Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
3216220d413d70fc47cf4ae93af9cb02_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3216220d413d70fc47cf4ae93af9cb02_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3216220d413d70fc47cf4ae93af9cb02_JaffaCakes118.html
-
Size
53KB
-
MD5
3216220d413d70fc47cf4ae93af9cb02
-
SHA1
42e0c5b097e89f06edb2b7e1a9a6749919fc24cb
-
SHA256
c54c82f567b07b3053f64d0cc164647f49523e579378f4e3f6270832a935ec77
-
SHA512
5c430dc4257498a02e21806fb595db5be4eade10c3bf0e041bb36831b141af88292b1aaae6bb81a2ebf21e62641bacf4ec0cc64e394e16e53b17e8ef7fc20ab2
-
SSDEEP
1536:CkgUiIakTqGivi+PyU1runlYs63Nj+q5VyvR0w2AzTICbb2ol/t9M/dNwIUTDmDI:CkgUiIakTqGivi+PyU1runlYs63Nj+qK
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28B73AF1-3E3E-11EF-B1C8-F296DB73ED53} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426724084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000033e033cd8d64400b0d623136e6cfd8bd14e7d58bf9565c45e0aaf41e849e93c0000000000e80000000020000200000007281f6cefc6a0f24c2d1297892188d134eb7f4e5721dbb9251196bf0b5d6ae0120000000e7c5e1bbff4bb934f9536612ca513cbed59253c33c12e3c743d9ae24a172930b40000000af3c006d9a623585917297f8c8bdbf2ab95d20a9c563b9a2b41f27637ad6c51581aa0797276ef1c14d126e11cc3395b2003d359f3ffea9edda8555dd8a46f327 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b927fe4ad2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2364 1084 iexplore.exe 30 PID 1084 wrote to memory of 2364 1084 iexplore.exe 30 PID 1084 wrote to memory of 2364 1084 iexplore.exe 30 PID 1084 wrote to memory of 2364 1084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3216220d413d70fc47cf4ae93af9cb02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1e0c52652cae564e65b2e3ac5a9f1f
SHA1aba6db8f9728e44f3357c7e7e5bfc21ea336d9ad
SHA256d1032b5413e12da58a23ed37f4874423058e832cc0123777abb011089b919d78
SHA512976b1228a13ccb568545339825e7864bde81abe2aea32d1ca007ec09d518f7fdf9f9f22d9f545dcaf7a3b5ec8f2204e56c518fbf2907a0e4a02d970b13df7f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bbf385314480575fd3ee1ee7cfd08b
SHA1cbe433d4bb59746ce45a9400288d94f7601f455e
SHA2567519edff2c43929e3bc3d309143c017e6540ebdd070814423b92148e18832a50
SHA51238311affffc6e608b906dbc1b53cd5800cc99be8bdf5b7252be868461300114cc469e3a846dc489473e2dff6e3a06edc2fa9b7918b50fbfddbfd8a5bd89d0413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc0dcc561dc5c397dc47a633a478c31
SHA19943a7cb3f699e71b135664dc2beed6ad965f3aa
SHA2562f96ecffb717701837eec7d31d88c53edeeae03e1b984d6e7bd8c78ca07d0f0f
SHA512de0f9a59cbedfffd2bfa6f4e4d2db2abaad510ce8d1e5484fe805c05d2fd98041bc1fc61d6afb58054058176b8f090100b7bae35ae47dbdc31cea3ee9f946425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53759042aecbbb3b17d7f0b7497c1b90a
SHA1c62f312cdf59ddc6158b916759ad07e444c18614
SHA256e7a75aef1669f283b54647b35c6607425782cc0e891ff234853a3d5c5d17ce77
SHA512e025ee19a9250dccdf6478d26f8f2dbfc9b1e25e402f13125fac1b6ba290292b6ea1b4104aa64952c92d9abcb4f173858af0c4d57bb8d68deafa6c1b7653c31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee60f3743a9fca72215933614baa2c1
SHA1573cb0b8f7cbe489d72fc36957bdf6959c9ef067
SHA256da641f91ef8904cdd9450934d3a8ce6930e0ef09bef5bba09c4803b4ccb24d9d
SHA5128ec7cd28e035b385cfc73e36e1c5c4ba0f0c7e0c706ca2f8b200fd060fd5257bae0af89e94e4e5f5a7ed699ea4e7eb61ae0d47f2a2f09ea9cf6e9174510fb039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50efc803cbf78318f6c31e5306968b34a
SHA163807a1eaaef10665d32395bcaeb98acd3e11f83
SHA2567c6cfc80a2dcd12d5a9dde7cf2b52b8a74bc443a739eb6ccce6886c0018ca57c
SHA512cbe511b468ea847f7bd55bd6e33cb9aa48758055f5173294b4e513e9dd08b41bced159cb5fd52172e6283110ceeb86af96c9435aa8efa694f5d62b97015baf76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f4154f5dd3e7c695c0e150ced2caee
SHA1d5f697cc5cdc28a717b76db849bcaf751f572ccd
SHA25693bbaf79ca7987cb1a9a9f986a931b11e571cb4c364dd0e78e7efa75d6de6c35
