Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
354c1c1e5269b64ad8e9d47ba8d0348d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
354c1c1e5269b64ad8e9d47ba8d0348d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
354c1c1e5269b64ad8e9d47ba8d0348d_JaffaCakes118.html
-
Size
58KB
-
MD5
354c1c1e5269b64ad8e9d47ba8d0348d
-
SHA1
84640a250df2efd3800e43425b5600ba5c96e3f2
-
SHA256
d5bbd44bba68604664092473f7f5d3b8b86da5c9b193b78108edf99b67df793b
-
SHA512
26abdd9d851f852f1de743836f68ad59dcf845d72feb2613d61c6fe382e7344d5844eca1d16f70dd84e98421f8934d8a07bfefc91f1e1c69e50a37dbb5dd3acb
-
SSDEEP
1536:gQZBCCOdx0IxCSx4Mf5f1fff3fqf3fFf/fof/fbfJfkf2fwfKfef9fof2f6fWyf0:gk2v0Ix1RNH/SftXQnjBseYiGFw+Cxf0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000625955d42be80bec70ee8aa0900d0b728136543711cda7521aa25b5fb74ca2b6000000000e800000000200002000000070e6908be9db1b2469c2241b5ae1256665409b61d5e7c3927c5a85ac68bb75f02000000046d341f1eaf703026ef55a53ae4241ac026fbe45cb0df74b8c1e55e2214e0ec24000000024e362d7eed23358fc86de639198137f2d768f410b90c2f57aadc2c524bd694c6f2fd07a9b9c68bc53ad5b694a1327383b12f1674fcf757fb81acb465f4c6adf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93A8ED81-3ED0-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426786970" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04e286bddd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2204 2568 iexplore.exe 30 PID 2568 wrote to memory of 2204 2568 iexplore.exe 30 PID 2568 wrote to memory of 2204 2568 iexplore.exe 30 PID 2568 wrote to memory of 2204 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\354c1c1e5269b64ad8e9d47ba8d0348d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ad5dc43bb4f414269f11edada515f1
SHA1e0313f94634b1c6c7baae6ae56956410c15f30ec
SHA2564306c01c90d56ce43aaf4c5668f589c22dfb5f5ca6687a83b7099e25e63c6788
SHA5128e239f13867d94969d6ab7dc675a94d6479bd0526e3e033650f2f002187604b6a35a494434729e012a06f9ee6b0f27627d7592e748d9b944f2fe3ea5618336fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56916715f7f7cd938e54c525b4a6cf37f
SHA182f2b56c506dc4c938f511b7000532379f2beb1b
SHA256169b929f28a6303227c135782b4b595c2c9fc9199baed30ed2c6d5f54a0b561a
SHA51215c0173f2ba06b2f138ba9a835616ef0bc218d43e3758d54cd8e36e12632b1dfb72e8a8a83db3d15cd3b56216e4de2a2ed0dda4b4d0832d1f2a57da653ba9aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58614e0460066fd644c40b677776f26e7
SHA1df113292dd13b5e849a311f7f4b1dbbcd7eb5b2a
SHA2566fd31b62482dc1276b3fe89e3f68c060b0c7955aaabaca875fc012b959d5a564
SHA5124cebefc210a4a7f5f7da516e4974223768a15a557394c916423bf74a239705d76060ff05216cd34b3c065c8d64ca63e1bbbc30b772ac339451e70a9816d7bfb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40e9e1895851ed5a291e9c87ae4dbf4
SHA10123367b129d1d31051299d99a78b72980804e9f
SHA2563159a9763ba7eb055b069e9028ec2ddaa6bd0f860c79bba4f4fa8ace78024685
SHA512142312c14bb9968ed092648ac089de169a4115317b39f9485b1e60476221742d4bc98ae7d394db43552bffc6c2d8e10dd74e504a8ca0cf273ce7fddb82c3e641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d725aca40dd7df49d3e4d78d432bbd
SHA1698953b7eb96a8246cf4d203b56f908def756c64
SHA25609aa3d42f039c6e03af2bf702eeeb20f6b05e51e1cb503bf201483f49f8b556e
SHA512c52525d47a15c25aaad7b5c34cffdcf3fabc1bd011bf82e5cc4813ee77210b970692f296e1ff6a514529759b3887a6a9ca99f067d0bf7d00adc9f070030345cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae6c65c089a9f22985bbc7f026137ab
SHA1ecc08e00f6506a3193a323224a7e91e9b2540792
SHA25630bdb4819fb1a3fbf9a085e14c5ca8adecdd1a5684c0b56a5caf6dc9ef812ead
SHA51202654381ac6e05dc7b9f7a5d9b5ad874001b9fed3308482777fe68e9af6207703ac056eaa9cf99795bd4edbf45dfa347e944971c537fe72d7ce2aeacdd3c4cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e650b15e7a2105b9a9e9349149cf6d39
SHA1065a3b406492ec121be71c0532d19f4e3ae125ec
SHA256b3c54f5328b79d8260b7932b1a8c9b7fd23fb528cbc7a20c1a931cc505c1c5f6
SHA512f04b5187a771aacb910a1a18827e1e3ad009565bcd7597424b627c8b5ddc3e708435ed47f13fa5b944cccaba8fb065fcb5276048a4851ed0226bcb5283cabbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e973e5f174940a340d0cb0936d4c93a7
