Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
5d186c5d7642263aae1257de4589bfd3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5d186c5d7642263aae1257de4589bfd3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d186c5d7642263aae1257de4589bfd3_JaffaCakes118.html
-
Size
26KB
-
MD5
5d186c5d7642263aae1257de4589bfd3
-
SHA1
443535dcd0779c32624292732f9e413afc17e9fa
-
SHA256
042ce1ebd6d05c56f3422ef01b782f2925fc96e343ac25ed3fc5eaded6da6419
-
SHA512
4f64c7063aa63d9bf4bdf3230bed08ed6a053b9a28a78a394e9c13f9b6b9cb9d935a1a7fb9fb6109cdb82ea0906fe9399062da1fcc377e8ab5135dfcd93e76d0
-
SSDEEP
768:SFQvwtSjySxLpvOwOs+IO8uQfJv1HhX1Vbsmx:SFQvwPe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49D99D71-165E-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422339836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a2777d8c84f3f083912e168adb45475d4badd205abc70499a4ac10cc298b7681000000000e80000000020000200000002a8f554f7e3f8530fe4a41ddd143a4facdc53b750750481b2c53bcfbc1b4271920000000a7854ffc640c6e552e42a9a52355496af0f22fe823a011db44db125a8a55e412400000007e326c5d0171a42ee04a8447a45ad5f46e53cb1bf4b94a0961dbc1bdaa0f4077f967c412fc616f0c70f5b4b2c03c4993a980869b8ac9f7c013f99df22b5a1c06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7069ac506baada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2388 2984 iexplore.exe 28 PID 2984 wrote to memory of 2388 2984 iexplore.exe 28 PID 2984 wrote to memory of 2388 2984 iexplore.exe 28 PID 2984 wrote to memory of 2388 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d186c5d7642263aae1257de4589bfd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad57cad0de6699c0aac4cd351c031e20
SHA1d1e9ea8e2a2559578a65cacc2d07d5a6ec0871ad
SHA25637d4a02807a8ea648bb652d2aa57154656dafbaf5f5210ef6451f810cd08953d
SHA51206f1be65ab487552b3c0508e7d771171b62967e400e5bd0830ba571fdbb0cf740a7ffa23c36f175ee1d7ca99b9ee81484bd0f1db7f51579cb7d7528a144629c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e21cd5d0dcc671249804ffa51823a63e
SHA1c42e82780fb795a78f90207f88225664b13ad46e
SHA2561b7839555a25ed85a1a70bf8492bf182351dc1fc29a254273aa76344b32f7703
SHA51216ecf4f2a0d3dd578ab6fdc9ceb845aa3a0e824502136fad4003d6d9bf29f7c690fc22ffc6dda5cb1edd1f05a583fd46964aed08ac57a79e30f3a72e2a4da345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5864ddc2dacacf20e971bf3066a442bd2
SHA1d522c46eceac0eb77ae1a84544154aa38a1ef5fe
SHA256ee0ecf7572f156e85cad37cb4d05ea665901c75c30020a481ac53b8ad2c8a3ec
SHA512a5f97b69c3d00a81add311a1cf0e4abef1c239150c3aa720c72fe3e8523fb686e9808a5fb2c0f07964562ea118538a3a52ae3757bf306ea80b5f0e9cd81c06c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f19b695686d6ba5fe11e0acadcc7f0
SHA1584597d7ed52dac3c75aac1dca34c3940be739e9
SHA256b9e35821578ce28bb50f7c957562c391f5fa720e1c46b171b2ca8e919317cbff
SHA512a9fe7bf11388e535831445db5afdeb5d082697103015344d933b4c4a6cce96444b1b55961dbffee373cc14fc1e0aca1490e154a0316a63675bb98740b13597f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525aae43cf8ca33c02bb9408aef9fe04f
