Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
664aea1944b5d4c3a9eaa0550366bc71_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
664aea1944b5d4c3a9eaa0550366bc71_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
664aea1944b5d4c3a9eaa0550366bc71_JaffaCakes118.html
-
Size
460KB
-
MD5
664aea1944b5d4c3a9eaa0550366bc71
-
SHA1
a1f0d1c2ff1e06d512ee004b99085ae5a293aa2f
-
SHA256
7c4cfc4185a26c3b3f25e69ed307aba4617b4ebf2a218c9cb7b1c74f775195b5
-
SHA512
896c396c7bac38ccbc6144d2d2cea4ce17506298a0b9e91638b763cedb51b8c15fea79beacf939123c4d98f1401326c301a78f4e448537fe9e80d55ff91efe58
-
SSDEEP
6144:S6sMYod+X3oI+Y/sMYod+X3oI+YxZsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X315d+X3N5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E872941-1803-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007a827e315e8a714dd8999449ad3b8518b7c9df57e6f74a515ca339a27bb99690000000000e8000000002000020000000f1d6bd123f8e097fa7f0f97388d4aa18c25ecd621ea5d0072d640ed9fbb72d63200000002c53bff047f1313488b9116f78908f7d1de5b21295c520ca915a4fb1a0e52f4b40000000c0057455b8018fadebe3e4e10b9f0016cf340ae802a41c68a8764b776d473f7be3f40fd5bcf728cb7160bdaf0e2b578a819adfe746ff73e65612291abf78d95c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4012072710acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422520662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\664aea1944b5d4c3a9eaa0550366bc71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3cacdefe7a9ec3256a421b5c3f393c0
SHA1a0821ac5360873d27aeee2f720755761d965de89
SHA256b74c96488ccd29b6b78534540d57df8299b5f6c5a2595922a7cdfa6a2c1ebdad
SHA51288ad290f8d36fdb85ba56cf560d340a6bf186b8a8ba31bfeefc1761f1686ca4afa2474e18ddae199772ce128e00cedebd9ccf9e5bafd26743b8359ad3ddcd996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859c5ced46c8a602d6647d882a08eee6
SHA1affcd329835aa98378ae7b135020eb2e2a5a482a
SHA256dff3a71c1ba65d325af5d897e5c2b5f5102fafa222ef16ee47398754c6d3d6ac
SHA512b4d4401668ad66581b81f468814a478cbc9c9e61584a4b46c5119c24940b0442b7468999e490284cc200c3949eac2c545fb1e56fdbeec21e0738566f5c701843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc37bf71726ed7936b7d4c60abb26dd2
SHA19ef4e677e341e205269b8de0de968ce42c8bbbb3
SHA256c5dcfff8fcf910e1f298f90cfd3ebb4ecc1414076b1d2a29e61fc9af38a90271
SHA512ac41d40d2c5939cca21e820f88d015b1955b79cde033643befb159b16f062a071382d7bbcb61d71e0236f1c58b7dfe7c2a07c1f87805caf4f14f04debb9d182a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c02cd4e7ef1be5d84f06e07fcc1b4e0
SHA1b5b482dfd06d058b39e94009cc2fdc422b72d206
SHA256e18009f0f9f5b7b376c7b5806bbec3404d001b356dfc7383d9808f501d531b24
SHA5126238085658cc50e7b842e769e7ecae81893cb6992af0dc08a9657515f17b3731070656a74325a2fa055d0fd1e03010d08f002c54519895e8ca7e54d780fa6587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3c0a63fce98e5cd72cccee90c9d1608
SHA1f6bf29e5f12cbea2d01edef402b297d246e5c4fe
SHA256e4172700560541cbd32f05a7450da5194048a6f0520c07e85377c198c88dbc7e
SHA512c4b2a59869d6e53205e670b3c8fdd71c1f0343bd803aedf598f75079b99f381340e45d4c8551e242c14be26a75484c08149fc95f51eaa242403b1392689653dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b7b98c989cacaec8bf1c1cb943f6e6c
SHA1233b3c6e2ab90cbbf0111e0ae85530473fa6c1d3
SHA2569d616e37fc8a64ab1b978fce002be61850a29c72f6beb55104c77720688b37f9
SHA51233b169bb1aa8d044f39e4f69d6123ed7ad7c27b8d4ac66b1de917d101fadd73c4080ffb31c67ceddbfeb4379d68b0618fe9975751b445b8fe376d9c9b6e79852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8618e1d4e3bf09494ae06a39bd1d66
SHA17fc6a40057152918219a1f8ef09cd19ece3e1672
SHA25642e80d326aa37894c276b1026c818b0894e5f9b25f34f6997163b5fd7aa3f707
SHA51299ec7637d77d553ec0d0708e8ef6ac8e371a27cfdd4b4d1097689cee7387d8d942a927d2b1576e4efacddfe3f84967d6b94440c0313a2613d76f5a7cd47480f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f44ce1ea60165c9a16c0faf26fbf1558
SHA101c9a34ffbaa059f594d2978db04da4356e842a6
