Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
76526ac3d7477e7a81c85140359212d1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76526ac3d7477e7a81c85140359212d1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76526ac3d7477e7a81c85140359212d1_JaffaCakes118.html
-
Size
72KB
-
MD5
76526ac3d7477e7a81c85140359212d1
-
SHA1
95081bfc6433003c728c18e1619802d0513f66c1
-
SHA256
94ccfd91f24c5e358c3627c420eebc022a0d51513f8c99918267dc9befa5f558
-
SHA512
292fb56683275ce9a81b8fcc69ca90de651b5c1513ff86d633fe14446dc1b78494a4d6ef1600ca21c47dc988542f12b715b196affcea61f0979a69cd48b9d733
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sI6dtqt2MsuoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3fTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a1e52d96afda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000061136705ec46ce8693de6087d1a4ff7a55e2034efdae897bcaa374e9db7fda1000000000e8000000002000020000000289adebdcfc3ab749fcaafc2360b02d16290cb65d305291362651f203da92adf20000000ad89fbab37fa023c5511411616be60b8ee24a97166edb6f1cde112824b0cf4ca400000006e55c74c91af1732f21865853a78b2a263013fb7460d74cb2e0e92a3f7ab1a97cb60887b06d58f2ff5c2c8ae1b3ccb4935a1497b20aaea9f3d907f3c71a41b61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422908087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{593F87E1-1B89-11EF-B02E-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76526ac3d7477e7a81c85140359212d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0ee6e19429a2aa5d93d452708bdab02
SHA10f207257e47f866ab9e9b2e52f458593cfc451e4
SHA256638473f7b7e311cdea578b2ad7a50d9adac1dd59ebf29a941723a390da04fe97
SHA512519da2030c0f7f10f295597c9798123ba89312a377c47513ac2c8ec024c26cd3a6bd4c733ed298cb75ab35a6edc81fb73fee8688245358c9c433dffd24f80a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5362a2f79e4ef713ec656c1780f341fc8
SHA137ad4161220a58efb16127c25f730251b3215fba
SHA256ec3b12adb6bd320ff538b8c6508aae7d168d61f499bc0cde4e8e4148850de2ed
SHA512fca06d01522053f0b33849b8d378960d66f3e37d693357a4d401ee35a68be7c721e7fefbe4695bdb82e8691575c88e3d91d285f5f7a5c3929ac649a7c07af6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ba7d7f6af799fb32b42e86239840dd
SHA1479767fa56c0ea619f5dd24b0ea0f799412a38bd
SHA25679f11ed3790a1f6496a9e52a1563540d0ffe78ca757f9613241d944428eb843d
SHA51269a17797dd6f96c55b8cbce8282266e4f80f229766153308a6a8345fcba80ec652ad930944b94b904b7420ac4416af112131fb688c28eb4fa32346f7e3120023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f011fb80a00a2c803a184343d5c5773d
SHA13fbe430022502c03267d7f0ebdb69a1d51f7ade5
SHA25606f3cb1b57b0ad1ee654435fa188307bc12ef83e3f13ffdaffe7e4578dda2832
SHA512cf493e0e8435633b8ea963fefbd689cc99c8cd0c2c2641621deae91fdaeae968a45cf014d1c758c9eee2b489ce5e6d2920abf1b1e94922f00fb9907d644c957a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588ea63e5ff612f8e3c4b9ff72345370
SHA130a3219418b4f1d3bda92e269d1514f78b961da6
SHA256e9e280edbd73395d818c342bbee048a2eb58e9a3d130a7d8a9e6f25941341727
SHA5123a0546dafd76c47afc33d5d29a9c957bf98746a4d2f4493b8ad0341a566a828f284947763a14c6b665a97326102b304331d6789aa7a1bc54c7ae0523ea9070ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55728aa6f0e88e1ada0acb613b3404a99
SHA1e0c6f3777dfba5df63469e847c8dc07e3e491765
SHA2566fc45e3d9c229991d4e9312a21d6d7f8e82b24bf64f5039d3ad8e601f0fc3abc
SHA512381b9a85fa15dc9532f4f278c5f761953984c15d63d30eac2b9528cfffd0a1be3d5713f8e8d69b1effa863316f606a3abf9b09c51976e8f081f8c048c7abe93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d708cc5424cfaee6b6b0567a58c206
SHA1841e0f0590da332b82a689c987fa63cff8e0a976
SHA2566e630892dd064c0ee5028c687347b441c93c16d5045a7e11358b449fa04466fa
SHA5129fb5902bb112418401007becea2009bd38dc5e62762a1ef2d504db98545ef6d638b9192c00031539b71462bdb912b791d6704c873d585fdbb613791e2b235640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac82c1c806f2ccdaf327f68593d1c74
SHA160b50f1df9f2605c353b339fd2afa51d324646ef
