Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
17f152960de9221ed1b9d5d8afa5807e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17f152960de9221ed1b9d5d8afa5807e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
17f152960de9221ed1b9d5d8afa5807e_JaffaCakes118.html
-
Size
53KB
-
MD5
17f152960de9221ed1b9d5d8afa5807e
-
SHA1
d15fde69c5b290e5e40b300ea06eb99254f7b4e6
-
SHA256
d1c70358fa0202478e8ee97b857f1e525a9296a82c09227bccd352fd726e3a12
-
SHA512
a87f605e3ba75bc2a9bf85ed778ab014ae7644b7f3a41d688570f0080d45415fea06c95eab92c2c0b62a7d50852c3407bd00ba3ac81a3840672dda5d1a05b117
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlYt63Nj+q5Vy0R0w2AzTICbbRoW/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUDrunlYt63Nj+qy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1C35D71-34DE-11EF-B6C6-7E1039193522} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000006bace6990e7a947b1656e33769cb7074a878d830e44b859ccbb8e7fb205a4fc9000000000e800000000200002000000014f56f2836d248c55701fd9a85a580dd84f633704950bd6a9913993bf1851a0820000000655cd4a88bfff358438a99df610c089cfcfe344deb462d10c78f0ab6217d91c640000000a004728f204e1af0b5c170d7eac5a31d6b850670c03a467844cabf6254967d6db1ab5f95cadc762aeb0a7d9372acb3e4202d6851dbe0c64f35f2a07362cfedf9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425693495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0198a77ebc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2264 1876 iexplore.exe 28 PID 1876 wrote to memory of 2264 1876 iexplore.exe 28 PID 1876 wrote to memory of 2264 1876 iexplore.exe 28 PID 1876 wrote to memory of 2264 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17f152960de9221ed1b9d5d8afa5807e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd7d5dcaa4a5bca30f5af309aec0b41
SHA1bd9be3ab29fde013a6390c7c8b97e00954829b16
SHA256a3610ef74fbfebe917cbfa7c19846ee52ba29523ee1fc6500e4d0c17573df079
SHA512e7e5a53cddd3e239d32abfb06bd004fa20857e5eb776ab4a7da2ee9733f5492b36807e390015a885abebe098cbaf124127818992aa73d85ecfded0709ff89dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525df4e0da738671e5b01f9b84a17ccda
SHA1a545e4ec294b95a574dc7c59cc67c6f179b67599
SHA256294429693310e84439ff8b154e6536e9126364f68a00f4715c0f433535242244
SHA512f376850c83fac91f31c000457b614e35cd13dd466f76c9b6581791f75e0189a8869a25efd3f52930d3c852aa4e5c74f3988e8c47eee3109789c1c37429035d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fffaaefbc3f0b9b9594d63865ffd71c
SHA1ae2a8ce8ea8e2d07bd0077dac56890ea1bb2fb70
SHA2560113108d9fd1d1000a53a0e95f6c955a0ef3dafe0139b7db66a8a57c7a2d6e4b
SHA51221a11e2343143774f53d9778c95b3508b4b18ee4463072d247379380d472c14640215498297b982daeeeef5ec7fb95c61410445f2baccef67dd04b44a4add3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914628112441369d4a084b5e024396ed
SHA1dae213dfacdb78604e7a0f44ec034c77b8059ab9
SHA256acc9bcbded27d4c40186481b28373b7c79031ba4471f7e30715115a6a5a3d24d
SHA5129d1b06c598e7ffabeb3766458405fc679ba1500613937b98a49cedd20d512c3f297f2309be434c1d06336e663696fac00870f1ae9e19f5f9bae3677fda682ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769a221dba4d80ea83c77a4c6e73fcc6
SHA1379ac194c5a8f8c40a9d44b0ebf9b9cdef0dfd5f
SHA256acbccfa7939aff70a9a255a98a3a0d8ff4cba8076fc54388135f768dcc525eb3
SHA512f8ffaea111a0ebaff6214d6823c600081f584efd496baa0b052cd9820d2b8b150ca1b2c21d3ec4586c68cf176499a7de62d4000cf14fb94dba8f00ae39f7335b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4f4a38af748ee231a15e185b1cca65
SHA1c570c9a557a677413223c59923ee556e992cc61d
SHA256bfa1d674bfa36899911b77a57f6898ccbfbd3ae6085aa4e63e1e73cc0faeddb7
SHA51263e5fb867eb9fb909966f4617232a74ee285f2059c5429fe37d5cea6be890be4399587d4b2d1a13df619c751e3ab54f5dba755948f31c8010859a997e6691292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c09f37ca28e30a765e830293e15d9f7
SHA103ea82013e2640434e070318fbaf8efff437a56a
SHA25627506cb1a399aca92f71fd91a586f9f323ce5d8bb65e64c1322bc23916bd3968
SHA5122333a3d0dfe25a70b83ade564093d91bc0471a1ceb06402258260e320a5d1e06ed8ee3ff68e6421b1c7110ed93e123c12ab1a7c6c692bb467903c4eecf1ead2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2f54d22fc1862aba0f61831028d5b3
