Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 21:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5b83641232d77d3cd28942781125c0c3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5b83641232d77d3cd28942781125c0c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5b83641232d77d3cd28942781125c0c3_JaffaCakes118.html
-
Size
4KB
-
MD5
5b83641232d77d3cd28942781125c0c3
-
SHA1
dd7d82031875c7a5b8e697747255e772694fba05
-
SHA256
2bf7e08171908243f9516d28b6eb53dbed7fce7d47bea10f62544e101c58bc12
-
SHA512
aa0dc38b5223b7989b9c83839e2b388857189311cb2a33297e2897635e35790f1cee8868f08bb00c95f6cd4b77686eca63b173cfc6fcc58717b87e131b74e61d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oGVf2d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d045a3bb31aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422315190" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008cdda8859305c7be6d9b1382ae8c55424190a4dc86332a31bd153df49d867fa0000000000e80000000020000200000003cde6276dcfa4e0ed69c1a47633c7cd2410f30f8a04beff61934bb6bf814420720000000d47f491bf7a7bc9ffb15e9eddcaf19c0550da9b35952034da5acf38d44f6612640000000131f9f777b42ca025838d4cbb9efac387a419e43ce70ec090abb057886d6f3c96babf21447a4c3f3e8f02ef59a81fc9277a586e67570a00c2912176ef7e0e4f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E71714D1-1624-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3008 2904 iexplore.exe 28 PID 2904 wrote to memory of 3008 2904 iexplore.exe 28 PID 2904 wrote to memory of 3008 2904 iexplore.exe 28 PID 2904 wrote to memory of 3008 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b83641232d77d3cd28942781125c0c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750f4b006d055d3ab20a2b5287c6acdd
SHA16374c511bda17915e00c6b031aa5812a67526ede
SHA256f938f04ac97755bad652c2861c7ab901e8d9a4b9a8edf28eb13575231fd7a2af
SHA5120597bbbe97046f620061dfff2171955ddc08cb9d2ea14d2298a30696607bb4e3eca541d3d62b1dcde0465ef40aa030d160a9551443cd9623d3fea500b5327cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5167d2a0543b850d472528a8cea6b5f
SHA14aa2e3756eff60cbb7fc09c5d2931fab34f16fec
SHA2560bd896891945adb2f9493d59e01584067b12fc16314f162147ba5d33095f781e
SHA51277e279df3aeda58fba17601302a51bdefe1891f93262129b99f1cc23cfb6fe441bc27a88ef673e2312636f1a78926c46570d20dcfdd8ca2540dc2f7ec329fa66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519af17f87693edd8c84c68c74e29b93
SHA1f4d61092601db62411fd4bcb6f1908bce5767888
SHA256188e23927d119df454cae8a28404428a4c9e3f38472e9aeb4d31ef848a75b5c7
SHA5127eb9342f494904c9cc2ef0023cfef9f220a50a13bc01a1975eb053172c5da8466ad0a5328524d9c6a186d91a44925559d8b4732e80a4bcc4bba0d581c5add50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e3f8de992b1d4c45fc2d1eeba0b136
SHA1d81b31b06cd3a6e6a8285cdff4cc856a61be0889
SHA2560abe195977ae39f82fd779bd4fd946e7da0fb2d36eb0c3ac03626b8a4d607d73
SHA512031a302099d154182fcd6ee7747a6ce967059a50677bf6a6f919266655bdd4adb9bf7ea2a8b4d304de4f4431f78639b7b1b110a2e544966345855201570ce981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c5cb89223afe76f3e8a3ed34dbe3a8
SHA1cbbf4cff08ad127bd584b46eb7b63f92439719ba
SHA256442bccd7f9c5dedf8036116bdc2beec38b6f9932f278b34f319a8cdba12f400e
SHA5128daaa1df1162cfdf346c124add88e865a4dfd9db0cadccc318bba9c8ee362ab94885c99defee5e9592aa3dcafab56a5d77074f108fcd32a1d1e5835fb9916e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4f813e40d03761345e8e42a265edca
SHA10ba80d777f61f850e747c007147052fb7a909d84
SHA2566df764eb42663d1fdbdc7822d55898285b1e5cb28eec2acfcba178a240186a1d
SHA512eeb7652c9c590c73c08d441f8da04ca9bfcd4be067cf89e0810c634672fca0debac50df7c805dc70bc391b641e1c8b8da3674700496466ac2a25bac2b8f1bbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52615cb4ca9b90e4349c58b547db0c1b7
SHA10d8c242cff49a22cca89679e5c3e4f87f07387a1
SHA256306c3f27bc0b3324b067ada8f4f32ac9093ad52f4d4a892afb8f89547046ab84
SHA512965462bb5467f577ff474ddc746d67fbf321706066dccd735e88a21a8e10df832d2ae6a1263186525eabc32851e3cb392303351207da017c8570115e8ff3957b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd275641a87e988b764b0ef46455609c
SHA1dbb61e034ea1996900b796fa102fdc89792959cf
SHA25625ded9a98166466f9dcff859f1ca8b276b83cbd59706e49063f9aad1af527e27
