Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
15646614f94557677b828d2f86ffd893_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15646614f94557677b828d2f86ffd893_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
15646614f94557677b828d2f86ffd893_JaffaCakes118.html
-
Size
53KB
-
MD5
15646614f94557677b828d2f86ffd893
-
SHA1
b72e699af64ebdef3f26a1a63b1d30d11755d38a
-
SHA256
469f5e57f7910dc2157f4f522310142900b0d22140c961f95749bfae1f1d5cfc
-
SHA512
f3448c7313d114885e7b428d09b4d1b224ec20c7f7330a46faf5f0f31f0e8b32a2890ef272b7f147d2cd3538ccade41775e5638573e5e4e24ba2cbb189641a3c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlYD63Nj+q5VyvR0w2AzTICbbRok/t9M/dNwIUTDmDl:CkgUiIakTqGivi+PyUorunlYD63Nj+qh
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000afc21d0b0696fa23879c84135c011dafc3e25c2a81984c085013aa6d2b2443f4000000000e80000000020000200000003064f8e744746a9f741e9c9f470e95552e50d2ff713260011340a8b1b7761288200000008aa38874ba2f9314781eb2142526571e217695a8546eef7f423f8bf3deba8f2e4000000076b9802f40c4bd957e2174304e50882090619856139edfaff794b5b075ab8b155e04b878dea43bd635afd6558ab212d388170329da34e2746a3d186e0d47ba6f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425640329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e0eaac6fc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7284A61-3462-11EF-A5CD-D671A15513D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2096 1932 iexplore.exe 28 PID 1932 wrote to memory of 2096 1932 iexplore.exe 28 PID 1932 wrote to memory of 2096 1932 iexplore.exe 28 PID 1932 wrote to memory of 2096 1932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15646614f94557677b828d2f86ffd893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab40d89b57ec9790395cea888110339b
SHA1965887d3f4c3156fcfa378f2bc19c291fd459294
SHA25609f9f46336ad27ed7bf3132eb14fa1c3aab05a9e14794dd8530d8bd94a4f7e7c
SHA51240d1ba880f81352c4aba6ac86139a7266a6f405138f7201005d8dfad6355afd27d0db51611250cf747e2701f5e67e7b4dcab980f06d2a4c1177a41ba2f5722b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab58c8e59bc327033beea30d91a4cced
SHA1325e3c6451ad9be3df62c1c3de7fdaaf748db7f7
SHA2568f5b0562a78be08e2ab1df4a3c40bb75fd2331c8f0399790b826d430e0059708
SHA51252908fe5367834c70036f839245cc53a3c5987f8ab713784b5064cf846d30223cc782a9011f6aaa1f32131cefac266be4fc931e335e29588e37aaab36841e5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d44604c4d96615fc758b41b060bc021
SHA1ea60c190bdcd0a37bb380242e7cdfc2c18dbe66b
SHA2568aa177c5e8f04fbf91bffd5507d71912fd81a1bd2329c02549b5bd738b0ef3a0
SHA512b659c38e6877ff7fcfd65825719474fd7d863ad73487ec6c6f573a5ca516b4539794b9be665b478fbe989e1572d88fa383fd81fff54568b35772dea7ea2ba5af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf0a7284b4c4f9c6ec2e47ee51f592b
SHA143f5407519a44ddf2bfb689d03c7440912b7d8fb
SHA2567195e8af5cd4f7a9741fcae64ee5b8752c03ced1cb0ef636c5c8df78f0d6c6f6
SHA512d23b8b5c69dc0ba9cfa8fe2c26696670dffea33dee52ed00775e8b2baf3e78b739339c174fe05c89da81d1476a1bc839c7999bea8b83e6864c35f02ff4c04811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada4db531012aa0fbb18a0d101851b90
SHA13a207e0dc299dd305012d9b77c70d3141a7f4951
SHA256865a0a07b8149251626080aa5a738fdb2db541bff837c15de9f9d5c7457aa882
SHA512d8d2099bd97de5f47396158923cb2ec90323a22a80baa275330fad6a44314a8dce924840b679d12c269b5815a497cc4ad62955a06089d63b45ce46aba703ea73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0fb89b74640551a9f083947f88d5f9
SHA17dd2bd367e43607d80d41f5e33e24adfbd3c2a78
SHA25684e010366b252f22e34426213a8596f13011526f02f36771f28202c0b2025e02
SHA5126aafb93a366d2992a62b7eef9dad44e16ab9674ff93529fc5746808f3b3911f1c2660643d76362806a75d510caeec034395dc789b45a9d0bbdae3070c5e5ab8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55084a2f39f6b216068fa1a1c72a3251c
SHA195795c8855990af581f720e9395f35c2beb9454e
SHA256bcb6fbaff38d7a02cc59e93fc39779a5328a54f3138856daf6ea5ce90d0d9b29
SHA5121ef989f04362e712f23a8415de36eadf1f8bc80b9257249e417e1d40e01e7121ec02a2f2122863fa016da7b027edfc6f9d79eb1f0169243c2208a9a846b8ccae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5ba0fa78cbbc44d94875e653cb0ebf
