Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
80d1467f42349205d3180bea25a5ebd3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
80d1467f42349205d3180bea25a5ebd3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
80d1467f42349205d3180bea25a5ebd3_JaffaCakes118.html
-
Size
17KB
-
MD5
80d1467f42349205d3180bea25a5ebd3
-
SHA1
515565207939565288311a3c94f2d50cf75bda7b
-
SHA256
71de0aabbcaa4dfea1c0aae8341315547e70e9c72b55492ea577302013c0ef5c
-
SHA512
4fa970b4aa5ff5a5c52403a5bf3f978ee56549cd26e2e02a105f52ffaba7ba638b2646c168cbd3e653cc713184ec4dca789ced94af7b58898dd901942c9de0d2
-
SSDEEP
384:SnzDGxcs/uiLqG3DrXN9CVI7LTaSpLauVXDhrXNi7nai68GW:S+EfDV+lF9rXN2a8R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08c1e27c8b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008193d45db570aa59929c8b6bc98bcfbcbb637ebec591b44178322f6a8b3c72fb000000000e80000000020000200000004800fb38d677e901ce8d2ea00f2a54e216ce2ffe8936c768485526cb1390f79b20000000dc20310c78f833125dc0f44c69373a74b4bb4d665f735f281ee372a7fd82c2b740000000be7c2158d2dd01a6f488df0e1d39a02d42dc70e645d15929d7c8dcb4b0f12574da378444904f402ef01fece0a08f67ac8c0bbcb52e605b32304a9549991a4d9f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52963401-1DBB-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423149452" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28 PID 1976 wrote to memory of 1944 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80d1467f42349205d3180bea25a5ebd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d266afa4224c8d7eb4f8cc84d4b78e57
SHA16fb4397029ea9c669e6d8feaa5452533fc59be1b
SHA256003ad2ba5d24b5ee08e0edcb1d1b1432d45405d32bf186b602787d964aa626de
SHA512fcfa6a52e69836f82ad009d9107a63ac5de9c1745d1a0de99b5a72c04fa51e61c9aa20e9edc0ca986ff1baf77b25b56b9165ded18a285d42f53ddccab1ab212b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808e73957abb9f066c1e8b8398e48e58
SHA135019d0ded027ed7dbb6e17d7705f22a479f25a2
SHA2564a20c81f919b632506a8fc06d5156090f9effbbd7c0a12584a691f0a9ccb5065
SHA512d62e60772488504e7cda4e4fbdaa8d099dc0da9e25d74ea1566d8abfab74a9aecad5e2db8c19df1b4d13ebb2a3a972580e9d0eb9634b053763bcba9df08acf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6abcc09acd1be0bbcf55bf51a0e4027
SHA1f93f316ed74815e425e01bc44e57d95ad70363a8
SHA2561780278169bdecd3d701546a4fd5ca361d435956c3d037fdf9fe221e811edea6
SHA512ec48e5cd40b15528faf21c327303eefdc8bf66f157373d5f27de7f2d385e1a2e58f285a1a46220a4df321427dd04e5203ce97802991ad1a815f671d8e70b1c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb369baed4c951c8c359c5105989a7f0
SHA10da1ed951a3cb00065b14080edff53bf28900a76
SHA256c1c648f71ee211e64cce9776bd9f956c43bc8358bb7d051fbf6e9814fc75414b
SHA5126b91a52c798511234c2631f82ead5f8aceede942ddc62754493993f8b089c6ca138ff61b47a8a9be815b7425a7cfa96152240b1049b56c421a4551fc3c48625a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5663e53f8858570625c67c960686dcb
SHA1b6321974216eaaef4d78152b304ec59d92b3cb4d
SHA256ba8ade48903277998fc2672c5d330e0ddb194f31deb7fadfa16c46c7e45ec6ab
SHA51266baf69fcdf13d25f3f1ec94ce4681306bb7cd5deb2a4b0ebb932f0115197811d4dc3b534c550c96f99d2344f9af6986a7578a9b8dcd8895e2728394a234dad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b24e3a4d1493f07bb5f65b97b7df6b
SHA11ea210f3e3ff38179ae87cfa024eebe0173ab7cd
SHA2564aa72fee8f83a416ae2701373bb4a092ec1807034176e2c86221afc9c4b85300
SHA512c30724e81710036c9f343013837a46c17685aef3ed95ae0c07aba28dc2218fb42cc7f84613fba10a2579fabda296e83fed8412bffdcf9b6a4f564c0b7cc0d8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b41bb770250aaa171bd2bb2c8f8ca8
SHA12e4fc42223b783e1adffaced887c87b3b3eccd26
SHA2566e7e148bab5b8a9dd451c8fa0000e193f784efdfb2c02dde6b65485412ea9813
SHA512ff5f59b52fa313c9cfca03c18ff6101025e0ef5ac248f8c9f42ed8eb55c54e226355b5decb3609071b1b8bf301b29559836ba0151fa52d57b9f8ff24b1c2cd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6adcd9ff875c80f953e4c5aa03862d
SHA10513cce100089b041dffcbb922ef7f0c315c666a
