Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
77b6735896bc5c0e04fec204e80a5a0e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77b6735896bc5c0e04fec204e80a5a0e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
77b6735896bc5c0e04fec204e80a5a0e_JaffaCakes118.html
-
Size
73KB
-
MD5
77b6735896bc5c0e04fec204e80a5a0e
-
SHA1
6db91f544f6071f9ce64ccd95c682602ecbeb58b
-
SHA256
40a542ff3b27a2dc6d33edf5102fafcc2c95e2874064270711f2bc7fe96f4080
-
SHA512
5f3ef9aa54babf8f7854f7008b9532442071fb96aa0682a36c5a92be0a9a6fa0077fff92e70e869ff5a22d9dd1bd87ca1a1a2485914ea4fdddfb925fe2d6272e
-
SSDEEP
768:JiLHgcMiR3sI2PDDnX0g6s06Bzuq+CzzoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JDfz5zMTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{207BAC71-1BD6-11EF-AB01-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fb20f5e2afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000022e36977224f83b979ea05c1a20b5fdf967730129008a6acded3dbee2572f3b0000000000e8000000002000020000000e5fafa89d0f904da9af386a4e69603d7019de140173d1e3252bb386586f29132200000007e74d2af97dd3aae4693d791de4e9d143f76f77e28aa8c94853a0a1a9eb869f340000000f4127151afbd9bbcabddba9bfa29a4eb326b167a67184c15d7785dfc5ee22d9fc1866699a6488fb206a31c604273c5709028b903d1b16be980786042803116e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422941062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1484 iexplore.exe 1484 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1484 wrote to memory of 844 1484 iexplore.exe 28 PID 1484 wrote to memory of 844 1484 iexplore.exe 28 PID 1484 wrote to memory of 844 1484 iexplore.exe 28 PID 1484 wrote to memory of 844 1484 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77b6735896bc5c0e04fec204e80a5a0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55664a6c548d289e014c045048af952fe
SHA16e2566f48a71fbcbc0d087326896fe29f4091dbc
SHA2564cbbd42fb88d24d11a8100f3e1ab7642eecfed037a4b4ff06bb6cb6ca7617b0a
SHA512e71b2a75359a7885296bd3dfa767ad50521f38a453dcf3c7fa4c0aa6aa0b708eb10b55655d596e46f2dec08e6cb607bfbbf38e0be45fe573d796a63739748b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863c3e790806bb87b2788eb2bf22353a
SHA1c76519c0e54e0df42bdedbc85df3f70bc4d309a4
SHA2566dd469ef35e9dd9f211354ce8c675e8a90d47ef639ecacc6785479e0dde5fb71
SHA512797afce21d858e2ac0ebf32cfccdfff0afc22ec70f21ba47fb494d03ca634f4793f3a572d3d7a2da188c0f61c0ee210eb1af6fc8539e240d5ce557b946303671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364c96d8f17e0c4c223d4b0b1c624e67
SHA19551f498b9ec17b6b0fc86987352cce6b8e9b820
SHA256f0ee88d2455b49f3a31b3f791af0af6df073e95271e3670bc0ddd249d5003e67
SHA512780f45b77e2a0c7f0f864895fde4ebc4d08279eb3eafe6ae77b51057747eb7b964fffbe9d4bfd632b29186a4043be88ec3d5cd3d9bec5761c5414371ef293e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16451973a019d6404fd2bd8ede16079
SHA18d5ea5839b54875d49e9560948ca42c60537c567
SHA25600f5d3b5057fff9a8ffb5eab905054d81b00f9929819c36d6f382b5975ee8ce6
SHA512c970666b95e207b0279976b4d3e203cd90fba84293cb2cce1db9f67453ae5d35f6ef528041631933f59824f73487e5c9f3849b705c00322b56f9a996717d4384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1019320901bf8eb22a23832dd55aa40
SHA14418b12a5f4223ea992de866a63df189f811de26
SHA2564275fac631c74667644d045d1688dd8aea440effd60af201dfc4cac9ad89c701
SHA512beede4f56bab71678e42ab3b09f8054f92af5e547191cf94b9b513716c76ec51d87b6069874fa45f9881256302e2534aa8615a41727d5e72e3b0142f38ef0b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fc464253acc127bf7ff9f52479a594
SHA17a9c582bc4b1b4e8d1e8821d5f415f26ee9816b0
SHA256fdd3bf673eafb578fd0a48be2d48a30a93b26c3672e227b4de2bda8ec41ab779
SHA51299a41bb54d3652c257c7df93e2b22945b1ca0f20097228ee11aab4f640ed6f4eb20af160deb18532becd576971ec56d17c88ef7b1eb9d6d7c3e6edf557f9342e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e747af23e02d308f0d3416d091aaab
SHA16796e381c78257afde14f5f1e1b5ce61475348f0
SHA25643319048003f4a76f16ec9b80fc053010a27b34df7a721655780676f4afddcb2
SHA5125bf729f2babfe73dc210ff2a73e8a7033bac0c8e961d3ecb2bceb18cfdf10fe85da21f3da197205ae4dbd5bbfdc1dba646e9adebb7aafb2286501215a667fe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296084f42a4f6c3cceb90ff16c954f56
