Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
34ddc538d59a197c7d2c7da746d0752e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34ddc538d59a197c7d2c7da746d0752e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34ddc538d59a197c7d2c7da746d0752e_JaffaCakes118.html
-
Size
6KB
-
MD5
34ddc538d59a197c7d2c7da746d0752e
-
SHA1
b122f5e4142b0b50853cb0c2d383afcff43846b2
-
SHA256
d6f3040a27cad76e850b3e4aafffbf7946df4cb19788af9ce28bf6a16d9bf5a4
-
SHA512
d47dc60c828f0b4b481bd681f1b5ea5fdd060d2dc589bf2fe3e2bfd263f401debe9b0ddc83a92f19a3b7b1bbd0732b0d37897ea7054301324bf0cafe4d4e6488
-
SSDEEP
96:uzVs+ux7wlOLLY1k9o84d12ef7CSTUKZcEZ7ru7f:csz72OAYS/Zb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426779548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BE0FB71-3EBF-11EF-A372-5E92D6109A20} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005494c1450b173bf002af28e64b305e61360545ca47b6e55882a37a201255e3af000000000e8000000002000020000000050d447bcf208cce42e04c01100043dfc7b95975fe0407bfd1c121a5c221b2a020000000189207a06a05f2b0c1574e070f940a93b792f0b9113b4c169ae1961fb2fa66ac400000003272a72f8c1f0db84e0f63e3c3c3d6316aecb8db58b0eb0db7308f68bcb9cd9837d6d5121320f0926a06d9a93c4854f04d5df375bc32d4156cc8a9c3060b4ae8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70548422ccd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 556 iexplore.exe 556 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 556 wrote to memory of 2276 556 iexplore.exe 30 PID 556 wrote to memory of 2276 556 iexplore.exe 30 PID 556 wrote to memory of 2276 556 iexplore.exe 30 PID 556 wrote to memory of 2276 556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34ddc538d59a197c7d2c7da746d0752e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:556 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffeae461fa12128bc451ee9749a1d32
SHA1850a84e6ffc2959cc820bc12f98cbbff2ff0f910
SHA256a32748703853091a9fed7865215a124eb445970774b39b2be36081562cee4d1c
SHA5122d4e3a0cb8428190daebd88b27c4d45f9a6afb830dfbb84e08d2646abdb84284d5b1d03a8a230e405ae14aea8c0de0ec2d2db1ba514c5243a3341883a16edc37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe423c466f48674c2e6abc1d69f645c7
SHA120979d0ec4c6c0e3124524f55690f5a6f82f59ad
SHA256bde22e618a8f3babdbbdd65c049d0f0ca6dedf3f087b54d06c1e467831d4bfd8
SHA5124ce8a07fde4d1b70cabc7efd037aa6d001e7e46fd9177728d7aa9ea4d6493ea025431d37a284d4810444c5faba2ded8996eb288850831006a20492ae3eab4e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d735b9b9f5485a90d2cf18886e967f7
SHA1cf663fe773b71d7a627eeac5713393981858e8bd
SHA256d74b83e0cf0e658ee012e09be8a4358b3637d153519469df2360d88fa288a566
SHA512dd2e135984353bd24e5f2ae53ec0d1e1b53c3d6277bdbccba57f6e1fe2efe8d0549298e8e49932862e33ca50c62b64d1cc68a9bbfcf5feda209aded1c54226c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ca273ae03515c32134425f0ec28dd6
SHA10e0db3f102dc484e60a855c612dabce04770c47c
SHA2565eb85f21fa2fa6b4c9ce62116989c43f54afa71a684ef0b7e83997c9e863aaaf
SHA512506354634d60ac875df5a08d1361af5b057d349f47a6b682fcd7f883203a1e08fa8e95e78f13b4c832cd05d8e8a1de675d499a380a2a493a4b1bd873bbbd3d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f535ac5efa5d26815bf47f5fe783984
SHA17d783bda0ca5c28ade28a2d0b650d3e543e4d157
SHA2560145ae4b4c8d4b8c470a28b043d73f2e4921f1a9e0b160c277af85fddfb74ad1
SHA512e130c87b1b10d5e1ecb487bb8d41a8c17d3cd168fbd175d8e7a8e02ca6fb141b6723306d78780f9cf7e5ed1d40f0793cc8c58d873e12a0c0dabe7caf20588744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544264d52a27c0609cb4978a6e19c2bfc
SHA1853d9c155de4bd18459c53f1e37805906b489687
SHA2564c8913a8eb17e7ad827fd0397d802bf3bdefb68e70cb746b70dc2529c78b2369
SHA5125a8fe0883634a0f842c4f9e851161aec4d5d7efac770c3fe716e412271592c59b676557c3c6f3882adb60413462ac51103d93b17ed883758db7e4654a2166826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531aa98ea86be3ded9863234d2433518
SHA14b1819af498bb3f79703169100486fe7049d9e3b
SHA256255ffac5904dbe6c70966461083c72fb0192f6fb034ef32ff8fc8f43dd514623
SHA51273dbf2b85b8328fe85394467de6aff3393999532aa246debbcd160581356639fba2273d802aa32f7f1c882ab2154fa694d6a07cef9c4bbec3e8cef68862df183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351fbd2d23bd717b8b92bad679b2e224
SHA18fc2eb0b0c3369c227cee72e64a513bf3f473bec
