Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 00:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
856a0c5a11f1ea8eb5f095c0657e6f41_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
856a0c5a11f1ea8eb5f095c0657e6f41_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
856a0c5a11f1ea8eb5f095c0657e6f41_JaffaCakes118.html
-
Size
4KB
-
MD5
856a0c5a11f1ea8eb5f095c0657e6f41
-
SHA1
a74163188dfdb1bc494be8181c27cc67cadffc71
-
SHA256
dbe3e5b662251e3b21d8d2d72e60d3ae39b7e3ff0d6e20edb7321707f7f17781
-
SHA512
edf32ce0a4d11e9a7c5d370ca2b725f2141bb906b728e06665e9f6024fc761eedae509f680557929b8242c3a0ee4579383014fb14697f2b91ebfcb68ae2d3af5
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oVdlbd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000015f67516708ab7249ef9e7f4e17c6e833c4ca49e81ed68c2a1413042527dd46c000000000e800000000200002000000062092cd23b5c4b3b7bc8b1924845182329b10d15c616843a0e871d32fe1cf80c20000000816ec0060209f61f78d8051dcf38a047a34d455739913cfe758d388ab111fabf4000000046260bb48328e4c6434e01c5e08901e90b91cae1a64a624d190be7aa3973af3754ec7bada526f70bc0f1110928615af7a375b55e0ab56ac4930facf033239c27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8053076ef0b2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423276702" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{997E4731-1EE3-11EF-A649-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\856a0c5a11f1ea8eb5f095c0657e6f41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518458f2b948632870ab2930709906193
SHA11fd3aa9bb6b9716ca6629b4cb24387b45a039743
SHA25649f4779a290a7eb7b599b41c133356049198aeb864e88b18b6783dd92577ec39
SHA5128ec3dcd8ef6689081ac1a161f9d940237516b8a463a54531a8a86e9edb428d8cc5e519217759db008c5a0c421943cdba5a1974415e2444e9d75649665a8e1f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7223985e02ba27bb5326ef44be32b56
SHA1c628452342c56ef8cf8b03f53dd0d1d3101e59e6
SHA256c6df2e752266d2e2354dec0d7376869626f4554aba0b3e53c87eebd40114b581
SHA512b82e3f2c216c4f75e25616ab0e4f35b06700f0f586f10e65ae0da1bb6be5ffe960e950ace641259e304a91cb8b5ecd0f7be82122140dd37d4ac0012b514719bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd668c37ef5afecf52aecda459f5ed0
SHA1ea83dec83b6ab01682201a4da14188bd2d761734
SHA256d61a7a8b1c5b39b4a55742230630e10d8ef8349e65d3ade846cd94e2c21a5d34
SHA5126ba38fe7280adbc8beb253eab063f5a19068eed86dfe6c9bc890b3d2ac639b7c86fb9cedafc4a2bb5c91ca2f88d7d184c156012fe882abbe37a3bc5f954ac575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b25dcfda4315777383fc090cffa444
SHA1b6983d2b192928c07ea6a8b4fc81fb4c7527111a
SHA256ce3395e6b6ba87fe530f051c5cfc0c90ec41dcd8f3ad84ca8360c8ad40c33894
SHA5127ed69617086b913c89a64eda98c76446496e79a1c7a0cce57003459d493dbf7802a308912eff2d7e92bbceb8f402a1ec309a4c25d73febfe3af80d5d46292d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd3508a7047a216456408ae713e76f4
SHA1078d799e0a93032ffe1b2280f87486ef15172caf
SHA256e00c607949cb116524a4a64551e68db4a66b01af24f11b32e80391f76dd0bb47
SHA5128f06112ff60ed36dc54d0b8729a8872cc43417829e0821f053c6541f40b1ab4bacfdcfe12498ecfee50f481dd27c15e48a8d0f390611f8b38ca60a8552f931ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50307101b126748799460531800b2666a
SHA1dcdc2b374bac7098ff129df02c33c2e67f9bf93d
SHA2562d5d12c85aee7a52b1ab7b490f03d8be6b3d8567f619db25f0b9f840157fdc60
SHA512f583d89e968b58c000df7d92ff4497c1506fb7a4b1c634fe51e6aa8ad4106c09f6088a380e99dcba43234df7b4bb74fc89783d79c1947ce8d2fea56ea30f36bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdca35971cb8a5678f219b51abf7464d
SHA12c2a12e073f26ef2b6b0c8659c2a92a9feca1c11
SHA256d376e6cbb8335e209585f148a0d3061d7414d6b8dc61147737bbbd5fb11210e6
SHA51269281e3ae12493a22921325cab218ab302097fd9cd4c199afa8439d2c95d3a2bc74a8c53aa1edfebe5ef94caf42efe6821d0070d8ec7ec542a1afbd505e9b5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fa70ad40d5592ffac5a08b91284e9b
SHA13f06f2178fa13476a8eb5a9a3c1db80a91bea204