SHA1db7d4d73e45ce868d15c04dddcf39fc2bf4e9e18
SHA256237a4d65c00f9642aa24b23802f4d62b155065f19d36529b5d8a7c27ad79b555
SHA512d1ba763a35854a1dbf643144e5d611e6274fcdde349b12b25126de6347e0fd0d2e728b994b93861584b841fa86f6f90647747ae3ef48bf2d04b10406560f68aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6ef3d5f3c05bc1706a398046424e71
SHA1065d2800cac53225433fe04294526c2413c86a5d
SHA256c6de1e1f9b5d156e5201e4d630003e783ac15da72d01f71bb72fe3b4bd9b7787
SHA51231943865d3a24b37f76bf7d0f0b5c577b8b52ca11d7b81ab339b6d8434016ff76918d396d61c86288f355d127fb3699fbf6436e6d41d1de6fa9fbe30fa0ad411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535dcefd325bb65d618603525c775f613
SHA1b84432605f06cc6d94f438fb44f0c6ca75c0bfb9
SHA256b5f701ad463034c0567368a66bc8002e000d89b46ac9027c03e5901cf1e3b7b2
SHA512aed33771ad35a4c06376277fc89ea0d54f7a8070a100c58e4ca5333c73e911310450a5aa1e8f5f1e2e8fb4fe0e668aaa6b03c9a628bdb5940f35a72f105f6499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b191815406be29cbbd7833ad28112cc9
SHA1828d8527bcc0d75c03a4df523c16741de51e92f4
SHA2561db060ccaf44d7f723211ddd5b496ad6f24501fb543718025a3001baba8fdce5
SHA512bc298cda03be57a4ac3f246cc3e67d079c8d32deea161c26dd17cac61e657ccb0be17a3affbc66b0b71e0ea8d169d5c3e2ca20e7905ebcefc9eff2841114ec32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b052b1211546627caec68b70355d411d
SHA1813e9e7a5b612e24e628798270ae3104d1204970
SHA256d374d6ed80eb194c679440c5b102744e9958de8b9cf49e21edf3a07214476c63
SHA512726d74b0e795e60a5b7f49246e8d6d5896f360abe32ebed76d49d7d47d467e308b2f6fa097adf9b3a683a0a836f6fb80399fb510875a1421e1df7415db8dfca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b1b6086dcd6e0cb834bdacd68d36803
SHA14f784d67ca137a8ff81c8e52a3b7e1a9ad690463
SHA25692b8a3098213eacde3e0dfb21f5f8bc9ea0e206346b932accf54110f0d278bf6
SHA512b9a327611341625803c97a40853e348b68588801463275baf5cb607bb4fcfdf33fd7246cb34e35911fe92ff65e0d7be43ef49efdd7958d4afb76155e1255af43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c68560ffb69c4933a17a02fd1760f2
SHA1125bc339062b19458726e862e6c88e1ef7343d34
SHA256ae336d3e6105ded99a62d2de1bfcc61b796600fe1685bb79dd394b11511abe44
SHA512f475f6d6964b33cb17b55c243b2e2bd2e976f891c1e240b3c1464105ae4b0df2873e7d5f9e2c9b4c3ac99de3ba8f4422ce619f5fedbc8c8a578dcce762989737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c973c056dfc3de92707934e09c5cf5d
SHA1ba1d8172a0d1a81a9426ffa214bf0b16c5ce8fef
SHA25623bf114d7af753c9aa1320668cbec3eb4b0d93f647170b63c49a3ce13d1a5740
SHA512fc4df5b6f4d9fe32f8427e2b01491fce3c35f1eddbd4e333dadd73767584c2f58c83f8998047c21ab6babc69c18a087dbfe387bfe175f2509ebf562a4fc31a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c57c340345c0ef39b5b269e3b1532fc
SHA1901029f57a57fe1c92fdd58d2ba90cfa4feb2bb6
SHA256e514ccd2d2b3813bc2aa6b03b6d2b352c8658d9a5a1cc277f3f9e9015a7818e1
SHA5123334310523707666cb257ea4ae4b4e8630a9db0018507994c4e7a544bcf7264178e27b46e505bd9426585f4aabea9a3be5201ad15bbb3095edca3f673e4b4868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563234940390d69875adea63b8c6b8cd8
SHA1bdb6558b79f7eb5321219e2afc3678829e408cae
SHA25690ee6c782371ff48f4a49f972f398c858285034a6460665f7129561dbfbf5acc
SHA512fea3bbea82b9a95e9bb0f24e2ba762846c36b52eb881d361b13c19cffd4151d3756d22ddd983a82dae14ec05978185682e680e1b6054d9d450ea622d15c18002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f9e5331a2c2b6bf6c1bfd64fb1f2f26
SHA1eb66d95f389710511988c1c5beab4cb39b9f3438
SHA2566fb7b5021d4d50b9a8e27c4db24bd09cb6ea8844da62bf03d87c5a08ffbe2c8a
SHA51260e1d9f4dd0b0e8576decd38c8f0f709919de6515e8b5bf38112aef7e0f0e24e7300386781577b13b5eecad56e89cb57652462ee8405af106ed3968afc36bec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f7ac2e031d8fc48ac82d9c5576ebfdb
SHA1889b1a87470964393bd1676e231f1aa459fb9b34
SHA2567cb8dd983b884a61ace915984c35b84adc95a293d3cb9ae55719d251dc57559c
SHA512131b205da6bc8795c81e8195d8cab4f443047d602118101a1b91b6a09546e0866aa55aa209135f54847387689b201ea6573e65e602272da74415c4ac8258fab3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a