Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
2d459dfb38fb613948ab7c1d451bced2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d459dfb38fb613948ab7c1d451bced2_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2d459dfb38fb613948ab7c1d451bced2_JaffaCakes118.html
-
Size
30KB
-
MD5
2d459dfb38fb613948ab7c1d451bced2
-
SHA1
5787012ae22eff7087fefd8dc380c6bfca01f365
-
SHA256
1428dd6267f9f679a59752b2e3cc5d00e69d74dfe4e2930531ef90cdb104833d
-
SHA512
0a29f71fb72e63f453de06482bbe22e3cb17700330a5101a3068982f9a8b33f47c032c3b43cb7a58f973ab765df319b8de03c9213dd2447d0845ebbf64c552c4
-
SSDEEP
768:CyikAE9hnEZs93UGUNHPmUGUoU8UjU9UjUNHPhUGqbf1TGP4:CyBn3UGUNHPmUGUoU8UjU9UjUNHPhUuw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f9554323650ef588b223ad007f9ce2bc0b63d910e18403b3fc42e223b232c7d9000000000e80000000020000200000001e78a9afab31a9e00e4a1a2d6cacde8d323242247fc9c993a127ce3c4ac4b9e220000000e16c51fcb8bed8d54be97b94f67a2ef0bb801b9c7cc1a21d7dc53340be76b63040000000d5922a9e0f3d28f358547eb1966e41e2e8ce3f78affdacc782aa4ea9222981bcb339456d015f4aa80c3a2f35a094afeb548f7b61eaec0e4debbea384ad3805f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E6E7841-3D94-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426651106" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f20115a1d1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d459dfb38fb613948ab7c1d451bced2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52042f52291667fa02390622f7589a25a
SHA16479a454888a8f1364acfe8d0326192224126af4
SHA25635257438a9c08a3de9218882b20ad73c85a4df4db95da45ca9d857ed399ef8e3
SHA5126c5cd8b021cd3641c96334944c31817be66ad9b0e4163107b0205677d3eddb0a34cad9a678c948f1c7c94ce2c441ff3d5729760873e86a0101289181407954d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adf216bd048ff00af65b9b86e7f4fa3
SHA1d9169927d2f80e003f0f638575821988141f3acf
SHA2561a99a2e50a2162be76226d981599dc06957df27d65a827c0f8fdbbbb7b4ac913
SHA512cf6431b0afd6a9e4b2b7705d1b18eb6f00a263587f4fe0d5a0eb9989c99acc42f00253dc1f99d03466bf4a5cdafc7d420c230a580a13310958fa7100744bc00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c7041e3cf4ef255166c5bf5c68bfbb
SHA1dabecd021314b10cb48001fd936795e0df846538
SHA2566b95099f4d961fe271c6cfe442da7ac64c2b8b6feff76193e50edc720e50973d
SHA512ee308b4ce14de1cdf0de3ccfcc4dc6564b1961e66753b51e44ac8999a9d9688051890cd4f93caa8ad4da4ea865f9cc9dd8f3a63afc8a2f30edc0d2272cb3dced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5e9f2f23f87ecf5c1d0e8401e5b93c
SHA1291231c17fc82e5959222e7ff1ce83bbbb2b975a
SHA2567c7ef48d0048dde88fbc42c3e284f3eee32fa8765e17dbaae6871bf02e0c25bd
SHA512637a3319676305e8e41fbee9ef62fb683d42e885460b001dd2e92fc2a9a3258431b0f5a0e25812b90c453e680ecc1ca2c71dccccb852e33756ef50b5b3295896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418bff041fe59933dd6c1ff956ee9e81
SHA11d4ade516ac69f531d1f5a94dc75a43b0a51c163
SHA256874caeaa2a5df77bdb374c5c85a0d8152b5bb370644a841ba2ad975c101f29f5
SHA512f2d0d39e4f692aee82ab19ebe6f66cb6e4f844a567fca0118ed3cd900e78f6524b18bd3bbb263e54af073522f8249e8a06a3a9f514d8c028c8d64ad0675d88ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c648f92adc8c4286a596ad30fbd39393
SHA1f09586fe8dce28d2ea2df8141379b31824860adc
SHA25625968947018356aa11ded33e44915065251646c8aca00d8ac8b2809c7a04c68b
SHA512837bfcfe525d1ae224c8e6d810807b6afe1d01469805a1e57dd71d64831d2a8e1fd8c97a9a297798b9343f9ea22b3700adde4e69b6ef6641f2db794d4ed45e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593731220e505834bac0209e1fd24d305
SHA16c9d100b89cd18c724119c21bd3403317e3d74f4
SHA256acbc039367eb7d9fdb1002d675d4cbc9267d3a295f2a3a53e993eea31b9e23c3
SHA5129df945e54fbe6391c7ad39f77acba3a5423f03a720ce2a4411830beb8f02354b46ea74ef1c586c8f4b6b31e5f5479cf5095b4c43f5a2c5681bc3bf67aa466d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0299ec64b98ae6a0ad48953c45da34
SHA12db20c5acd97879e5d5bd09d8acd2cf541bbd57d
SHA256df48f89b4a8945865f0dd015dd37a2a2010e123653effe9e6d9277296e62f142
SHA51272add1d6fd05c72e363f7c5c89e32f9f3473d38f5aab9ce0f7c5edc2ebcba2ff8d593c3563d4603b3ee70afb6e06c4381b97d7307c7616e6c571f4c1fbec9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a8dedcfcfe9a45eb3722b7688ede95