SHA2569fc1fa361603a0c5ac949817c3c195258655d02a45ce4cd736c810589a960345
SHA512797e1299d363c8e9f36b889de37522bd16505e86248c64ab6f81e9805cd683cc62c6a3735ba70d34a4a60da9ec8668b2b5263a857ada41909931376d04769559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5926dd7985898813276ad53106950d
SHA16b08ed4abc753acc17771856c5e6c46bc7244a8d
SHA256226aac0af4962a7daffe3697987711fc067d1252262d5c58ea21848794723c6e
SHA512591cefc0f5342464f7c77b5e5524ea6b3f4e66d9ae172ba04c71e758501b0f7e34c0125a8862b88c987f591c563b9155ba67dda89d4b74c36d728b2f8f2b10d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c02d92227631ff9ca690f250b23275
SHA14029fb390af9702f2ce43109132f1ea6a477de1f
SHA25652c550f3a85a4ac0553d98f7cf1140ecdebd50652bbb5f5e7b0d65001a3e3b70
SHA512bb06c25c5fb56b200052a16ea5df2b262128f83d40e7716349acd1d0005208e547914172b7d78c1e58fd426e63d5689fb629769a40d251c9ecdca072986b495b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ab5d8bbbee6d8e179a159223aac9ef
SHA1fbfd40385e3ef29cccd7f4d890b3e306bcfe97e3
SHA256b3863ba72c278d521e0643bda44a36dd7ae0f5d321ad134a08b321e57786de22
SHA51220ee53dea9fe80e27805badcb4999c4d87683839cf68669ab666a3d5e7ced650e73cc8e14d25cf5292336a7084285cff7d79186846f73d85fe12bbcb5265a7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e39b4c48ab36fee0ef4199b88eea2ec
SHA19c995d335f02a34e709d0fbc7e5de0f3a7157627
SHA256c4d77a11aee4d4c2790f30d58c65f5d9bd539bcc2346ec76278a14cde8af1a8a
SHA5120e85322343a6428b11bca40a31fdaf9607207598b776bbe8d5553ee10a7fbc6531fc5979fdaa12d9d7f55fbebbad46564a991cbd1b665098fe5df0c6505ca404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec328786016b378ffb1e2d7eb2ae8db5
SHA177feb00df867c164781f151dc97554b806f65b1e
SHA256cf7a00298b97cc97b9bbf4c2c94fc501902fc520e5c49ef130a0161eece72f26
SHA51231f6f9e6da3a1f859e2dafad63e39da687b29cb61aee057fd45afe379689f4c730b83b6e4fdf2e2ba810a2d7c8bee8d594f9362700d8a14f63cd5fc47a35ca58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553935ebc8e92f03311c680f213156276
SHA19e084912a9588c510276abafec89551b0aea65c3
SHA25686e226de41032733959beb97085096848a788fffb6fa10f0f23a875a9ccfc08c
SHA512dd9a7b8fa24fb987db899302cc2934711effa3cddc8d10b742cb38bdf5ff9b31fe44591ef14e8843f10710b9f689d99a159d1718116d879b5d6d1657f79e129d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cfa94fc0488f111c23af028e2ef23f
SHA1d07c011af7a68ba126d690b5ddface6b9187fbfd
SHA256eb88970a3dd755880bdaceeb68a92bbc8ebaad14299fe5dcd8616b3044f69e7f
SHA5124cdbe2c8c23f32867ca7c0f7ed35cb9ccf8fd6531cfb1466de588eed2fef7170e442dcd6ffda635a6b2554827de9806272a5f2dad430edd9136c6f508c015564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02e464b2993c6677961861f16b3f95a
SHA1936578fed26c4fcb93c5601d5340e3fea68bf6ef
SHA256e73c50495fc2868f7a08cb84f1fa8a71459cd0a50566aa87a37e731ce54e2b89
SHA512136048efad60399e9377bd84ab6a626cfc3c668edb19a8027e479b97fbfe37cfeae48fe6358c74a1b65e940e18bb10cf4e0d9cc560436c99eadc56d405a30b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f070afa5d38acbd6edfec49be90aae
SHA1d306c7cb649f3928d8799cd7be7b14b7331283f0
SHA256e0e1b3043e589c7d2af0ce5c821329232e5518209e845625ae6356fe987a911b
SHA512370e3c87be18db88f7159d7d2c85fa0922085224a5a1bbfa281546158dfa70e33a87848991294aebc1c8a812f63d58dc4188ab3bdcf5404f8ed472ad7303a19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deba30b8a2f6d59ee046de4d20761d5c
SHA126ebf953ac6f9d545ed414ab46f79864f5f61d49
SHA25637c75e0e79a0db8847e435ba6ecb9bf1d80d45ebd2be4beb9dd4dbd8dd6f1cdb
SHA5125e18fc0e675ae6d3f5dbd06966d81a0eb42004cafb376273e6da48df7cb119abc97c56859643e76e99ac768cbfbb8d1ff17a873163c2dbf3369a674d1ad2a367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55888e63282f377692e63a61aee33b2d7
SHA19d758a20880c237cd36f04ceb522fecf1722ed58
SHA2560384c950744643fc33ad675e415261b41b34cdccaeda30fdbe81f4160f3feeec
SHA51275c774750925284a1921a24bab8a1a3e578cf549de51bb7404f25371d24e0bb7aa77ae57850f4d4da16d492831176a22257d6f495b87a487a4e2197852c736b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58857e6509c1fad839b2cdfcdc854f3c8
SHA1650bf7c522619532a28670527cfdaa2527c01d5d
SHA2567f807766bb2a1a0c3d666379ff07f9b13da178cecacfab6db2832053b8249a88
SHA512678a4e86a01443211c9dc3e5c9fbf6f6ef7a679ada0ed9d9674ee4437a23a94cc89254aaa49a43da686b82fa5528a5b396cba861199dd7155b2c026558ecd407
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b