Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
7471d4271be0c8379db508e5d0fb0638_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7471d4271be0c8379db508e5d0fb0638_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7471d4271be0c8379db508e5d0fb0638_JaffaCakes118.html
-
Size
10KB
-
MD5
7471d4271be0c8379db508e5d0fb0638
-
SHA1
9ef2340700d77c8cacc4611df0772296a81fe054
-
SHA256
056cee00c668207f5651810b97e34cc25a683e5e1046de16f7d09ae6b7dc4560
-
SHA512
e79aa73be5eab98b9ae093269e7225a2d195074d95f4eb8bf530f4581f021cc9389827f8d4b700a06033d07641520b7c53a49976c4423951e977f7d3b3184939
-
SSDEEP
192:2aDDAsh5l1sY21EzShVMwwBLE523wY5NYeTcs5dlQWRsjWeUWS:9DDAsh5l21EzSh+wwBLEs5daWR+S
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC127AD1-1B1F-11EF-A649-4E87F544447C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422862752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008588b50305bd942640e854442eca4ebc456a3dd30042be4c2ed1250dd1ac4047000000000e800000000200002000000074307473102312b3541a7039cb23d38f9890d8cc1d8256c09cc0fb6fb10e1fb4200000003225d346cfd4015e2e79010c6143b96d7a0a8ec1a4c8ad837d11ff66b088d83a400000003a74f45f33a8b9c2a04924fbe2b30c9202379aa66f032eae78d9987bc4f29c8572cd22e8f5b5728f2949068bb3bf820616d3ae535d2b91ac25b94be4f518eea2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a7e9a02cafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7471d4271be0c8379db508e5d0fb0638_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221c2183294fa74070cb308c0440f8ac
SHA14b4881a719575a996a467e5d284b005049ead16d
SHA25608a672d7d9b73e7971b4a24f4835a434e0590c4d57f27dc59d261ad1e717e977
SHA512e46a96b5732380e1e11c0905fbcd2babcca4aa92e9916de0b7433b914b3c421dde348640a7db2ecab3e1d8d8c86a1c2efeb5c8c5923ae84a2db664fad3d9f322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c71c40faff022e656e6bde75d69adf
SHA1c3fafcddba016be707eeafd0baad0ac1698cc9a8
SHA256bd9d466712b9b01324fec74b6cb9b4fc814c931e0c9d0e43a9629443025f2e23
SHA51254333fb00fb6b408a180d28756b6ee75f4ccc98f9c0a6bac80fe77626a9a27ae5e969b5ea29f384caab0d81b290894cac28616d723ad782e85f4551823fbaafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0d2a0716d430da12d66a01445fc365
SHA1c345e0c30896ad216c284fb782ee489d5df86409
SHA256a33be44ed80ecaa90eb05dc99fa0633b22535d64faccf44aec5725398718ef18
SHA51265e66da4faf404af6424d4dcafccfb228b77c90716ad3344b6e9c90521d95c74d427d7f5edb9ada6af162691c75b98ee8db0b8a1c9e86fd0bcbe2583b368c9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522445587ff2bbcacbfac7f5eba4d357e
SHA16c90148334307cb860c7999e5cd69e382e0bbecd
SHA256b4f3da5cbcd4ed8863da42e8c6f819a56037719164d4d7bf2f371278e92e18cd
SHA51284e680b6ff270aa81a58df17df8c99d09e1ba41eb43e2c4ac284ff6e969b3ddef4a5adca3b0b9988800aad49f452b3d015516bca713dfee59908efc7ea06bc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7b58787d14db35ebf6386d70d464f6
SHA1cd8d4f341d5bdb89b1ecf7efd789764388ea50e6
SHA256ff95fb70186c672b3e23df448f0f8032850252ba5b9123985daa1ca345865eda
SHA512b3ef18bd11154d71d9f1bc89affc0465b1f8383d4080de1642daeda22e900e8ceb7176d1174c42f374fb2f861ff758dc42d452f026eec690d9d167d98c587376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04b9d294e63930e868d1deb8b193946
SHA11ddf9c8ab8f7682c2ddbd698fd1209478d7c2141
SHA25618c71797d2347f74c7dfacf67e032824d2eff2a00d558fe6a8bebc459b581d4b
SHA51271c0335d502c57b87d1fbfef45e69d4eb8e839935b1442672109d3bd7945da8a6aece96a506354c25664100e17b75368ba59bc7bf63e608176eeea53246a11f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56da396874ffc7345ebc6c21badddcb17
SHA1d0f36710e6a61d8a8cacfa5aaaaf3005be610fc8
SHA2560c459ed2da79a45ec606cb35f228c5a83095395acdf501736c34ea7a11bdf1bf
SHA5128d66b279f6b21a521e143b5ef223b401f9c19be3c2af6afc62eb3507798c52013447e4eb8915c16506643f85e6dce408d1c94ec8b52c555073a77f1ffcdbb157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b89f148bb2861e8fbdccde1c6b37d5
SHA15878fa1d63ae372c6c036e9c67e3a3eea8907dbf