SHA189411024282e21befa3c3bbe85f977ce3b10d951
SHA25667fbc196d7552ad1f4c6be0ad07b6df7aeb285b5b9b80999d5344f897bbd013f
SHA512f0fa527064635c50ccd539b601792703af96012b74477fe6040677f6ef9e940c84fa69d578fbdb4c39e869e9e004e8bc9156894b59a528abd6c429cb0fe1479a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552453342be77f1f92e07f1b65d1d6cc6
SHA1c038f813d93b488d802966f813f4a5a5e0e16624
SHA25673b4d888ca25c2183f3f9b0a0e01da3c3947c99a5328294384aa44ddb57540d9
SHA512401a9c792d9d8cc7cf081262202abbad34bb1da72c55ddcc279864c4b56f9ac8a083f98927b55460a9ee912c047b31c50b1c2941e52df8a40ef7d0f1b78c41e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28f4e7c202eb69210c6e87fd7a57f2a
SHA11e8f9b79b212b57c43d1c303055e08a212efe836
SHA2565f7b3aa83cbc20cc1fc0eea02f65d86b1e4fa34e8e89ae6a5d383a5a1652dbf1
SHA51263a244f33e39d67a1c5e569ee804b40216d3e918e0fd7360727eeeabb8e234e437d416b09ca9b52298ba893780eb32864c04dd54a7810a9a22d499946c46be3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567633f93c40eaeb9a8a6ad4a6ebdae49
SHA14cd798bd35b061920f0b44966d5143f6b22300ec
SHA2566fde3b921ba57a0d5d4de8d514be5cae207f97fdef70f22cc17b4a3d9a7cd64d
SHA512c305868195db68c9293f9c989b8c9cbb92898d30b9de232a4920023bbfbf1a4359f5dc9f241e8e868813ccb4cf52abea11951c3a3178a51dc1bccbbcfa50a840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab885dddb8bdc2c01168732305de7f7
SHA1c186f68b1666e0897d3cdd228003695bdde3eaeb
SHA256580e5fc8d4d5e8557845f6a80e5bfff24f04c3b5432622e351d05cec4eb93e9a
SHA512a9a6a04e41ce4fcb1ed35ad69e2c8ab1f58afaefa3358f34e59258215aa84e6527e11612d5f6ed73523707d95e319f00a533ef4bc0cf79eca50956784abc7650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4d9251c8734b63eea9358360e04589
SHA12c9692d2b0061c945dd7d54fb6966909e6044376
SHA256d7cf8d9893c9368ab995b32390a04f539490806bf0b09bc7d0892326d21de469
SHA5128929d4750b533e14f2be7402a7257e9a0a8bc2c4626ba09fdcaf7bee586da96f1080d9165a10b494e4e1cea1c2c4054f06fe6e014999f9a7917022b3d5a3ae98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551aa863461e64efac82ac71273ead2ad
SHA1d1038aaf79c75df6cd5768946aa5a30cab9f8174
SHA2569959afc14ef595f0816f2e40ed7b4d4d8e61fb99c8fd788e3a102a22878bd81a
SHA512eb9ebc95e0faa5d76bb63853d73aabe4f3b9fbe956016cdc8c32debcdf2c7fcfd2fbb3f8c130d92a0a2300457825720f6d6735de6007d385d89a995072e0f4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097edd14dbf8dfadeb96a49d8649c24e
SHA1e531bc95cfc3ec4c4b957f6c932fe4c493fa9265
SHA2565ca2cb111c883c42ec81b4e19b7d6fbc786b5d57d46d8ef8c4a0105ddbcd617e
SHA5128ddba3dd2be52c4714b773ef5b64355751ea3e47c2f4a726b9f4c0e396f48e5a14ef0935aa771e53059948fc0fc824bf86f86d8afedc2dbd5c47b0c18feda260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c02373a37fac6c165b70452660addc1b
SHA1aab4b4542a3efa278947deaf1f2672df32632f9f
SHA2563f97f068498fe00ddedbe70b6c9995e07f1a6728c098b008f5ee01c9bf6e745a
