Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
32ca450d35c2e1e033c9c8625b485f19_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32ca450d35c2e1e033c9c8625b485f19_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32ca450d35c2e1e033c9c8625b485f19_JaffaCakes118.html
-
Size
53KB
-
MD5
32ca450d35c2e1e033c9c8625b485f19
-
SHA1
3b7e909873824aa79600ad5eb5d4cdb7dd7e7789
-
SHA256
d6ad4ecd8a7e895b04d0e34dda8e626cf1cd945ef1177042c454fe4072c21180
-
SHA512
209e4cf6b5c51f9283a37f7581dd223517be915704784f470426d89ad0bf14765753cb87594404daeb81851c7f21442c39925eb3f6f7cc1579901a3634035550
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlYX63Nj+q5VyvR0w2AzTICbb1o8/t9M/dNwIUTDmDn:CkgUiIakTqGivi+PyURrunlYX63Nj+qH
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426738056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0A65751-3E5E-11EF-9E2E-D692ACB8436A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803cd8876bd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000080078dbb8967d453267ca6da170aaf343bf6394baa62b1350ceddebd9d4bd415000000000e800000000200002000000083f0f24e178db754ad7489be6cb156f92f1e507f3151057459c5599d0b2f258c20000000da9ca407057a837d02cb54810c139ab5f5ba93b0cf1f7ae28f1df03700702ca3400000004cc8859591de40b0769d79820aa6aad2f5b4b38c759d3f824e0cbf7d057a33ed1d176d01773d9e3c0cd66a6a08a41bc3489680f6917517b587c6b0fed90e0442 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2684 2112 iexplore.exe 30 PID 2112 wrote to memory of 2684 2112 iexplore.exe 30 PID 2112 wrote to memory of 2684 2112 iexplore.exe 30 PID 2112 wrote to memory of 2684 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32ca450d35c2e1e033c9c8625b485f19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb394287ad8916d6559bc08c6382825
SHA16ff5535ad4f3d9ac9eccfb58231ae89365d20865
SHA2566d3f4160db546f65b1c54179dcbe8edae0ec7b6167b65288cace7a36251b592a
SHA512e890234efe2e8b45c9121a48c16ca1b51ff785bb55c691c75a552ad6046317d5b256f1cd8b41a00c3feb552c8716362fd99f7ba4d8a443abfd0312f685b5538f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba5053df7de55a7a50f4d3f400a1a5f
SHA18390fbbbfc2c6c8e579403be5efe6bc70ff80565
SHA256b214be7d37ef18c4f4eac10c2866543760fcd0d03cbac9bc3dd3ba8ca9b39f67
SHA5127520a6d4f918c8a4bce2b9f4fedaa1566a39f58571a8bf9dc4366ede46f731ea7fa8bc9a25f0ea0e789096e3d0dbc76638d298b11824addedfa6d55dd7c251b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b3fbf213dd081b4204bcb47bb526b9
SHA1ff087849ab4bc0b9a61039190dc01911a3e50e03
SHA256d6b31bc181d4c6553179c66b2d9797216aa3f36467ea5b2dc2d957604bc29b15
SHA5125305381a921b69a4dcefcce7690bf195a99220cd75ce53f2aee5985d1327d1da0bfdcf3bdf24158ff202f14fc6420dcf0440d91432288cd49a197c4622873dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98a27d332663440485388deecf75165
SHA1e04da958bcdf1530912ea53303545805fe1ae3e2
SHA2568c9493c2dd6a52977647118bb40a04ae2d8809633bfb0bc20bdc5bb37160be3a
SHA512e117ca72b86cc08e517634baf11c8e72081933474a7c6cdd661d5d6b1b9167dfad034435ab54e08fd41ad66998f1d973e61c72ef454ace67750ef17250158c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c99f7db27e81892d4aa9798e57cc1c0
SHA189da2666820eee60065d3ff614e9521750bc843f
SHA2569869245e44cbe0d213af9a88006f0fd587f5570982238ce04b940273915af09c
SHA5123f71fe5e1bf5329a20d801f6bd4fc3997abb8b6aeee2f729d9bcf77e1d46da30b0235ef043e27f90cd8e73074909cad536de08a1f18cd31296c8aa623e716793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524981dc2b1f46625888bf7f167bb73d
SHA15be0df8b6d9e3ec05cd79aa5f172bad700149626
SHA256b311b7dc4c14f418ccd8c78e393c6175b33b7828494cecd4a539938e28aadaf6
SHA512168353d8cd8230a833324568c700ba5e72d1a207d21aa8bc51965206c241aaabc0566a9e5a90b0b0240de4e26e0a75c29b1794faa7713d97a2e76ca9e58f1f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7964b36ade971dafdbfd86448986ee
SHA12ba55953c25c7f62c7eac5de240d31eb771f5b3f
SHA2560b8bdfd0fb63b256010ffa871e0dd72986276d7797a0263b0232a6722d1f6bee