SHA512a95af18d47a886aced6c3b87409b05f2c2d49e782904812e946c95571f898fdfc96cf4c2954b02c410bab18a55881c1c348f8828d3cf5bef07937a48c4e7d1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8549ef4a69d3bd4d3a4ed54a042c2d9
SHA13f6167f95751a3dcab578584ed3c435f9c37522c
SHA256919e429c628f648464277a65d3b522bf49d917cb0c9931361521190d4d8a0757
SHA51296b8be60c0db155c7550492249d449f1864413738e7006e17c930ed2adefba097826f808d4dca459f95337f2b09bfe62fcb5def01d55a95bbc1ea6ff9117ce1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e794154b33c4dafd5dbaf97c333352
SHA16321f47b7fbe4a7d8a86c03a5bdf4590aa4d8947
SHA2568cb58b96031a28d397e8d986ffc1189ae6be25752e8f636257cdd0bf025aeda8
SHA5122d951baab3ec1d99f1f7dc0be40a803ae73431822bb91b957eecfdb20e784031bacb2bc01f0b7032cf1170e5a7dd1c1b96a145f470f62b35b2bba8d3a91245a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548629e4a1e64a0a3fcd6faa7e2bc3587
SHA1f71e9b83505b190d6fe705be5792a69f2c319070
SHA2566dfda51629065e0a2aba5c2a34ff5ccee44fd4dfaa9e9ce711bff2666c36d878
SHA51299eecf416065fe2f4f444833944dbebc8fb195198ad76c5f9fbfc2528ce9494c291ba00060a089ec7ee403ec1014c0d2da6e007a6fdd40f0ee30b9a61396f2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a04fbbed9e6a89a66547418cf1f3aa48
SHA11fc382415f9b5c4a5a1b71bde13f617617647da7
SHA256bfc5a21d3f731d334edf955470ba8e3c84adca0d9ce836c6e7711c6d3945ed79
SHA512f1a9f72a74a8a19362aa6b4b050f774070e17106fec26760d9d292962ce72f75cbb30901b1f13d1ef614b54227f6c6fe51ead8f75b73dee7d89d2fe2b6777b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0ff4618b3d02ea4bb6134a64ed4b198
SHA1b0796a79082294a068cbe8c73488ee4fce31fa1f
SHA256d77fad6a900c9d815b07c559289fb752d7d3a31197881a183c83e4d85638c822
SHA512dcf5c1d4eec4b5bfcec3f538aa6bf4de544965b42d58ef7ea93bdbe4d24ae63a3561cb99e4d6d434fd604606c1ccd0e63dc7b587fecde5f40989af4bc36464fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a205c06aa4d1a2a13c3d82fec2b2dc
SHA103453479f0791200cd5ce04c941d79fec3cbd711
SHA256853d5969b026ba8a4cfc99411a9554a3887470961f38d014d00918ebcd9a6470
SHA512fe441bd95fb460bf936ec884097df660ebf3ca485d4a0d8da88785f7a9d59218d289d1afe3befbebd25ec014e34dc3788e78a4ab4c7e806fc6b31bf5de4c6108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03006cb09f5a89e6a392285b9d7fa49
SHA12a28cee40c24b977ef1857e8696209b112030424
SHA256bd5d8c0682f0a38e121e76f0c4782fd3cc40837cc4f2b3803aa95e9471c71c56
SHA512ca0aed8540fc983cf598e18ccbc9f04c8715f3b4308ad1d5bb2a16e9a49a4a1073673236cfdf615ead3d79a4f88d0685d2d5470ca914d1f4595cddf705d9f015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b86b7605e1434d8217e5706b475226
SHA1d1b759a08f5bf4cc28fc262b3f60218bd40671fb
SHA256d71a76457cd48b0e16d5cd0b061571e37c2176be75abdf4f21fc302bbac8d3b4
SHA512a2cc01a1d0b3748b9d7a806855c67b001296ed6c2adf99d74bc158bc92a1de23fddd6ad6952debb96267ff1d7271c80dd35e8d233fb9239dfc285777ad450d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536163793a4d061d0de92b3a9f35b8bbd
SHA12047b677a5fb7bd77273c9bf96effc860287ee29
SHA2563c1ca7efdf01fc09db10ecc4f91cfcd00620325e65bbaaff328d99ac5ada8280
SHA5121bfdd3939e6cf35d77847ee730a1f18e81889814df445a09a1b454880211a3db8b19e6fd3a6edc7db0ba5a1496df1110bb9c0bcd32d3e52a646589b36be5f68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952c4391f30dd72229f8ab5c8fed9845
SHA115cdecee05a4a50f6b8983632bc8fa5aa649cb2c
SHA256085322a7cfc1c2f525f5ddedcd92b6f579921256e0b1546b4f50f71a559335e7
SHA5122dead41b1c0d280a431ec2aeb49f77c8d0a5ec0741986edc4eecda30e7c79628e29f5492c83dc92027e30b9ef333cf07df92cbb7330e2d70410054ec5218f7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50efc33d54773429be0378376200a2fbd
SHA1f82b105b44e27be118a2a613e858b9241c5a92cf
SHA2568e1d47bb9975703833dc51eb91a670936a8ecc565616a1b7601b2d19be0a688e
SHA5127a220bd3f6dae795ca2d1160bc7679ba19e2e1fdc496434f96f0bf2a0228abcc457a54071a8f27a93fea9f2cb6c1a639c5f196aa4c8182f8416476ac0c3c010e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951df8d9e08c5dc51a9c5e8ce4e49b67
SHA1d6244d13efa0ed668b097f878285fb9c92467c6a
SHA2561ade5503b5cf4579a905c5048b1ca73b4ce44cb06abea341c806d4ab0477c6b8
SHA512ba95d68a294d54ce7cf727fd3e924e4720e7f474cb72838437011c47f38b9e5da311d14ec49cc8640ccf53b4177574741c6932628772a97ebf7a82f2a75f1e2a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a