Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
16a8313490aaaac5be9f0bbcaa5ca3e3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16a8313490aaaac5be9f0bbcaa5ca3e3_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
16a8313490aaaac5be9f0bbcaa5ca3e3_JaffaCakes118.html
-
Size
61KB
-
MD5
16a8313490aaaac5be9f0bbcaa5ca3e3
-
SHA1
428df0b61bf0ddccdfe04432c356daae7a8cb164
-
SHA256
6258331f15d73c27801976c69480f2396fe1f7c0bc388238a0742d57e7ae149d
-
SHA512
746df4e9d9510a376314a4b9ee2ed01cb8229dc153a1836b534fc7f5c33de3bfa55ecc14fee7f5642707918956044f574033134f6d77e4673fd40d399817754c
-
SSDEEP
1536:L/+lApJM/gMTb4v4ChUgVKxSREBk1m61fOp9n1Bw:L/+lApJM/gMTb4v4ChUgVKxSKBk1m61t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000309d8b09d02362cf0a28f822f01f59d8af92487acc35ee8723060d1ec99dfdd2000000000e8000000002000020000000c9922f1a1c2177c856b99f75e68e3145fe0c3a1f5ef2106f4812701b7a2744a62000000051c32037eb73c12ce351296622cd57c6526512eb993e6fa9c25e2e17118eecb640000000d6494e052e272c2dd1eef9715ed9d79ad77cf22835b1effeb847c633a3347287426f559be8f0f9fff09bd7704b4dd8d39a55f5558985dbf0fa1fca80a6626e81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425666754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0277027adc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D9CAF41-34A0-11EF-AB87-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2028 2980 iexplore.exe 28 PID 2980 wrote to memory of 2028 2980 iexplore.exe 28 PID 2980 wrote to memory of 2028 2980 iexplore.exe 28 PID 2980 wrote to memory of 2028 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16a8313490aaaac5be9f0bbcaa5ca3e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc66e51d9a14a8d77a36b948f4513a9
SHA1744a978714fb7ccedf640f202f4845d57511879e
SHA256a06663c13975338093200a57ebe554b50018572ee3a355ce1fc9f42b70f79678
SHA5123d490b78b7adad7d33499e63c07be1ece6d8491740498f9007b23c9bd5daa61fa422b7ed0dcc79293113a480e4567d253a957960f02db93f32669c4acab9fef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4336abb891cc48b9354a96150ff123
SHA1465433ed286b93ef2ffc982d57482e52747cb8f5
SHA2566c851d23ac669948e24579d1c2ff1b654e528e72f097e2dc6733e192961d739b
SHA512e3768e5b94fbea6c1d4fb71c7af6f9a50750f3d9b6ce34218c1146daee41124e0243a6f023bcdbc8222f9f9fb6f98268a98fe7ac3e7884dc55137711e46318ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a680d92b1dca330f884d390de384dd4d
SHA13c429f4781aa5da70ebed1ba00bb12fcfbad86e6
SHA2565f3a4f419ae7540cb2047e355ead24a6616be642dc0411262220ffe97a0f3da1
SHA512e98334ab56b7399ec3f2d886967e6671e7bc8d9e1b37ef10c11f28cc065ddf6c105de3f7d51ec8ae52ae503302ea92e11f752206c8314661f21e700d3ce72e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf58eaccd4e678720666aaf3a2b0eae4
SHA1312347db6fceab926dec7c1af809244aa5016d01
SHA256fa7f2bb444d26493073613797ac59b63955b12fe3829b0172ff04d95fb528494
SHA512c386b31a23730d7798f27c429bc9c8a878b8590b347230108893897128c6b910772107081bd3efef716232355e5591916a49d62b14e3a0a4dcbd724b6ee5d07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f480326a4e994cbf44cbcffdd59bf64a
SHA177fcbcaef87a2d7581eb96e3fd5821c99db8de42
SHA25655c1e1e9bf59204577588b711333bccd9feb20dd530b877682bbe921de2502bb
SHA5126c1f0ca22e9678fe45820e77210bc22f32510786b4d0b60342ba8a0be589384da584e31272c622541a8a097c71e4de4b6a2ed1d2a611c6affeef462b763c9374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ac394f0ec3adcf1c5619a359f782de
SHA13ed4155c2cf26d54a112906d826b0fe8b34b7071
SHA256c82029e952ec27b7c167169026e82a5f447a56a1350c8a7e09c33f61ce9f64d2
SHA512cbdf69d8c557430f5d9fe22b4a413dd2f55f778b4dfbb36304e0b6a4173480185fd205b80e372db6ff3cdc4f1d38f1b3998ddefa3322e234177b723abbddbcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7addbef5b831339212b0ba4f3a13fa
SHA12a72779a86579246f26e4e809753f74ac797e233
SHA256aad16c5f2bf922d8bf3fc9f8a88869f37ce50ac32c17784dcf981591b9d5da85
SHA5127705c63c337434d66d9d4a84bdfaa282951c61cb843fa76dd930ba69c14d32f4e7f16c7c2dfd866fa15379cc99461bff8e4ecce6acf5deecce1e55a58ef4cca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d4ec104a46a1e0785e8c4b6fcb7432
