Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
96497f4189d12326e542b9ed73ab12da_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
96497f4189d12326e542b9ed73ab12da_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
96497f4189d12326e542b9ed73ab12da_JaffaCakes118.html
-
Size
94KB
-
MD5
96497f4189d12326e542b9ed73ab12da
-
SHA1
8864efdf9d7e181fa6253110a53b80ad88038486
-
SHA256
75aba3e001d861c07e09ed9e984a26e62e6fa1154b3864e014734d54c6993036
-
SHA512
b9f6b8ee579da25996e6c0672d6299f10f16cc44efe60fc03edaa841dd9b65ce313979b07f2e99422f37b1a9a68750e57c0e157b7ed7829f3af6159e968e2d70
-
SSDEEP
1536:WMLiN/+L1WkeFLNN7LC44e9cUCevXAf73yzZAkkBdkrY8mgHC+qpEyW:WAiGZNBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c088498ec4b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000e32a8eacbff04ce1302c2530ef8edbbc145590274c978f6cf4b0c5d3a4d0b751000000000e8000000002000020000000e3d65a954df01b3409458ba5375df00fc84e95d249a800fa108f56da01bf7515200000003c762e1e978fab4b92cb502cc0348143b8ec9aa6c40d36488f976f2b6eb3863240000000d686950ca8a9ad7fe17e43ac0a7837536a4cd20d08cf93042eec223877fb1b8783bf640504108f0adc3f20fc7464a432cd80041a925fd29ee44caebad458ed33 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423697662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8A7FFC1-22B7-11EF-906B-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1796 iexplore.exe 1796 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2252 1796 iexplore.exe 28 PID 1796 wrote to memory of 2252 1796 iexplore.exe 28 PID 1796 wrote to memory of 2252 1796 iexplore.exe 28 PID 1796 wrote to memory of 2252 1796 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96497f4189d12326e542b9ed73ab12da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf80b6201aef314299b03d7c74c342e
SHA189e31dd87a74bc4cd694f3368e16a095d3d51aa8
SHA2561905259cbd918031648530a5613fb4bdb2b4554f36194fca9e90ae32a64dc6ec
SHA51291f8c8b64ff963ab325763197052e93e9216440b7fbf9beeec0eb9b7133b3307e23ecf66de0edddf11908a0c6d1cf8e209740c29dfcb1a2167352764e4ec6ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6bb486a882a301fc5f17cd7680bc2d
SHA14340fd6ad1053a29e1e13350180fc79963dc1070
SHA25622993cd0c83a28e30c1ff17899aa538bec792aa1c66034d13720a200fb39a08f
SHA512ca903805e2f6b883ec727b5d73b74b1d189fa08f3992e5b24d5456fad3a59fb1f1d780f5648948d1ea3050ae72813470a870757a7ce45757d59d7ca267288a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53062bb5eaca0df4f65df243af1a8b2d2
SHA1acc759904e7d8eb76ee04429a723aa8a44789e11
SHA256e1c210f0e7d6f1afb2f6c026368e898731b3b35e14773c2badef4d178f7ad811
SHA51223ab5d86c408b665f33c394bb86ff6f394b1f701ee1de993a1761379d4fc657059a38bad7b4b63eca30c3bcbf390b6d2fa8b55ea5b92b02104df88994abb6621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d9525cb71f5af355aea7f6bfd57812
SHA13799eb5ffe38c5c68bec2f954cf9684d0bff4b7f
SHA256d363527333a379472b8fddf86d8879973811b278e2747d38edb769872dff45c3
SHA51224c7787c60e81e80630d971086d32e6abae59a25721305809ca2338ce8452e7cb6d12ae1685b1ebfc9cbdc1de8d2dd2b0359a4671cd1720fd5a234e0a55a89da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd2ac2941e0aac9aada778b61f4d8ce
SHA1f1ec416af6c14573c9f12dedf3ca29c857f917a2
SHA256908eaadc7f19dddfa5bece29a8e1bf0f0d138465ee180256f4167b328d5a4714
SHA512826cce57f48d6be98fe3130b598694772ef40f6b55c32b95146d7045710650f1687c8dc488d3c72c40479ac6ac64717d0f47e6308f28c8903c7ed5b62bd51204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59050cdbc18b6756fb993e2953e56f0d1
SHA13d170f0acd45b3157cdbe6b9882d6ef4a12aa6bb
SHA2564214f4277c4047fd39514bd2079c18d688d38e06326e4e473eb493611a0f0d1a
SHA512e2cf42490ea2ec30256e2f57be02eef31c94dfe9883c2b8418ce8e17f1ee85c5b87fb76526d0bbafaa012d0a93115c384b879678894349cc1fbc895bdec46419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0d999bc3e9978a7aba77b0e5a50be0
SHA1f817e79774a77e7a5298f527e9f5a408971e591b
SHA2561f7b7c0465bc99049d5cf6b8367ed7a1dea7ffb95fc6c52dfd9b9f8962a87631
