Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
72d52aff937fa400763aa6ec267b230d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72d52aff937fa400763aa6ec267b230d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72d52aff937fa400763aa6ec267b230d_JaffaCakes118.html
-
Size
124KB
-
MD5
72d52aff937fa400763aa6ec267b230d
-
SHA1
d0a599791247cb08ca912ce5b18b016f740dc1dc
-
SHA256
480478b10c8403dd16810af265377ccd1218491a60eef7ee8054ca7e4a4cb378
-
SHA512
f54448be32a7b8eaddb5c4f375459015f8ed897411d89ac923b6f7f5d3113ce9a9f512544ae4d52116b9cc80f0fc20ba1e7ec42cd17d3050e45ae60ac5e4b450
-
SSDEEP
1536:SoD3AyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:Ss3AyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0031b79ecfaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9C2F731-1AC2-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422822805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000015ebd5682474ddd0f5ed98f09afd96905c8c299655dc5ed74aa458eadca53b11000000000e80000000020000200000001ebab75c38be8d8edcbb4fb8d4b28c2fb6a40337c514a7129e256bb9f7d8f04120000000292b180700a676c6eb3ea2ff95e899a35065b45483ce846d40eb606ddbf3dbc140000000b0f103a2adbdfe19e20ec00035dde0cbfa851c8814cc759ec4e435efb61f996e09dd87c603379b52796bb033f8d096e4e9eaad0461eaa7f0512303da83324ec3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72d52aff937fa400763aa6ec267b230d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d53e843ebb2d1cefe50195c4bab43f
SHA1f1d85b3e1fcf47e1c117571a552521ad8ac78cc1
SHA256a62d81e8b94f0abc885532d3425e9ea18d7c3d8aa58e088fb71e44abf6e0d975
SHA5126a6e35ca038f039d1bf2f48e23bfe823c4b96e68ecd06371f4cdd0c7a712d0d3a8ac5d1a123f1db5d2c0a23e1d21e6f11cc89c9f826617e3e71c0bbc356d070e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0464166c0b10ef0982b7ed8f7e99eed
SHA17545bcf046135c55d4526deb72b58373847a1ef9
SHA256efb94cb450c66bc5569b646b693678fbfc825e240c2cd6b37ee1a397dabc0600
SHA512176a793823f0422f15b11e0fc528073b0db489b06d4a78190fbdcd00498b163052103219346c0ed136d96139dee488351de43fc9e0a27ab837a638375d685aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59789901ac71454e3dddf7b23a204c06c
SHA15e3bf6edc2d1ed7a0e3b46a3deedd09928fa1c62
SHA256e8ba5f3cf9ab76893a4b4f8a0f620137b7fc250070632e990a1be9c25ff9e1c0
SHA512d338f44638254f5d3a174b3cac63500f1d853fd5edb0383f54a8214b7e2594b50a52552879ae0d2f10561a14ec99df1a402d662e4dd0fc8a3a7d49944a3f073a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155fafd10dc3ed949339917b5ce1fc31
SHA17e4e6fcd0a299830b1a2eebb8ce3b231c348e9a8
SHA2565558242ce3e853f89084df5954c1fa0c10cca1d9abcdccb245bc12ac8111ff3c
SHA5125bb142c266d0103ced3a5a01bcc8f880600881beffd68ca5e6df470450533c0d6e2784e83945b63343c12a7882b8440e51be8823d5241014715b2b1505ea606a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde076fd6fa7050ccbefe95ac6c96c50
SHA138701d8fd1cbce6aa3e571e3830f10c5c4e80345
SHA256beb439d3aba0284e849cf5c817da1f6e882efc2d8f7ecf9c948e93bf4269ae6e
SHA512d48ac8fdc4270d85360711eb6eb2f99e5994124eb808a54e27cdb4a0dc1a5e8ccbcc047e5e47baa778e038db350cbd3488763065ceab9cf2e4f4054149ee07ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c662bdc2571614065315cba145224a6
SHA1286a0ff3d7d355ab3061c403f12918d869476242
SHA256764dd8369714bea8819b7d5428f0d99ddc29a1235af098c4a3a4f2f31e458d24
SHA51269ccf72757bbb3d96ea1843bf2fba7719c7f0d67eba3c89cd3762a572e84987b4d0dd9236396248a3eebc39dd1a1a0b0fa83899f003fee6adc3953cafe067201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325795ef5bbf7e64738ce29b5acd6ac7
SHA1fa67740ea0e067b976251d5a036a78ffeaac98d5
SHA256b42208ed224ecab0923dd2f6a019182d217a0407ca0463c9f9c5dd0a235a72b8
SHA5121870486baa9c4a5dc66afb45acf6ac2bbcb36d65f809a4abe73de0e3824f13d1b99b2c52e4d074de2e76443cb39fe083dd31b73a867c89fcf562937f6de36235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b614f6fe7b19cd63f2510b1c84d078d
SHA1d09fca00558947b15987373af17aa22e4458bb54
SHA25612cbe5efdbb312470bbc0ce6cb98af5819accdeba6810d5e91b886a0623f0e05
