Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
aa2be2121f48767383c0c0d971c659b2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa2be2121f48767383c0c0d971c659b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa2be2121f48767383c0c0d971c659b2_JaffaCakes118.html
-
Size
493B
-
MD5
aa2be2121f48767383c0c0d971c659b2
-
SHA1
b2d8ac613c00e3ebdea07d8bc7325b035ac2adf5
-
SHA256
36d41fcf7347df5f7c85a4ae4bd6fd0eed1c7cfa33c74cc718183d727ddcbad2
-
SHA512
e70fb0c620274d91fce3ad0ec9f088573de56e1619bc1a3c65e51220c495322d1335c798f228e99c33b6ae9c7f3208353aa38259572f53f68057a47813b357bb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E313011-2A5A-11EF-AFF4-E681C831DA43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20301ff366beda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000f355791a172264020e76305d0dda3b38327b05a16af6df175b3252130fb6beaa000000000e8000000002000020000000503dcb81b622d521d38beafe3737cf25073390d5e3888ce769813a89c80b3d282000000025992cd415d11b30182c01c3b41b5773664633431652c74253404080228ae54e40000000a36090617ac4bb3f4f2e6d02c7fe93c5982cb389e7bb9b779b828476ecf1d758cb011cbd59336cb0e6edf7e533e15bcb1387ab126db8dbe5de3061a389953e45 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424537069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1896 2436 iexplore.exe 28 PID 2436 wrote to memory of 1896 2436 iexplore.exe 28 PID 2436 wrote to memory of 1896 2436 iexplore.exe 28 PID 2436 wrote to memory of 1896 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa2be2121f48767383c0c0d971c659b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb1c8abb09d74c984fa6fa6efaaeabd
SHA1ff62a745b5a1fb00f474810df26e9ae5642d68f4
SHA2565899b279cb4e3974aae9b215123b5ce96b4999c580c04d53fe381068f51b0844
SHA512877759e2925b73cc7b050843de95f077df11af3c89b39baecd0766c068b7d98ff5cffb06dc13b180126d1a8defe5b2295738516ece59ed65e8838882c4388dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57595be89efe018a4892774187dfbef30
SHA1c511abe8cdfcb8c00e99524f7d66de90346c8013
SHA25643aaadcd1c904a366bc6fc542bd6bb9f05677c0e3d852cea20d9953728af6b74
SHA5120dc521ef5b7572ca90d5ca444b296e018ee8cbe93f8c027a9340c87e6b99464f963888f08095ca97cdad7d807ee4e13957f45e32a5089bab83dabb29dce1fd94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e1ef1014a98cae7d1c39e944d2f41c
SHA1d92a06ad99a972e0dd058e8144d300921919c291
SHA2560a5a7bee45c2395e4c36e07a93271a55c1400a652cf0b05e2fc866aa781010b5
SHA5129821c99d8328a41228950f8c73d451ca241ceda660be3792878abf078e3c9e431af32d0ea539ccc45733b0c464968ec9d5829cd922a23b840853daa07a447d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641e3936757114799265ebf41fdb71ca
SHA1461834603879df1acf26bbb7707dae72ad8cc3f7
SHA25655589259722e2f38da961cdc03940d13f0838199e625f991607e729ccda0df0b
SHA512a7539b1d7b7b19bc07eb0830d32909e601807963e3d22b1561698d30490d1e79eb70cb0d722e60b1e971473d8951a9046fd36e7b40a020af3131eed8cc40bb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d59e363ec913972a9e27b48ba1f758
SHA146332ece4a765c0cddaf5ab64a67cf7ab3ec77ca
SHA25692873b7d9432c3cae062403b7873c897416af1be217f8c173047bb0636361461
SHA512af2b08e406a77af4d7fbb6287819028fa98e255aaa3dd2ba4c0c07e4c44921fc48c5e722f73487fe11e07d58b14850bcad54fecc50d3123f1e0f574539b73c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab112e643e613c6a8558e3fb88b1691
SHA1d5fbbf67984cfaf0ebdb0a73b1ca479cfe27ca9c
SHA256092931b9570cb55d6fbfdb91418662676b03cd92616ac7da855ee4287c312043
SHA5126115f6f3ab7e4d37de14572d9a79f0cf1d5893d1f605331a061c544e4b5a531778998d8be956662dca4af950ce2aff25d0457665dee3a6f041036131347acbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dea426bafdedb38898f8636918af4f8
SHA15b1e958f301ae7458152f0e2560c62d6de0347b3
SHA2563bc2aa577de772c5be7c8a9b4874265a3b36ae9b358620174737c63dd7cfab21
SHA512e28f572b06ab42ca71d2b55c9856af7ee5294c33a6f4b17b36c8a35aece5f4fa6887d6afe508468a1ac0b3daa3197aae3adc7834a498a8dd421c6fc1ffdaca94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cf4752d0a448196d0bab030a10930c
SHA13b0c2f2f7dc533b75a191afdec86c28f040cf708
SHA25663888be814afa0db538cd4c685d6bdba071015caa3b6bbb303d22bd1a6519f2a