SHA15e28555e922c0e7d9056e67b8b8a625ae76103bd
SHA25632f0823887d50972c00ff8c2d90df3ca5370fd0d403023b4d879736d6880cf53
SHA512e2769f07f2706c27009d428e4808ee145952eb51d2508bae4e73b1808f209589afaa0ce27a5f2185f6da6a1957e26f8348cba5c589a9896d3274d2bcab2189c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506026065121255ff989ea18db428f099
SHA12c5b74f0d1eda7b55a71c55632aa5e83aa4e5150
SHA256c99871e10bb2b44a13e708bdacf1758d07b797572f55b0de0b331d30161d3bc0
SHA512e71d6d508433add94663f7d236aadbea74d750a1fbad2b1e14aac2c6f6996f04aa693bf61fd765de2c24c52083b11fbf5a588892da65c4d5800c283e2872ea0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59188eb32c957d4e537405ed37ca08980
SHA1bfee9c78967d2f1c3ad381dccf01ef76e6d4bdf0
SHA256031c2dcd3f70652f226aba072925d257f1e0ea4735c2374ed20d62c0a6d9a6a6
SHA51270fddde9231003ca78cf833e1ebe5fd0e9c27e7d8080e0d015a37451f0948b7e725eda59051b5302fd8087994ba5f53171711df4768ccf3dc842a0d690e34e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdc6d58175114daae8b19efd78bc606
SHA1dbdddbcecc185d5eecae066cfb23404c0821f671
SHA256154b4657d1037301526b7d785c693fa48a19be158b9ac2c2e6ba04e4628f3fa2
SHA512e1ec266c7d790353defb0b734fb183f832f5c05c8a61a3cf6e88ae559a509b135c99eec23c152606d9af5825cf2b19f40fe78b459f8fc3300f0c44ef5e0769eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c374e2b4e172cf2589ffbe23f294999
SHA16066247a98b6ac0fb2d2a1477d5a9f29dbdba00a
SHA2565f2d292ba8dae6896ce0e24577c16f7830d3dd247c2b41ad1fa2b6ecc52bac83
SHA512bf1a1635a2057222a9152f81665ddaec87bfa43b137d3d3907b31fe06ef0f081d6d20d54b23ce13d2e86d1228658d2996128222334abbbbd2d316ca1f667daf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52347a7b1c179710bad02a67a875ab989
SHA18f6cc82c1e8847d7338e3c6fee060374d62b3762
SHA2561a84724cb95656a0fa03a59456b80f336634b2167c2f65e443f8e19b36ec954e
SHA512eee47c4969f4c7498680c6872ec3d3ec1388358cff467c843ade7cdbadbb7c63f7f618d78af05f43d3e3f2f5b2850ac3232dd573b72ed43f2a28102fd9c4cf5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565340fbf39dbb6eb9ee5f91efad6c249
SHA15539e4bc229e0527c01e292a30dc89616b8b4d28
SHA256c3cc94a4a49d9b800a52b47b4dc7aff1a4eef5e7445f5baa8d0f134ed7ccbc10
SHA512f5c645b80399c9812b1b3d53a029c7798dbaa616ddacd1595d878b21c3bb9c708c6cee453bc7cb8d8cf34868276cf8f2a46c93af238b255dfb89e0b381b0f22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d0d8ff41693b53deb2d986d36c3943
SHA1828c9e1dfea80a37796083d771f7b653d2cf1a22
SHA25664d0aa4be382db7236c649861dee1887f5d2140678127effdf02f1af982b806a
SHA512495b18913df2d7ed4c211936732ee0077cacf86858490bbb6830da3be1008956f55afa94e192c4be9ccc893cb1f20c8cffb19628642c9b4d71c268f5db9a32a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a03d50b9aba20fdc51398cd84a6c57e
SHA15d972bb62f29cb49cedf237edb4512dd11970d86
SHA2563ca7c13fd4058059937285a67a832c5e9d62462de51ff5cbf3823df807c8946a
SHA512e97fb7a9626b9c9b20daeed33c1fd14959fe86a2d4d8fbb477868eb6761b030f0727f837fe98661c95abfcb889e8390cb977438bc282f372535a7908e7c72324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97ec356d1089838160b1941347abb25
SHA1231bb9fa954b109e0ffa62bc7c26fca463fd760f
SHA256f8db413bc93b9ceb6df256c34fb8ce6257431cf77780e4c410c52be0a6700d47
SHA5126b9547a8cfb23b1ac809bc5a4a9fec9708edf027b2ba9e71567949f73b10d0467d210aa6387de30d2e42cff0dc4d40ac6d78d7e2a059b3343bc0e63134109ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a63b353c7879569c126aa2a1fd5849
SHA19066ea3c20e96b57827126bddf4d1d3cebb4e9af
SHA256e8e300860a01032eeee96ac6d8763819893d2a2ad562f615649f9488c1a900e2
SHA512b1ed1d5118cade925cc22022d02482ad61260903e92df58a653e8e8481ff080a752b9e9047fd008e97e56e6c3232120f842ec5613d4be07f28e75eb27c17d9d3
-
Filesize
5KB
MD5037ba585f0d3a2cc7cd99ab3b1728af1
SHA1d6ec1dbc21aa4fabee56d663fb3b0c85913bac1d
SHA2562e179b98970db42e9dfbc00bba0840ed11fa7e3fcf331c048f59d34cde2927ab
SHA512ffee43bc92506a3d0bf6e4705bddd3ad5ee182eebdcd0e8864fc8535f2efb33196b9686d52132aa9a81768e2ea96ad54e1638abd908fbbf618d07b08abd808c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b