Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
191cf841a151454a1d13d4ff9f6ddda3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
191cf841a151454a1d13d4ff9f6ddda3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
191cf841a151454a1d13d4ff9f6ddda3_JaffaCakes118.html
-
Size
53KB
-
MD5
191cf841a151454a1d13d4ff9f6ddda3
-
SHA1
1d063f1e4267c3e200a0fc656de1d70c3fa42416
-
SHA256
584c1f1f7ed5f869857b6eaa01eb19def73f8b7305350954b00d1e0be6a72d78
-
SHA512
83bef8c0207272411b9c4df54a5a3330cfa7cc0effab8851e4b24adbd58898cd156515c7638f615d7191ebc45da25b10009d4f026d17308453c2bcbe8078d738
-
SSDEEP
1536:CkgUiIakTqGivi+PyUwrunlYO63Nj+q5Vy0R0w2AzTICbbLo//t9M/dNwIUTDmDg:CkgUiIakTqGivi+PyUwrunlYO63Nj+qu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e6125da0682fe6da10f41d05dcf5c6d642c5a42824587a3613c57d5a30a82c24000000000e800000000200002000000062c627f289ccc42a6ecf7a2154206a4edee638256c8a73a2ecfdc2538d3256f420000000889b9f1ff72f80ffc315ff62529b1c6e94d472add53cb95e2337c82a96bbdebe400000005864a81fd39910783354f4908b869b6f678c2ae2f7909674109fbfc868f7d6b5bd68260efa5f9167a10244cd4975d1bb985ef86351f46db3e85efb382e894ac8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425717893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70188DC1-3517-11EF-A05A-CE80800B5EC6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04fc44524c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2284 2480 iexplore.exe 28 PID 2480 wrote to memory of 2284 2480 iexplore.exe 28 PID 2480 wrote to memory of 2284 2480 iexplore.exe 28 PID 2480 wrote to memory of 2284 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\191cf841a151454a1d13d4ff9f6ddda3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163af95d2a475f6a098498d8bf0c9c03
SHA140853c4da6c45ce24b9f06933b0d0a84fa60dbce
SHA25635c1c9371ea0e037ef20b74fa819d43d191696dcadb3c060ecfd329f19dc8a49
SHA512afcdcefe1b040a20e965369538a86035f4550f6b20b3f2b678ee61165be390d3dbbeb9fd6fb92cffda12ce243e8beedd48f701a3e8e19b160b436eb95e5a8b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6e60cb95475fcec7df6b5561a060b9
SHA140724d6688f9bf6c036b4ce3f51be9dc0ee1e7f0
SHA256d2148cc3bb9650459a8d7f65493df7ab686c65469b92a43f820f85a6e44d0472
SHA512f9675c7c12828e96b4ce7770ee3ace08df5d37d92e45b5f38c8bea163a4d867714f091d7cae061b9b650408c21889fae7999ac70c514e0713ad89d64b57b38bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42ff6918365d93159ac227c3b7bdc67
SHA1e508821d95fbe38e2b69615743e7768caa65b262
SHA256ab86351cb3cf5402f63c59629b70d80a33e3094f41b6d997c85c12ad1ecb822c
SHA512fc1384ce654fbaf9c8bf8339464623103205687ed384eecd34fd244bebaefdc84e3a8b5bce234dfeb03dab97622edee509c6f83e4bdab2f46b80a484ec5c0774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58799250780519d63fb5915ce0176063a
SHA1f9fe8678887500fec73da2408cdae974647b3949
SHA256cfa3890b4335894b81b49878f70175ef40f4da04a77328c33d1ced273445646a
SHA5123db6b740004dc761edf2b32aea9299eb65bac149b24f6f549cb5ce95627e9c9b8976942c5d654a019b7f80038237e167c6e620edff017cf7fb6d498cb702f826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558618924d90c31951952b5e60b8f76ab
SHA140131c2c45e68be834a576c072e9bc25f9e8b3f8
SHA25686dd929385965713f0e9db9fc9835d91ae7766f9d2be33ce1b7b27b53612e26d
SHA51293bb13b6a1636ba646ea6512dbd36687c974583b4023b49cb96b57a7c58a99e309d5b67d7696b93fc52451fb19003788c574e061c8c214c2c7b8e5e40d420a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc33f484f78f65aba67c96633b26af5
SHA1b43119785355c9e548345a7d37d3a8c7bef23497
SHA256c766bd7c0c4e93f4cd3ee4ecbdbd5f744d02e04ae9768bf49df4adc9bcadb3de
SHA512f000e98214cd7103be58425a2ee759e8171c05e2972018976e784ff152067b9287a62bfefd6a7ee21dfaa9aee2f41ab2646e9d7811db059eec03055601bbcf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d66851860101739c4a6cf656415852
SHA12e88313e76aea7ebc1ef43b73ac935c97b768424
SHA256d5a2341092df25a19bc165ee1c021c7fc9c46940005e347eb568aa529ca2cb63
SHA512b81da79bd08dc882ebb51667cbd30c94558cfe636026a12b431c9e2763a763bd50e130d691e880c5fd508731624eb23ffe7569c3b4585667af20013d8c26d01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbccea2e8520cf569175670439a83668
