Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
5f9ec431fd63307dc34f9497eeea6843_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f9ec431fd63307dc34f9497eeea6843_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f9ec431fd63307dc34f9497eeea6843_JaffaCakes118.html
-
Size
4KB
-
MD5
5f9ec431fd63307dc34f9497eeea6843
-
SHA1
7dd51706ee95a599ac4f4196637759266ee000da
-
SHA256
3dba838f82e1dce5ef0b75d5aab6ebf0b3a64253535b3a5beaa9d1814d621b3c
-
SHA512
834f695520da8f23a70125412dd4594e5c6fb49505bf5882a4f52ea2a3cb74fcd0072524a0544ac540926a6e55b42ce98070ad815a7ccf8c06a9a6c71027b08a
-
SSDEEP
96:oDausDoyrh/rieESWozSrZTKT5z6coxWhT/t1KZ41W9sAqM1KDRflv4xKfsRqZAK:3oyrLs/BI5zdoxWE41W9sAqM1KDRfR4K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4792E01-16B6-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422377918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003268e40fc41f057e2b8a71aff98d5e8403adb400333f9cafa571ca813b3e3a0a000000000e80000000020000200000000f7ebce95203a6f64fc537135fc25fe4feba206829fe4c782684ffe45905be6320000000636be3186899e37a1e3e5f6a6240fcd448040a71f0af9a1ccfccea213f18861240000000d6f85b33d5fe13402b1b236761ce136ade78936bf375f142c6363b1b646b27e95137d1c24219cda7a3d8d6e1947bd0e1e28c90e008b1efe0045f4efb73c04fe0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301cfac8c3aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1864 1688 iexplore.exe 28 PID 1688 wrote to memory of 1864 1688 iexplore.exe 28 PID 1688 wrote to memory of 1864 1688 iexplore.exe 28 PID 1688 wrote to memory of 1864 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f9ec431fd63307dc34f9497eeea6843_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e65558ac2be119ddc997e3bc9a5dd96
SHA1e5332f80d2ebdd4c1914875c2a416cb4ca4e5f06
SHA256daf02c3c43055d1ea0cafb9b0a566b4919f9b57424b017b685e4fe66d65fb463
SHA512b6c09f7876086a66ec7aa7e9fb400155b8f5a016d82a9d799d01359970e06667cb822b168dda0c1ef3603d847271716602539ef7168221c0fbc1f4181eb61d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb66d1b4416ab390d2866e11fafcdf3
SHA161c27ee3188ace525efb3b0dd4227b5200884799
SHA2563726762addd3cdf245ed3d763870fc425f2804d8c537dc2fac3ff094bcf1f3f8
SHA5126e3adf32d246df11271af86b3a553c99abf1388610c0ebba1e93e2a9ccb3207af9da7a347fd61ef241ad9610690d08046d0c25dc3c04e97f59c9688d8c01547d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a75bdd7c89400b74d6708d0c2e71867
SHA17b1b4ed477a38e7c225a552d962b97608931e342
SHA2568c3d4ee6920e60bbdb3032674aba967f0095e9029bc739c6d0a3f38c04e01235
SHA512f9960e286699333e69ebfbc20019c926ff5e70dce7fa9ee83df026e1b7b679292babbadf3ab113aaa6cf8aae0dbe1abc4d1e1245fc1afdf19740a50bc2e44f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c3378a191be927cf2433af073a9e45
SHA17aa6e8578cd110c1f7532aa74ac956dfd65815b8
SHA256b93dab3fe9a21ff974a2c363d478422cf7237fd7d0a906d81d68a9439ec0d911
SHA5128558d6474d3f9286762131d4bca3ed911db3ba47605cd2b3cce01c1415221b05185462bab861750e8ecfda24b54556e133dee384f3d9efaa67b429fd0a4e088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539816b901cd3c82d282c2088f609c3c7
SHA1e9d98d5cee6cb48ca75da4f5c6d8dcbfa4f793ae
SHA256f066d0c3496600b75be48ab1c4097c03f522e20020e17708a48596e5459c350a
SHA51249126b043ca1ad1bf0cfe5906d511c6ff19cfb3528d8c3bd9ca3f9913b3a11cc5a887579a4edc9c39aa1ca34fc27b3ec0f4a5ac9e2d8a6203ab14fa8824c3f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53658d9a701d1b026964d0b15c27848f3
SHA1981b8429a1b5c9b2df6828ab2a81a7e5226f80d4
SHA2569c804f9aed128ec06e51fc8605c06b94e906f6a26dba6419bcb38747e4c03c52
SHA512585a80e482039824a79cc6a250d948f55673693beeb5290c2700b8c81968d00a47e8a5088a5023b2e3b489eb3aea1835562c0110fc9332aa4c0bcff689fc9bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30f224758a32a576b145a6c5934ab7d
SHA118f63e826d7498cb0d1b64200e9220f011f1ffad
SHA256e656194ac94304a4ef90a0c524e718939b45a475f646e807ea6751e6a5c9238b
SHA512d663433e1ee5add4729ee18177d014d5071b4392fab41206bdbc4b25b900dcb1e8ad6264977fd5e453cf620e0e859e732f3f4faaf704d621699f53fe8994832f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d128898a305b44da7435d336a9dcca65
SHA1a914848264b8d4d4ae2e4a2223bf843e1ca0192b
SHA256254d5381e0ccc56c68ee4d8e3c9a5c6cab89022b9557938b646cabd593c5fef3
