Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
5cc2770ed34d8a3de21980432bc99583_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5cc2770ed34d8a3de21980432bc99583_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5cc2770ed34d8a3de21980432bc99583_JaffaCakes118.html
-
Size
461KB
-
MD5
5cc2770ed34d8a3de21980432bc99583
-
SHA1
054f428bc63082980b4e92c51e6b272cdf7e0b1e
-
SHA256
a83dfb8a4848c1ed7cfe916bd0045480416c9eb39f5863c4c8b0da4fa8eb9410
-
SHA512
4bcae7685c858a3bc22f87757923c8716fa38151bf74ff8b312f121dc47f5c69aabc2fdec831ef1245f4fe385f46b49ab0d73163cda0e479ce6c943d983964e8
-
SSDEEP
6144:SLsMYod+X3oI+YrRsMYod+X3oI+YB4sMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3H5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c13bf65eaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DB698D1-1652-11EF-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422334609" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007f822a944005e28e31efa2fe59f808dbf7615657083beb4cf380817eacbf6f48000000000e80000000020000200000001242afcc05c04344b5cbf56a56bb53784a1a6aec11743fa1753dd3530f3f376620000000643cefce0a35bab28327bbb132da2d8a21ea160fbd265fbb0c427c081d27051d40000000bc5fc924b53ea7227da4af78c6145239afec387cec9c748b641c1554404523dda26b4532b0b2c2fd1a40a475988c9a75bcd2d53fee7549b04e73b307eea67f98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28 PID 2040 wrote to memory of 1332 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cc2770ed34d8a3de21980432bc99583_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd2f65bfd702d38c1581e902c99a1144
SHA120c3cd8c9fae71193a871ddaed0a9269fb725110
SHA2561c4916b9e6bee7110a143176a02ee408130645c91db5770c3b6c13bd0d67991c
SHA5126791e466eafe9523c079f299d5d8cc6b097bd7690753b0435f2336484a3c1955c89e8f380d5579a2268e1c245b167127b48e602ee7c85e3241b5e4b768742e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b818d7b9ecfd47f8bf847c7443339a1e
SHA1478544263ccffa12d6601aa7990412bf3384ff5a
SHA2562134c126cdbe6520d129b9f5d55678dad4fecc606e198717e4c84d561f8ab288
SHA5123ea6c27bf1ea539fca321c9304d2fd231c32debbe0637fbc47af4e97310f9d39e0240d024c605d7642544bc535d44b9854b56f1285c7796dca3e54a58e4617c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffb786df9a4438297dd0df3762f2c26
SHA183e6dc8b149df6fdad5a43e9afe80ac0690a4872
SHA25628c95508796280790783f8f607a1e1c275e0e06743042a8144c50711388e763d
SHA512a548af65383ffe580402e03e0b884f30b73772e0c3ec150abc174fa48a3f4074fa1c96d9785e601b3d4139ebe193b913cd2f369b5b36b743be1ecc75a8a399eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b225b5b409de76234b6e59cd2a08ce71
SHA1b9280e3a4f078bc6602eedb65bfd1d7dd9e62ca6
SHA256ab07c99ada0aa0ff4e5b038990871ea352fb696d37bcea3a3f4c28fc5045d226
SHA512a97a131c0bea30b4980335b20c4754adf816e084f369878f1334700e4aff81e5bdb517c798f76659ed95fc7fc7d4f28061d09dd289ec32b8e3fe149b37d5fc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552092cb3002addc819c2568d58d92062
SHA13eeb95c7a31ff9dc26578290728e44cdba65ff3b
SHA2565f5a440d670d069aed46e448fe066ba7df18c4725e60a9ce9c53c10aa591a1dd
SHA5125e9d9aab01cfb3d1202c96dd6b3744f2ce1a2af31ba0f78cd5c5582c98347ab6dcaad3d4c6e12e61087493c0b1ce7993d11471a923992135189506cf86f82122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac226c06837a26483fc498972e54a4f
SHA10ac92d66f92fd8659a42ae5bc8cfbc342b586018
SHA256edd6dfc947cae302463b925ec3e048973aab49fa501c41b41eb5325da5f5ca56
SHA5124e2ea2158842c449e46ec8d8992ba937fd569eac48fc3f7bbaa7190a8128ab4e1a8da1e13ede86528155fbf4e28233df4a0f1178b778e2fcf98fb90e9296c479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef6f8568eb60f97a9c80ac17a7c65a36
SHA1b890428255c3d833e98a3bbc1184192f22513c9a
SHA25660e9ab3aae09bef77284df41b08c3e7e3703654d1ff7ca8d16a48f5bbe48730f
SHA512ccc98e1bfa9bfe924d77cd1c9fedb9404686d94e9f23260ac8c3d46da2716252c5983798c2a3b2af749f8f011d70ff0490c8f570f723846f14455c7a249b9909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc321a5a700d712a9828c1a8a0c2f8d7
SHA149f26bb194473d10b98a0d8aeafb6a19f8ecc0e2