SHA2563f4ff0fc910f2799b98c641d000314de2dfecd42e8d050fba70caa6cfbc1f07f
SHA51288700ed2896ee2834eeb07fe17fdc976fcc3e4cd33f7d4ff2eb7aafb7e2b138abf07f8939cbfd4ef2361047cfa1f26bb806bbf63b4b2b45b224897b1e6231afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bc9d08dda283be2a358711a1d26477
SHA146c5001350d8c02d0708576166a1d3f5fbc5e00e
SHA256372e21cc0243394062a230fca950ba61b2ac583d268339064cb44536898264f9
SHA512cb2f0c914df83e5b799a6dc2f8264c89e26e87b3b1518f821d500cfa0e499b7fd653cb999523cf09ca38e8f05d0dacfc88c3d9b7480bed74c28741c6fdf491b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7fedb1bd484da0a38df3a8aa032c00d
SHA161c0e256c0e6d3a3d361fd03ae5730e6ad9d05f8
SHA256d92a6859b36621f58f73e48d09da7d9054b9a39f3440082151fdf0511f21fa0a
SHA51209cbe296302885fdaa43d1978885ce321fa9ffc654e6b81a87916f77a1d51db957883b8f665361ab3415de0281a1aa51b254a4491bbc5185e342f408a7fc4d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f379edac2aadae6a5739bae0eb1182b9
SHA1a19d5c5a59150ecd6e26a675c4ed421ab9cf5b4b
SHA2563302c542f46c1c4cc1ca7090c2da573a357a25cf4c2754878db00fe67e12f722
SHA512090a6f6758eb42d63da555312cef04a6cd0e7bc2393fe619621b607ca537e9886b28e5a691d55fdb494fb2024f275770af11044886d966eba911161dfa08ab9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e501496db2a72f2b5194149bf2f6369
SHA197411037e026c2dea6d1909066be62b4bec62bed
SHA25633f9f2d1e3e03aeab323cf55de91e28a222502bbcae2bb6b9963e953ef1569fe
SHA512a9742e9d39ee1d3adb8bf586d325aee428c17122ad9edf5c84ffe870942ddefb33e06f05ef44842766ab475a991dfb75d11352173694e071f19e789e81be9616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65000533b78270ffc07ca82b4c25bb7
SHA134cd2adfd72b61123a85e5c9acbc7ab81d0b46f5
SHA256ee38c04e269203e4d88cbdce22a1c249eae5dc21e02dafc678367425d362c0e5
SHA512f70e95db0a15f342624c8941837bcb86f92cf0ea5be3e7396b7af8641e34426b59be848c96f3d48cb2fe398ed8b1a89c139d6e356f31bf60103155a82d2311fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d4ffde3199786421d53c91e5c9d72a
SHA1315824972fe31ea00974e1dae06aaafa62081664
SHA2567fdd34a8d00b575f60862211578edbc9f2648d41cac28390af58658533e66db8
SHA51294ba0b7eafd9cde37f714449aa554cdbb50bdf85d6aa5ddfc65087fdf19f619b788f5cf6df6bebe91a308d7c4dba754db85fb69b66a8b4848ef2b6172c8f8bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e57cb38b75dfd3cd9800872d7735445
SHA1cc1f5be3a8360aac33246e1e010b364332469f50
SHA2563a5ca200b985a1db593634542720cfac0172e86bf1b70785ff30198c690d789d
SHA5128e25fd007929635f28252c39718347b16884338d3c96bf8bc58d9ca822fd6c82c16ba4e206178a6e25ca41c9e6bebb8326b255264b7694a02afadc44bb104f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e05e2500b6c05801435034a06f53b8
SHA1224250bbaa4651ee3a8532f2e5acd52c6322a5b8
SHA256f7760f7e844f6f928f3ff268a569933cbf9fed55e8da2d852680ee70137bad1d
SHA51275f2842d05dce898095cc322f5a3cb8752039ff9a1975d6fbdff4c09f6bacdc169c3394f04e6ed3a2831255f80b9da8d166189a5dc5666397869bf4c8fd1eff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d652781a6853176ade20f8108821f4e
SHA1d0c0480e22a4f46852d4dfa1d7e2122ab1e00ae1
SHA256f953a83ac114e4bf12ad2bdeffb89b0b94b19881788dc8ed3c657a4212f2a9ef
SHA512ebcf0c4563cdda784e2a11179ea6ad1e4d3b39aaea3daf12c119a00f1dc13774d6a41292bc52e4c64896028fb06068ad907145404c24ab68e596960324afb7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d7efc50b23dd38888bf9291b610fba
SHA1a433714d4f5814e8e4a569dbe76220eaf5e40ace
SHA2560034c22dd806176a7e442f3e31940bf49d97f57e4501425d5c7f82403ebf9726
SHA51232119e997dc2f0ce0b22c903b65de1220c77552f7d4a37ac94289780efeddd0d140267dee0218b03996b6633cc87aa29389b0b75e511955319f8e6fc6d347ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581417b5e49b09d43f40a62131cedfe35
SHA1aa72f773fc3d4121cefd3b0577627778caa730b7
SHA256e60c17d81185701d3f52dc9650fe57ab9eac538eed83ac29ff6f14d6ffa5166e
SHA512764e6d72d7df3497e16d71814f0e6943332936f1dcde1ed5a06bbdc15d0ae4f6c1c58b92be653dcc1eb25ce94c6c1cf30bd96a9b644b3103f471f92ee6eb3fe1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b