SHA512b64305bfeffc170b25df267a13aca4ad0d5d027d79d3839b7a8895dda0ad34f34993f2303cdecfc11806a12b39317cc6ad6469722a4e3452f7e6dcd93f5eae8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d31c51c8cdace3f7be7f57422de8777
SHA19612a983914af59e697d78aec5f85d690eb47c84
SHA256cfef51a85111c1fd4137217f859f5b485fda1d0875aef5c99917f2d4d7c09bd0
SHA512e0fcbef03c211eef25adfe684df43627c36b814f9d877f0a06c7681e7b1fe3f2f93f3df736cfe94a0851962f20b6d327f9bc881ba32b87468ad430a0033ed912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51817834a1a55aa7178caf16bfd72658b
SHA1b1cc6aaab2efbb047f3186355c9f109eb6022cee
SHA256cf52900de8ddfc3d4c97f050857f38b730eddf181ab4297b10cf80b44d6a5d2b
SHA512c1402203254c91cfd3ffd80e59fe270e64d521daacdaed53e29135743faff3dcfe8a7abc332e4490e17230575b7794045a713cf22e6acf12dd8399ecb7432b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577954d621a1e44d7e4d1d6f2fc113ee4
SHA16db24c1c197b41ec2e356b2b61c09a0541c9adc9
SHA256d27179083e6aa5a5a90423251208f3d0fb459737c9e794d4805cc351bf677371
SHA51289811b586b621fd6655fe804d514890a6b0e523b25dbd233cb34ca18e3397e3256f88ebfe013d5a036640ee45189ce28cd3c7e9f31be9e0212d9430b897911c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34ac8738b4a6fa0fafe92f8f2edf808
SHA1980dd8a816bd7570ab2de7d8f8f9e66b84f9ff8e
SHA256349fa221538c2300ebf5b833269ad14bae5dff2e3e86843c9e1b70c3f6254955
SHA512410a511844df5219dc127e23a076f7984af26b657744b72c9a9930eac61d521413c824ecdfc1cbcaced8bb9e364d77ebbf2826ec80561563f4deda3236e93a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a36d5acdb2624342ccb7e2a60f8e789
SHA1c080ea15197c6397177323aa5642699d0b6f22d2
SHA256b1e2ec566c6aef16426bf0a7a6688f24996df188cc178133cd9f9cf6e703f224
SHA512d0a682b09577c99024569213d84ed4766a093535727fcd53887165f1387218c2e70e2febcfe916c022cf78bd8729469d1905ff3db9553a8d18ca2d21edc79968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f187923162ac0e3ea9dbfc4bc3b43b
SHA1e824a31a562f160d32f98ce03b8ac803bb0c78f2
SHA256c3d9462f95963856018219b1c1a20a599dd3768e007cff7af1ea954a2639ca8a
SHA5129b545e1692cbb72a2b1ce5cc68e04912ce7aacd78905de8e33eca0c39b85eb61302a8f96ade4b7b3cba130af85f6949afb3d16522c7b402046c2d59bcc7936ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a93b70584f048ee8a5ac80fbf413603
SHA1dce8e971f2c8baf5461451b0237d7476b917e07d
SHA256a43fe47537787a918035df26e2b78e4525dfecada2ad1c29ddae653986f9f02f
SHA5128ca70f5e00fba259263426e31690e3e52a65b022ea4e4310c7ff984adb5adf6de3e83b33f8e1bcd7a2bb04bafa2e3bfedcaf22f5e4e513d529be9dffa0a464f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524eb1631b327880aa172529493dfa77c
SHA1618c4e201f1548d8fd8a22e9eec01bb4cd9b16ef
SHA256b84fc88a6c96d1686e509b04e46314860a0ce903ad5f1dd1a6ea189103d34beb
SHA5124a73cb0464a21bf2401db0b1f0682a877407bee4678064f2218fdcd135971f5d7b0b3a8d77d0d74f31eb7b0a3dadfe6eed234a8a3c7e3bfad3a91d514449446e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7daf843f6c2bc073d4a54dbaa6ff086
SHA1674c11b23f670fe48c5dbba537ee2e05bfa275a4
SHA256a3f5835fbc5c7a1e67c7347bad03875ef395095fd4e9390617356f8a8e631234
SHA5129b1fcd8d9dfc8d9c92200ade5c6ca686448016cf49f3a58f29985f954d0e8040c5a1581ff80387f5b72a4ac906ec7b585df2e35529c242c1e7bc27a673924008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca4fc2c475e642e026421883d86968c
SHA1e767bdc834bcc10355c53ada2b284cfe595e068d
SHA25655a81ed05489657105597f8bfc4aef888d70625e3b99f00e58ec2271961c3978
SHA5126ab8b9e73f082ded45dc7038a016fb9bfb858c4ee1a72e6df78a2adc80111c6ae3b42e5cfd2fba28d398ec344e9dd4694db9ea4af374ae4314e42f31f37baf84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ab19ba96e330d4b6a946a39e14ee67
SHA1e73d8fca37007f28fbab00c1082d8f1d26c22fee
SHA256042e2daf688b5ddebb33cd0fd1fe81272dccac8dce94447a00e95ce55d716812
SHA51222557c9316b56670633b336bf5c88e2c29aeedbb37fda57483fe2023a4ce9ea616ae5d6c79e321caeac5406d7196145f5617179860706ca238a8c90c8b891f24
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\filter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b