SHA2566f783fd3a6428431899b8e5f31df2c7ffba4d6f58c5caddfa3f1247b0902990c
SHA5120f9618a442e9ad79e756e5a7d15690d117c0e1c04eed398a688b2527af7cdf7f274f94ef77e3964c0576984245fb2bbe83d14cb4cf93fde61b32d5562d31bcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5630e140e5a4f5eabace1137e1a485616
SHA114ad76faef7144cd656bedeb6af2dcf6ece1be77
SHA256522eb60421b997c3cd74e5d9050d21c4aa962d0a1cbac305bcaf452a153d02d3
SHA51202a2cfb70ed27bde5071dfaa711711bd4bc20090a2c291ecab932b27ccfcfb1342760e4983fe7686248588aacfb05b589829ddba4d9438bf470a7e753d2abdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c015df7771f0ef882f363b0213d1914
SHA1afd7345ccfe733a13499e1ae1ac35f435dafa39d
SHA2562250b5b776aa6e6368a3f7da4869bb2cd297b8f9f8aa08c279dce6b04029b892
SHA5120cf9a08dd2de372df30cf1494c59e6fb0cfc6518788f9a39b39ca7d75d693b097137f8d6e7ae727ecbf215d4f4e2cb50e7277e1492fc425d1622683ac335b297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21515b316ae8554a5284591cfe0280a
SHA10f7ba2a9478c7e65c508519822b44e13d3d1d11e
SHA256e15c6190a501774de89503861f47061ed16aa9b9156291ec1a236267f05bee3c
SHA512faa0d391b46e7860c77e230e97524a8fb84fdeea8f30170aebcf9f3f79af952e8c44cb09b0441cd262a1bd220c2dd60b5243456dda13b9041e6eabef4c13a5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf11d384af4e2f9517528c0e832c95d
SHA13c412e9eff055b1676dfe0df512e7596385d8179
SHA256a3b0c905f62530650394e5719002a88afa757440b336ad7654195cb4e2efce56
SHA51215e08ec279ffead5377ce4ea2822bf69cd82ea8712808e3bf42027f95d3b6506dff97bcc867ad3a946b7eae319300523f9abc4a9a4ac099c0ca8e099655cb387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce687685d26f483c3a815aadc74f3e78
SHA1c55cac61fedd3272ce17a532c6a96cc1e31c98ea
SHA256a2b6b4518eec193dfb8c3bd9df952a4a50a2e2f30f0fc5897f0e9118c0fc25e4
SHA512047f82d221d6b0406e6e1b66f7903b99867191771cf57430e029a4a1140657a699afbda989303fea7db73d1590651934eb2fe8079150987eb6b35846f113dbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536d0f1a7850339e6c4f7911e7d94161b
SHA15aa54e0de4eb8f79cc17b4f161fd21ea12b7b8f2
SHA256be4ec54198d4a45977e0b32905ec747a294beebbbc3df77552c5a922967c0b31
SHA512f8af2cd888ace75d897f913a9f07a9e654e8238ea0b0b37f39bc963c50bf7d220c18a22ef2de33e3de9f69a738e0092aa242a142e5c3f0a108209dbd75f842d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d0a31c17a5fbe8713c3e4fac54cc07c
SHA1085974e62971e53495e152beeb2a2ea80d078fd9
SHA2564230be6f34ca15ea5f1a1768086de72ae0a3fc9a6d0e8fd97635d2c681af0aa1
SHA51293484915a3a1eeaa16914d52941d8c562df501a22cc1789b84a0a241782517a026f84f96bc63383281fb48149e24bd66cee9188c082bf0d2fe51d8aa1531de80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069b6f94adf83562f37184ecfa1a8f25
SHA103eac062fed4bd305e295661f43446b59f4fdb4e
SHA256bd7de1235e951ec2fbb096fede6a2e0734b91065b58d6f77300718270adb1622
SHA512356c5e2afc089bf28d9e1dab71bb26af3445f5e6b9ed6686a4cd734bcfc8219efb446e3b43b9d16619d9c282490287a384db072141563a9c2fb68293f57bdad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718c4f7358620ef1f53181570027380e
SHA158ff0c86fe65793ae498c3b88d8d33810d3b4efc
SHA256c2c6d78cf551fd5743d1e5a8df569b6382f7654368ffa18d4cedea4c84961e52
SHA51210f03c7b4ec5d4894803ce4dc712155c7c95d6052d19562498775e904d71ff6b3ea206a93e24c11d76ee3acd06c06d814da4c15b9d86fffb94d841e50d3c706c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511be664af1558dcff6ac3665717cb6c3
SHA195280eb886794ab4a630e38098542b4e72d79886
SHA2561ffe6bcd948e06bc4d0263866524c3a723a3c1f6e211a35ff0a9803ab5c81c47
SHA512388d9a8b8b6a78e39e9e5bb7293e2c0d22a49ca942fda25b1ba1ef153d57d5a88aa3777e38623e63dfe1ca4d4c592b9c6b3a2efe02866b9292b7d9ea07b32e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507745e57b95441b69b6faf9083d9116e
SHA1a685fd79ad7703c01bd21b50e6c768f6868e4d13
SHA256da1ac583cde23145fb0fc0be854c433c48d6c0502550b3370e4f1f01eb18355f
SHA51211cdf54644614ad99e07e33082417ee46a38f3b5652bc6070971953c966db07d26fee14b2a1f2594b24d14bfc42f86dae3569af86dd35b17151d4a3987418a29
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a