Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
749d8984949ac9052a861f83044dedc7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
749d8984949ac9052a861f83044dedc7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
749d8984949ac9052a861f83044dedc7_JaffaCakes118.html
-
Size
24KB
-
MD5
749d8984949ac9052a861f83044dedc7
-
SHA1
5abbb71ea3847c5b1d6431c61142f56be959447e
-
SHA256
5e6ba1ea8fdedfb4c924eea343eea9808da74b445a8871b1de0e18dfc73a26be
-
SHA512
ea019ad3a5728d257f0cdfd4bdac627bd9699dee6894b1fde599ec4dc506eda77f4c119d94c4530e79c1a40588b76cdc114928b92d94259c8bbafa4096bf298b
-
SSDEEP
192:S2PamZR7KU0ifxj8fxHfxRAgfxemPwqF4dAcx1QRxQWdtnY5vSg6pjOjRfxWwLv:bPamZRTR8NEggAwq+xmXwdbLv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{549814A1-1B2A-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e02c2937afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422867277" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d4bc84f2c5bf93102ff792d326ddf44390a2b283145920e55411a67a4bbc0fbd000000000e8000000002000020000000752be7aa63b85744bfcb6abce0704a3de66adb68e2edde598bbcde4b2bb8f9122000000038c120c68539d0f654b9964aa36613679cf354296b9623ee483453a08a23c81c40000000471a0c634100fc005a8de37e84ec8b3ebe09b340d7341446fb9196450011d97b9aaebccdd178348ffa663956aaf535c22c3ba6e1e22c6accce9ff7aeb98f6d15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\749d8984949ac9052a861f83044dedc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562d4a2362833b66a67a8702f5aa9095
SHA131ea0698d33382a121532cdb5bd8e88b4d8d55be
SHA256a7b15b0f94fe8b54abe4eb810993b762b6995c22c8b0f7a37e725e936647857e
SHA512ed45252421bb0a564a2ff6e995e3a3eeb8fd4e33a687e5ceb7afe812cf2950f2c010d546dad7b6611790bf1a16d7ac4d17884297f1e083d5fb7fa18fe694c64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b57c15b26c105d3c95ee47c7511a3e
SHA1028fb91a1fc44607ca6c83a5efc44cfea26d9cb5
SHA2567243346012d2ad545904aeb869782a19bae514ef022c22cd93b0956bf3145504
SHA512ab489c08b4cd360a149513208d7c1085bc46cb57f8a7cdfcb37a6a41898cc5c06bcd326d7fee4c8230165860c2b63aa818d1547f3466c14233744dad555e1961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5934981bbf78fb999ee034d9e42ce00a6
SHA12723b8f7f32d0d2e2ff855aaeb4c2dfb0f764eb7
SHA256c093c566a836ff65169c45568ad23d2316406b015232f71a3d8524f56a22e74e
SHA512224eb6981c63a6ff07f7dbfdb85d452863f27b69e66acac60025657360a3b2d8c5752b05386da0a3b73a88a2299091c7d0d56d84f7e466e72bd478f5322497d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de27ac57f1ac0eba2ccbd8b34a44c47a
SHA1bc1e22f9dbf70e8f678b550a130af5f0cb4eec5b
SHA256c33581aefd45fcd2f5aa2c11a1789e65f83b4c8b23e64ca0e9325238d6b7cc70
SHA5128d94a7c258b33e57fd48b7952ced496b424c13bad0bf993d025ce9dcf5b8970b9aae21f8ce009d7d9d3cbb2a0676cff4b145cd7550acfe965ec5ce2cce683303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbfb75fee567a64586dffbe05d4a2da0
SHA14c1c0fdf7d345dc217b6bb3a6137dff1c35a8c2f
SHA256f5285761f2453655e605ed3507afd1402c392972502c94e4d206923e285966e8
SHA512b396856293b0acc08707ae5a0c27df1f0dcb6926afc2ab7352d0492b778f7f62ae66ece677b62d4c41f716148da7a58726a4ecf960654477b2a9307414e29a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6c2ac7266ba7c951441eb48ce3a74b
SHA154ad4632c58687cb02365a3c738aa30e3e63ade7
SHA256ac0a4762fb134c5ca5328a191a6bec7cca7475c6a959a94d5d35bdd602152d93
SHA51202ed73219c4306b61974c039666b92d0275a8e801413c3d53e4a966e1d0c8f62956a786885b3ac012f9493b23c1c6a2a1e61a5f033dadf30487ade8fe05ce462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b60c1ada2292d469a907d7a9f391da
SHA14478c6bef4203920a53889f7873f51c6dd2084d0
SHA256b4a55862bc23d455873e47488dde7fd1a8bd6408cfd5e7cd0b15c7b25f6c2b52
SHA512619b1065e19aae7fffb29b36075571d496cc68e49eda71e91dfa5579d37dfb1dab5388802ea03f029e0aeeea9f5dbdf42bc8a63a8dda80345ebc66d593e293cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d880e63919155e774b4b895054d6d5bd
SHA1677926fd950547f1c03a7f7b191efa6706e14b26
SHA25636e0567d44291e7033d1ce8c9060d2522801ca99e8e4c7008567f20c1e268a51
