Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
7389c4edcb547af8eedeec6cd5248461_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7389c4edcb547af8eedeec6cd5248461_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7389c4edcb547af8eedeec6cd5248461_JaffaCakes118.html
-
Size
4KB
-
MD5
7389c4edcb547af8eedeec6cd5248461
-
SHA1
fe152d9ea3a1a13de32cc4ff5c2613f687776da2
-
SHA256
20d51ffa8673e2171b6bc93cd92a30572d8e839c3b362ee59016d53824a32a49
-
SHA512
87b0a4bad327d242c26607514225b036b7240c9a82709e59cceb2c6ea9a4e832f977ca8331a939d844853bc38b7cbc93c29c01c13572fa2f9f2786835a2e3cc6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAtacd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f7817ff7aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422839933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AADED371-1AEA-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cd3ea46396ea4eb59f10c02a62aad5c1d9419eabca7f9b7c33e38b7219e2e879000000000e800000000200002000000091949ca4a2f9ee04b3dc7291211d7c6a916df698334fe479bf2de546b1be5ff520000000dea00338f833d46ce72504594fcbfc4eee13889d5e1f4bda24cec0ca990bedf540000000ba2a1268da2659521f189a1e1389fe02d4e1b606d8d936426758cffcb15a024da865f7c47c7f92ae8bdd4e047c9f30689fd3b794255629ea6848b5c80f47193f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1008 iexplore.exe 1008 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7389c4edcb547af8eedeec6cd5248461_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596c34f3962f16d6ac7fde978f59c6850
SHA19bb79794aae5ad2b76540c6d30770b88fdf8ff8b
SHA2569860c9c7b85855fb43cc9e1319bacba2927c939df0ac1cb11e065cec36c6a5cb
SHA512da22fce3a0ff241eb59e0c8c2c24f10a202345f8bd9159468e5dc56043940f34b44d9fa420fc74aad33cf3186971f26eeab38d6417ce6c41ab5e6c4a557eeb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53226ed325c930481d449588b95f5d37b
SHA1fc326606dadfe97dc35b0608efc69e4c4a1db06d
SHA256996869df442cdc6e56ca3ea24cf089d737b71f9c6ad8d797d1890b3e8a3c76cd
SHA5128ed46900f302a8d1274a1ba7764528556089da03ea0899e6c8f8fbbf255a899f6cc8722feb42f4251d075d06c7a26ad97f5e2d9ad9364d4104e67ca9d6e93796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4d03a946b8e33af4f370cedd6af74e
SHA12d593b672aafaed9b472b2eaef205a5d148de7d1
SHA256ba54579be8e2570a4f8700b36048a40daf81fd4444e5359df39de5b2265b0d01
SHA512341b966ba6f86fbc80bb5024e5ad6af5f2a62e7248f6e087fcda4bafbafa5483e2f4f57d2c4f3cefcf76bb1094d074c4e8ccf61365edf816e68080ef9673e04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a1adc0e1fb7ab92c26cfd8c03bd268
SHA132c40badb598510b2c51ade86f4c6ed0bf6d656b
SHA256ca48c4761fc3535d986cb80502e1c27c39ed7365a8060d474113e4fd5b52ef8b
SHA512f01cba607ddc7e04dc805c1a75955a5d8ff5918bd97493a2bbd304e5005b9a5a811a4617158fada58d421988f6d84e2a81bdb264657b22ccec0cf47c4a6ad0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be58da9b3f7a560485f6f076f444d3af
SHA1f43aa78ed7173da9d6f9fe64cd1fbbf564b75e7e
SHA25607550df248da95ca1a44975dee3e54b90fdc57db05620d9f2532755b564ef4e0
SHA51299c7cfae0f7d7d4751f47244891664ec3cbf4a7804a570d2dc29d2c4f2ba3fc232133ed6b02809f72c6403679d4b8b6b306d3c571886f2b9b72c2f434c377199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08e425003806694828a8d4928c3b53d
SHA15aaa23d5842f566540604f56f0a3e9b232ab6644
SHA25674883f5f7cdb887687c08072434e569e729287671b33ca7d237e3e7f5c3897e9
SHA5125a5746ec5a75364039d1c3377dc8e5732bb501b7fe00775cc5b9f66ebf3c15bdc225509918e82bfd9958045fce918c4d8c5bc49fffc14fa1fc65444cd53b3928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3205ffc369097e0ce659318a6f9c1af
SHA1f41ce0b475849dbf52d2e29b4ef746ebd4de4466
SHA2564bb16db984a11368e0eb0785e53e882d8b37f4caaa7d88f14feb09b824f9a010
SHA5121d21189ceaa5e244ba2a2e0e20bef59c4e4beb01b472bd8f844de4d9f358a4ae9237776bf6e54d84909353d17aa8c3e88148040504514e1d6f5f127b38127fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d007fb584d7feda3aa3cb4e0a09be9f6
SHA19722c01711e4e4d59f2a3c2f57fd8961dfb3f2cd
SHA256da49055d80d6b91c31d25fc66f4ef44875b36d1960a5393166c5b61ca2af87e6
SHA5128529ee2533d1540eedf53f4e2566f3471dd886b29fe00c536910be9b0656a2617b736cf7927aee6135a276b9f9fd0806c00a2d21ac55f37ce6810060dc158f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55606f24424ecab3c29bd9113b34486ec