SHA512327e1b6c630112a8b1eee2f17b2bc438d589c1c32939fd29afe9d9b301dcf82a09758abcac91fa293f0673812a7d3c5721d5587a79328731e703f2c7f44e2011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb76d2d0e4fb9438c38ec240f0872fe2
SHA1e96cd9ef5cd2b8e552e29a2162a94c426ce5b319
SHA2560a89d928a80209400b687f6dd517134e0d7f313f8497152ee28d5a7d31bb84cb
SHA512de2877efd9102ca51b59036c42a15ed6fc1e8f09abe81bd9fa1c1c23a4103eb72adda3abe74b2ef848daa14abdfe09b3e21c95829ae5f022264bf9cbedf30f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8b670d41d21f9ec488e07090b4efa2
SHA17d2a592dd731dfae80576b25d04ac1dc092bfb0e
SHA25610398567cf0c5ed3b4fba56b7ad56055fbd160bee8f345ba6c06923bc5e63079
SHA512487f4e358dbd8f0f3b3e6b84b9c025e26d383330a5b32b4a995d83a88432cfe476ecde03587ca4d31d9899cf7d5682c88a63dbc4a8a8eff1fa2ff34e0800de2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f5f954c37350c36e59255648672a09
SHA17c1cb90d1301d0474a5e062350d53f2f666d4b9c
SHA2565b6bef59d40c8c4369d97c1793e37db3bfda2746458f80ee717c312915ab014a
SHA51250a13c5789c6ef62fa83c3af860f755fa330aca49bbe4e3ec9798ebad57e715ba1ea5c11f0e8985caa756ef23c025517a339376c4aec78dddc422e58dc1034cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e113e3f685cb4937f7c18a46bc4a9a4
SHA119cd1db04a463f032814cde28c1f94a270590cc5
SHA2567b773683f6de5c685c0b5bb363d9218debdf738ade68702b217ef9c103f4f34f
SHA5120069f2212409e62a14cc4aa85af0ff8418c9c352e7b6a21a9dafb62651481aae06608b79810fdfe98c29a7a3cef50efdd93eec5c2acf4c8820e5b035723bb26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768dc9734fe46b1f66f9bd22e6336971
SHA17965b70256f021d6259a633fda6a8aefecc27e65
SHA256c2ca167befd04c399de5160f5a92a8b02b70427a540348d21ea38988910690a5
SHA5125f869fcb503c1137c3e0fdc5ea4354c2088650a271a732c3904d87f22594e37bd3ed0d2c292c50802090534f50a921bf12206489021b0b1f5690b5ee0b247508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba759cb5fd2d734cb55d3e8b3241183
SHA185d31d12954afa0d6245b9d12e3341b1eade9726
SHA256fbabe9c00b5adaa6ddf7b738347cbc395ed878815511403a17e2c78c0a819448
SHA5127c57d6779f4372172fb3df5e4be9f8fe68e4dc8ed6e2358c6c51d16345febbeb6fd2ae71c5ff585660ff62e56a3fb3657a83d5ab031e2e075ad99ebaefbd8045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a839b2cc3c062fe67865d44d10e6dbe5
SHA144ddf24a71b8458d7858437d63ba4e69749d8c0d
SHA2568b5a4a2342a1d1408475fda197303cca1e1b1379a60273fc81c34fc31ec18bc7
SHA51295ee9ebd7e9719ae2bb1e136a257b2e5c450fee6aa90090af996cabe4af5a103aa2ce9d8ce316897693aae7d4934ff386aede0eaa9623ad8c65de5d7edd1b55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe8604891cedef0165bdcfdd37ebfda
SHA1a54cb29fa6b5bdd475343e76b0a7a4a08294aabc
SHA2564bc724545241b2c162f660fc5d4327cee8d23b7ee2f11f99c26b2dc9e074f23d
SHA512dfa0ec75b8a5411768fc539dba06eb7f4e5cb0bdff1eabef07b511ae321d51fa7e92d71a14bd0a4fd0df7c8810d425acaf3c7d5b46721ac35487a1ece74e8bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a11720e87d090e7506b9323e08551e6
SHA1df662e1f8eb5454b393599d7b26a79259ee62246
SHA256ad39b32974442c88cbede07c78b37d072ca4e05f0d7409289230488db4f2bf69
SHA51233c03c574743070afb4c50e8ab4fb4d71c1ebe7fc000af860eb6592a0f440c6db20b644881d29365230269d0d196e885428b137c7ef7829ed1d829eb00c595cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504964ead4805dbcf28b04e9f9c85dfcf
SHA1b03c125ec5b818535671d7763a101f1f7eac1de2
SHA25646b0477b1a52daf667e5d42f7fdf689cce5da4ac0105bcce4297cec407ac6e84
SHA512e4ab889242f466e88277ef0d847524ad92c981f174c3e40b253ca142258cf4bc8498d774ffa84ba7b0a739a18fab0f0d124955493f0d105cb81d7164087cb76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d7248fb79f4a0f84de95f79e2c1b43
SHA1ef9e30711be04e62dc11bca4569f9c2ebf42dc93
SHA2567c537c61e906709e6e67ac1c387fdbd4243f00ad3f02e735f8a4f779083cac14
SHA512c1fc3d955654f66bfa65f8e52efc0585dd86d7e5aecf35424e5397bf3211457e237b8510b94f22cd544fb0081b26744878c5af90b3e0982426829bfd4c974294
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b