SHA25644a27d321294643d27dc506a29ffc5b9a9962bd3feff803444870c285f1294ee
SHA51285a38ee34c385946a63bc2af7ff25aa9bb81cd4fffdbdbc0513bfa5d5e755a72996205cbd1e117d92a69ed4f5489a5243b9d68203c7ff4d4cf87591bd350a13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d987c76ec9290da266e8249f57de4815
SHA173511dff88b68763a73662a13cdea98c4924da7d
SHA2567eeba2c9f619bffee08eae4cd0f6b38afb5409eb0659b9495f863eb8861f13b4
SHA512cacba05f634ace47ad020c02b8fffd05417a29e7ee4472d73cc1c85e0deab57b9d4ed9e794a4dff8920213d11f4901450cd73cacbd1ba42e71869c247f8f0168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53366c5db38ddb7e4fd1f0fe2025f4540
SHA1e0d0c89b1c752938e010725c00c17999772c71a8
SHA2565119866055712d1adb25087a44da3493e2ac1bf10f4211bea03f85d013831ad0
SHA512a7149de42be4528fa16ec1f7d1434c13fb6a26e09ea7b7b7e0582e3e6184d30292e9794df8b6f4b8c69286a975c5fe80ca521def1ac68b7c44208994c1727952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559811a2f9d51fe771bafc13d0a28b839
SHA124e6db5f8ad4d1ab298449d5144fe7d3171303d5
SHA25650ec5701a44017b11c1f49fe4bacc4df696ea49125c40fbe087f0b38fabede14
SHA512627fb518a9dc12da17427ad8f2cb04bac18d9a9f3298b76f572c9c735a665595e53c09ac1b6e7ccaf902d363df707dd59119ab8214cd99b2e939b25231ecd4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d595b9136c3a67bb32f1ee86b05cef
SHA1153755de58aea065e7a25112cb64fa2f32cf2b80
SHA2565b5733292cd7700e6602c58ff68a49878c5f4240fd2dd80a4a1dbb114eb65208
SHA51218bcbb34b9be29f064352e503e0fa2b9b432a124cd8715416167510b0bbe6eaf16ec7c93652d834ee47363b10b11e7a45e3f7ab6731f80c6c276c3caf0722ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bde46e0c20633670e140b1c05cc9c9c
SHA1734ed4cbbbacb9cce90fa80dcfb50430d81fac80
SHA25681b4f6c213370300d2d60767f25e3065bf7589a2780b8ea58392603d1327aabf
SHA51225e3756b6f17f12380663f6ccafe588ae4a91ce9256ed9ace7d03578c383c96c3cfa43bc6dc9ecd439185e593f8a9141d627c6cf8dba5fa9e89c6447f585e3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbdc857d96b820cc4b1fe055ebef36fa
SHA118958aedd3b00d3f2917e1a6670ab696d7bf0ef5
SHA25663b09c2666624f13871a4933ed0aa4ca5f79f7daa986eeac0babbad875fe3c35
SHA5123cb31a0e7ce65e1312facd848a1427e590cf7a941106bcec3547606280bf32119bb383fc91a5f7061f414691f7741eb4f73fff1c77b2889c2556efcd69502de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bc3af84c991a9bab0e011f699119d8
SHA1c6821e16fc653584874faf0e51f95120b62e82ab
SHA256e1c2b3e8ef86c073c4017ceb45c23d51eb1224781fd41d72f79e49238d00e7ab
SHA51232c56a727a9dd32e30a9d8751e563c06480fb403b44fee74f21e38a67cc6b33d30d87627e0791806741e71c1904b74846ac847ac7b9fe73b78959d8db67b184e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef2b3d0984d191595d1bf06816e9381
SHA1400c539ed68194eae2eecbfb35729f7a26c13874
SHA2569bd855fe53fbcd92b8c00e9c36b3be889f949f329318d05bba25a7507c732412
SHA512eefd3f0f5190e1d8250c8a9b5d6f4175184e43b68002f0a04fc50afe727ee0bd155c119e77cff077c404520a3f2071f7bbe4035e3df2a0f1c5f442ce5cd0fa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbda27388a877e172648ecebb27d3e31
SHA1df9fa663f103dd000123ad48870fb1d9d89e0755
SHA2563fbe7d1e43df23a0274706badef9571c95ce2e9478ddacab43802c5459918469
SHA512c28ce3928f6be489a28181cc419df4827f0e11d096c80e46f52db403fdad5c34acbc5108207787cef487bd307c38675665c0fa6fe9a118161d4f2fa7f19b0a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d1712cfe5e88fb158b2e1a5349b93b
SHA13e451a9282cef344b8f3290aea55885565810499
SHA2565da91e4c991d311752d56ec7432431ae0cb944e8a16ce7d2a66ddeea7b3fca41
SHA5125c352cde7c767e7e802b982ac37273b489865aae7f8059ca70ad6b6c64b23150d87317a2089a884a9c9f3a24b96c23e4bfdee7ee9099f7f7c0671cacdc7571aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fac9cc2ef501fb595dd53d98137395
SHA1a5c9c083d3b133ac46f63d85ed504c6fe479b735
SHA2566177020cd48439d6040a94b160e35206f32535c402cda9a2353f8f3ef2fc9d7c
SHA5127f24b51fee145deb32c0a46c466861a8d6f9808d8eacc89055617cc3c3218cd08f9336debe3b2c70617774ee7dab93941a3b44d7efd8a05102aa162c22da0748
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b