SHA10f6e336bd748b25dd9f1fdee73291c2dbd56b994
SHA2564edc45d484c9dffabac36819ca4af81b79bb5839f710b539361e54469dacda11
SHA51285ef9aff0ce2efa0a584ad62f6b758bc3b498379c7dccd630b2fa706d0d237ef8002abcf3e52aecb48090477f66f369ded778d8c1a4014d0a1f5dcb545984b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580da04975f46078f589bc91e5201fa20
SHA1281f9c87b6c8a2bf7e802f61a2be35bd2199095a
SHA25636405fe84eaafffdb942ea67451e8129e957c1eceb78360c1c30f0afed1443a4
SHA512c4bec3f34289a1d0d0953315984341ef97de45a342b8a6ad271033badd95e30bfceeaa135ac029f7602758f2f780da2228a3497fa6eb740e84bc56ce6b7c730a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599658d35c61f2248d679c1ef675972ee
SHA1e5d707278e5b18227b117bc256b6212d84788754
SHA25683cfea78b8328a0f2fb9734979994b24ca02d9e4fe5525a6974db3e30eee94c7
SHA512ff980a75100f305d277abb788e14070e15bc86f1f1dbb68a7e1512e5b9f7d6a749354faa95701298fb34838c56563da60d15cdbd8f7dc615503a1e19d6be3798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a08846f5dcab03afc0f2bf0a2568f39
SHA1d044b61700e56f2f7b27e42d959057da2a7ef482
SHA2560a5e357388397e733924797f8deaaf9ac8db365d511417729b504f2ee2add84d
SHA512a9b04b03649dd9ec6b7352f10bfe027697282aec55399ef6bac26207a758b2436997aca809887fc3da25b1d295fe00f95278d47385f098610749e4e22ae90e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31577cfd4053c93e7c6851e2578a5ae
SHA16d6fab21fb0cf797633589babd3fca0b3f5c2e07
SHA2560ec3d3793aee1713a4fd993b50b660af5e64c161f405d0a932b4820007f55d62
SHA512073668d35e20e6942d0ea15e95a321063a098a0692f605e449cf725483d151af04e794ed00849890f645a9f2001ec9562c05af36007ba17a7e87411c14d54af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c82ca85f9ed3512ebfad8677e62be54
SHA1546c459796b38ac2351c0fe3cfbba64534930ae2
SHA25680bfb33c327a6a3d2453a6161f9b1bfb27decca479be794ca0055a74de2c4ed9
SHA512d5c534b78c684ba40751b8d661bd75e9629e0a261a404d77dff1c2e0095232d86bc338eb2c8006c98d04268ac38e517cf2e2669814b1ecf0bf951aef53f337bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e1d7353069f7aae91734832698d011
SHA1dbaabee41148e658c8f6065026351aa24f166ac0
SHA2565d135a5631d31b1b266febf27b3b95eb9c77559607db483ea77acdf3b3bec6b4
SHA512941429c5770f9b81c484292ca882e36182f0017b79c67280171b4f76b24c12105d4745049f4d85bbb7c93e4faf6c32cca33f48235062fbad4dd40941ddc2c7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d92172a94b42a4edface9b25f02a7b9
SHA1e7d4195a51e26476fb44568ffbfe576296981588
SHA2568b26692bdcf8903f38706407cee3cd8863b50816f23839adc8418cd086d8f70a
SHA51220c08a6d8bdf3e2f768273f78d6496766defccd0c1e0adcba90edc8867fa596e41ff2ba955896f77b2924157bf26679872bf817dc8c154d8d9440b0ff8b36c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55188d0f3d56a3ed233e76e5e7e8bac9c
SHA188e2ec361ec444221f5565360c3658e59245630d
SHA256b7c8ae6b9cf0390d61c401a9cecf541d59ae698d4ea258e53ae47ebbfa7e357b
SHA512fc465bdf51628ed761a743be8271df4d042c11264fa92ab5601d5dbfa6d3cc4851828d8547eabd36078d508e44292207f56f391b330e4742f022230ab41cd5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48bf71c33f361c770f28fdb29047850
SHA1f6541add3e636e83ed12af171af276afa724aa97
SHA25664c58f003e8e46e4c3c77c37a3dd980ca6e098cb06f748fdb2eee932fc751b79
SHA5125d69813475d3bfa8b84e6e2895452300b95fc9c68c6859beb432a469857555a45a8b4cae499ff83d34abc758ad5c746e2f0d7e83048ee10a970c85225803057d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d3a30d46566fcc5178a4aab5411338
SHA10e31355f2816964b06a7810d6490f9359f244045
SHA25609cd1a5ffe14f8118fc91231ab4c8ba5b1f9c6637404a138cefef95005617e21
SHA5120ee431ae2117af649fdb192757d33ba0b74ce3725298ec435767d930d52870ac0ef80a266ef679410fbf2335efe4550a38d7dd86c05594185bef428810ef2b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ff33ad7387510ed95b596084435131
SHA193f8516b13612a0afc804847bb50d0f31a6dd1e0
SHA256515919458c6baf366328c80014cf7a9678a9509e8a098ea1babb1002d122430f
SHA512dd8456969958a0625757ec625277cb3861780023e5ba94d13e44eee89b0b43e743b965d08d2c5e11a0896a7e40acd6dd990bedd8241f32d996f34396f1ddfb42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b