SHA1e2da31873efdd4e351817a02428142406ce75e09
SHA256f239e13f157a9e7d28b5a031462d3de785b3f2e62d0ec178224e5f1fd691e39e
SHA512ff7f9aa2b77d24f76134cfcf365f218311de1882fe8915eba34685c34c06ceb50432682c4db678ab594eb9913f55d7e813e153cfcbb8922325e5d6df0b009b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8e842fa4558a7786f424b4b00180b5
SHA15b9f9da3498c79e81c899e90a70e47cdbf782030
SHA25631eb9cbb71fc16f702bf93d94b96fe669a4429e51016902b04c2290c8db69179
SHA5129b6a1d6a11ac3b51dcefba82dd0f036b5222b693f175cf8896a41f45e82468da521c92bb6ddc0aea60cd6bab8e5a99eb96b05c58b8c91afe58dbb21987897945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71bc67af0ab69509951aa052d31e774
SHA1589ef12e14a465a77f465c4d9be2d010cf8ab30f
SHA25663334adb127a5d4b1a31a81a88185366b48fad7bd48db0ead9ee49b591e6a222
SHA512ddcd86aaec0b35d4c413e38899c01274d03b7d907664f7d330ece6149e65e8ae58baf51dc132b6a74d8e731e7ce745b55a178550f4b0ec2553923720340b7824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533213044a132d5a595f9075df5daf4db
SHA13c0f27e817171a211dbed8e75df5130170e1089d
SHA256e4709e69f4e5ce58946c14df5e45a1d09a4bf4a26a22effbb669d485d77ab381
SHA51255387fa999ad4cd4dc3de6866aaaea99263fe69bc8e35b60d91a614edc190b9274c830f29e210aca532d995aa9fd9c9411f8a203edb1ea69183ea1f4b0fa4148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0851bdd0510e826ccf2ad4a012aa038
SHA1410242140cf5604c42fa7de9d511eb9396f334ad
SHA256a9e7e105f85b67b0467903e7ed75e413a68ce5533179e694e3ebe307fbddfe09
SHA51257a1fe820057b593f5e361eedf5c0e9d10b7944252eb01f28fc90771db144e74617bae1e02a4ebf1eb2949b84769a4209acd7f7474a162eff9b8cde5194c2dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850e7515dc1e0123e78dcf873b65ad28
SHA13ff7bae362d67cac24cf13e7b97ca682028c878b
SHA25669333788d664771542960525e90c5a3844b8e46731489f131112c7538a6b4ff4
SHA512364ec8cb48d69c5f60d14a9f324df038201cad764df7a5b0027499b75da05cfa1ce9c1ecc17656d11fcc3b630f3d1cd3b23663ef46aa099fa0ff7d3aba714f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab596f809e8cf8b20c069c5fbecc225c
SHA1f943d75d97c3382c800527dee93ce425f487bf7c
SHA25604f7b8a393ac914a6369d0f18cf552a7e5fb5166faa972dc2c054c9379b66eeb
SHA5126ca9a5cb846915cc0f1c1ab7b6fcb79a34397458cf69a903e1c8b24acce2bdfc14dee8ea860ac102b841c7ffbe6741c495d90ab9300ffd49ae0743c06045b1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a8a0e92ccc9c819c838fd512c0dbf11
SHA1bfe4ada769663fb5dbba988f27b50351e96f1ae6
SHA25613cd77a8466c1a69fdd659d6d33e2249ae381141ecb7d342012becc52903f2b7
SHA512444a179590ab87765395411e5ce0dabf2e8485797bdd0cc9fab74ac6398909908654607b1fdd760a143e99a4f6378cd64afd905b6c19944cdee7ba04d28707c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154bfd5fb820ff2ad079d7c1788fb651
SHA1eceafc25f184c61ed8e02010c282aa5934b23188
SHA25657fe55409b0b66ac43bb60d56ee46c168588060249b945c84a588132e30897ab
SHA5128ff62dee7a6272d81c35c703eca32d959329e7e6d0f0813b755965d86c66c112cf11e399815ccf455ddbf995dac321580f2fd8729e9f1e108d798b33190db551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec054161c250df7fdedbe822654b1615
SHA109c88d657078c689a922614d57818f2d1c5be074
SHA256482f02ebc48f29a34077af3c132f369790d8e18567c8632084e579de8f8abe5d
SHA51229b915ae87569764511133dacd45ade206d21a6f3ac11f718cc51868d716743b41d750d2181d4f958fe561f3d562f35df56490c17092798e282e4adb8fd02bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566690d7ba5e16a4b79f4de5c2f932346
SHA1c008f1d257bd4a6f63e080a660f02df330b8ad8a
SHA25658a1c69870b618934eea7894c2f71c8652889cacdeca2a29c2a8fa1d7ee6e77a
SHA5129f6df5fd0cfb41a9562ae1647b4e394bd22983421069a2c6666260def9546136665882016c5aa0c2ebd22570cc6efbb16425a7936363d1a554cbb5a852496364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5c8595279c3734b839988af1a6aaa4
SHA18ae8a8d4006365dad06b1d33d82aee50786a7dce
SHA25656c345cbc68c3e45ce7dcd017a4d092f9222c80796e921972fa8248584505f6e
SHA5129988bdb807533ca8c6e9e28dc03d93275b2e9e7e1a8f45ed32fc50d95ce71be0e7120faaef8273a83de90b959a6cd3548ddf8a80b49df4cc558b6ef6fcedded8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b