SHA1c36956fa3f149938cb758739ff4aabcf31270c9a
SHA25622a8c791264c10da86eedb9c8cddd416a664e14afa0a787a609a3a5f5395ebf7
SHA5126a63ebdc7c99e85025603edaea4b11e366d2d7a2e689c62d08b7763e56450ffc6011fa903a5b93e913c3be99976e5c3493f4f185cf44372ff23c3593a81a6756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2892c3abbc74b3b9c0df71c0ce745bc
SHA1e4ff3881c142ec3d7e90e6ce25ee56453125e62b
SHA256fd33690132f52a8326a73ff4c9394beba93d02116606b66cca8758bf5b6a1692
SHA512a0bed6b7a7c0f12ff929893e42990e6742c876e8a1dc615dd107ed43c1a09aefa55cbea5fdb293ae5171fd77c18f973c87bfe09b0ff0672ffaad2449ae35dfe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0d2b71e62e186da442ef8a8613dee90
SHA199fc4a31dc52cfc791014c2753037f2e316bda8f
SHA256303054bcc7276309cf0e7c79345a8f3124329d7b2220fbdf7bd4fb126551d6bb
SHA512dc468a2090f71df8811c9f8fd2a145a5b664b6d0a5fa84705f74cc3ef691c539d247e99fef49baf8274421e8253c41273dd96e118b8393d068fb9ff1813db5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9a4d249d3e5d92364e709131ef8693
SHA1d196dcd86ab7144435cfe5834c3b794efb3734c2
SHA256afedec966331da448181d329a77f3c33c6a38bdd7199cf4eae9566c8f920af4c
SHA512e7787dc57c6b5825fcdeb961f087e936fd5798d3dbdfd7c2feda3342e6e9243570df6b8a44284d7940f0385651f12bdc68bb361e53d9ded68f1dd3bf5eced38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fe991c8f53134c7151ac99a5cab68b
SHA1b290b80df0cecbd466b7671adb7bd88befe8c595
SHA256f8973ec4dd0d7987384608126f1b0e510908e30dd47d4b3586af0c5d2a169b2a
SHA512518735c5a0624809186333146bef11b28f729fbfdc477033924c4ba921326eda547fc9ebc440d1160b700df4c2c586b420bf48f7c2c36602bc60186276bc5e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a25cffd98150d8ff0949e5f84ac494
SHA1ef7063dd7921cf9861e7a536a22fcea17ef23293
SHA2561167f20f43126cef71cb09d07afa955913a70b17c29e9b3fbd881d1251844df4
SHA512cbe12ad1710fa3368d3727daee6825655821f807c7e18339ed8d1b8d0f1aecf929f7120e74cc03a9227f6efc2cfd7c0be317b9b99d8684dc4d1e17a1517fe047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ac9d9b65a7b89dd3948f1c0f6d5ee0d
SHA11e03342a7835d87ca2f734dfaf61f319593d3207
SHA256c6279af72f9a07de15ca2ead21b7733255639ae4c51ed7a1e6d7217896e3c741
SHA512fb0684d4c904a061860979a8595978e241f9cb92b60e7220957fa81fcb8f5806db4d7676844735e919141b3abc13e956e9ee020645a0a9d9e42a184df56dcd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5678b6c5bb382fce4a3610b8fe2124e4e
SHA143f54e217e16c05d5f1c49a4c6857565df9fd5bb
SHA256a3c407f95978d5edb95fbacd8780c238ca7ec2b7ee17de51d6c399d1d4991c43
SHA512b3d2843080fff5f712eafa1f47014dfb627d0e7cc98ecfa5bf336420ea7db7d0546e6558cb71b308668735c090e656add6d4610043483a95ab0bc79c664089c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588fe589d3a883de6e74308241757fc8a
SHA1747917b0950a9b45913c17ebc773e1fb74134955
SHA256584993988c5d6b9fb58302440b545e43164552afeb55c1b5c25000ca19dc614a
SHA512f96e74af420a36f0de97cf025b708d14f47650066507bd13d8af6cf6e853ba836d342d11c03d8153662774d9c4bcb6cbe5334fd986d9ef9f0d7f4bed849df177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f71830c37b2da5fecedb507daff3f450
SHA1d2857d2169b843f9fd44f507ac6a672403941afd
SHA256c2920ecd66fcc6a7221c4bbace26e56f778d72204a4f01c0d40cd86e172535d7
SHA5120b5649816f0841fe49c2466a848b0dd7fcdc2a2aa69888131d78e1c7b64356c4489b5946698e532e1db1d3ef9acc813e24ac392e95979b8276b69f07346b328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594381680a0b5474b9e9f0e2676007c5c
SHA12b00b19512b89d01043f4f7c5cb2f5702bfdc663
SHA256ea6c5b9fab6ff92e90544ae7bf4d717db5a4fb200ba3fd4da42ebbb9110a18bd
SHA5120d93374dcc88691b6784f35fa2a0191002e7a0ce2dbd414084ce8502d145f3b169e3ddd6c9eec4750144293816749a6d7b3f45c9356ba36e37a21cc8f50ee9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59111427dd4f0f1af8295f4c5f6b49b03
SHA19e653e540ef149b2565fd0601d65b6b33a18fe34
SHA256f92f99ed9a787908ecbf1a09cc6103824a7d352bf5d6bba827cde1b1fe5f9ab7
SHA512afffe2dda88c3e3f29250e46082df85194fcc73740c7539d662dd970db6ccfc53edc794e1b6a6324dbf7023f4602edcf75d90e929fe3514accfb9b7477d1f527
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a