Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
7420639d6e96fdcf48f6990d88cd7736_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7420639d6e96fdcf48f6990d88cd7736_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7420639d6e96fdcf48f6990d88cd7736_JaffaCakes118.html
-
Size
44KB
-
MD5
7420639d6e96fdcf48f6990d88cd7736
-
SHA1
4fb64dd1d05979ffaebd6a79eb697ae205e62224
-
SHA256
d9f9fdb73b2435445d48dea0359670baa0890f88c3ba1ae002012452ba7aa8ab
-
SHA512
a6642a51ba62ad12c38f0dddbea94af98d0c62e88ebca07b43b95f09153413e4b2be3b5320ed0bb15ac8f2835f01c43dd419a104aee991a04c8adbf0a9320532
-
SSDEEP
768:/wKlNct9NVjF02I/JpoJVe71xTqbCF0eu9ikzM2eCEf7kzhXjAJVOfHAfgCplLyc:/wKlNct9NVjF0l/kJcRx+bCF0eu9ikz4
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a24acaff6dd64b26b945cbf35e2e666234fccf6d7b51ceb6aa1c7bd4df648a01000000000e80000000020000200000009d39716f854b8534f9e66e0e74fdf9e383bde0cb3005df99ef3efc798482f10620000000ffaacf043331df397adb1020ac229561528a11fea1a9a7f4bdedcac7f40712824000000037642a6a082f792d2035a946a6b70bb5e7351492611c8affaec3df0c18cf7759ca60dfd73a8ad245d887fa13d5938971094e113fdcfc9de06aba9b74f695a1fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7D3AFC1-1B0B-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422854156" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7001b19d18afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28 PID 1548 wrote to memory of 2128 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7420639d6e96fdcf48f6990d88cd7736_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513d1bdfc78944b13e6e40ffd026737f
SHA190ca9abf8d256da0b71438a23be7beecafdfa11c
SHA25698339dee1fd0bd0dc55db7e44e5dc490f0ec93fe7a914c9f63d5a17b15efc20c
SHA512395e7ac728a985cb7b445dc34c7b77b2aea731dba25fd385cfa2501665f492a898417060227b52b2c335a924fb1ddd46b79f8efc1d30e3e5cac7e92ccaaa4c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528547606635e769f5e5f40e6ca2d02f8
SHA184607452fe3ff13dc5cf4db2602fd9354f1b6945
SHA256e289f4a7aa7e8120509ecd0a9113faa9678a04ed793caaa5d00e0c4b5d6700f7
SHA512351ca11ca6712551aa48031dd76d623c66a6cc164600ee8736971cdd7c616133591da2bc0a57dfa9131a9de0c95a46ca3e748f81f2757c18eea1f263e58942c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc25806391991acec03424cd14e77a3
SHA1f899e0559138de64fc2175afe64fffb7868a9899
SHA25615de7127ec42cf5b97b57cf17a9eb5e1a3f101907ee5672a32ec297e1f284530
SHA51201cd04faa1188fddfa100fdcaded600a729146dfcc303e79e4dfef43f225c0539c4ed344a379f2f45441f2de3eca2847f0d107065f28891a657e0b36241091a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57103ae2bf7e2abc8efdde24acf25f628
SHA1ee27edbb9cef0c2cb7c55dc95bc6ecded8b16260
SHA25646055530cbd155a83456056c718815a1a24c60e7c5df35bf18bd5a5c4cd75409
SHA512e26ee114646d61e031f104d8855b5487ee3e02d5029bdb7bd58c6acb7909573a413c9367e766a4a709a0eb8ef5a702177d582d12f816a5e973e3f34e11d58557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0080229629a14ba257ced4ef1693fbb
SHA1f6a5b6f9aecde1353f8502566c84a66dbaab34f0
SHA25641d601749e36491bdb45f0af17eca8d093b36a761d8af60d6d5d6b05a3148598
SHA5127351c9e75997f8c2a2eb6c8d1a767340129a2de37ac3d31fb14141cf11012c0ec36608a48736835e0d93a41e74de92550426343d0620b8f9b9e73244c9085cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5fb6b4ac472c483630ccb740ffd85b
SHA14237801c8b1ffa855abf0632c6f0e49395783dcc
SHA256f66b405833d9495a987df5bad50f3ca11db6bbeb0835ba701e589b8d7a8e365c
SHA51264581a9b0ecfb7937c5c25a22f5a5ea81f88e573a047b0aaf07dbf127e3971fffbd329fb07b75e7b7e384b1f960222dfad8fb5ecdd026c06da8cad0a91cc77a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0f6d7712e6c35b8cd319767347f090
SHA12cf8e225e6fc98f954bd6ddfc0119bf675d10e87
SHA256f1269d1c6093a3921bcedcdd492dacee1df38f2d3b7c8c44f3d34b09875577fe
SHA512ca0832d9b2390d42bd6e9479c693932c707b84b2bc65254d81f37cdedd535aed614d73d58a3e99e19e9e6302c6ac509b327f5b40977c38d8f7b925fb82a491b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55462a7a44c8f734887b61d9c4a58f3db
SHA1bafa83b616bd69598f720c45e835cb84b8c93911