SHA512ed9e24ea2e7ea9ae0f883a45968e1518b944f0d00199ef5f000a21ec742dd7f23aa52bc7187f1159cd99836cd200429d7e75befe7be4b7c1184bc65c08741dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba1af57cc0b52d8db57d39e226063f9
SHA1d8ee99368118b2861d838daeb57824544fdda248
SHA256e364c84fbe31183b0cd759847e346f39e54cf83e05de3754e8b7043f48be63f4
SHA51288b4e2f73cfcdc9866c69590ea0decbc3c90da53c6ea29e291b7cc48b173d5d23cc5b4ef87c9096719a0e633feef7e3fc64c5cb3e91ec585498333708545424c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5653bfe7ac2153997034826108ef6627e
SHA16edd57e1ef8d53461324c4edcf479c9e637b5e7b
SHA256fc11a4df4bfa869d8ba89614ea7a12cef4da7ce860df778a4520e49d2173bd4a
SHA51203ebcd7221533235bfc3f21866f2fe96378d9aa4211916af85949e8de6715485c2f5330ce6ddd2acd8bff14f479a5481e7a66168e42b4c7ff31711de4ee9a1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f249f872ed851eaa77632aa1fd9390af
SHA1768d9a03c7ad0e8a50191041c15ae2760603c08f
SHA2566af55112aaba2a7b511afce9800f113093350db30f99c5fffd0323c1f9b71c09
SHA512564715935d7708b6bd7bc8ae3b7efb17f5ff2e25e1a5b89cb48a2b6b7b33999be4589e276f96423eb92f77bf3fdce61809633eb06c8dc3060e8d29872a482fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c5c3b69b5a8340f47ebbc2a2c73c461
SHA1510912a663887b6c36c38f9f6bcabb5c6f1520cf
SHA256282fa28f818208b79bae050290b01884df5cde79a76e990bdbe0fd8c541c55af
SHA5120a9b828df03c27e87b339071850a6250eeb0110ae03fd9c92af3d81393ae2920c8cbe0795e214442be2274c8d0c1b22006fa67367f06065a14a98d823bef118d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa512d05a65e2ab28126cf47b8d1bbbe
SHA199ae55042c34a8eec8f309c5432cce1d24b81460
SHA2565332e7c6b9d83e7d4dddc137e3a444b46fee1171578dbfda8673d583afeff904
SHA51234b1918ffc8ca42be675c7b1c5cfa590e0d45db3aa5dfb59aaf8aa6164150a72392c422b1fcbcd8802442db1dd57567ce799ca5be51e928e7f6e4ba996a45351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552c6465319f408e76ca38b32a46e0713
SHA1fc50e0821efe5117533fa2c2ffec35ca7f3e9906
SHA256306e6c977c598d712f0adbac820b20d2a1929431972580316a0a06db41d94de5
SHA5128f44753eca277b7d8ef846f8f59eb1a037519ce6e34d3c6d03f195b14f751cc9ae484bd5f19f89793fb3756e08dab40e8d6012eb0c88a6fe2789981a7345b508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50daa2af6ab30944cd2522cbca60b6d35
SHA149ede908fbafaaa8f31dd330d3773709b2d5bf33
SHA256b41fd2d617e78c098a5a1d164955527a2820f26822ab6d481fcbf46e85a5571a
SHA5120846890eb24e8e5a3eacb1f21a97abf1b3469a30aca3734a2a5cc1c311379b7a371c9be6f914e66c3160c94c36cc63adde96f1bd11da968b4d29384d1683e249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e275ea2eea2a7e0c6d4f92c14534a434
SHA177901b14d0510846679ff75a69340ccefa73be98
SHA256b91cd0f918223f4d6608e236f180f84919423af7b78370e6c658958ef6ad50ad
SHA5128e075ae46bf2514a5fab7d2cf04d8ab331234a0f28289acbe3d0be1ee63930f1965c746f05e39f340900fabccfe1cc51343998b9dd21f624183e47785aab20aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50090afa6e74462d75274a5f52ecd2ccb
SHA1bb660ca3c2d1797e166306e1a3a17614abcf9bd3
SHA25691fb0f61d0e64d697be9e88d32d78a7a68640b54a00b35c969a9dcfebb10b018
SHA512452a80281c1c03d4b4b07b8ac039d1766adecaf7cf54f216bf6d797a20eb9ccacf2bb760ebb0472827bd8314a9a51bf4870e0cf1edf9bd057f544ce253260ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56728a023eca5849e1df50c9f2ed7e1d6
SHA1ea4836a9d6dff23147f3104e54105817c063f8fc
SHA2563534e823f5695742d4b5f281d5d3fae2842ee8fa23eafd524ee144b875db9944
SHA512424c96e0bc860bdbafcc818356838116a755bd110252960013a15194498028c32d36fb23af4e60d751a1dabaa2d8622c475feb9e0d41de3eaa239a0dad4ccf08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71f72e39dac50f51eeb119065411536
SHA1890586caa98c818115dccfe66b8f8fd85f9f09f3
SHA256dd31fc0a249fffab754e7881e1acefabb8fd6a804dbae3fd20762ec652840888
SHA5121bd7454adb5620c063a8546f443bdf0005ba492957dbb5d573d2a3d30dd50d98b29d716bf8e9be15c73c298a107ee5a858b0fc792ed3507d8183e6ae44cac3e8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a