Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
817e6c09f1124206be4a7bff118895eb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
817e6c09f1124206be4a7bff118895eb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
817e6c09f1124206be4a7bff118895eb_JaffaCakes118.html
-
Size
4KB
-
MD5
817e6c09f1124206be4a7bff118895eb
-
SHA1
53cf2aeb56e143c77ffb5c40d92bba8834f50b15
-
SHA256
475600ee58a4c2cbf5edb8e59dbaeee511224696cf0c4cd2dbf312f056d93e66
-
SHA512
0f1ec648e72f433d3a7fcb1acfb27dfb39af3e673d19cf08053598c2d780fa59a5eb8c4d72e141d23886f67f315d60ffdf44cc64d0e6183ccb7a84b86209e709
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oTX3yd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005b2e5e37f7b8878011e607f46de25f1d75846f78a8d17ae69728fe468d87eaae000000000e8000000002000020000000ee161c6770a7541f9fe6a7461f2ab36b038497d5066e4129be2ca4b89230a875200000004cca324f9de4d18025b491f452d0cf943088a5d0f9a19551ddefcb247fc28729400000004b8d48f9d029bb7bb68dbc51dcf3d3989a714c53f158129ff9fcab2a8c65c26a50d53038042853696f22c68eead9c860af9b1b926da75b231a315d45095d6625 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a9593ff7b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AD7E7F1-1DEA-11EF-81DB-4E87F544447C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423169680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\817e6c09f1124206be4a7bff118895eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c5aa93fdd1d74f2cf85b335e998645
SHA112885ad9c1faf875058165cf30a48f4c1a67fef4
SHA2568f53247ef3a653bbd814476d93bd723c6843f484659f42e56e98c9b516e776e9
SHA512fe7948c312f348740110b76939584a03e1b4f3cb438bfb9230650a8be38ed7e744c013dc08027d961b075b7c2356b240c6797a9cb2572fff358f1881ef2ef6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b30a5ac4c59d1804af08d2f23b1451d
SHA1dfb02532b9fb15cd6906cf0d18db063f9bf6b30a
SHA25674fd766b3c8254321ed0c6a25d25eff891cb23329cb73cca49af61ce3e80a98c
SHA512422194ed3a944278e8d7e5119c22b92a884e755c1cc762cb7cb2ca384bb76c9af241315e8c7d0b0fff759be8b409c6623cb091a82c59de2515589414eaf1870d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87d97639c6eb6e0be32bca81e3c5c31
SHA14fc5a6a23e521d99cd4353fffb5c0f5516f34b7b
SHA2567deb5feca4e23fc4feb222610b967854bc63d353d21a9e6cc99f11180a283f67
SHA512217d5a3527c4d6ada7a4a601837f0f20d25b2d2f542dafeabb955bc5fc82a1fef345c0592d00228304d91a0409f903310339bc37a9978d988337d57688e4a644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e928f68e7a1dfcb938118b78f754e2
SHA1fca6a70d4adb79d5f18e290ec10b6ea477423c26
SHA256a7ede2894b31f8c9aa093c2b44ceeb5eb240e4fa1ac5c3ecf44b50b80f6133b5
SHA512743a32e07e1c8e761770b013b1388ad7a3d6f2cc0e91ed3d5d71e66f71bd503378da06cd9c55dd920b624e83209288d9649e0519a1cc758de4c77c22bb14b223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca517014de59f96c8935cc0a8ea243d7
SHA12bfa11fecb01fb82cb104bd5b3e07bd9867ad48c
SHA25649560a4be383913ed6ee7a387faf231d3e2f935a65088975aa3409cae089c4a9
SHA51248d8bcbaa600099f6cbef099df8364ee5f66de71e2a422c70a6af15225c91efa72bcf61952c60b26f0e10e26ad6ab74ce7abb4ac13dc7af0fe1f522d4b725a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee51071d20bfc5535d03c1ba7d5c31ea
SHA1e0aadc1058fe34e1fbb0cd6cd5b87b3223751869
SHA25614da057b7a108020ab1d62a4036c0c897bb9bed72b119d15e282d5a1179859ed
SHA5121669ad618fc0f0a83854962343416a6f9c63670db1ce975a049abeecf2f6956762e1baa451bca7947eceb77b11213e4911bb680f2cc7bb1679d41b39cbf9bd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66e8cc850c8d850ee31fa35a00b326c
SHA16043e64715da410b6befb09a05c0532632106eaa
SHA25621f40084136e6a90a421d2654d9844ff101cbfbefc999700f00cd5b916aabde8
SHA5126fda6de55a2b62c71bc9e74368d25180314806613546baf1d08595564f3a606afbde10901b468cd2be598b21b18d64c45a8e77a5906195e386e68ce5edb3e92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dcdd02fc2ed939d1be4e932e20f42ea
SHA10115e1bf04e115489a4e3268fd082edd2d322e73
SHA2560b252f8226a65c31e31a6796cc88045b4ebd26cb71970e6fa0ef416ac755f84a
