Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
1a521f678fbcdbd75153254bb3dca074_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1a521f678fbcdbd75153254bb3dca074_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1a521f678fbcdbd75153254bb3dca074_JaffaCakes118.html
-
Size
81KB
-
MD5
1a521f678fbcdbd75153254bb3dca074
-
SHA1
0127c72f56d6512d80794830f6f9244fa7b58417
-
SHA256
cfa7d167335210dc45f54fe287b629bddc69fb82a5bada2240327f902d00a133
-
SHA512
6ed6471f7489dc01823883eceae274f9b61d4b598968d6035bfadab3aba7d3e1c23d80f190d5bf455d66c852d83ed947c428030c3c886b5389adc0f8fe261057
-
SSDEEP
768:nd2o7jdnEK4Vkfh09jHjmKJGsN3izBBdQ3BBBIiRuJHrG7H5arHUlilhk5lhCLBo:gkfh09jTYG7ZIMv0fAfMWBadqR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c69f743fc87105aa889c313277d37b160fdcb58820086f3696706e5bcb418038000000000e8000000002000020000000703702a722d9146dcdc2c1a32b662dcb06eda3c11e9bc821ef1c199ed2e6231c20000000e63c6ed840878edb036b6c210ec2d06b2d515169e9bd28e133e0a600df514aca4000000094df6641565fc199a842d85b17183c7a1c28658ec43719fea201c5bb747af67fe5859ef929d348f77cae4849813a0ae141d213dec21d61e190769383ed9aab74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06ba73160c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425743630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D23F511-3553-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2484 1688 iexplore.exe 28 PID 1688 wrote to memory of 2484 1688 iexplore.exe 28 PID 1688 wrote to memory of 2484 1688 iexplore.exe 28 PID 1688 wrote to memory of 2484 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1a521f678fbcdbd75153254bb3dca074_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e01860d34014e64f1a684c577263bc
SHA1f0834a89aec269f793ddfd7fbed8dc9c96cc954a
SHA2564c5e57038743e52ca43c8d514333794eab5115831042f5db7a2c6f6a5765b057
SHA512f23b5c8aaba0962edd6c5b65e2ad98d9d2f886f13cf98f93132794cd0797b6d9cde82fc0628c0576e92e304a6c5ca6391d3a4eee73deda99bc5bbd43348f6cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9383ccda269835ed673e1d6da7d12ee
SHA19662a6085f4bf448c94e2213ca142c107d572ad7
SHA256eb0e940dafcf3ee81b034931a4f95298c5cb93c57a7660e34047f1e28b406fa6
SHA512ff8338bf373acba8d570d84738a7e309316c6099a207f20799c60cc079e598876b54a9ef29066b945b3f898938dbb0674364c56471f22814ec114f516a0a9328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82ff8e9645410be1ec4cdb0785c6d42
SHA10d5b9729622eba8f4cf0b3b839149e5b5cda99e4
SHA2563b0facee8176c97a78ac47f6229c40ada75da055ca78731bdc25e5f92dd0cbf5
SHA512cfc5dc1a26c83399eafdad1cafced072da652749e8a8dd87c0a5be323baea1c3ee7b4a96594053899f53211e88e1230ce2f0a9e9d040cac949a06563c2253c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b55b34b0785f9727b79c1b10d3fae8d
SHA1cc8337222517ce93bce4a180d97358e914e01cf8
SHA2567fbdaff241c8fec884f6ed87c79ad18593febac83b750e18a60089345591d675
SHA512bf95287f52feb687e88b98814db2089a4d6dce0adcdd2bdb53558c09f4dab1076fcbfb5bd7f24f7e1f2ebbe8787af1491ec9752da2d6fc3d573d0cdf1280ba0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d48907143faead676e3a8c309162904
SHA1ace2b381e805c0567bb732794455bec713349f82
SHA25638282835a7d88aa7b985e3dc5b620cee643d2236dc09484f0e2d761316343a6d
SHA512623b726c3fbc509ce64e7a054b53bc151bc6386b12136208b9db793cb136be81a7414fb94051f1b5a55e19f45b6533f545be8293bac9d79e2f34a5212f1cf618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597feb4e4f3d417e5266e676e60cb6ae1
SHA16bcecdf87b7ef7b6a180962ea9be12e77b537eea
SHA256d352086777c9865903b5d11951ec26b73fc51bf7ce3e254982a58daa65a5a6a3
SHA512c415ec062e25394442af11cbee12b7f6f03bf0a897992d24460ec233a5c17db8633f22e53ef742c1187e9fac58f6f867813038a104e42556051f54ec317c42f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93aa21434537747418eb9c30c95dc59
SHA1120286696a22e5df1507e5143f066a283802950d
SHA256a009bdd3e5f6d61cb51f729971dfb5e7bb5b2c0a36b70b98ed40fe7ce495edb8
SHA512809eaf563d2576e54d13c51f7f49bed404caf9dcbc84b21705f1270eed55ebab39bd9897e0c0c28b9e5da86f344b5873b349eaee38c139a37372762dba58d07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2e121a0e436eeb11de91b851e5a52d
