Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
76c6244bcfbed3502f67e866d0a835d0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
76c6244bcfbed3502f67e866d0a835d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76c6244bcfbed3502f67e866d0a835d0_JaffaCakes118.html
-
Size
461KB
-
MD5
76c6244bcfbed3502f67e866d0a835d0
-
SHA1
a085a80a1a16ca0a247437936a08e967e24986f7
-
SHA256
a8d0a6b4f977e91a70e717cc4e0343e1fd184571ddb88eaaeffb462c277443c9
-
SHA512
7b365367a9799934225606323e3bc857017f959578ed83c80eb2c8d6856c6734e143d07e12bd992f064a2cf14ddccb66aee6128eb4ff879fc17416518b90c36f
-
SSDEEP
6144:SQsMYod+X3oI+YJ1sMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:x5d+X3h5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e589991cb51e1860b2fd2a6827d3996ff5edddc50f1aca826a1095ae0a8e76f0000000000e8000000002000020000000496f9db7b5385b81b9e89b50e3489974e894d6375f6f4d60be04e6ed3ce00cb920000000dcbf3c5b6ee57edfbdb71f19cb4da298fdfea5e38e223b505de1803186da1c7a400000000a5d914c37c4b9a9b632ed9e85e5d523f889cca7e905afc5cd17355911546ac1789535e4ca45298d6aa1c6dc2f96840fff95cf5c077415e72a905634863be49e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422918154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA3ADFA1-1BA0-11EF-B781-461900256DFE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7052cfa2adafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28 PID 3012 wrote to memory of 2556 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76c6244bcfbed3502f67e866d0a835d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b0ac41bbd5c9618a0003423b34ac7c
SHA1047ce1789779d5ff7c8daf4beb231ab00c7c15c3
SHA256642f654bb31fa01cd1840a353bdc78b717347cbf7883c5f6c58276295a944fb9
SHA5129bf79a103db76694511e0d74cb69a18be949e91f5dee2fe0eac8d8cf9befd508bd2a0fbaeaab2f5d44b6092cf0ff6711702733df7a91ac3d4b464503b13257d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b159f1e06c8fb1514767c883cad77a
SHA158346a0286e3639ca3aa1c6f2e701d2de701aba9
SHA256b49ab63e9ff4bd3061e93bf75b8cddf5b72acddfb3ba2105dfa91edf7f07b4cd
SHA5122712d15f0b8d0a183923d422987b476f2206360571e5d9eba6211e230644abf8975cccc41ec0b0be6d11728972247ee4598796ff10e30756adc695bfb8aee919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564e6300ad76faa8f708ab0e6654e41d
SHA13ec53fd475f200dee816d86d6b596026a784bd0f
SHA256e09b04e344b902ad3fc94267813d3592bfa66693cf6b99c7158ad16582bd8bfe
SHA512f94dedc8fd7be6f6dcaa2f144175a99d25356fee44e9a2f0758902ea4bef999a23ac87ddfa86b8a3d97673813de24a82e8354253cf294a66bb0ac458bba0526e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e307305c06876c3776a89927c5b01e
SHA170075d0d5d0050ae58d83e5e66a02e939ffb2bc5
SHA25669880c7cafe56129012cd682d7df0af95e841e19e6c1fa4246b4efbe03af3ee1
SHA5129fd5176610309c3096e48e72e4a20e50c4c8afcd0433f58b8e97b4132e8e5cb7c6c05c8fdce0531e21419afec1d7b520d542cc6ca1fec1f1488074bfba4ed866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560124237d292fdeee029471ff9806fdf
SHA1262fe906c73d73d2fa1be30e7770a1cb687e0368
SHA25663ea8422776fa14c1edcfc7b9aa5a837691a0b9590b0099ad330e63b08e8aeb5
SHA5123eb94bb6c12e2982be7982aa18976a0ef097fee3fdae74a46fe950cce2adc37a439cb8f3ccdc4bda933d08946be80c1f443ee3e948aac9f1a58edce110d83f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584cf446c76786b1bb8ce9112cdb1b7e7
SHA1a1efec9e5b19d9e92838fb376eeaed4f7cb3f686
SHA256090be0f655a2b70630ed0fd14635d034e586138821a220a7abd20f7a1bdd7af6
SHA512878a61235062498596be11d63e5ec546329a4792e26c74c5e7e3db955272fef295e1b06870cc64934c6230f9c45e05183c14c3eb18036183e81c8b38b89f109d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e864aa96e78995349b32129cf97d33
SHA1b664fdd9096b558a5b1f6d4188a2ef43c7bbc79d
SHA256853c68ee8e5052d707d83fab7ea623d0b18eb281d11d38bc6908c742f7cdc48f
SHA5120ad7bf17499db8a6a86fb5a45a898ec61f580fbc725c127ddcbd8202be31f32380721b261de48cca884b5d808234e9f84696551ffeae3566a0d8aec0d4e4ed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd27a4bcfa87b224ad822e71a913592d
SHA18e6aab0af2879c9418dc5db79ab3ec54d914becb
SHA256085411b3e49faa01cf2179d824d6d5d282a0fea4557f1bca0293ca815edf7bef