SHA51254686e1f32d5838fec25f5d811b28c88c5ca4863e30b89f561eae03c0f1ee0a70ef1d3e3731486a133f77657a2d6fb2141330da9ef0633fcabd831b32a1b4aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a33afb754aafa2a9c55001b7b05a7f
SHA18d17970d56fe275f6f6df57b04862fdd6d580df2
SHA2567dedce0aef583188d50b74228af16c606934a977272d984f200825f5a76f9767
SHA5127314292a7f37256d35162e39c1a62b75b861779202f4e098169ac957567f408804eb29157fc431dfc4efb4c37ea090ce3dfea3c2bd22e334ae1b655f3f6ed3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59330719d5f7ce513417302f6a5316ad2
SHA1f7d56747186dba2319de2eae769b7f348854cc64
SHA256db065b0c76f66870323fbf42add588cb836df702db9705b610a1bb3ea5134650
SHA5126b5b642cf74dcbea3511c2165d256db433e2e721a532fc4d7d86900700bdbffbc4b87fb51f5321f096d515ac2fece5f12bd7c9683432981be48a8a540571d7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c70e9a178c9c6888d97c847551c2e12
SHA1adac1349b73a84297e3d505c80252a610b721856
SHA25645f395acbf2af873cf92e66be92e5653bec7de4306c1dde5aed71d895c0ccf36
SHA512318ee3f48a6c4545ec487e78c60af288a903effc1280827c6187d0edcec35cf6580b45e89a9184d3069f597d71ba195eb76a7a3bb6f3fcee39b442697ab3cedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6fd418b4c99b0f2d18c76230c453e7
SHA198823857089c4a04cf26b994eaa9634cb24df693
SHA256b245d346e9a2802b08e3a05fddf94e22f03dc2374d7962b6c62def61701e2101
SHA512898df2cb2fd98439235d4ea8895868a1176907a0adf4cf6782869d9a9cfceb60a1f6e7b9fa0e8b4d0b639006b12aac8b14a5b6a080b3825a4344c8bcd5d9900b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276c1716fdf6241593d95c18c2022f8d
SHA1c81024b6d4fd72988b96f7c86ca5c438304d936b
SHA2560608ed0f5fc89841c25c44bf6d5afa2ba18a118932ffa19c519c1d8333716478
SHA512bcf799d8d145b327921f054f2ce224a3751d345c41e403ecb46f2d869742f9e597452b8a7214087a0156568eaaf477db78380770e553acf50deffa58ef13a643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c4c5ecd82095d26e59591a46e7ce39
SHA1e91a2910558e61a5558b2ec23aa5a7a6a20b0f9f
SHA256bc7ed3c6c3f33d326aefaa1a9d166bdfabaa3e5be7ed8ec1da779f974adbc78a
SHA5127390e61a1b73124a791446331bf3a3551aab2219ccc34a091b080a5a00da8820be18e0cc6e52fbae9ba8d81f37adbf9da66ea3bce2d85114d159364804150c2a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\dot_clear[1].htm
Filesize800B
MD5dec80cdd8d9572f0917cc1ebd14e1277
SHA1b99266c43c23dc5affc9af9ec9e49b0b710b3a53
SHA256968da01a86cd7092add33e504cd9e414d09e82998114f58872c21b3f7a71c782
SHA5129a81c3eca670c45eb73584d08df6fde37b1ce9675b071156a2d08a85e5b13b1ecda7b5a68bec6d17746166f841455e030824704fa878304873e5823640d37d00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IW68H88T\crivelli[1].htm
Filesize800B
MD5ab8263156de55cece8291ca360214fce
SHA1fe9b5fec6245446264694aa3577f2825340a7eb3
SHA256b62629d5ebb6792d87bccf67bb879966f04773879f302827abc19f7416efed60
SHA51250ce8c395a0a9022c021d643b2cc19a3ad3c6e1856fadf88635212fa14a29d2bc0553a0d1c27149006bd348caaa1d04733d51c1638bba0d7450ea9543e71d841
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a