Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
939eba4b886d22e01436a8a982301133_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
939eba4b886d22e01436a8a982301133_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
939eba4b886d22e01436a8a982301133_JaffaCakes118.html
-
Size
2KB
-
MD5
939eba4b886d22e01436a8a982301133
-
SHA1
18a956988be4bd517b08019afac5f692c334e8ee
-
SHA256
71116f30b2da8360a80060ccfabaddcd71c0707aa79cadda3a138a880490fa04
-
SHA512
4a20ca72fa8a0bc7057c5e4784387aa54c29b9035d1edd627b9d45094036bf72de2a6d08b6261434850f9c8babd4e74e2c9f402d0f19b954c170e423fcd18414
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000019dd69d64ca93e88242cfeff7b1d6d76b8211313501a90c75a25964563ce9e71000000000e8000000002000020000000c87e604afa0c21f8a9580e98162ec87642da7793f0620c5b636e46f8086b3063200000006356067bd25cc0fbfe76377ed9b3a13e9807b5e0cb4a7953f24792ec6b06ce0f400000007979790a11f973c9ec5179e2195663d49e018d1a8dab10f11b96ca4dffff6cee7c51439c2c6bd6e86dd4de10baa900aa32f6821c4255c789facc450f536ffca6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e2a7553662fd59c1d67f7174de1fe9d70b4cfd7717c0cbc08662d09d665e70b2000000000e8000000002000020000000531e58e690a23129b426f1ad57cf8e527dd9313a3dd5783e1e0a6390233bb90e90000000ce6fd6a2e85a03e8a19f4b58ec155484c03526a8dc4445a8fff71b29f20a0fbcc5748a1f860ae3000614f3b0039a2ab7f14ba947be507276440b76716f54c8b2f653824175e34159400159673370ed9ccbfeb5cbf9ae0d7f2cd5d2b498256cebfcb4bad122aa7e92f083427e140aa82b69ebe14c9c64d97037a09c23589144d81c1fe826a20bd3dbbab5d9a658dfb12940000000b5adb445905bf2072fd77c85e67a2db594b71fbf9c810abd68fd5f09f2632645a5e3020b7b30028818537ecba47ac50ba20161e2f159d192f9ed27c71179cbe8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0097fd537b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423637224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00C33D21-222B-11EF-84C7-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1636 1916 iexplore.exe 28 PID 1916 wrote to memory of 1636 1916 iexplore.exe 28 PID 1916 wrote to memory of 1636 1916 iexplore.exe 28 PID 1916 wrote to memory of 1636 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\939eba4b886d22e01436a8a982301133_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599150b256600fdb05d2f112340def3e4
SHA16313e878fc38a0bc365f22fbd9a40d04e0c87f25
SHA2562ef324d60dc39820ce16141cd321e2a7124a6883e32f34948cd4cac5be493914
SHA5125e1c1ba1f20f6ec2942eadc41cf9462006a694e932c99cdc8f6f5c0366bb7ccf924a4199aadc4d894266f6c29ab663445eb20041227d505ad62a960a9a6773d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50986471336c2ae9d11a8fc05b881eb25
SHA189953c3951a6cabe5a9317e51e7052a042428225
SHA25665e6b4c95009dfd1d076f7cd246516d7e915e34d4a9c012f2f4a1e5a83e7384c
SHA5121f317bf1bf8c564b8a3458f4b6542ab23d67c20c60618b8f014d63a8d15dc5282613562c9c6c929828f18c457f522dcd0c1e08b548bb003555f9939829263a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a3d849c9207b7b00601484489fccbf
SHA12e83f44a03309d4ca6dd1de004c134c06237cf87
SHA25645f71a368cfbc60782bb07355e7594dc68286c0b53851ab828408174995bdc69
SHA512d2baaa647f922d4008aa961b34cd6e5f304f16057e091574c90f3764aea8bf0f5cd8a39088db21f417d271e4b7f81ef95fbd96054fc5363cb064806d9162d602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f4516aab7e99791ff5e149c3110707
SHA19fb0ab83de1f3d3c83c1fab018b34f1b42f222b1
SHA256127fa705e0df088d5583735c628f7281d0eb8951abe3405e0010238dd8221071
SHA5125b7073040e455021894ad0fe3aa4a0f4905732ed637f0c089989825549e4c2e9ede3cb103efe5b27647793c4112e589fc8283ca50cd01f9892ecbbd39b64b357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5a4951b3f142d79cc696f3854ab024
SHA1a60d20e70638765b450d182639598d48f1435ad0
SHA2562aa8f69578747b3fd589e8f2af887a31404ccaed6a2ef4b15040451149947212
SHA5122c41e947fbb47735cb895b3450a47d0786abc42186041575f0f32fb428e1750aea334b0fe1d635c4d46c6f7b46f929ca02868f7e55c679636e1f4d9cab752a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1e29885900555a7a355d0a2e2eb516
SHA19ce4ea0d59630cc66f8c8dcea365b3c15be8a0d0
SHA25657c334f1c57bf981ba6f50ef54f7415fbe1d305c8b2f7397d3117dad65874243
SHA51284ef8113b8e0ba78e303b76c1476973c144832f5c924b9396a2413dc2e430d29f72f97e4a9c76a1ff5aa79b02af8ef873ee3eacb3d1294039e039fe12cb80df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582230e50e8f089de60a3e48125e5cff
SHA153b0a3a69f48cefa4b5d34961e7c4dd1327229f2
