Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
a4b0a9497ade148886e9fa932979f1fa_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4b0a9497ade148886e9fa932979f1fa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4b0a9497ade148886e9fa932979f1fa_JaffaCakes118.html
-
Size
43KB
-
MD5
a4b0a9497ade148886e9fa932979f1fa
-
SHA1
26957aaf84d7c61b3a412e46d247ed40f95a07ea
-
SHA256
cd68ebb4bdc04e21380e9b8f6c5eeecfbfa4e2e91b8eb46d1808e9c04450c32f
-
SHA512
f90fa8575923efd232139667ea2a7ec5b33c3f68cbb86a84ead2f94156a3fdb6afe85803039634c036bd4c8fe43987e2da0fb4bd7ca72d68c6c85350e93893d7
-
SSDEEP
768:swWm97U02VzVa3OgahWcSMStadaOam0XHiQ/3v08xENYN7JNFznHM4MGVoDH9a1W:/ZU0OVWOguWcStUhv0XCQ/3v08xEC3TU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000b4ec5bdbf2216b1578eb067005cc294dcce58f23f3c14d81327deb67c962d7d7000000000e8000000002000020000000988b9fe43a1ecde28c62fc46d50c1df6d828e631f27d557a867f918246ca812e200000006dc5fc67bc562a55848205b08b5c3cedd39d7791d83b98d8bbae867add6b738e400000007cbb6296ba83014c2f10dd05b94220d18346a0ea0e7e4b77d3a674f9a323f892b9dec05d4d74e262eb798a101e2d01f4031baf58c303d1eef0598039524b72a0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4120C581-2961-11EF-A490-4A2B752F9250} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08f31166ebdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424430183" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2292 2112 iexplore.exe 28 PID 2112 wrote to memory of 2292 2112 iexplore.exe 28 PID 2112 wrote to memory of 2292 2112 iexplore.exe 28 PID 2112 wrote to memory of 2292 2112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4b0a9497ade148886e9fa932979f1fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68c736fe43e952871586e08426a342b
SHA10d14436b0e85a22dd5307a4fe01abf344ad86713
SHA256f5ced7712715d02317b5ba7d71190b777fdb78b252371d774afca7b1a05e9993
SHA512904924617e3c02888d9f600fbd76a49a8b3b54145efa3b89845d7553d5f36ac4ab3937bfa48db8c1a24c6600a3a9e4a4e5e666b9b6e3b73dcd2782ea5fd9d34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba65bff2dd9cbb8c0c83a2f19db9bdc
SHA18224dd1cf0df4ce604dab59069769be75a5ddb49
SHA25691d08e5acad7def346f0e5ecd24095b0b84fa97460258b0a307533bb0495f26b
SHA512cf10a2f7e4e86e1b23f894f00256e963fea8cb6c191cddf7949fdde2ef5294d07d715470481714a6d763ad5c19459b76cab24f39ec0701918e8e43db0de7deff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721780f8ba31e7c0b20325c2abb99273
SHA1fcc54bc86d33b88db7831f663a529c5103b7d69a
SHA25678da3b594335014fbc39fbaed5139fd17024909b0fb96c3c93794a61d7126b05
SHA5122aa55a44976f568a68f5639e7117a05fe4c8375f4e86bcdc03bbded696b451d797f2dfc800b80cbf1d016e44665230d196f96e42fcf6fe7659e5cdff7fb16d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f66bec3ebc9ed49a10f35856b67d8e
SHA1c4af2da1eda627c4ec7d4f8cac644fbe44b4914f
SHA256eaaad270225f318fbf5a47d47c1f5925fa559726a3bc0414422dcf5fc739e383
SHA512ebd7c25cde9fe42c38c658748e77a9480928eabb5aacad3013bcb614d9bb22d55411230ecce2b1fd53b8d48adce477ca73514397c518a1d37680a41014742244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bf4b3790334d87053faf02b3733df4
SHA1b703ec64501b83c2cfc35fc0206ed2bc14168628
SHA2564b27bef8162b70e954bededa3115ca9d46ec6b20cb51f30df60d5af24e1805b8
SHA512759239121718b4bf24c26745396d258b054e7c9b97dd360519dcaf82f8ccb609de2ef0b9bca182dabd3885547cffe906e94e8df06153cb7087788ed21eef6c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da679c1f1f783cf6ce2748a36cd27307
SHA1de0906d59c0c5107b576b2721289edca8ff0f78d
SHA25616bc0ae6efe738d8f3a012b252e1f66739fa585a21972479ec0f8d4cde33ac22
SHA5121ade3e9caa4f2ca51b74e89acb6b4c68a68f88a0296b4f252ea2c3b5da8371491a8ebccd420b306b09d25f82026a761385e76bc4a8dea5314e8569e8e21f4358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02cd2ff6b0c1a6dc9e0cd8508353a3d
SHA1f393a8e402f17bded27e2f3ae33d8867014b4526
SHA25649aea8c991d22ca4521dbe5c4ed423ee07440b4576cd44492ffd2188ff7778f2
SHA5128e65dc1c6f89970997acbf91103da3f790c71ab9d317a17031022747012f07f80be8213b28d838b4d3d2a9ac0a58f2869ba9fb8be2b6a11d4f911a41e47104a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d615638c86be3a84ceaee5fb5c4571