SHA1063deccb831af1c4c3b3178ccf91181889a20720
SHA2567fe4343fc2f25ccd2ad6f9aeb9be7497b9c6e7c010772ce798cdfd49ffc8bbde
SHA512e4623962126cc63748edb554ae310a426b0a331e4e943ec149b1558100b1d11f15d2957c6ffa231e9fae2697f662c0dc87f297267ba9da4c74f8068da3a377ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d8186b2985961f0abcb311d109bcd1
SHA15bebec0d819437451d35c9d447002c1460693fef
SHA256e3081ca50b186958b73fbefb29b53b1d022c4e763b8420690769a0bfa05193ce
SHA512be2164357aeb21a47b2405b3e3fa220232e99bf7b7043087b94256cf52637d5ed541ac33ae5ca549e3f0d1eb39e496555fa86906b7c194ed652f11d78d44f80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382470a7300ea928a4dd42ad25679556
SHA1b22b01ad9fec8eb4e5495411bb3de11ad181b996
SHA256d747b0a313f3f2b07b6565c86042929e35df25a2b740eeda2a499f387d0201c3
SHA5126ca2361dcc037b3ada5525e89c181bd7cac913a3d1dd9ec42e909350b786bb8869c0566f9027d44eddb11b6323057a19e88b29e980a913e57e39e9ba9dd4247a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb742d3d6f5a9848f6638d9abf35253f
SHA1844df9d219c2e76f1e8b1642226452afcdbd7224
SHA2567579cbd5558fae7456e3219956068ac2d8fac6ba3868efa93954461070c6556c
SHA5126f8946dae05354e53364f5d69148ffb47803cbee9af3fb627682ec3d4074f3a93278bb7193b1edab4e2d126864d6afc9756fd90620c46d91f8ce0c846fe09d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2cc6dc4296aa09d80f34bb1a1a0639d
SHA1aa1d98492a1fb8ecf00db159aa42abc748db5370
SHA2564fd2aeaa802d7ddf5b7b3b1a71ef651a1b6f422b443a1d949bfa422966124738
SHA512d7b27b9c5fc1fa62a608f953f6c548e576de926ffc1baf54780613ef6798eca58dd92c54b75ca2fe646f43cb46ba43fe4aaba13202a4ce06400a6b2cb7459e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7eb560b5e34271136f7c1957d3a9b12
SHA135d06733bcae88287fa5d643b01966fe95cdf16d
SHA256aa1b0e1568888435d3c9beb9c8913a583fe6c774b03310ce56d3b422ec11050f
SHA5120bceddb71b1151c3ffee5368979238cebb19dd975f05595319b4e6197afbd49b0c521722b9d7f951a79dc7880e2f7d86580a41c0814856bd8b1e0a22919d8b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f01ac461ed0d4b3c458de8f4431952
SHA1fee48a05537db27a56f04d8e0905a0e77ca816c4
SHA2567301fd907d1b0b6c9b2db704165fdcf590c429b746a050a2199bd562b567266d
SHA5124fb9d41f003eaf410dce6e87c9d743f352d0180d3bc19b560e8916305678c757e4aab52650438ecc338e04ab242c9bcff5a6aa57b5b6c7ab16ec5c33cb1947e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccdf2a4ca9a0841ebf98ffbc71e7dd1b
SHA139ebf387b349470fc5707bff102c6e3965a114e4
SHA256b8aec63f3fd8fb3471d0ea246836a144682d0b96daab3adcfa7ff7c39e4d98a9
SHA512baaf34aeafa4a1a18521baf9e04af5336d56bcbb4311dde0b9496576ea1f817e7552ad4956bd7e768bbe6eac3dedad6e3fecb85a8638fbe23948fd65b753a1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00639e75d966c019ae0b1c1cffe33bb
SHA1e9a9bc7c000985011a0839e9f4f478eff1913df4
SHA256e760371b953c70f58e4945b9ef162b74325e306a59a9069e3c2fe94203b40306
SHA512a758d635546bc6b0e1821ff9b3bbdfc522e79e2a0ec32a6b1ea5a8dc733cc7a561ba8675a4e4cc2f77bec9f8103d012d87c0f028cdf6b70147aced951f27ca0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f8361c3ddb523f8f04eafaa0d3607e
SHA194f4bc0ad3f6462d59254cb9946a451b061f2587
SHA2568b9e988f9914682112ee39c589eda2c866a9a5f874e7186a77ae671f59ceee0a
SHA512af6e76abd804c7896f26fe25df68d7deed5439c29930b77037998b6a2f4d988380f9afcef798a4caabdee3a80b0892ad35f11021f5788c806f1109984c84dff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7f4bb077c8077ad455c6cc5bb5b728
SHA1256d598ac0be4cd0cb24b30fa2c94c47cdde4fd8
SHA256c048b8258fb036b5165826d6ac2df23b39076da56bc3e8cc41a72fad6b47e8c1
SHA512015a91aeeae21149470f27a9857f76081a8e845c930f004ce3586afe7fa530adfe13770889cba3c32f5b2d4597990ed72b4f13b281676eef712dbe4948af1ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52285ea1ba4843080a90bf5b51c255d73
SHA139a00dc62a0f3672bf71e25fe7fe18ed3ea23e6f
SHA25651e282575bb0471866541a0ce43722682064f9a82c1e6143ff8e6225ebd91915
SHA512ee9293f40d367e7cd5262bb8030438a7742f92f910cbf8c647e3b76d6a8fdc43abcd10157b58ca76e3271de46dfa1236fad7e34200004bac5f7dc5d182d96d0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b