9cb6f1b6336864e185f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ea9ba4a6439534f2ca74758d98e649d
SHA108a7da00746c88573cff6ea2faef86dc722ac1b6
SHA2565fb19f907b12187488589f7d5f9ce3527e5631c00301fcb3c9922a660e207b28
SHA51261d27955b83c260ee0e993b581abb01d7f76603e4b0ace0ea449240e5ac8a443c5e04e91b6252948f39288149e5ff5d59025ec3b7af4bb1b687b4b39a89d2981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe89c9d8bba35cc4067c6ab06643cb7
SHA1dbfdf65fa33457757d35b66f1d412d121f479d4b
SHA256708f4873a55dd36b62cc7029f8888603dc057dc53cf931959744a6e50968546a
SHA512c74cbde265d3562c0abb012d1cfb06531fbe104bad7f8d559e07d18442399b876fadf3f6bf0572997f4b70ad1d4cdfde94ca87199bca249e0a66a56c792eb07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51214635109897509ac0fbfcdb107f3fd
SHA16c0ad939f2a695486e1f790b8202afbc87f1f7d6
SHA256d0615da5837c223b8e99067f4a15ab491b05d447f96989fe3304430265da1486
SHA512072b7e7c3b88d91ffc02f3fdf13d789029a0a3272de3a261ec92e79eee1ef70f9803947d3aeab3e90745d264cc14bcd87052e1395fc3eeb6f76173d20148f093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541da46d03ef60689d7cdd17a5b6cf4e2
SHA1b82ecb6df041790f4038c747cccea9431a7d6b9d
SHA2569d1cab15679d3c8d673a18326fae2905c70ef581405e4d9ed470df8b5fdbe414
SHA512ffd276a3e8e058c8d13193a305375b6551acb4fd9a69ce41cc49e0358f96a19b17eba7c32bda30db9ca1a17db605e6008b1e7fcc295de5d15a6f53a4bcd73d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05f26377403d8fb4066de816b85157b
SHA190cae4367ef65c573ef7d6d89350f6f7fb68342d
SHA256676a1ef35803cdc15b43f4bd36b27f8b09aa31e2d073b5b9ad1df0e57556b1ad
SHA512618fe99fcffd7fce813f1d6fc213e668046ec63198e13786c258f53a89741a352f3b43e23df494626eee20ee49e85bb994ed793abf45af93293ca0eb49ce78f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56665f71a6285a81c6f22a3ee63305d72
SHA1edbb3eab38b7636ddfbad8f415a1b43c895ac073
SHA256886b3d9f49ef280217c82517637e08dbbcb9a06d5b5528fae2adb5accca4f55e
SHA5129ea29bbf53b1defd0e1a8ece8d50e01bcf71e3a765b88107da750072721688982548b1d5c6f7336af9efb5c7522f3a8ca643d8aa48b7907f9698c181e77d0112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af56241097272ac0211e463c90a146c
SHA1dbda0a45ed0b7cec4d7657232a4be2b90ff9bc0e
SHA2565acbcfaeef290b9391695a196491310197a95c49c5c261efa21e731c8597c72a
SHA5122051303ccd97632a698cf2b3b74c61ab301da95ccc410243c83cb25ab55e26fc127500d2b5ed05acf491bbea76d18584f27d8e8c245ad5423759bc4db78817c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5321c1ad739a18b39776f6768bbbb6da5
SHA17489153a37e4ad0ac24c91b0654ace6655f61242
SHA2561268c5d3128c8c943a671968cc8444bc41554e6afa879f5bdd341d89a6369d30
SHA512aecec65a38ba5bc36eac58909ffa30dee3818ed2977050c453bfc537bac03ff78cfd8c419789eb34c62514c72ef70e08ca9a57ed898e5eef58b5eeecd3260a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50569d8c808bf25deb823f062a296da70
SHA1a0b66d713b3def7ee4cb703fd3c25bb05b31dbab
SHA25691f67f07590e590d07cfc9c2000631603f08728afa6e4e48f80cfa951db591c0
SHA5124c40b9da1afb7e0f4c053b8cacd2031d8f210021cc78ec2e7937e634a42e24d447a349a723145a0c5dbd820ad7b5b7243e96192f405e97826b01b1cba84fb11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d59e9b641bccc2e4e117996ad8e8c56
SHA10447d52884352cf51d073cc0f77b471e95642cdc
SHA256d5111d2c5981794df545ea5800ed88a1ae308c2183568ed8cd82b92000a9ca09
SHA512c8a9af0e41e8c3e40b642dbb9e998308cb64ea3823cee6a54ac2860d63ccd7a6b391ea7266217d104dd675484bbc8514acde547bd2fdad47b1df25d0469745fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529f6f752e1bd0891d9defaa089d2db91
SHA1f6001c70ed1c327007273d764d0a313e636b869a
SHA256e3625aefdf18b81ea358d6a1b7d518d2e639ba734a89228ab2c4e45d81870ade
SHA512c595cf0fa398f6920e422ac07b0d6e58230f0635a302447ab0a0b44627cd07a1fb5aa85deac69288aa3a3b0ed638cbf1978f14802ae769f3cff69b57b94cd4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a3c25e1dc2d477d9a35c3e6d875bc0
SHA11d415874cba4aa3fce5443d41e2f12487cb86e04
SHA256cec593c6ec9304c13e6c7ddccaa00849b922100286e880364e7224453435ba37
SHA512683e6a8f4f6e52a3ffbfa854cb9b7f10d806536436cc71b4376bbccca6da003d98f80e56d6bf4f17e6198dd29fac0c3fe385e35fbe6155ae2c75a05131be6b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510f14bcd713ab65cdef0fbab19d638a4
SHA1cc199f6e42010593282336f15cf898053bd5d8f0
SHA25661e46e638bbf205cc3c41c2808b173f13557aaf8c3fa306a8140f2c6899afbfd
SHA512efb6235fb106f43d69c59558c590e191b63e3ab7cf1e8f21b52a8d66199fbcb290d3f9647a77f5af508abf8f37a5a24e8ff4fbf6a0c511d671d7e775f21bda93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a638d02b172f50ca29ab272821156a06
SHA15a7cf5d36be4691e84eface61e78eee66aade437
SHA256afb72daef1350d939ddec7a0027d75b060e5acbb15e4c4d0d1626e8046648080
SHA512ead02dec538a6a543f5e1524edcd0d483449f88bd207bc3fedb445b86e4437b0888465133b5e3487623dfa682dd405d19018f4d406d3d6c3149f07e59abc495d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a