SHA182878a9e3afcbf1e6497970f896d8c848b37907c
SHA256dde92d02fd7c97ea63a012a135706653fd0329370df38cb837890a3a5b674435
SHA512691211c3028be054860a417cb9f72175d72bfe8ff4e1499f6d02553a3973b6927e1776912872fb886758b75bc7a005aefe4c200a62c1fc0e649de3d2939b572e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55832a386f713b0e117ae1e13555cb7bd
SHA1ac6c8f7aa6468efebd15ba6e6c1afe58ba317840
SHA2560c47489d6fc25e19ab358ad8b4536be1542903118a87286b9c3fb250a24d2a5b
SHA51241c45f535278e338ea7cd6e775c9dee1eb558435ffc99175857c742b6c1cec9f4c82a9503f4f1e4e01557f18d7e58678ecaf82d76a1a99ecdebcfa790beb8bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51534351c30132f0fd0868b33876647e0
SHA1b4f387bdc8e2aed31fdab10d75b76622312da373
SHA256c61cba526166cc11038fd6de1fa7e39788f5036f1adc70b15faa89a646ce1a36
SHA512fe51c14d873ece6550289c53373b679b270326f540f859d22447d2b670e6020ec0155c347a4b99a3fb859ea10c3b60c20adb8ca35d6bfe7690d85d1e4a20b4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5524c18d89fb6008c0152e0fb487ed5
SHA15b14cce9d88797a09f4003b47c2d02ad04d83343
SHA256307f63c32f33789e03cd3e021c142a9101bd48c02e295c015e68d1e0043fde32
SHA5127f3a38caf283463a2a65cccb78769f10c7ef10c179af550781395fa761c3571f69240a5bed22ef0608de1b8e593f6af9bbe21919fe2170e84e04d9d477633d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b227fc86f7e401535426a9c42ca9cfe7
SHA10ddbee16bdb3cc6a51b2e745c9859d3a43120c7e
SHA25671939ba180cf1bbc96e23cb10f5298b7625de5ce6c6fa12dc2f4caa0d92d5694
SHA5124cbe35c93dbf2bb2ec70745e749415f47f09223725dcf5ef3ad41254528841011163f1314df665fcf38a87a4fd20053f2546eba681088a9d9882ecb8324fb390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558463968bfb94baf6c9902d6bb314230
SHA116a07db3e716faf6dbb81bc8c96993db1709c62c
SHA256261595ccc3cf5f7bc6ec754835fce7052f55b48dad24385c9b1c54850de6bbf6
SHA512f4b038a235b114c1939ac027b3cf69a18dbf354d595ffc1865acbec3014de1115fd76360ddd2ff23c6418c4f89d7eb559b473cb902dfa609612127c99c8c48f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3d047e9440f99cc561ab54a6a7cf48
SHA145254ac6bb17746f92c60c47ad330048fe3f62da
SHA256fb9856e11da25682a37e43cd7513a740aa67f7b07a027203e434c9cb77a21d33
SHA512b41ea39ff2490371e0c2a34199b760c6cde18c8593b6f6ab7bb96f4359efb33306352c90a8831e1b17f0d0f264e388e4aa4f0cbf4120f94090ee820401895d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c9b72833cc7647d6bcf6effbe5fda5
SHA1476fd2e373260169718a3dbecdff9ab822fca8e0
SHA256d29046bc2b2f379b7fdf0d581201d1ed9e481ee24f14c0257c9071f2b3be5296
SHA512d2b6b008bb3abad117e28a8c6e01a70623ed9f314df5849e325328bcd3e274c0f7f80a7e5f4b269dc9d74302aaf06267879d63eb52a4de208e94f7d2b2062c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593769314c984168e3ce2c1078279a3e
SHA1be0b72e48d92a8db815d81eac6466df28f705736
SHA2560ac0b3a09e39c37da60b3f77e89cd6dccb4c71b86242d78239175e792b916471
SHA512cd0b88f44782f6e4197c0d859a8fae9c4f1bb7bbb2422b333a22fc3044a07329526c92b61b8f95ad843becc7eff45f525b7e971976d6206c5cc00bc3569542e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511327e3506b5ec3d09e7a8bf7cd17a5
SHA14d2dcfbf18a839ed7202cb85e63c5123897cf14c
SHA25643748642643bb4698866a32006b3571bfd4c936f3ef5a422577f188afe0d5d45
SHA512a6325bdbb8408ac7f666c892cc04d317508854091f00f84afdcd20671cd3ae18780b0ea8e0c9eda35900f254070bb0131385dc9638149f17c76d8245d25086d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de1dee2d9aa6d90bc7d00977dd24e24
SHA16008cd135e58f907ef0061a8b3b86ebafdedeba0
SHA2565a1b428387dcf72526267166223088cfe5f90cc6fa616b812109cb27fa02079d
SHA5129b133f56f5619087993e33b364687847a9dea1d9fd6627b4e96d151474927bad3e231b517d4b01701355338284b1e8581a7789f8e3b3bbe667f65245d08aa765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46953867d40ba25020c0de77754a25a
SHA1360bd40016597827a7d2356357fa79db85650bbf
SHA2563fca493794b6419df0f8f2499580594e3cb7b2b3165c2cfc1b9084478e386ea3
SHA51282da36f1ff8a964dbbaa6028ae13b156e9728f13c0288bdf7a7bd74c8d9deff1511fe42412bfcfcc1645fe1bdf843d108ad32728e91c48ba8252bf5fb2c8b1a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b