Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
b896e6fe9ff5231a52c0dcecdf580146_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b896e6fe9ff5231a52c0dcecdf580146_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b896e6fe9ff5231a52c0dcecdf580146_JaffaCakes118.html
-
Size
24KB
-
MD5
b896e6fe9ff5231a52c0dcecdf580146
-
SHA1
f71613324e7c181afa05da5c2f101a401182e448
-
SHA256
08468cd0e210ae1a52618f445007dd47e314cc03488b6922a82bc2dffd4e2a0b
-
SHA512
3c0a6e89791bb0027f742cc5949a504d5b5e8bd76fe3c8a924e5e707ebcba20aca4bd4b9867864ad03cf22b8e39996110cfdc42836380c8183ae4a15072feaa4
-
SSDEEP
192:bkXQC1FtECVM/bD+d8wDdfecVuuGyDCFtttXWXZfTT9Tl9TojS+Es1l0ZLz8q8c1:bkXQC1FtEgM/b6scVNCR35KLz/8c1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424788764" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c053ebf8b0c0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{240F4571-2CA4-11EF-AFF4-E681C831DA43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000001d2d818fdce0a316967afee86466066e1171d89019c1142ed44809e316504d6c000000000e800000000200002000000093f74f5e49be3a3bec0e396b2ef66588244deccf98d9dcf2bbbb453d3787b4262000000011220a31b15c324513fe5e56757a6bccdfe802ad375a37bf53c5f77c6b0a260c40000000a5ab7fc8e9e46a849f5596d6244cc1dd5659c1b80fe374c08c1a58e1b2266913860dae11b4533e4534d35b10ec253747d3b917432043bbaa2a8be1fc32523271 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2108 2440 iexplore.exe 28 PID 2440 wrote to memory of 2108 2440 iexplore.exe 28 PID 2440 wrote to memory of 2108 2440 iexplore.exe 28 PID 2440 wrote to memory of 2108 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b896e6fe9ff5231a52c0dcecdf580146_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef38a975fb872340874510fc77d89b8a
SHA152d86966e3629ea33d135f4c1a3f76059a00a02f
SHA256204fd04f785f5ebce0b96d1909e1d08513401f199547cd1fef6f37f1d83865ac
SHA51289b71dfc5363a0d54c6b68a0e4731973c54d14765e3d94041230551742e0048747e02dcc7a27b0bed00c25dfde1f539ccb188343e5372529e36a286a5ab29188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b1e14a38f5656d035d9ad67fc0a6b8
SHA1eb7ee24520af3e6cad71bc9ad0f250c3951a35b2
SHA256c52f65e76ea69ad1c769a9ae16e64fb9af46296b636514211492df4994004eee
SHA5128fca979aac7eaa2baacceefc554306b09dbb98171e4e8051b543e5d51ff5d53b5f19debf204610b628ff3dea232d116800fa4e3d2b975267965a10949298cc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50330cc19b099a9980e9580b30fca68d6
SHA1d1dfd88495f1ac990c3c4e1eaf4dc1245b660517
SHA2569b417a47f66b603b11a95c44fd4d7b3fb07b735bab9c95188dd7494659bc9809
SHA5128074b90ff21998e1ab3fa5416bc16c795843fabc577c6ac0a7ea095bcc422ef27eb8b1f331d7c0d4b57c075d8a00882af0fcb5aae1cd42a1eec33d08cc98e5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8c0b2cdc182d6e1c51d020683a1d88
SHA1f3e3320cc16ced50ddd92eb00175392d2b37966c
SHA2565b2ae5704c2ef630669a32456c9474b6832ba4ed8346406ce0b18935730e04bc
SHA512add681f5e5d582bc68245982b82abd246bf81535b11bb8d64935bead8f5c905cd8fb85d36e197e3f54a3618a914444c062e5b38b25775bf575d563b88464082f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51920ccb03413c41f913a94f15341e4c0
SHA1fcde50d45e197aa3da4b0720175d6ceb4a471346
SHA25625cc67e6b168167ecdf6c1214e88f0365699dd7705db20227829fb2e3f0ccbff
SHA512855c0f094d7ee236ca73ef4eae828d4306679db882f2e76e13c19f9ee5b79ff797197cafcb5e1d61d52e9e1a76333566c8796a5cccee955d0d46eee62e026eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296b31513cfdd389a4efa4f1abad5484
SHA1da0d0feabccc52aaea19883c3ea4191472ba678e
SHA256d3ca63abda1be40018d884d6fe3cb0d362f8cc84cfc6bbd68760af6046237f1b
SHA512f569331d7810c212c952d182c83752375d6a856c5b994bdc07bfc9359981c6b031dd772884b5129551a8b907cd03c588507bb811dddca74585642980e7f946e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475fff9b2ae8acba7ef6b7ad4157fc88
SHA18228440966ccc133bc091539ddebe5b8fd9a0701
SHA2566282d51c4121038f91213f5e0c8e5c3cdec929be88804fb84170ff9a05f8ef87
SHA5122ba5a485cda8baef0b35f7ff958e8d6e2ac5662f574f93d0d306c2661c7a7594078b5c6d9666b2d48197e4d208611925926f68a068ea4bbcb37c88bdcdc7d4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893eb60965270329592c8e93fa5f9243