SHA512e2a5a505355eef5c15f6f370a1121fb0e2750879bb0f3626005f15e1c40f84699e5fa657232efa045c2be6b913a2c5766fa4021e98427db188224906818ea3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccbc150cdf6c8a76f71c8f15456a659
SHA1782ae79002cca0bdd06a2a3780bafb836ae83390
SHA2569113563150b9639d6ad04f44305cc33b88870b7e2c558ced888ab367d1fefe1b
SHA51288c2a543f7d44c0675ab1c9c8c1519ff83ae467e8e18a59cd618d5fda4150009172fb4c2b03172506c8a436c9192a40b6c76a3fd28e063f6d402ca00c1496b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d598607404b1f52b6b0918f186ba34
SHA1432948f4bfafcc65c1d051eb55813151d9e37110
SHA256ffe11b1d4e449671523e466c3a76d8bb9a6031d3e65897dca27d2c37d0c383a7
SHA512863fd500dda983ae4ca45dd144afa3a4dae75378efe055d9495a660c8999cca187bd35a4f5a439ca71cfd369a0b540c5ecbf5181b39c7162a9d523f133769457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6cdfebef011cbdbb832e36c4849dd4
SHA1f7bbe0fc36b42968a7a743a6a49825763002e7b0
SHA256ffbbcf024e70f657a16828988aa280c846d80f965c3708d7f132d8a006e51ca9
SHA512fa4ab261c1e6de86442c7061f8a1a74d179b9984c9bcee7ad94eb1ca75ca7296ef6f13262c3f87f25768a7303c665e805e4cb6d96ef7ccd52bebf483267728cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58001292b59c51c9ecdb392276a2b8166
SHA12fa48e5c3a0cc9f343f47ceef18e20de0e126e2b
SHA25674e0592c21ea9908786b52b0c5d04c424f32553697ff6aadd181f4c19f5cf115
SHA512163f38fc8901582a826309aa7a890f83a417ed8b6b2169fcd2cc309386ef6ff0b34624fa86d4b7228be9c59de45246c592dcffb43bb69b800d059336db89cb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548abd76e99e3475fdd2c938279c85bb8
SHA1cdcc4df866bdb1c0b79996dfb8ef1e50dabe0de4
SHA2560b27810f0e0c7e49d71f0e687c1261f819761a4d664cc197aaf9cbc58e419f09
SHA51217a210cd6dcaf33cddd475415312dc2aa4863da3f88b477f5ea5c064270e3c1a7a4d63c14a981e1d534fa5732618cfc4fa835b161cb16cdad3a9194d41bcbc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f947ce2afe5f8bc859eded2fea79fe1
SHA124a5105f1e810eb3eb1a16c3cd2093f94ed8bfbc
SHA256eec051be8f20c189b2640d8c03951b251f5991cd0526bab2425c7a9aaa3ff4b2
SHA512910470865525a48f199bf0cfcb5527adb6e69bf7ce64d0e1af860b0b8642377cd522b69cef507f5eea71fb6ad131f46510f492f0798b5b32f3a951aa1f2e13de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540dff4a1461683e50c65f3fd8e91cf57
SHA16b9d04b59bd4b6f0d21bc2ff00b8bfb0e4acd625
SHA256e0b102303de4afa5cef84fa5b9e2e473bb3c22e9bf236e9b603cca2eeabe84b5
SHA5128910b2c1e803a60f9c6ba875282597920a512264bedd87d191b58fa7a19c1b9f55382781703ea4e9d2be3df59e8982f82de0b38d91e31311c54ebbb00646e4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa204f5831efa761f1ec877b5369c5b
SHA11653fbaed75ee3026142d657d15934566ccb4aa7
SHA25606dbf1e0f29b6a243fceacc468d54638f40a0f675c11eea9225aa17be0b092bc
SHA512603a160e494ecbd772ff1d33330e7ee2f620fde2dc635495e5c820abe13b144252f71ea40101560a888c90020733fa747cacbc9b48b813b4e54656552586cf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74df7af3682c9690bf2e72e332d28d7
SHA118d128e2114f7dd189128fe16da54c944d4679d8
SHA256d56e48853c7961e6c10cfa7c05bfcf2a9480489a837d4b2b14441b3beca59b12
SHA5124d7e693d4115fa826ba618f51706558beb8cd5cf1299490fba3f931321dd2c7741f6df10572d65479692e1abbbb68eb521d9d258754418c0bfde0b20f97126f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2af76c859c879990e3e390dc9927ab6
SHA19f04f7f1388a269775aac8ddc5cfc7fc14a0496a
SHA256c972bb5066a148648e6f22767d0b19997eb1eeed5a3b5cadc8dca5e7d10ac21a
SHA51278f7303e82c806fe54080e9cfc092fcaafdcb0e6a2cd35fa356d2fdf37924638ebda75833d625cafd0d364ae50a4bf79a1a384f39bdf8dc52e07ca5ca51e6fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af96319bd012d7a5111d695a20d02499
SHA160d4c59dd399f235e3c0b7bedd817af69274188c
SHA256f686b20df8c562d991ef4262aa15c30cb34600bfa0c73379b1ff742ea154366f
SHA5124624ed44f3c747a50a470403ae34afe6b9107f9cf2b3209a5c9f20d5fff692d9e9da5bb24d28d2d7aaba1f7850f3fb963004f04951020eac0a7f3fc863d3e440
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b