SHA2564f73cc0c2835e9ce21c5adc593f1940d2066e3ba6616a91497a4dd40035c408b
SHA51200dc5dfc02a54ec4258dcfb6e42905c2c4e0dfc74924f0b6f76dad863bef91efbb8b352df4b57e90325e899490c02bdc4516181b72588d117497944000c24e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd7021a52e37e98054c3b78427a68ac
SHA184ddbe421797554b82d111c83c54b2c5a95e929f
SHA256fe2ba7a277ad70477eeda1097085836a7bd3f1baf3cf6559e91cb4fc3b49cca9
SHA51214b5a84ed67fc2d106a69feb7d55aaf5a6a67d1faaabdcf5ecd33c64ba2ab9eecb31a979204c91cba42c70384d351a577a00171c78738aed2046b7cadd3986cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2df925d2e4c7c465b5b7537ca6bdaea
SHA1d8a65409a7c8a13fdf05d4ce4a076b77162419fc
SHA256702accba11a635150c9df22e7d3bf62bdf9b6795359b442a2d422e66f4c88f28
SHA51269723eeee867a4be703475015460c0bdec754fdf3f9796b5686f8ca0834f2340aeeb1dbce66b066ad356faaeba742ec1bc9006add10562bd16a22bc2d5e351ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c157f192d5299509d6abc96a05eff5
SHA14877ed02b2c7cbd7c7783e46f74c2575eb28f3bc
SHA2560bd4652d37a172e4a36e4f296d22f6ebce6d9a1eab52b4ea9134693e66b0d0d0
SHA512e46afe144fce52fa8113d6aa81b4444ebb90709eeceb14c81f0f284ea32f250f29f52dffca569ae38ef9a8829ad071d44bb1cf554c320c9ee2af5c31e0cdca3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59c759992e58c757666a35ceba53e43
SHA1be273ba0969dfa1a46d6e3c902f78cd7b67d75a3
SHA2566b771d3ed761648de6e903c6b021570c6051a050ed632700295b3520eaed0be6
SHA51217d50524d61e93eed782b05d2c507078844e4a4fd454ec854b15920bd2caf3050a015ce48695bb8bc92d411566b287524ea7bf57e1494fcbe28e0c00570e818f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562faf461f190749345eed3aaab1a6c11
SHA1803a5619a8ece5efcb8fc157f8bd4e62b32452da
SHA2561f50d5eab81b0b1cf402085aca31a8ed5b7c1c7482d09b4c6e69b6e0e9e60af8
SHA512036334a463dabe9f53b32676dbfe5a0da4a2acf9ba7dcf4e84c6eb2b036102be8c322c8b92e4c1223842d0389edada2b12c45b015f7f2b70cb8ccfcc8ceabc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b636fd499d9648621d6ec65cdded101
SHA1c7b85ac4ab9661c90b114c02a5e562aace304e8f
SHA2564288af92258be62e7ab3df8ae0fdda0c2a1546b779b9bd421c961cd207cbe7f6
SHA51252810c9fb386ed2b310f980dfdffb71406eb6ef4f1d39a95df9a176010e3e3b833fb21972c673587002dfbf82015bd836fa0662cec276242516c57cb4041715b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea88f88069845dc8236b6c03796cf2a
SHA1617859af29e255eb1933d1c239f4748a20bd1b5c
SHA25623671cd264b8aef02028f566ebaf69ce4f14c8487b4aaae9c51ea6d18bbcbd14
SHA512c92e2d96cbb5d93eadc8f3dc83527a2ee815242852c5d8b9fd54b33ca6d4e39ce9d53094d638416efed94f177c6cc023c0aebcfe87e5f6547bf2762c32a659cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4232c8e042c1cb0ff542fa1d0e3f74
SHA1f680456b8019ac4754cea22b08edbd8b3919a12f
SHA256914f59fafc87f2a257a06503a4e30b4933953686562b46ee8fe59db0c7426a7b
SHA51230fc8fa26cb7b359f517d282f703cbd01840f7eceea735fc8c4d118b196cb2f0fec6b4d89cb31928ae8f119e4bc006f453cb2f552be0bd4b7842113b2d9e445f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6f0d4174853aa2b6ab2784a8a45cc3
SHA170497c2800a59841bdbfbff53171e73156299a6c
SHA256b2e5668ef86869f5c27c294ccafb3ccd8f3b57dcddac570ce43446a294c0eaaa
SHA5121e9541533a17e161011efd528cd8f792f11605f363c548f061474c0aee952e53aa4596ef0923dcd3e1b58f5263a8cb5399562620e9e10757975647602230fa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040f9389afb9d11d055bc3d6772d6d03
SHA199d3b5ce6567ffbcf961678b63db972938d1820c
SHA2562ee6b3f2e72961085782d6a388a8c184999b88cd4546460967e0e93c525b353f
SHA5122d0c8938f007b0de4ac9f0e976c7e64283644f6cd4d9bdaebe976a78e1392778ceaf0ada9f043ecdcf334dc9202e25eda7730d94fc275a12e9e2f306407c6e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c59482d8bcc6658b21edf2a8cfe937e
SHA123cb7dd1e277a8b8d7470bce9e2cbec50e8d19b2
SHA25638e2b41329f2bff4c120b61e9bdf7ccea1e175e145af94a241335c8c5811f8c1
SHA51259de8ef15df8198d88c1df785c677c711e0bf0d66a17270ef72702e4e378e2fbb56e9838646af1b331a747023ffcfa9805676b60fd5b4859bc8b4dbe180ee513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306dbbe397c5a8dffd41f4e49881f17d
SHA1998136162f6dcb31e9ed2c74013658a591de4634
SHA256edfb781fc2c5041dc7625df0ef7d70e65f6be12d83616c379c577bdec666c1c6
SHA5124f942c2d85e2f5254066b140f42cfcc56b404782f5de9d53cd6a13ef4874a634bb2d48afaf74241a12b297141ffd36834445f4498ca8e9aadf5135b77df689d6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b