Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
98f1e2d3b6ec7cfad6e5d6937b49caf9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
98f1e2d3b6ec7cfad6e5d6937b49caf9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
98f1e2d3b6ec7cfad6e5d6937b49caf9_JaffaCakes118.html
-
Size
460KB
-
MD5
98f1e2d3b6ec7cfad6e5d6937b49caf9
-
SHA1
73ba9c6a1ea18f94b543f7c325b7e524251111a5
-
SHA256
c8a43f7e243b96b89f88e3d841d0ce19072bcb04860883cea70394122b474352
-
SHA512
b5b875bfd4f4d9ca07a734653f52d85b7f79007053b3dd16bcfac4274b3771dcd79cb7f400fbdaab19bf12754338b7c696775746f0e95abb5233204c9c9dbea4
-
SSDEEP
6144:S0sMYod+X3oI+YAsMYod+X3oI+YRsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3s5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02d5f9d78b7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a519419b2ba479c42ecbe025c4b01864ff156f6db2dd3274bb168505a02c071f000000000e8000000002000020000000455b5e2f81339b202d69504e9fee851e29e6a5a1b4e551a5563edccf44c9c46420000000a24b3c2ba64bdbe5158eb9656bd7e623c922d282b14c9355443a1584913ad41c40000000df36ec1528f83ae72966b31242e4313b4cf392915a53dba84ecc5d3b1931e178c3dd8b386c4d72ba7b12071c9347b532b9769e3409ac274bdc4b8d9c0b5e188a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4DDA6A1-236B-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423774992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3040 2060 iexplore.exe 28 PID 2060 wrote to memory of 3040 2060 iexplore.exe 28 PID 2060 wrote to memory of 3040 2060 iexplore.exe 28 PID 2060 wrote to memory of 3040 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98f1e2d3b6ec7cfad6e5d6937b49caf9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718874be0c0b6e758ec343a062e7bee6
SHA13760da3af3c7d3783a40a7141411b8eab74d9f4e
SHA25677f2b3eeffe2f36fba6e16b912dc72183b981fa97803af6aa3ed72723db04879
SHA5125500390a81ba8ae0b4be280cf58a1c55723eb85c72d2ea04713ebe5bddc13ca158eb5f57f98c59d76b9815f0b7c9f257e9594827efd5c14d42b7b57ec8dab911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561bade2d3100cedb39ff43603609fd00
SHA1bb9b31e2085535f8feb458f4963f5d4312758047
SHA256f7e2f71e1789d23ec4a741b420df1dd3760d6d7f201dad4cebc8059296b21121
SHA5121c9bb7b7cd7c58dd046ded8668be1cca49dfe7b3563adc7f32454a322b7dffc7b948cc1b273ae0771891770bc1d666e8848a8a8360ea482bdc14a80f837ff968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544319ec8bf77cc24af153955eb8dcd20
SHA1b9739db51c6ca508748fd8821c90fc57533bbd2d
SHA25682bc2780ffecfcf92c69a4ac08aedc5b0f4d61b27e052d37cdc5dc8db5a2ff59
SHA512e2a7dcc59d51863c495156a4bb7a682587accb6eff072f7d2fe79a3e2c66c16c0e17b1b31ebbc8c5997f46369a1f56776e1bc79c67497a845e68bde0f99e7cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc312b7f6cea9b66e4696054af149b1
SHA17f9376e54885f520e10984a813c5615a1e45c29b
SHA256d77e4d737aae35a540cb811b16ce4cdc1e272fc2c795b802bce36496af9d02c1
SHA512cab9ba7a3e4ba25bb35c3dce4e857d6dfc711f0c61e52eb656179c385cdad4e2b820a200cfb0380b6484ca665f7d11092dd22f30af98cc19b3bb7b6aa2008890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459bf27d2585a5f1359f1b7a243a63fa
SHA11702a0a48a2d5c0aaa64e09bde9c688368755029
SHA2560e2e088d8163cb233bfadbcf4830c647e83eb059a0c99c57cde80f10918afea7
SHA512cb3595d9f23b4484cc736c4653ba108ccd479b1c16716646cbf38d21891ad3fe63ad23d2fb3dc35a783b212d23816261ffba0b681a9b6856819ef569e118c484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77819f9eb436088b1c433ee4aa68355
SHA1c8f0a3121a83b1b8b421678030d8ee638fc03d88
SHA256f84360b65244f33f0e27a1024483d90896830ce9df02da493e6f2f08ee79a9f4
SHA5127900a73affe3981a0e46251c8729e3813d2fcfe7c50ac48a7eb92db2bb4270a2b9e31f532d6e27bbf3f74ae2f8e20373f517a2d384bdf8b30b645f485fd1582e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f619be49a792e741e147a2d6f318c2b
SHA16348aadc4f2b4bd51f637a22662d037fe783f462
SHA256e71fdb6b37d1a64cd7b75ada44d00044e966681fa3355686f900fba65154b274
SHA512c0b9253165866616976ea203048113bc3062043bef7c05ca5d6d594fc9023626cdbc6d840c000e791f545f5761b28720de8851b4747a32616b8d922a730c3cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de66b30c88f4b37dacc242c8df91150f