SHA137a0b1be454e98db2788d40fd99bee2876b3ea6a
SHA256a9d0c38e005a8b608226f804ca678d3b8cba01de02ee7350cd5ccc7a66d691c6
SHA512e687dcb6d0214767030f74a4b85f1e3fabd4e2d0625bae343a6332f395978f5818e4f25d3474885777049d6ed79fd69ef6d3ffbc95c8c3c59143e8f11ca30416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c6f1c79e395d833381027b6b47d099
SHA121bf4de398229fda85f9b6d02e6cf6f3993e6915
SHA2568c9fc44993dbc5f7f7f1db740842528255e3138f72b7ce358ec24e3c24a52e1b
SHA51236932fe697f9b62897eb2f6a828ca24647fbafaba4092a2e1d5f4940cc82a8a4e5b91306991b5097ccc2f7c77d2075c8691ed4fe6597d07610e64d6e36fabefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3c11769fdf57d98d85ad0dd3509288
SHA19eebabb57892d60ee9d14626de580c741cc72be9
SHA256a5269bdb3a8ca17b19591026f8caa3a62c67a7ff78d10410a9fdd44636a51d1d
SHA512522939c3c4b335c4e13b1d39fe6d7d66412cdfa4fbc4aaaa7c68a92ab1ed2f20c427d6c1a5bb48b545563e4aeb2cc2211e1b461bffa94fee466e86f23c5d391a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a248738e163c1f416228f44eddbc7c
SHA140697254ae6c5c7f39dfd5c4c18563fd5ff9dd0f
SHA256666a32ff54c8aec1e6a431a9763c3e15e216ab623f1dad401dfccb5ae04ab6a6
SHA5128e8a07e34e3b89cae15b7a7316f89c8ddc9541e12cc8047100f8f6c24f779e71134acd9b733d414e0505d9d936e490203d7c6a55d8f850fec15b30ecbd09d4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540deb120e4ef75b4e781acfa96fd00b4
SHA1c216a591d01cfd28a38da94925af243f8af7685c
SHA256249c71a09a3255e23df68df380b348420c9ce9e7d11e9ea74c58ca9d50a1abd9
SHA51224043bc27cc87c5cc4a2b95c2bf67e7d632fe4bae83332412712153ce71aaf6a98649500aff66803cfd29dab8b5e3705cc1212e18c294c946269de3483605cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfd78ad362d4586b72af5ec8c72e9e1
SHA1a16516323aed783272b988df7a5b5750b04ba929
SHA256b6fa064a1cc692218a6b32d2c5183bb368996cf41e417278040c60697eb3ca92
SHA5128b2135b5ae3444ea8496f8a25c9042250d7e0c87e5b8280da2d900412a5d660952323ad5ffc9af038077cc6c0b04451cf7967abaf813cc5d766913ab770bc19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d9e50b208774051b381a46b406c700
SHA1453b70446445f85c9fc0549ba256254645c99127
SHA25602832503addec544ce53eb453453a53fa6f188a9682e3dcda6b1eeb7b06e39a9
SHA512f66c66139d55b656f5b3d06d780969c975b6df74829039d098e0feb715985d3c5102a9dc5e65d28d8bdb077282f7a8df181458b7783ca14537d2dd0b8b31b460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d429c09fdbd7f3295696d774f504697
SHA13d8e6916d3fa1617debf35f976037aa7b32cb48a
SHA256ddf117ffd489e9289ec43dbb6218ae6c14b05757a18bbd02cd645471259661fe
SHA5127b9cfb7ed09b5a9db3c9b6e4b7ba9b5926cd83043effd3e7079359bb4bc2338af9c07755dc7a6a6364cff385a2a8eb1205ba272670b952bfcffff4cfb5381eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2ff9916e51dc6361f6a206f9a01df7
SHA1e2f99d8172ba957c6dac68d3c26cf7c1d1bd98fe
SHA25643b3cb1dfdd7101be78656bcf74f01db23bf2ad845b649b6635bcddf361534a8
SHA512645427235086aa5a6e599dc46aa7a7063cec6414e0217375cad8ff3c9ae10eaf862a6577c23305c6d7e775be2733453e45def2db81f9f7bd8285f2b39362f0f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55502fefd8e0fdcbe8d8537d38a03885f
SHA1b292b8575e2c4f630d3f563d1f13f45d132aebd2
SHA256d67b38987f6bc15252049375effde28a7c779976b2b3b1f505a3ff8a88cca7bd
SHA5127b3ff39b067b8fda18669eae512bba4540c78afe7a0ec2a51919648c44e03da3a84fe10fa280c4d6f4d42d49ff99d2660ba7dc064d1853fafad162ae50e47bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739e483bd8bd7eeea4da3cac6b4e77a8
SHA13a5ff6997b5849867270efcb774d47aba3bda466
SHA2567d8ed8f0ab6457fd99709511aaa2d3e406f8d864daf8ce26812352c7ca135026
SHA51237baf3424420eb3a9c449cbf1ec1d814d87c2598ee5c316c41e6fdd2f060fe76da35f28aff8a987d24b28936361e173774ca80628e6704acd4221375ddf89880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b11488b624d7ac5f0819bc5ca9cd6bb
SHA1d73af69cf3ab927d0188b7b568e662eaf799b057
SHA2560ed18bd80568aab15ff86c69345b900b65ab01ae010086497ff1965d9cb54131
SHA5124cc4a88131aa2ce8c90577fb6009ba014b3bea05a5320bebe5e9d9b83011c1d8454dc67b4d32988befdea156839ac13fc17561b40b553d00ab95c278e35eebe6
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b