SHA2561574165905ee4cdcd4dbd335a617a94e2956acc51ac51bdd319c9c49e7db362e
SHA5129521cee931e925bb1082dbac63c8d47b2235dcfdaffcbdc51fe87518d70449f0d2fb07c4fde4d8d8a504242a51f335aee07fce9445f14a1b3a1fce1036125387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c58331bfc68d0e171ca24596e2e1e5
SHA124e9e400cb89b491efc2d48c4a0deb175127f2b5
SHA2564fb8efe666aaa8ad8b04fcef29606fd7ac0561e77bed94f49463073e1dd8f358
SHA5123d2ae7bf3b67ba9ea762936b489ae14acda9aeb75a5143c1d59af33e4f33dd1dc8dbe56255939f35fa705ce613f0bac0d39088011a3edd55e1a81fc1c4fd30f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c97b628179a5e9995b917452718cfd5e
SHA18c37837a3197dcf6c225c7961c1e14be915c6961
SHA2566f6737e61dd12b8e337049331bfab63bc87e487f7a518b58ff32fa19919e57a1
SHA5122011b3056b7986cce6d94a5c906470fb9a9ef055d4f721b5b73f242db5ae07021b50c82661918f2b4a181655ca7531fca60ddbcbff8b9be7663a6511725428dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f98523c8156f890da210140af40d211
SHA1a9c368836fbe3bd21e453c44ce3995c66ba6c901
SHA2567ad56c49911a2c106e3f774b255dd09a49d19cef4eb9f67276d12c30a1c1aa84
SHA512e82ce2af424d038b41cab213b966e0c738a6bf4a150deba47af1f29fe01d3dd3f1eda5e20784cce1bf747ee568c942dea26d61c56eb8c7be14a8668ae9f0157d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62655575450a8df12345223352298df
SHA1fb6f7d80f10e4dd883dd17703c10c5fe597b7cff
SHA256c3bdb0df5c92fc02908b4877216ec2b9257842d7228412ead1992db36ee67af1
SHA512ebad0060c19f0a87f6f21aa4d58c5f9f7688254af2f3535ce1300a25d021ee23a92c3b5fc189010e5717bdf0abcb72050a2ef62b33f293b9d43f9f3762f19cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548f5839e6d7d11c5556a6cf8462daed
SHA19909b87a0d84f885244f553ce22badf04fcd7550
SHA256da11ba0433a7e40fe2357ce44c61fd787fd95acaa6711f1ebf700f1d6f7043a5
SHA5122c743831294d09a325b3e2d4b743c5f864aff221d736cb831b16066208b738c528d7ee5fbedd4559078ba95aa937db280ec2bae17a3eb90a95eae774dbfe49e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b82616aac90f1525f6d7540aff569a
SHA15df01af4eba2cd9e02ee0217f4706bbb16961b98
SHA25611bbcb8c5d3a1c39c3a7ac9f2ee6e24bf39dc1be7a76602193d89c306d6f6770
SHA5124cde7ff56edcff9c2b367cb294e0e0fa902ef60f9e98243c63941783e4ac7792a66db44df286ed009d50bd8c1cff83a36294d1c5e36ba86c0abf0edba0e62f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e898a578498464a43f5fc311bc284607
SHA1f123731146a137b80e1aea6b0de5eb6ce4348fb6
SHA256ea7d4085835348485c64aedd609ff62a8ba770f9b2379583a98584b995a54224
SHA512704de09d3c6d1c0db49d76e7751c333e63a9887844d1bcb8a648d5668ed585000b201eb9c4f531ba75aaa9be95da006a5d81c724420cf8cd5ab0e27da2d92cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fbc915b7c60dc9f908c998457a82f6
SHA1a980d4adae6266d38a62786cdc9d726108df8130
SHA256641ca6d39cc45016cb7a28a2cb5365ce6244cd927774039619010a0fbf6f6707
SHA512c0d957d1cce9cca426ef2fda9f860a35651c33fdafda295964e6d591da983a8b61315a0ab205e54fdbe2b0bf67fcf9713ff8c5165a1f2131d5337bd4596b3a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df50638c1fe5aed5972942cd9a111e5
SHA1fc2341e4c55c947cac2d93688b8019f9a3bdf978
SHA2565d021ea13229673969ad48f11f610db90b8cbf8cdc573124e0c4bd7e5d1d8158
SHA512cb2b1d02060258d78085071f70c00df00f1e896109ddab8f6ad53a58aed5942089fc8799df3154cc7b526b1aa2829edd2a1460f0b4e1a4e127af06ccc2482091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cca302a08914934377c025bf3a4463d
SHA12a4cf2f06ce72dc5067346fff83bc8a6687b38eb
SHA256ff4af4deef0b167eef6e5702cce4f4af19731aca8723bb543c16ed353fafabc5
SHA51215ade34b0cc0f920a3add544d88af553385ea17a5c09c68bd0ba114c46b758981554722831cb1f71e1d0153ed67b8c42458c7c1ae9628a0904dad032ec6771cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6a40837270521b45f91a743d2a314b0
SHA141bdbd8cb1134090fd8668ed601b611b5c5b5ff3
SHA256d0334b7bf37a1763ad99ca6bb3770b029dc04b552d181291741e6774ec949301
SHA5125c27a0380b12f6534d6dc5d5eb042da0b3c6499bf5b24fde88a3b8484cd3c978842ed871b6898b66b48a64496d8f667b0e628295e4f907d50e99447da2b26523
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a