SHA256b1770423c47cfd166b69e25939a618093d9d9666f01ae51c771a0264548ae59d
SHA512386e75ff6a1c3022259e4a31a208b72c17ee9a7908c2c4751a8a486ff288c47b61d5b129c795ab812a2086beacb31c02c2cf55681d2af2fe9d1ab0d9fc18b955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dcacfda2105674eac2a76320a67e7a7
SHA1d105ab42d49ce220c73d38bedb923c8ca2fc27d0
SHA256d83faf0e1bd8c29588ff9af395b5fd2e961fc57245c876bb8dcbd22a437cc8a1
SHA512fa1280c10fee82b76a1f43d332c3f48cf1bb9ea721cef674bbcf40968307bf15994a11be3f707d9e408f8a906662eca01e533bcd751d409fc52be8d53b24d271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57256067933d9bc5b8c181ec06af7b255
SHA146ba3179c630d1d04b76e44a4d5726ca95a40129
SHA256e911f1d2acd6ba6737ce2c4ea632ca5e4a6954d5c1db09e41f9a9bf7df43d755
SHA5123e431ba19d8f3c6121883ec6b0ae8b480dbd84d885f05ae3b4bf493e8a57b0ddd31fff42b94dfdda33fe01bfb82d21b2d72ba7fa71100b809afa30601340ee66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389b183e42009e6f233a319977c5f71d
SHA186bc9e1d567f1dc14858547e30d72fd5a55260fa
SHA2568f98027f84a7c5fc0304ddb5b0b968db38f6c0a7250eaa59ba1c30715b473765
SHA5127822d34d99df60e5f584fbc0ce5a7be3ca05e299b0b917ed76c7e4738720903ec18ed16a2fcf5041c952285ce1a1289046a5b6d33df9efa534cec2a7771c08bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed394275f3e9e4f7ed7ee1fb0a20577
SHA12866dd57daa5cd0905cc74be51a9f61e43cf41b8
SHA256f184b98caaee9f5623f1abe6ae4efdd21eb5b8ada66192869870a54d0e47055d
SHA512a47d0872a3891ddd2e6ee9f76dc3bf18229ac9cd3dd313709c40a22ecce983ac3cedab525c07ef1a103b7415d646513bb7625fd7950feab229fe912bfa6ee67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe3365992266d1a7b1266c047e4d02ab
SHA128b45b6551668e3bc745415c7d6a3a2be39968ca
SHA256930db7e96282739b2da322a1bc2ad26e7743a0db0f9f72c1e006e86f891ff950
SHA512c8255de73d6781439ba84fc0c88ffba7af31a98c4aac70bb67aaa775698b9ac7857838c360e5331b6b06514798c0254b6c90a97533cca397bb1373eac903b229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7858760b0a911e33b8045e794357f42
SHA1f3dcb8d1f4fc84275f9db7e2bd5040066ff00678
SHA256cda1900fe96915b5c71b9f4641dca2a325cdcc4a0bbe7d3c4486d2bc8c88078b
SHA512faf94dac5139a713a3f4fc91688ad9a2111a78c978809bf3c87700ee6fb097fc2b9e94802340b872bac6d59774bf25aa76d004c0ae788caf4985f49914e6b17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db373fe13f2c34e6252ef04d271785d
SHA1412f136f4260b70f807fcda015d48eea6179c2af
SHA256eee40be19e2ef297ecf60ffbcf701663ba7d12ba758c8924e3d855ac476fe837
SHA512cd09df7204d0f779488e505ce7f5b9ce9f19945d3a0756c455fb4c13672b6bdce73c555ae2a02f929e21d83efc6944f75b588673dacedbf2230d4bf07df62e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54868b43ee81fa2cefe8afba832ffd814
SHA14c22f132dcd730d6816addf4334a2c38b285d8a3
SHA2561bef6e342df0cc67b21ef77d5c271a5a18bb2bc20d8aa155735e91bb3d485279
SHA512fbb2d145e5c51283f92f7d8f7b68dbaf1ec00886a795ded6555f8107c2cd6e29268d6735469e8991d27cbdac3be40337a1ec44a4a21c860a76945d845e6b2ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb2b58b11e8b250b6433fe4cb96792de
SHA11df1b572902b1103ce1ee12d9963ca26ab18b40d
SHA2569b3520795e861664aebfdfddd8a61c675473abc54649d45e1c671780951e3d8d
SHA5129ba931aea52163ebf74af7a64f21adaa5647584d811692fe54f20529db6d23660f24e176a53d5fc42fcde65887d38c83fbd36abe4b716498c792366d3e458f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc35652c436913782d8d994ca46f3e5f
SHA14bd118b8115736d12a410b9036ab1ca899ab2e8e
SHA25699d88717e77b8389b2b4d1a39f2604823f5f7121a5c7ff3a201a982c6a6eb088
SHA5123b6eb0c41147c50d24f3885ae08c79df35322bb66b8533666fde2ad9750da82fb072fafa1159150fa7ab89694e4256e84841592e4b0b325e31d26a7847d07a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce523a86f99f158ae020568e8650dca
SHA17f23b1fe5cd7e0749ed683b62072ab1f06f22022
SHA256cf48fd476110f6cda80150792e4cabffe69c16045085c561f840ce11db136379
SHA5125afd3a3c19a29ba5225d7cd7e9c777e757683cf34fb9d02ac535a9e530063a2eaa85f6c907f076804cefda93d2ee9eaafae42dd13dcb36a075ee68bd630ada1a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a