SHA512d33bbbcfa5e7d56cddfa9592b76bb3871ce7dddec3b4c23a90e4b75cd1ace22a1d780624a216251105371800a91b812ea0e9616b59eb41b76dc0abb419e7cdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51230398400a8bd212ee6eefcb62b513c
SHA1196c66d53efd67f5ad840ca2dc5bc0f3b60a57fc
SHA2564b868b3be0ffdfab3edcecc42741c84e80de95069fad6d4203bc97b917fb93fc
SHA512622be11e613c15c9f50e0ad23b64599f782ffe93799643079a84c1126ae1ee6cf9b499860b38167f9a7a106eb72052d0d7b4e8cdb68e00e95012351f2b7d42c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57903cef9866f03d093691ef82c98c8aa
SHA111e175ee1ba4bd97e88681fdf29a563e54db4d2c
SHA256068da6f8935ce931d9c540d5737f27751a337a1f4eba9837571d03c4c4ba67b9
SHA512463e60ec5dd05b85077ec3ae337c0f09b4a2495df8162d18652cf35d3967cb7f6f7ce7510e6c28e103f9bda87e014d9af8007e36e34e52c4977099afca51b7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b271d6bc7c3d51004d2bd465557c0a3
SHA1212571fbd2e7742d63d25431a9473c6fccb80603
SHA256a20a30908148d869f5f8dda71e70c8e9494a82c874ecc2de6f0c4d72afb0e4de
SHA512b4c872b4ab4a076ae8d33b0805aa1ddfb7ba5be0271143dd0641e3ee6d2db09157defdcbeb90699af9c69390ff17366bb03c0f823d056e682b84e9737d93bbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab84976687f7b3912d5dc3471ff65668
SHA1fad054ed1fc3ca1830f91c9946c9d02e52f65199
SHA2567383f4eed36e0f59074804088073afdc65870b01379b7842a36a8cf7374992ea
SHA51203a785ee38aff85302fce73b099c09a1902c0a0c6cc17f01b67f6428dd7ddab77839ee4bbaff25c4103edb36e307e780955e612000402ae3924b1049d37500f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6d12e7e49a8688251b68dae10abd3d
SHA15cb21037269ff6d0f44993fc5abc3e83a70fb793
SHA2569e06e6f8f5a4972b0c2313aa8e64789e1e422f53f12b11007fc629d8b2180ae4
SHA512bc2ea7d344ed704fd0653ee89e13c3ed53c763acbdcc38e94c1ba7c2bcb27fd0348102329e80e83383273477537293dfcb770287685d079cfdd54917b3d19368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224426a405aecaad9c1d5a091add3e17
SHA1bab3cadc8056f5b922a821ddbc8d41e55a3902ea
SHA2569366b8082d393c0a3498b4a6f1872ba8fd20d7f0073c3462f9beb3c3536913fd
SHA512e45bf0f2063dfded89ac9a1a8ed192743b7e16d6c38cf9a53ff5b829d84d1b894e5d757b8e8cd3c869669999a8c1b927584967f938dac8bbf9d90782d35d26ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d42a4d4b5da4471ea6b03d1dced9d7
SHA1fdab6f8e02dac4ae8961385551b42098f0c22991
SHA256cf2a2d41bf3331f55a398938d008e38e06c324c5b755af3a98682d8d731d654d
SHA512bad11fadd9a43114c533aefb5a4e506464b86b6b302bb11233ebc2772747d327f0850cd3badb516361ca995600e41ce3dee30892c2e6aac86d376381e539503f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c132f0405cdd5a7cd2ad01ad68392d0f
SHA10b163895eeacc5588f70605382837a016db9768c
SHA2565c0eb71cf82428a07da2cfc257bb8f1cd404c1b7828413e435384cc320857921
SHA5129ceac2560acae7d7e32657d9de6038041611a8e591d690e8cf0969be8b6a4d29d4fbd3cc014718f735e5efae79a390c25900c47d49fe3e702ff434a55a52acc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcfb69965a2e871ad81f1e3c1a195c96
SHA158ace1372b3608c4c6a14c4477dfc93469bbe054
SHA2567cbc5d7724a197863cdb76e49ab7b0d81d87e117652513bc2032e1be9ff36b86
SHA5123ff1a1e7ccdfc5256bcd435221971db9075f54c2181f7ccac6f5e6642864a74682b5e306ec7413046f0cf29fd047ffdadbaa0f2278ea8080d9d205f53808362e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c16074850c1753b1132ab47c272b8a
SHA1daa0b8d214863db2056398432c3d26cbbfc175ab
SHA256a88c2ecfe780cba6f895fce3f4355974482b7ec3ec545ab340a6ff4905696b59
SHA51280c2415982a485f9024cb8427738756e36efa6103371ae20f21d39405b38d0bd554c563589733ea1bd823f654ccc133dadc888312b299f00d379726690c75b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683ca19f52b3c41ee3d275195fb25aac
SHA13da6da6c727d53e8aeeaacad1ee5d9d494edfe43
SHA256ec284404992251996245fa535659e87ef5d43f751ecd07508d3cc288e6272352
SHA512bbe475ca0616e6a52ff3456b9c74aab5f8c4203b927b1a924dd47f8b5d0f14f727787c72ab15e10155b0e8d40b6973887f6af2b69b87687e1b6971ff1c13d8fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b