SHA256abce510e72c1d780bd9084124ccee9bdb3c736ab866aa1835bc0766b8c9b919a
SHA5123c561a9f0f62182b3ab2f032573a827c1dfe450f7fe8985346aaaff53be83d38eb9eb26e312523221f8a3914889a63eb7748bf021272ceb82b61d11f10a8ef31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59adc984ecaa89fa40f02ae28aefce429
SHA12e1b8295a9c594d204ebe082e3c177bf30b27da3
SHA256e9aea2a8c2eb6123a93b45ca799215bba2d860c5b6830d57794f59cb8481ecd6
SHA5121b4f9fa37af674b56cfcc6c33ac695b279719811a20b95089315e80c7f2f21f715134f6a88d4c39a6cc8d34a5423dd643a29a657c8b4b996d20d996d8cc39e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571cbeeeb842da0c61d5952e085afc9ce
SHA1703df3b1f6633bde5ae0e89413145f86fc529519
SHA256158e8ae20e96969e9e8cba3d787ea2bfb528060fa4d212a7baedde932477d436
SHA51203dd5e201e1763b6062d660b6b9472bbe2bda8b88c4026f7a542b398a3472e3262b6502e3001df08aa825e4da1859cad3647e6350eda950a5bfd5010536ad04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03d568feceec852b41592aff34d6364
SHA1c32d0498f3499a41a85b79e7b5b33e8eacf7d6f9
SHA256006257db53081b1656616a3e1532436bb62bebb0c845a5718747199e4a7d1952
SHA5125c68e6703bc1d1433a713e4d0fb480715a6a76610336ceb2cdf6d363f67c14a4c0e5c6651b43f43071e47422251b4285e38a549f4b41affae0c124bbd5d24df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552286b171bf623b18ca640e04654fe1
SHA12c73c7b63605f9d3ff9eb2cb2bfeacaf520513da
SHA256e97004e9f07e2823f6e349408a80cabe48a620bbdcbedef77101e8a6eba3ab20
SHA5129c5c1f19b633dc2c24f2dd59c7548c2bc35ed8b68366993d207a40d4a8cde3d95d96bb1bc5514c0fca22bf72a1b3bdb48b54142d4d44088955d950dddea77065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e90c3c9819ebf5def6de893a70b6540
SHA1090e263022950c2b7e08a82c308dae46fefb448f
SHA256680c9c1055e8543d2d2c9a9e3845f0109e9ac817f7612d2d57a871670b6789be
SHA512e83394819d1f2f37733ab560e3b158392f5ee0fa464f4d8d6fe1a9e90e48a535944d04f71efec12034ad97abeed0157ee78bc3bd50211b51b369a6d0df04971f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57676ac8978c82d43619a67515129e7a7
SHA16b72af8568a7c5ea8a0bd31a1bac9999e7ac9211
SHA2566396e63a546a8ca30621dc19e63def9dca8d1714ddfa9074f794991e811083b7
SHA51240a9ce99f2f571f5650c4ac1df0ddfdc0169257a350a4f778da373eb234417473de5cea8a81b11ff9dbcce0fc6be33223fc6ef39c23b5f3a5f65e3fd185b4793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3a4043a2223c2b98ed1fdb6f246a7d
SHA1d6adb90ee6cc112bfae46b9ab14ec8510caa13e1
SHA25602899051897392008cc75f7019813f3eed2af9b2c01d331f8421fd3c749174d4
SHA512e5a89a82a7a5fecaac93dc909e3ce6a56b1ca29a246db4e970c5ce1442dce0dc3291c10babf36f73c854ed27f4c4fc91db1ac053ae7d2034465c28a500ca15c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d932e9b4f8083cad6ee8620ee5f6a434
SHA15d762870f77362e26e71972f8e505f90272c1ac0
SHA256858bc3fb86749aca068770c86700216c0b201a9154e0ad2f7a996dc5cab6fbb7
SHA5125a7d9c283cf4d085b2e7868e7e39494c67cb3d6465ed13769ca3a336908f4297dcd67c97188370164c741ed4388a49f16754f1edf9d3486581554e478421a283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557db2cc63fb7a42862995f2e3296f9a9
SHA18a76a41da197d779706eaedea687b7a10b4744df
SHA256d3e92fc56d52706bd2bb1ead7c3a27072342578a8ffbc8008bbc04e137ed33f0
SHA5127be26070f7ef564e516ac7dc43705f4c08f60f05f1c9a2021c70529587a522b1192b735f63f2e7f8ab7f6fd02f3cc9005466f1b2e626f3113b690182b320e1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e41c2aa94b24ed2d56a15c01c3fc64d2
SHA1d416164d205ea676f1528a9bd990bd5a7a7d4d6c
SHA256f89a324c4580a95d742b40b26b02d192043dd39877f4a29ec12f50ee2650feff
SHA512bbdc8af9c29a2dae9fdc8670f3bb667dff152220cf7bfe0cddcb82de2e84e62c49b30f7b41f6d6cb30b46733bb4144abad7362dfd954970e553a10cb20b88ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945e7150766045a2ba9ad00ee858bb2c
SHA1e3aa1a122592b702e60845405c1d08d0e719481b
SHA256e23355a5d46fc4ecd14287febc5475f3fa782f6bd13a2ccbbcc75d99d63f30dc
SHA51274d511fc7bfeb4326304aab74e644b251947893c3424a257d8adb14bc6450382f0939d4c9d5e2448788caf702ad5614a48bfc30d96ccfe4eb5fd1419b74cbd5b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a