Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
7c359f68121f632d1d751cb596c714f7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7c359f68121f632d1d751cb596c714f7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c359f68121f632d1d751cb596c714f7_JaffaCakes118.html
-
Size
461KB
-
MD5
7c359f68121f632d1d751cb596c714f7
-
SHA1
4a87b240a0b10444198d76fb2ca07250ca62d436
-
SHA256
f9687dbc542715850ae32031b36691358eb3f4f8fec93eeae6f6db2c5d73f00f
-
SHA512
eb1fa190acbe234bd14d21645b6572bad0c96a2adced902a41c81f9ba96f196ba3d93b5a1f0b8f7ebfc49a730f3165a328ea29467dd2349ef5f80c8fc775541e
-
SSDEEP
6144:SRsMYod+X3oI+YvsMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3N5d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005b691da9605d59265ae4f6b6c1412c1d0a1f822ca3f60cf5da6211597d303b09000000000e800000000200002000000008e200e9b273a1507f8e9f019a769e9005479882dd84ab4cd83988df47efbaa020000000f96df73a73a29bbd5f777f05a81be677f750b4279ec36ddd0adbb783ebb77e564000000034dbdf3d5f6e09d2674165cb4d3e94a7098a14d72a0bfb62ecad35010a48285dddc658744180ae123a591d87f3af080a0fa9dfe87f3048492e696afe6ae897a1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bdfc7cd2b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3C8CE61-1CC5-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423043934" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3048 2256 iexplore.exe 28 PID 2256 wrote to memory of 3048 2256 iexplore.exe 28 PID 2256 wrote to memory of 3048 2256 iexplore.exe 28 PID 2256 wrote to memory of 3048 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c359f68121f632d1d751cb596c714f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e41f9af6df5b1c3717e059afca47bf90
SHA1c4f39f90fdd032c8375ba1c0c3e721d986606286
SHA25663cea3eae19262f5f8363590b4a78d430f5ae1379a8bad9be2d8ca5b3c4d409c
SHA512ed7b8a81ce7ba71dcb748168ade7fe75c32aed4168f7db0963644c3fcd16f0cd525b0f8cbfd599bce31bf8f4bf05b4d57ee6e08c40b1ef781c91d14d12fe6af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547d9ddcc0e381520d81975a21a15259e
SHA19fa5c79108425ecb4e273587c5b980b014827ce7
SHA256078a456aa846733a2d0f6f2b993e7e0aff1979f9b3d331ece69a879d463779fd
SHA512e6cee2ab9c6eb3ebb570f117437bd719b77aeeca2b790cb4bb45824614225956a48d494cb3e11f5ddf42cb62fa28f1c8cfadadd87a3e4f64b94c5a3a06bcafee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39327aac6756ed4f1a3329779932f04
SHA1a6a84b7f7b8cb09c5f6786ca68ededc7caf4295c
SHA2561aa1410f753819a091f7991bd3b6bc66ad9bd3bb1ba01a493d78b69f3f9e946f
SHA51287d2179ea03630072cec88c7efa48c84e27250992d139920548fec6a669bd979bed89e10d74897179a9502cd9ed1f47bd023629866a965f9d0006808359a7269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e6c6b2bcae810599468442f03eb64a
SHA17ab46ed5ec3a145d4d76e2838ce3593e6b866476
SHA256c3252af4aacc5fb7cdc7762aebbd508a686b0b087f2704bf5faee0fa74cbea02
SHA512f9ba7b32a973aff01edd83857405cc108bf04a0a04c382ca548dc14a1d64426965a36de1190464ac9a7e09b97d8f9c52de3324eb883e39690687328007830a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6202c13c51683705e702cf6eacd73bc
SHA12beb9ca1e166f1457a634d8a33cfb280bab248fd
SHA256f29773a602ce49dc4be14fb02efd4c027e59b29ab64a19407f1f4439f2bb487d
SHA5127c891292ed1a32745a4f571f0ea7cfd67fa2d996be965b5e5f2f0664d5798503bc8bb8cb7b71c5651f74d9b57df0b598e5ba487d748507e29cb4630c2d6c35f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a7f57664c7e61e52cd1ea1b47eec63
SHA173f15834008444661554d1905dbb0c125ba10e18
SHA256ea4c442a55937cfcf3d1a05fed2abcc322163fbb7216021c5db6f546557a9fdc
SHA5126d5100d25ccbaad0d4ee03b06b5eb501bdafa6e51480ae43b4de3409e3931359cc3659b5597c8cab3c21c926473631beeebadb24bb3cab3da92a055f8c111119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c5c44618926ab6e574580facb0bcdd
SHA16b3790a9c4dfe077ead85ab60f5cdef1bf20a7c6
SHA2564609a955ffe8ad531793ef7c6760e96dd9544a544598931bc99d512547227eba
SHA512f0b04a576d041cca0c497f3c1aaaa49ee2b4e940909fb05f42527609cff4723ce033fbaa3348b1aaede5421ca449fa80fbe2c25f997e8410064db427fb25278e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53870857421482b94c86d95f219cbc8d0