SHA512e7734c88398249472dc16df20c6c78ef941f9329388edbb0f803a0be3738938459dc7382f3e95996b559373c9da75a3668625cd9c2940cd5710953f63fe9ca2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b09b69ef813197f39c12b103a8a4450
SHA12b2fbe60400c8de8e99276b38b2d662d0dd654f4
SHA256091f7796c81c4769cb2370ee12487ec99f3ad01c865632b5a2a43a13517a26e7
SHA5127b9e51fd048974ffce4f60350bc085968733bd3eff792e4ebab2c01a4e088a9d1cd600738ab6184dcfeac172f4e1afee3c1b68f0e35dc35d26ea3ed48e277203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de35ea657dfa4d944605b6fb02a292a3
SHA13f34708e9e1ccbdddd5ce33ded14a8be4dbaeabe
SHA256e3abb96291e0246a384fca1952c4e83d37fea63cba1c063515e3cc4629799dc4
SHA512da8e51574e133e94d0bccde3c96052ec66094e9ba5986a8e9366e21de84370a1a6e64b6a0e77774192a720278da3c43de6cda87fc89d527c8349225b2bb338fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d98288f6ea3810633dd9e303bac3e8
SHA136b2148d9620d4bd65c4750b0786b5cca22a6c53
SHA25680abd3e1ad7d02112ae06c50913ffea2fa41cb646571ae901c3f1f406e2436ae
SHA512b70b494a553779064a5fe0f4a3637f518fe19b195faeba4e6fe7e0ba47f543b0ba65ece39595683aba92e9981cfe9b1dd010ba1ee8b6944f361675bbaa454784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5579eaf39fed79c39d7feb9fceb66590e
SHA1bd152954d206465be4a03bd6d0a34e191d29c1a2
SHA256baa0f158ec7d413ec25d02ab1581c7a9c8b837773aab4ac2edccd44515d87b96
SHA51210f046e3454d3aaa045263a862717a35a8bce3e2426ff05b746a8f7e20381b0607e3757ff8ce3eef22b192018ad68d1e20225b378e937103651fd21f20f70f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce49127fce932afd157088ffed88b4ff
SHA1b356dd8738156922f658784882958f1b9d716b33
SHA2563b7970515a4f24516b44c9c89abaec38b5fe6a5c7665e94a80c7e4861425ff15
SHA512b29d1dc472c7d61b55e35e0ad3ea084160f3f92b3d7bee2185770bbfa96d9c8f235cdb6b97e9bf2aceda965fb123d014e46b485e97b80225d7cdfa7dd660554b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534e021d3ffd6128f76aae69c1a597db9
SHA151a459486861512a0824c0c697ba075df46bec39
SHA256c56f367590e8c71403d700e73a58e1556827a07e58b033b356d868548fdb8c19
SHA512eef0f585e0e6ada6eef0c1ce57573a1b08d32c5813665360cf23ad431ac9a240b150e797f8f1843348b47521579ea0f527a5170021496aacd64deb2745bedff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f7ee148e07dfd239fb3f6a057375b3
SHA19bbcfefe6ef5b9dba47bb8627abc17cd53004b43
SHA256211cffb4c8e028cb1cf47cb8c24bbe27c566a23cc7e19773f692444435557663
SHA5120ad5c4843eceb8532415d19bb758b18a77595a997b63a9ca7275de76dca6ac9746b5366db685829e0e781b6c7edbb3b572df412d8562f0b9ae61f2fbf3a676e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515698395167e875ad4109e40c4287bc7
SHA1f315bb417ddad6ff1d31f3358ffc620cd56be7cd
SHA256ba524fca84cd4300667eb6131f35ba4c924b272fb7a3ecfe146ac6bfb25c4773
SHA512d57704cba4869c2e4a4d4709e367f1462f3647ca71e35b062e561d32c0e96f20b5479e8d3db091a6b36b2539f0e511a35a91d547b9a5b42c1238cf1232f9a476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832ed11f71004349a9afaddafeb48752
SHA1c14359850cb773f413c8b2691a2b54d814ef0417
SHA25623e104afc1f58abb91efbecb48e82a31ba584130673318d9f8287f80a5cdb221
SHA512cca2042e8d1db0b4886e307bfd3560c92bd262c495c0c692a4bcfe8fae8a59517b98258987c1d4e922f2bd81bcdf85442fc3b144f94c2efc5fda07f94b419a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1a16e28698876a58049c14accc3409
SHA15e5e1eca843f1da13af81075d8fda56404ea6025
SHA25672e0ee09f5802608adbcc83ddd86c24e6dfa2518113a5126673b9d25e66c3c18
SHA512d72e384538c65e1bf53fcb9458021ef25c8eeb77959e341a442ad1c022f2b3f8f6f46a15b80a5ef395aa73a1b2a321cfff8ef40cb848a9963abe57ffe8289cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748825a1a6c502487777b5fbf9eb33c7
SHA17faf0c91624fb527a0d08d501b8f11d24b8a65d6
SHA25683fe2d0861b1ca606b06b21e5c90024710c2008e39421002c31575874b9d247f
SHA5125de60887c3b5032804c96a5c4c0ded9386c97d8dccd443c3878dd35f6d0d58cbadf02c903768c320451b49a586317ad3a2d52cbf7ff8241655696440f82c2580
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a