SHA512fd06586f94b5a6702afdfecb90e18591493ea2ef15dc47831fedc1bc90787f10ffd0d6a2b55569b02492993e04162acfa18462577122d70876e65edb4f8f2a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedc00772c27d8dd94ab8f284d3eff0f
SHA137316a4131644eee06ea7c0237be9af45c6ff1b3
SHA256d8b1ed523d05b6644b8fb1501eb0ac000ee36d9b93f22ebd4912e01aed6e7236
SHA512f8c3ba9b9bf07cbb27389116f7972c23ce5a1c69cb3d6e9c426bf97dfa5d87d5430b1c1fcef9d2c7a812bb7964b9777c158bd84fc6b9eee20cfab50cf8cc497f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af66589e7872c3c97b0ece45471b824
SHA1ffe30320e5c1480cee5c47853e1733a4d46afaf2
SHA256928fcb27137a174f5414b51cfa67d446f443fff87909b331d3c161c5fe8ed791
SHA512b9961576fa12f5fa12692e83d987e0337af8a8d5cc3f1805e0d3cfed0580fda7d64eb77539d3d886aa97d9810e3b6b780cbd594f2db628ebd6ab99faff45dbbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559cffb52f520b55aae48fb7c8fbca143
SHA16f2c2ccca7de29b4d6404c0a981866b95244e52a
SHA256fee2dffda747e1cdc52633fe28657022595a2a495c26f84e621038d51d4bd920
SHA51203181764b1f55e3d0737e11f09b060efeb0baad24a4b24f6a7904a6338768d5d20618fee5ff0b884cf211f47a38eaebe28bdef948523eccc7029a900f9fcaf64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5523dde2ab58eed5fbd810d941b819f59
SHA1830858897a48855f5d08e18756c04421096bceda
SHA256a35d3837723160d344ccab4098243564dbb12422311d96eace110651ceef820b
SHA512f0db240333cc5620d3582a898cf2ba0d772587f549b9d8a0fb3fcdcab642f94af1cfedd2d0341fe989c3cbc9e7f6107899c130dc316112cc80e78e26b9b03a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662caac7762ca2f38829291cd1c1cd35
SHA1828d0bb7387e4a2c7de9f220157a1f45cfe2310e
SHA2560770fec2c70a75d75be620c53403ea260d49bb32349ac58e1e217807cf4ce924
SHA51259f1417dafe906c446f42c007152a261accf45d6b8fffba4000852d1ddcef3a46649ad0e8fbcbe9fcd33d665a79c8e1b72c97cdff17ba8fb5c66b75992c5ec33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e765fef95d0e5da36de63ac04ca9b1
SHA1e661821068ad93ef0b182c68ea8621bf194110cc
SHA2564679e28efd222ceadccf3f0ef8fae2845bcc51a7af0ed3a7ff7635e6306aec65
SHA51215075a100a4b3fe23ab60809f4890939b760954105fa9d6dab66700695fea8017ee7da67e5f69e09749a9d8ffd93f9e421127da765302b4dd327edb2d89d27c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ebbfb5eb9f9a69a8dfe877ec98bd93e
SHA1cb6bb444a544bbe7671cab3bf0d726d1cc1aff36
SHA256d91b77b31873c28de52106f6cc3e2e35b04e23df77c9f702b316f4a0baf35e60
SHA512ab49a9e2bac1cb118df5209ecf6a944f3b01e8b3a092b01ff5297607bc46c984032146a8573849809a2cd4fd50a3eee9e832a7fa5ae345956ebe6c4c8370649f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5536c53adced2644e13aa665ac6be2808
SHA14761f65082a3fdd947a8d8c6552c10a433c7a7e3
SHA25603586a8ef87f3609ba937555a65192de072fa29b3579d0e62b9c8b87eb226e82
SHA5126cce978b8aa3c4f1f4876bac34b19dfe4e6a871ac532fbc59cdf7cbf82f9bd9cd8e638a1638f044051565e0a8d296a945e22894aab0e661fb43028d4c50bb308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf9345361c14038e48a6c61bab3ca27
SHA15ad56803e91da86b778a06522e4ef8bc2a68ff41
SHA2568b88a4037527a0433098b4a5a5679be3065838482d113a23cde363c9c013a77f
SHA51295202026dadc04e97c3e203c1f041f73f216bbbeccb25a1a2c620f93f93ee3da3317be10f91b45f2f4af8652d80680d9c5dcd0dcc49a806dff1fb14658425520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc8303802e818b795d28a58ab1e8305a
SHA17e608744aa12de953eced5eae2a8d5b224fd8d6e
SHA2562d5cfa380df3c042352e9207abce173d88010704599b3f48661e2e3d66cd9796
SHA5122e72914fbf4b77324094a4aa14f719a50c4ea2c4d60c767f6c1c1bbe732d428e8486cf374b61c8e62f761422b3f9b674a57a5ead6cc9b48db6646b44e8fef832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4fa5e943ae34645023cde81455eed9
SHA190d915fdfbaa9ba6a378fa664d93cd9961385014
SHA25688da69fee1e526f30077f06e6d81e7d9c18a8c676a3931316afa6d5cb3e9c4a5
SHA51237f7a6c35ef7eea0c07b71378107fdb4573197009bc678823c2cbd60acaef50aafa66aceb880dffc4998c904e83067ccff7f58c9a0d46af97426d235b9388e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584de7558be0c81c820e8f1a40c0b358f
SHA1f3e125c0e229df5e3467b5e44c07043197b8cb18
SHA256e71c5c6cb4312d703f790db6cca85faf85a030426a9beb5b8c9d12fd9cb893d5
SHA512cba379720e83414895bf6851c1169335caec0a71606ee0061f7b077baa5818a6e72229345a3bf1e20bf7e556df675a7c4abf5ed058f5a9ad3f8715cbbfd066c9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a