SHA17e0f08c2407c3be1f5e09edab060cf87eaa6e3b9
SHA2569222783c988ceb086be23e5eb40670fd929f955f4c2cf71805649c3c6b91398d
SHA5120a667d80c7cad4d15ec1992306b835a4517dbdd4de5e916a10fadcb6977c2390cb702c720f2daf1dbd87cff77e6fee5a66e0c6314d661a11cae80d2170e6c8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55817fd3df0e947de413dbf01fbeb540c
SHA12f9f9c75c0b46a650a3b640080032aa078061189
SHA25652e44ebeeb54423940c0b7bfbccd9ca9e4a0d49ed1e245a9d9302ebc75e02dbe
SHA5126e76070b6531e31867444c071de34c109bdc826dc5714b314b9b0417918470ae120d8f4c8673e33dec184e1e08e011edd65389110d687aae7128db745d6302bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94bbba12eb97ff6d05ab6c882e9e581
SHA1548426463a9195ac2a16ac3c7bd06b1660ec86d7
SHA256552ddf598db633e95f3a1c586e6a01ddcbda27ee81f4b571ad28ef7211b654b0
SHA5125b8d24bcf66f785969d383db8dd8b19153aa85da840ba6e98be1cd54226e8b1ba942c972efcdd9b9f2605324537b7480507c75a5a6f2dd2052e23bcb6cd63677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5144316ab2cab8b46de42b988e28744e2
SHA170ddb54b5b5dc677fc21be24610a322360b2d020
SHA256924ccc97f738de078eef0de55240cad2f0489f41cd4d2d4cab28981ec6d6bab5
SHA5124fe481eaf57362cc4777bebe24a2a13c8613f854d88af07100aae9c1bcb03148bae3a20cd8e0d09410c7784b925cd799acb9273c64bedf0ca7b957fda93d231d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c9411485f83dd5b5436b95eab3f21c
SHA16a9d5ff2437bbdc840135dc9e42832ede96d922b
SHA25694987988276aee73d65993fd8dff87894eaab234d91de22557587ece1e223e6a
SHA5126161c1028ac4b9bd7f10ea571762aab0b1783ccb41a215b4eb048988bfb2d8c8f7faf492e286efab7419480aab11a23cadaa3a32ab5841047b590a8a4e94a6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c80b769580009d8e3b615e231ff90602
SHA1c73ca7804ab8d37917f234fcecb25635878ddd2f
SHA256091a737bc612fc1b690bb98ff436b3598013e4368cbd2e06d01e9c0f6ffd718f
SHA51247a032bc9871b24943fce20e1ceedd822c4e3721cf9e4476be515fa7abe4812509d638da07df7c7ef0fedfd89e77e445f1d8e21a6166e401ce622a00d3d628d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d848ea4594ad3112dadbc2b36ef50b
SHA106dbb003aa273998bd09fd08fcc49e748c424e80
SHA256c9c02e7bc1f0d112d4421fc2a213a53d7d8402b3dfffe1afd48477cf3eb03316
SHA512c371839549c7daf4dae3909d697fb2f6d6b1b787b1ac96663b6793d2396ab3b395163a178cf720f2bfd773319c30ca104ba013b61616d0f2245edb7b6b8d6a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57079c2be42c313bea719efcf2f664dce
SHA1c1c93b20d24aeabb64e5b8eff1600dd740670c73
SHA256027c3014343a46ae74f997066ae4c42aa53b89f222888d2a9b52b212c5f52400
SHA5122c871aed6e058b147f504bec50ce72dc14f8029e73aa498e36fc6f29f1c4ffad18473adb9ae0889c0242b1cafd4a1b7a367a07e71f9f3dc8a123830e507c0675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519abf675c3697e74580cbf12c86a5938
SHA18f3c8c8cb20e575e6263224e9ae055c16519f766
SHA25625882b4011176474d008e867394db70eb121c60a9cc299c5ff97a320c3ab1766
SHA512e675f5840f05c3465a4c15f81309c67e35efef475a8ff8af086b5993c44b76b72424b77b2815b43153383b1535096c1d69c76d1ef534d1205ec9c1bf1b593b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5678c1dd373273b877c7b667893f196c2
SHA1722dca6abb265bc462f003268b469c45221ebd2d
SHA256fb3ea72a7c57631687c5997c95b45857d743ac30d1a604625279b96871749361
SHA512b5bc0427c6b0c79c30fefda57582e35181f0bd0d455f2ee3de1658adbd8cfb709243f5ac2a651ca4b7dc6246155cdb0d56d662bb32ea873353bc4f07021d9f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5340e361c5cb55d1eb0a45659cb01a26d
SHA1f4f870644a0b62e615620bca697babd628682c91
SHA256db7a3a2c67f22c3d1188201a36f23784c1392eeee10c0e1ce4c865ad954c856b
SHA5129bc4c779c4a7c54aeaa2c7f38736f9677d1a13e829c1ff4fcb6f67c6bbd1486efc9eddc45eacd7e2e08be8d83654841d0209deb2d8dc501fc486a30fab50b134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2fa5f329a0dd1646c6347742bb1e8e8
SHA1ab1a687b62b45ee44a2f584316b5fc265fc80d59
SHA25644b7211a3b66424490f91c8071cbe980d2f34a63fb440df944ee862af0b4baba
SHA51200cd96573a69a0a76f80683cbd4a36a1906acb3013e9065a41ae06a23a76e16a140bd8a1f4084a51e79468a1e7615ff3085a00fff85d84911a06ab3c3a98d084
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a