SHA5125ed62786fdc7533835c04eac826a78d08a9c1d2ed5fe13d6bbd9c448bbcdf9982f913e31429575f910ddc58a2ad12729266c47d2e78e2647df07bc63a1acf919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b805422d98eed45e931a3a8bc8a485
SHA164c3298bd7afa997bbf888df874802e1389c9586
SHA256a2eb20255c44696c28cf5936748337bc87f2aad4de4786e86a7e22bf673906c2
SHA51221929a94c04d92678b4211b07ce1d6057a1fec632db5690e62e9cd7e768428751e17093251a678c71c920741cfcba8f29f26af1c31e314696aa0aac53424573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc8ba1879304b5510d1a0b1b291aa31
SHA16cca252a0368decbec18e4f683bb86fd35e14d00
SHA2564cd6a66af2cf1ef31ca5153bc53840f1af53cb9b933ffaf5913a309f2613405c
SHA51257177e89f751db8d8bf234ee391f3c9b3e7015786569d996cfc900520f323a3fa8cf1686433b0cfaf8c86284da9d056187a59e3d533badbce0c24d628b4898b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee938c91fd65741dc149ae71ba01c50a
SHA12baf57124c7d89f29c23beb2e459c101e688c719
SHA2569f5c0d6512cd58d28a4177518a695ffb5fb6f5fece4f3602860b56b9cbd78b91
SHA51226930f1033ceb5aa54fcbb2043671fbcc28c7c3f10237e3717013705a524a89e8e56ee1b39cee70e23db52b4b9bc0349cd94d63a7531acf00ec781417cf74e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126e88c4db3bb1ed21201640a39d0ed6
SHA11d5be06993fc621bbdb18694619c441ea5ed53a8
SHA2564df6e6f77d666d35237dcdc150d4aaf86fe4ac3bca197808fa022fa75c10b462
SHA5120c3604bab56ccb5ff8ddcb8c43c2a0b78d6ceba6d3a8e562410389e92b4cfc0a4cb04472440abc9bb5e84930f5781b29ef84f6ae53e578c2a91990599af6d6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974d5f71909dd63ae80598c826b8c7b8
SHA1fb9be0b5521365976d850bf6aead520d933cc9b5
SHA25639e597ecd063c91b0462027bf952bb7312d99ac6932e39d5e7eb7a43a92d994e
SHA51296e8ed6325b483d3b8085eb752c4ce732bccf7ec809cf4c23ec2c076754d833b3c4733c5146453ab3378e5ba5b3c6c0b088dc4ebe6f6974deb0e290f96bf4075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad95dc6da3fb7df6d42f7a01bdc5ce0
SHA1f551949d0d5552fc1210697fbbcef482f6bbae66
SHA2566c41efc32db287a93fc27bc35aef8d967d87ea764278f1276a565e2a27cf31a2
SHA512c0c0195cd0262f133d2355880efdba9fca6e7be845b1ed379d135efd8f47eb3324da256e1030e4607ddd6c8a0395a3f8bd758b359d0f808930783ed3c366b0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56256f01a75c2ccbbcf2f42d446a82fec
SHA194a919f09150244a9d5c9ac2f55eac605f1d86a1
SHA25629cf133e6aa91bcface7935220a3c3120ce1b8d39f76227435e0514c139f946e
SHA5122d9f595b4459926ccb179f065841b0c8a9daa231f8b70d9004fec39dcf46941d50457d7c1a38ae33eb609ff35810523a96819c0f507e2651703d032baf258615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed03da061c56403af781d34d77b0bb9c
SHA1846b681e5bf152e823a863d0fdf84a3221505d00
SHA256d66c1e9518eeee89f7619c8583b667c91a5f53e43290ee4c77c98cc7a2e76355
SHA512880668771d0b44e190b5c59fdd21f7b755cc713a21609f878ac2d50469b1aae5876152a4416fea6787c78b701bab341e2e5790543aec9bbccf1aa1bd0a2a12ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fcb5e701ed01cb895fe91ba914a8d0
SHA135552c6380c4d11806b5ac53da5d5f5394498a64
SHA25652fcf1bcac0d3600892b6448f908e12a10f27f64c4b98bcdf5f2e28d3f2766f9
SHA512b86142e5e27b4f783c4323ff1964255c60ff36c0928d1f6fc907b48baccda1c462181ec346c571d30bdd4c2d3f8e31fae2c8e228e1bee71588c426a47fa73ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54025f13c63d21d2176d16cb643581e2d
SHA1a8e167e498848944c7a44bb4954742dfcfbb84be
SHA2560d6840836341d8c0f368ce22176666793e9e62fd214074e704d2dd4db98bc525
SHA5129ac447b941dc04eed1bbaaea0166a763f6c176d604aa76dc5e4f38fd3004845b3298fd7c983f0c171c1f9f856809ea5184b39d16099cfb47d6a7c92fba9aa8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50073efd1121f52fbc9271dae8f8b038e
SHA193da5679b800290125a0b9e4e75df68b0ad2e4a7
SHA256c80b5581af9beb7df7141addb115e4b8cabb0fd3bdebf37f50e9927c94d0a509
SHA5122c32fbced7e4bcf683a0f1398d6e4a856265963c15bef9018b7c2c633ac215890ae7fa6820f547ad44ba274147051f3b3d3f49fe47a5b5dc1ee77f2dd6a76ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170d4fb980c71519fa4c37f5d6f944a7
SHA1bfa8325af768b8cbb4b526d686584089b97d2aeb
SHA25611181959463e9f2d25eaec2c4dbba6ab13b4aaa70508c12df1406ec642e5cfef
SHA5124a2864cc14e819b8cc786d84c99e032a08d019012df635a08a5d083f44c71cdf4350dee96e52c559dc5d4a07b92c38377ca4cac500eda9b9576db0413c413456
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b