SHA15f3ffe88f36b7812a2f2c1ffd051fc546a9bd6e5
SHA256741b8292db676096a81fe152d1a0f0acbee9fff75c273ee16120528564c36fbb
SHA512ddb1c09dace9faa6f7957f91388d4cffc9577269894595c7e0e08df4b3b3dde4bde195a419c1ebe41997b4e4e289ba92c7e49e016108ee88a039a9407493b529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dc1820252439d5f8f9a46aba81c0da
SHA1f34bf13a7ea552105a472e74790d6a791a9060b8
SHA256e1c9d3b5f3f875dede5233e6acaf79b4e5e756025919289325e6337ca6b0faa8
SHA512943a963892a9d5ced4a3206d38b1824beb88620441c5a4f30355fef268f9eef5afffd73509ce3e3c694ef6e1fce0c33505025bad183f2be5e11b0886a943ab66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0666e5c151e1af362107b5f69a4d7d
SHA1558285f14470abb36c95c3bdb4a8ab9f74407270
SHA256072d43c81640489b529e20ac663c67ce40f57607ed4ec57d62d99ced189701bd
SHA5124d4c32743cb795f981969451957356ad23284b345492ff9412a07cdcab4fbb5788ea130bb50e6dff7b8ac551ac2a397c9e371b00b60aa43625d9ccf07bb3b43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f182c33ff6393d83f800445c4abf4042
SHA1712f8d102a41b88ee815ea0414b4f5e22c6bd56a
SHA2562edea3a86263ca41b3f66757c4543e8502e447377643a8ef865fe1c9711f1c17
SHA5122a9c92d907787622cf7cf51ad4f2e9d61e916a0ea61c7812e3793ff13183aa0fd538cedefb6a0a03e4f9608318a147f00ca7bb92937081fa5bc81780867d5057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b658b60f96c7a8897b967c3d1b5c99c0
SHA13bf778ccd49cf1e2860fccc4ca5948648822ef98
SHA25665ac7170d57559581fc0cb8538fcd80187a5090f342ccdee19d3d09e952bff9c
SHA5125473bfa6aa9d46878f67af0b4825c5d6349c313d47544252648c813afb631bd24ac6cacc6cd45e8e9eb59c11a5292ef43b59eec8cffcfd534f6f7a5efb71eeeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971fb44e2e3b84913d676d7b5a30e33a
SHA124f8e9903756167ed2d91a3848234a8cf8200982
SHA256e75e27746481abd91d2cc222807785b4a0676025a99ff34b4618e7ef90894abc
SHA51265f48fde6724f8f78ef046b362039d362097f2cfe437afb23dc1291a4be7b3bd25e1d2fc047b33cb96e5bf692e75d3f6868e785b7ccb713607660146aa64dbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1de0bcce45f493ac108a3cfc92f99c
SHA1087261c25497762bdbff5a3fb7716cbffb4325f3
SHA25699e0d62eb28d414a6e8373a9d9adda769fc4d4d6fc89d1299be79d79c096e924
SHA512659af02ed9074fa797f1f70e0046235d36879a35ba4587696af3cf4f365b683f9ecbe96fd27acb93794d873518554337185d1884145ac2216fb75cc7af898e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58756d06a916174f0309bfc569e6911a3
SHA1e9097af29121f92c1ad8bf9ba7f24494bd131684
SHA256cd5e2bd917d6e50e4d306043e76e66d72dbb666e99155413f4fa62bd96950b92
SHA51296d6720b763777521dedd14ded1af27acf6ffdd34c46db09690a4ef2c7dcbdade7c6dbc20915b83592a53fb37ca2d712b557b6bbc8fe014aa6f9f77f448ab8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58667fcbd7cec3de6717383b8d272b7bb
SHA19ecdc69ac75a185a1a472ca899df0698ecb90808
SHA2562f9053cfd3164f321d2ed63a53cce53cbe597a3ddb13ceeba95d9073a958c968
SHA5128b4ad5587770d8cdbd194d1e0ea1c767368d41102a2f0d4af2895bf5c1db16e18ffff8d7ab2488f7a0ca5313f8fdc8eeea4d384fe5a68e654fdd541966d0312f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57959e76d43f51813e1d317ca61b2070b
SHA1e33e77fbe2f6b2e7407dae0ecebd80fb595a73ca
SHA256f0f9815cda728469bae03da06a3e6f13109e3766a66097b920dc7c5a18c452a7
SHA5121869c84050a76788f86e76e04a3f028ab2e0259afd1252fc7481a3bc4cb61948c235a1cc01d76ad2036d7a6c9e49e1acd96298afeffdc8d4db432190aa5e8106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bc5ddcef570e66e848fa509dcc159e
SHA1c59b8921b3853afbb50b9631529769b1e6c747fb
SHA256004f722d06d9996f456907339e868be05105005faddf05bdb5fd6c04769cff51
SHA5129b25f51dee1bed39fa349a68a3767c14f7eda2d442c13a995f8df6b3c1eb814202a43506295b0ac392cff218de4df07f401f7b64b8b4e20a2c1db98ac4a60ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3210e2d4eb1c4d92701b1ab14717719
SHA1f6ae79f29cd9b65fc92c9e43579ed437025d64b7
SHA256f4a12698334919fc720066feea6f2f196e60a61c2da2a303ab1e39ce85647987
SHA512c807fabf9781e7fc77508dba91ba95c35a8a24db48f9edba0b357ae80b2a6e4bfc8dbc54b5fa7ab546462b936e563ef6c6c9332a623db76a37b3024ca9bd2e76
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b