SHA5127821f10da2416748509edb61ab49892f9bfe4f03bacffd0ad1ed33af1e52265f38936061486169cb0055b870409385f7a8e5c6800ce79964e1b3691cc459ca8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541eaf5eae48e2711481bc8020106c3c8
SHA12e8533ce0a7c129c34467af236e5eb3a0b33b8be
SHA2567f00292de90ffe3af3d225596ce0860e3692b22680df5d32f09dc2a6190ab47c
SHA5127058c95430a85a8b32a673d7b8ba3c37f62e70e3fe797c7e489253d2dab6f9563fd983d184210b0059a00ba2d9071a114146421591aa47338cb8db0df7bfb9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccebe3f6400e0e28831be4f934a8b759
SHA1aa6814f90c0e6bb2f5bd8e0d5e80b4e3d3d31189
SHA256312a465dffc694e77671e4fca370512bd36b39fa9d49fcebdb113f160b1d5fb5
SHA5127a25664ffeb4a3defd19b15058f0d90ce484f7567fabb8a15a81c9721ed865779b7a4499e2ec6b5561182a78a6703c63af1a20e181aecc18ade5cc622e4ed8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e724c2877578b10692806d27df3e82
SHA173f202f00b7a25e4dfae2d27a7fffc21111fcaf8
SHA256e40bef13708025b86ef22bb1b42687b9ee5b31511d0fed7abe267d17c96cb14d
SHA512925c7ef23e087fe5e38154fda88f52eb7de2288e722fe16f834e885401a790a52c8c21301785d0de417dfdb49d55343df7f17de3de438c4298ec68519dabbec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d473922306ac4babd0395ada4685c53
SHA15739cc3403da9e552649e673d0000851777d7d71
SHA25676a21c4668bb32a945c719757abe6e22403181d6701e5e983820d53e98d0ad6d
SHA51212b8086d9e2c31c21d560c204129c13438dcf2a22f5add9cb02f17c6fe9c47e5f2088a64a8b5f7cab83cdd51c273d54141eab70bd6e847f5cee56b3ee90fb49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce2a95e97897e0adc313d5b0a220bcd
SHA1ed0be628599e8157a0bd20c1a3f7e486089407cc
SHA2569c47bb2d804012c75ab2d5245234221f73feaca89e3039d1b0b4dea16b1fae5e
SHA512df882f7737b8e728e01c5243b8037b7774f48fc5724b90a2b589f2e16004118da59ce857f750bc9ab6e386feffc15bda568e628a41b62e65fb315129309284c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5759edcb9b22d3f78591a7a962b74b77b
SHA17c97c9cbb751bda0e8ac96f00553882819199586
SHA256a8b2a8244c7c35f3aeef912970c4b6784572736ac1f91388264a99fe96613baa
SHA512fb05712a7780d97e5d21dd607060ea579b01d715741eedf74160ed4bb25e93d6f1b28f992d7185b95a8211d9303281c3840d297cb3018690c63dd76dfab29675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590df86ad479e8bb984107893129896ed
SHA14259e83b49f0f642c9fc18c668e22f1a0bad23ad
SHA2568e8245f8580e502238642d99b07b4c4190e50c8ce0aadd6c8fe63b9e93d46819
SHA51201d312c1dffabf73be2b6d287deb414b107ed259e78436b0938e722f189ba8d97281adad2ff3787518ecdf8bd14ce5b00c287777a3b10d1d38b5fb36e0fcea30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca843c29c42e6325b38ca5d2db55cbb3
SHA1067e8d0521cb940e741279c5ff22dc11fd13b1b2
SHA256f2e30772a5af5a8310e843f9216a93be96bb510dcaa5dbd5170f0d4cafe120db
SHA5124c5800633a8e4ac429bfe9955090da29c0acce86323337bc83721e5855bde05d9022799f4c59d763eac495476b5e2ce9b73fd87e3f81fa31b5e5969796fdaa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558dc03616624216b9b2cf6732be9c86c
SHA1957ef9f2f4e17579b9b059027935b3cefde852ad
SHA256d2a8844ed011fadc8f91b07c4fd5c703eebdfd23b497477dbe273306d338dd50
SHA51225fb336dd870b587560cf8adb25d51d2c6e487f9926479553c4a865b2165998bec086c2d20d971f1b3c15442504cd77a853265c6d948790380e42341d64f81d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f56dc51ca3b209a5f58ebba18ca1441d
SHA1659c4a71f90870124d2cfee65912a827cc0db888
SHA256d912659864badb9e5add6d6a158d0aba9580125afefbde7d9d9cf5927dde876c
SHA51272925259a8f6ee5782f4803d6eecaaaca03e8da095456193e21cd6bf136782dd93732e170a271eee42cc04c7914a69dda683356ddfb726a8974f518881983ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564b911d5fb3a008a0710229d07c2912c
SHA1a2c25718276b92649df6ce97860251e539ca534b
SHA2568d3b65650171e85454741a5e95068dd38b186454849298424645bc818700a973
SHA512f0de953b5b5967e9da814fbf1023164f354caa7372603279dca4a26cab61274fe80f070ad3ceb1eb17e89b3da207f5cd48094d73abf095453839a8ca8e997735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c791e6d8aeaa3754a0b08c512e0f06b3
SHA11f9d9785baebb23d7ea483e19f4f55e2dd2d6219
SHA256f8afbed0b472add2889bfbdb7a727b574a2bb7d314797c50dbdf9afb83f72636
SHA5120c74f2f7facf8cef5259a3fc4b7f091af74946a714dad35e17fcdf504f42d6a92f1efa98a055872ba18affb850e3972fb80c840dcb081a69e24a618194c79b6e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a