SHA1896f8a6d9652fb5f819551dc7e1bdedc9c905e01
SHA25648c6e24f764be5018a17cdd3640328ca63e8f19d038613d570a501099da32a42
SHA5120921bf761cb3140bd4d251a67dda90348ec4d7fb01b874612049886b884edd7ac7f97c2783a1bc3fd968d357d30d8e4f4354f2d16b8c00f986c5428f1df74e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca29801037611ed2fd74593635746ad2
SHA11627ae913fbd2f21c225b68a07aa27190652abf7
SHA256cef4e3023c782bed6e671ab9414a76c9a304f74f75a4edb02ec363ced096cd37
SHA512241c382bfcd708a14026759205a0a6e7150dad3774242f8a4f74ad60c6bbcf80cfb30e4f35487d665c431028e2852568eb5f36b5708ebcd0ea8437514ec44102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2cb260cec6de8e7e14df0d4366aaa3
SHA18517f58dceb0cfd1cbea0a0c0f47a9e0062314bf
SHA2566152ffbc8b4df1f41e5b586d0cfbb8777ac21dac1f15d244b32db4d6a0d6c61d
SHA512fa0dce5c9ec12bafc2c5ac9c29587c1ac1606a53b04e2e771da7b5affb2c085088c92a326481ae0a9226488aa950a3253fc60095a0793a15c88e99e5f56ab004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca7e67284d513483cd9b028742a0b1e
SHA1a91d2a70f3bfc6c55c0ce4bcc0c1c20ba5938248
SHA25679005482c9fa6caad3688099feac32b2d9d9bbd9092a3868168801eb1668dae3
SHA5128fbb45858822a0fe66a964b38980eba5b3da840f90d11cfb55bd0bcce6dde2fb42ee71bb6986c382588497679c1686983e5f10676ae8444ff29d10e3caf24402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd42ae9b2074c31a47403798390e39b
SHA10e62df89fc3fd3360b45a69282ac5c942f1f6082
SHA2560afd858c823afe51880314972127778c2503b1dab59a217e44c62794d7a47179
SHA512740dfcc2343f41c8d2ee7b3c5407a098efbf9f9366d7a1dc11e7f0861b6f424d0141d9f7752e5a0cc49bc53b63482d426395bb5b5c0e5e77e34b60c1b030e74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a73b5263803d93f1c02bad37269df8e
SHA1dfff5af16d4575400b6bdc9319d68239672fae71
SHA2564b01190581fd38aa5a423cbb9ab50ee2bc8ea1ae6b0bdca82d82f41a62328242
SHA5123012259240d23c2826a9580d5d821b70daacf1af8596f2b33c53955d71547d3702acb79913bda46093da018e0c03cc16d4f4cbeced748d102afff9c6cecc7895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eceae806d605a3e40396664c580babba
SHA132daa7992a7709a41d38e6306863be712e57aa73
SHA256295ee4074615271d15f07c31a9ee4bf28476fe8b5dd435492dde72a3e1bb38d8
SHA51206ec031c060f361d6533cb9b0cb03f42ddab3f5974f34a5035506e1e2eac73887f431e2a1e63abe18e1fa680d4aef13eeead1feda0603d4304809052b44c45b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195691850b41e778ab75e5faa0951a36
SHA1adcf4dbc1edbea2b9d1cf9c3c36fe22756aa7484
SHA25649c1a372fb596b74ca5c31bbaef377cae17f879cf44a879fac9491b069fab496
SHA51223a30349c21563a0700df8db36b966a319b17a204cd3e2002b0d30fc5d6dc36d3775c20e53b58e705c1d1a45ffb8f6152926a6abd5b1a8f993850a96b08ea2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e3e5e58e4618d40451faad64ef248e
SHA1a10aaa6218a7397cea69cc9848ef62a0f063fcba
SHA256b6c9afe60c9ca735bf95a9a49eca9bbf8cfb87568044b83b0de0d94caecc56f8
SHA512e31c56ef4d72161a6b76eb707a12dbd29ea139d1150b4feeb35b6c23f4309578a53f834679e9eb1221970268f880af372bced0a64c7f949a96b86b3ce61b2293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c209592dcedd44a26e79c5e62c8d0f
SHA11c95877c737c128a96ed12e466f678abc4b2ba12
SHA256ec8ad78519adb35f83ca5a3c9440a0101e52b9620dad57c4c4b49c332ab69e0e
SHA51295fcc69a5c54fc379bb0c75402e6a7e1a4a1be548eb0faa516b76a9849d5d7a72d7f9d3b73b521cf4c3712316ed549d90598a91eeaa112eebd3303eb116afa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827f9e18c9338e4df7874effb71e7f93
SHA13479330d80f0d62914c4b566476f3e74ed99bd26
SHA2569a6a00e86e9f736d72837dbcc99b717cdcf68753327eb4e6a402ef8869ec0107
SHA512d261c752d7f140aa567e6951d6da50e8e7dc77cb477392196c093842e72f6d837685800314f953c2545eb0101000682830c41617886c4cd178745667fbd662dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766b29e90c9c77f7bae377a17185de25
SHA13dc0df95bb3663bc9efc0faec894f6e25af9b5d2
SHA2568411c65cd36504847f1bb7b12fe7870a95920b48c7d7bd6a30904137d04ff083
SHA512508651c6a6a593ecf19edd875668056b0a2d78b2c9d628fa28f9865cda120e975c3cf3deacee206d6652d196c6f1b5fd7c7ebdadd45899a02c1681f1960d9ff3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b