SHA1d2421c6689ba38edd1ea0e0ba7edffc5e47a9314
SHA2560f2ce7475be69d50e9ca5650d195261b8d72e99ddf320ab0927c23e0d537def1
SHA512dd1818c99dc5dd1ec8e66786a2bab105a5fabbe3db9562db04758fdf29ef9d4fb1c32e36ea0c9693b12910e3490d1dc826aa4e989f3b01d759ef8d518c0e7704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1842d4d1e574a5a02967138d4ff5a8f
SHA1b212681aefaa868824d2e1264e2a3c243f609097
SHA25687648ff8e05389247b304f57303e47f4057e9de90e1318ad11cd3f43c3a6300e
SHA512703a5bb67a6869e4616bed650511974a7e22cc92d45cd61e6b89dc5e960275d76b6cb8fc528f11fe1c9eba93304788ea65e556cc29b44337c5bb49f01f4c09f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af57ab0d38087261f6f805a63318c71
SHA1d7496705eb7a25e72b0b517f72c8c3534df75840
SHA256b33306164a6b4814d56a046af65f29793925581fb56b2017b306d9114088ffac
SHA512fa3119f8cd5a11ae1a75e3a83d95aa1c664af5d7f233b7f603d8b93dbbd2eaa0788b5a233e79c7e3f715a00db2ea94507057cbb21293d78c318b15e8cd6de218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57cbae0e535aeed09adee979441e723
SHA17cb82d97128ebdcedb8822969021039ab9bbeaca
SHA25699b3588e9ebb2bef3758bbab77a9448bc5ef49266092ad27f43ca2ccd0e319ae
SHA5120d9e00891f7e7c96e2982a162a19b841366600528c4167d5468666b5b17645f8888dba55c32337291b59663d52f008411f81b1c675ec84218b6b9807187ec824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684718d4461dd2f7d0acbcc5ab2d4b23
SHA17a5f01f8c2aebbf6279b5ffe633f3f64f7329705
SHA2567a4edd5705d5fb6403232c8719e83b0e20c829c08516cd4f113390ecb12b2cd6
SHA5128b92e8751fe5494eca290b4efee101054ce7208c72ba57de2ef8b2f26bb1750f6d974f0d16e84f719e68b3c7a1c95eebdc4f96bcddf42cd10e218454ee1f1d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56453930e7b295724cb85a3b82de83593
SHA1f49939ed140276ce8b97fca1d05b7ea32046c7ac
SHA256d1064980a8b722e76584f8246efebd666248069b729d794d333ff3590d74187f
SHA51260d4850e8bbf8a94b0313ac6f7d89d9903eab769114ec21a64aa209ce2068e81f7751f292b36862fabacd5f2f6837c6975b846bcdc5b47dba31f41d44a14e1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f9449a6a595f0dfee58287a2783e51
SHA18e73fbfa9899870d8d403d6c3b85ccea2aef9239
SHA256634b4f6dfe6f926356650da7f29cf6cfc980ef27c4527064bc1a3f7f85be607d
SHA512a6a0d560ea3753cc10d41f234a0f1d7e45d64f1498e89319ad527243d111633b3db71c08a2163bb74bbfaf0a9e1e9b04db22ef98e12234be971979540ea7d880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b3db09627ab8f565416410e3d0636f
SHA1eda01d702fd6d918712b26c3543bb56d4f59ce58
SHA2568966f4bae22b7c5811c756a3148f1fc345d8ef70cf696064783561f8897a890e
SHA5122ba8cfc134f0b3f18ee46963c80183ed7c064915c952bd3e4090cf26a5d36de4e4cb1cb9a4a9a1bac2256a0786ab24884674f116e0fe99aa7e86c8d90e408754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f7a29baba3758a1e38ffd5db42d97e
SHA16c7e3c8a87ef585e9dd838bfa2b12cda352485a1
SHA256a02f53c3731357c43aa01edbf20d3f33e0c01a770cb71354cd7ff19b10e6f5ab
SHA5121c97d9304f8edc1e442d46eb900941beb68a63b1257f7a0f45049c74841b6f2941ea567484da6457d852869b28ca75e0f126d2d1e4f4489c209402f9a4400b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e390523d0baf7389cc3e3c33c2775f8
SHA10e94f8c801d88146d96c6d397f5e12cb99bfe06e
SHA2561b6f3e0b8e66dfc41b32890d0332b58612b8ef0b427b311771216f29b4eec710
SHA512d5d0e0b20ca1c41670025efa5daa4030159e510789c5fd53b540163a8c62ead30ceb75a68e3577570c366c1686634a774c8ef2d0a21eeb04a65ba7564b081da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a629c0ee2be49ea53e005b8bff9106b5
SHA1549b06ae07a90adc3829895ca26c09ac0e1c7f3f
SHA256979c5c252f61ab4135f0e0dbb907792e151b04f9a9419c0bfe5f4c42c2cd5181
SHA512e4b15f4af0d692c6dd311c349698121afce6acab19c4eb3efff4fe517198fc4bddcb82ba7507bb90c7d7b5552d71301702245a6579ff4ec2e5ee60ee03e74a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14bd40b38cc75a7e0b98017e7c5983a
SHA1de17d12e4b96f725924286ee5d7449142527973b
SHA2569877f15501c0450592ff2c818312cf9301ea42d7060f5493139876f9bcc1dc36
SHA512eb46bc84d1f4b225aa55496f758f9d8bb67c6b6f9928af51472b51bc1554e44f16dce920207c20d4c444adf2976e3d8dfe67067aa8eecacf29a381ebfa2535a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b