SHA2561fe5a3eab9928cb90d10d585f06e3b263c4bd417905d991d654464b551a9d733
SHA512d4fd870c682ac0e65bdc3caf5e9a79825201f359c24127f8d7c5e745960eb1020ce825a0df4c60aa06738f3bf64d8370ce217db1e673502ae0afbdb5563a2ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a00083842b9e516b8c0aa619491bdcb
SHA1f9f2ea683596537f1bfa92442e4f7e63b16acaac
SHA25613340a11ad82ce50075969b35ce7ceeb5d0632c83393d4837eae0f026bb669d1
SHA5127c55b0ccee802a7892248ffe3db75423789e05be1de6c4d0f8cfb557b01f2eddf4ecd3a59f2cf3abd7843dfbd8e2232efe0db18ebb3b919f01b500cb05506deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559d6ff4455e74464126ed8174c3313ff
SHA16211c87ca6df8a609c460b18a1b635e80cb6af77
SHA256146c11ed53dbde7681cc01ee19ef0e61a53e2172108e90725e5f3d2fbeabc769
SHA5128c0cccce89f8e1bd84947fd7201dba15315ea59c2abf6fb6a3b573b28d6b3d56f4464c7a90d85a75b41f09bff099c0a00b3e66a14dcbb47d81ee947da987c74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54272322aeb54f5e94426732bad9cc1f7
SHA1989f3a0b01407f5c9a07528535d39640c05d3ce8
SHA25601cf6978bdafe5be00944a399528d305f10143bebb1ab2380971deecaca67810
SHA51241643ca48be0c213f96d91fecc75ecf665c62660ab2a4b33439c8920552930a0446c558b21d385edcd1741f2564c853cad8a87d1e15bd22b13407dc0bbe3d473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50050cb8bbff367b7fb6e3980bc28c65c
SHA10d5c24b98a43c78abd868d15ef7bfd4c541d4afd
SHA2565b5f557eff56bc87a055dcf516c822029dcceaaeb5c4422597f076ea27fcbbe0
SHA512aa5aec5eed2f016af9860c5ee650c8535972f44e4d03c928db7023d0d36864eda7089fb40cb5e67f2cca19198983e45df0b13bd761254a410a4b2e9a99bcd2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f391cbb2cf93f2cd8ac6304a1fc4cfe
SHA1a5c48615fe038485a4ec900018bd1e74f7d2719f
SHA25604cf496af38c55b492f5bfd66367bb3478033429e7e955a2c09ad1393259d63e
SHA512a5dafba8d16426e8110e145b020605994ac72a8b153b37f87331d47edcbd315c27ba989786bb34be7f1177b40243f316e595646b4999f906a53767419777de9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d2d1e54e9a6f312a513caf19dd5480
SHA18b20fd82fe80d3306bea67fe4893384bd940a425
SHA2562ca96db069bf66fd063334c3a3c2971ba0d1c7c343751c6dd6cb6607b9f2c487
SHA512422bac5221c0497ec518c397248fe52ff10e2c37148f36e97afb3de94997df9a1b6d43e43f3d9dfc1d9abea011c1b7ab760b19a4dc369c94da417a4a94d8ebf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574be44b7bb293b0e7db423391e7ca158
SHA13a45b6ac038a409714dd45574aee7da6d466a362
SHA25653ec0327e053389ebb02887d474d737886310aa57655bb339ac5c779f25546e2
SHA51206c2233dd9b624b8dd14291b1f3cfd009e86201c8f655ef5bb6a941204f55ffd97606182150f713070b9cd51369dae9fbd62ed90fbe92b88c4e1802a2057479e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932552d397e1f02581a620820c0c449c
SHA1d3329df093ffdeb8cb38bb7cea1e0690d230c0fa
SHA256fcde62ee2ab09b788f85955d4f16ea095c2c8081f0774bbb37d86bab5a09272a
SHA5126a4926aebfc525ebd559507f210babdc6ee8a44e05aa47e2b43a94bd8e8d6d28f41e8bca603bd57dc249a1c45332dc138441fdff47db2b9403885312103cee69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509704383df7f45c4d4661180b3608654
SHA159d5d59ade811ba721e005f1baee8c16fc1d277e
SHA256813b7381f1fd205f0c6441b3d8cc8755e29a043efdc4b05e8026eb1cc1007bb0
SHA51259554374c5ed81e7b391bbd70875039206daa8cc837a9f5570af8b9608c8671e90ad5a80ba72ecfca9a93529ee75d642ce0c2b0232b215beef4cae48c9ce160e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a199938395efb36faf98c925f03c5f2
SHA12f55d944bd6abccd18b611d745db6aef0fe37fe0
SHA2568849c1fc290b602785a0f5b2fa93c12818863019ab4f27cb8413995c7b6f81dd
SHA512cdfd2c90fc011c3eadad350d6e6e15e1ea718f9f98e29d1a0b419450413429487a1576f33851320eacbdb2dfc8b25cd4c0bf43f61d7df8592e79ee64f637209c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b2825c8e251a51ebeacfe3e19cf4c48
SHA178dbf393310a278b6b86dbfebded2b438bad398f
SHA25612872740d97718a4dd2a77bcd9606c3bdf7625a97cc29831f337f59e3adc086b
SHA5122e2d8b03d619507082fc49e2e4fce67fc381d6455ea147c23930bb6537023a5fc7ac01284d6eb2d08b2353d59800a7dcdf6bf139d912427db9e593ff2ac9572c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a