SHA10a391722b76ef0f2593e84e74a987e9a474316dd
SHA256347904e93316ab770eaea3b5120a4bdca4ec1e6e5238ceff0a5e39133360ecf3
SHA512efd318477391393cd25d9b52f7a88842d0216fdf6c2a380268f2256e36e23552383d7aed51959643bd022d6a3a25d466e9049733ea503fcb6cfe900f4d07529d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5673a7abff315e6db9be9369c5cd788c7
SHA1df3e98096d24b56e9f33c2b6037c5b88cbc5b7b7
SHA25643d3681be0efdfb40ac316294739446bfe58064a99de26372c35df30d0936d5a
SHA512564bdc2023c6fcecef9108d24a122b89c32fc980d0f48d51d3a5bdca5639c821ba3af68978e982c256f0f375f7771e991744eed33d479b551468b5ac9d90b9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa121a50b6fa88abfd8ac6e5fc383b0
SHA1dd50ef9ef5a50bcd107acdb4db5ba515e3b083fc
SHA256c57890d9325bc64299eede23b133bd4ee8b8064febe8b160c056651a4f45fad9
SHA512914943dfc10a59b75492fee199d006ae37bffb198e07dae0ad6aabb7a401370aca78088def1f0d0e5f6048e4f43f0f9ecf2dd897a448785694c789ffc59f4ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91fe589ddbc55b5e259be58eac4ae5d
SHA1e8168a65067faae495676aefa14dc4457329613a
SHA256153e2ac32ec712485afa28be5d1df60c1c8b0af963865ed31ea4f9935173a424
SHA512807f6e34ebaf725f387711c0d2d0d8fd2bee2d3bc5e424aa7b72a1178032181266f4042a56d16b140084fd57f0fd8613d350392994587bcdf7d232efda867c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d752bd41481cf40bf2d74eabb3b132
SHA1713d369341250ad0a64fbaaad6244f64d3b36aa2
SHA25631c03d92047e93e31ab312c122be2bb112b86289c71efb1cbb0455a74e0cb49d
SHA5125a12dbdb914438382529ef74d7294b1880dce170804198649c415da781d6e0ab09a8cb5aef36778eb6a3ee591515ad0860fea95f2099627cf5a30ab8a4c5e5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bd628d1e300ed6b6c458249d62e8cf
SHA1fd1da0ae6331264c442fb3c1e54f56c7661402b3
SHA25633e6b64205271700b56a2d50c22815dcb46f3eb001b061a59271a7d8510dca0b
SHA51222459941706087cef7c625d17cc1f8430af0f9b3de54c28567947875d46f5d26241bbf083cb02905a329df6db9256dd34cfb7f6322b08fcb26134787c9de7b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb95108cb72cce25e77a4442f995b218
SHA1f40da765dc56bc8de57a10de9a5de50f13e8d5eb
SHA256c95f4d933e7cfe6a231c42d5701cbaa1524c5e38c7157819d155e5dc8d6496d0
SHA5123c8c02be5ef6a3565960f0c5da6a41efed5796bb8d59c06e89eb9fffa65b3d98da53993182fb5e9c56d27d317b409ee9557afe722d6e170d7e4ece5e595aed9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652ac513e190ec05e398b84ff0e8f380
SHA1661efcdc5d8826c9299af0ccf33323be004e15b0
SHA2566fd180f5ce2b7b6b13b387695050a630b37e231b1a1cb4228b7991b411849e98
SHA51206d5321c284c5d555bf1eed92913b09f73965ffcd5d49c3791eebacbcf473128f47c28e428acdff9c33e8690529e08fb8f8b452ffc2b61d47eeccdf9b18ed0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3fc03a64662479f9be1978e27be7097
SHA10346796899695195677953ff18eb9347645077f3
SHA256fab3c5c308ed6a850189be76fedae9bc4d47285be3a8c8edfd36c8e6bc34bcd6
SHA5122c47bd97de5b8571c5bbadc23278a0b52009ec99e55337ceb22fbf1319fd354b3efb0a66792a8839bf0fc516e00ddd85a5ee927a8cb27beec25544cb923f4c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1bfa26e74359ac167b5be47e7b1464
SHA13ac709253b7cc425f48ded755cc5ae3057eac73b
SHA2563ef4543ce8c8560545ca1a0e5f84e8c43640dbe13d0b385ccfec4153cdd1c33c
SHA5126cc59fec6c3b417eac2a0eeb5e949fe054b7787181e7c92f2fde07b70b6a6aeaf2c68a834b32d11b6a73e05ff96e6ee8a6c6fb6a5ff621f1df9c9de24001fdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50197085aa7f42a448aba02de325d2906
SHA15318bed9c10fccf34f8d718b42d7c371de2b8820
SHA256397fedf62674448e8fe5309c3ece6c742e71da8fe7565f9c0b90c6106f27cb57
SHA5128017d057f51f6cf16ed17b57e99037117a956018cb2842557dbb04c28d03472efd6847f952aa8f7e0cf20b4dede509332d6b5ccbd953c9b2bc90b18e224e9804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db98b9bb740c16ba3d37535036fa539
SHA17a59bda62c06bb43328f4e3ee89c14c5f1a20bcc
SHA2561e2bf459af37ceae154adb8ff441dd197489eaca47836cd276ddb8e5e3c84019
SHA51213ec81fe6ccf5158db3c0c26ef071cbf75041d1ef26abfca62ef0f03bb0850bf60cf58ae89a7b0fa20de50490be5f8cabe367c85fc21148e1875ad61d7b78726
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b