Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
3a230bf3fe4a7ade03ec9dba8cd53cde_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a230bf3fe4a7ade03ec9dba8cd53cde_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a230bf3fe4a7ade03ec9dba8cd53cde_JaffaCakes118.html
-
Size
53KB
-
MD5
3a230bf3fe4a7ade03ec9dba8cd53cde
-
SHA1
aab66df9e22fe51842142a12f15ecf1d4111b3db
-
SHA256
d254691f9e5073b9f6c85ac9885d3abc91a40b94301714f7aa4eb2f1331855fc
-
SHA512
7fd14679f46f046975e391331311eab8a7a44a2862a1b975084c9b54832131eaf749bf663ec774ea957a2cb0f7cb69b77b6992df681554741eee6710899f4ef6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUBrunlYP63Nj+q5VyvR0w2AzTICbbxoI/t9M/dNwIUTDmDp:CkgUiIakTqGivi+PyUBrunlYP63Nj+q5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301c5f21bad3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426881768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B2A0D91-3FAD-11EF-83A8-4E15D54E5731} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003d01e4e4196969bd2f5e833e49efc8c9c854170de67dd1084d0535a7bd7db223000000000e8000000002000020000000964a746713a2deb318d34f199bfc5c8bf186f2f08365b9f7c3ed909edb45c474200000000b7997ffeca493d4da6314d4a26262e1878a0db6a7cd741c532d0a7309aa283040000000167a6f1c1a9fa5a65552ba5701b8d125efdafae46bbf3941a04e299499e4cb47fe8264a71fb030a5bfcacf9d295ecefa600ceee5f2d076734f3350508a92fb90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2764 2936 iexplore.exe 30 PID 2936 wrote to memory of 2764 2936 iexplore.exe 30 PID 2936 wrote to memory of 2764 2936 iexplore.exe 30 PID 2936 wrote to memory of 2764 2936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a230bf3fe4a7ade03ec9dba8cd53cde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd40ec9da589c3f2bdd14abb5823005
SHA1ec36625a75e61547e3d7ddbc43c70f7950ad43cb
SHA256e8316ec87488dc363c68231df57344818c85024e7fbc548d4f66c4994a3138e6
SHA51270d93c58c8e008a42d831397c5ddcd4a2c97ecd4383faa00a0a7d23af300f963fddaa5894f0c57bf8aaa2eecbd175ec74e51ab1c8e2a88f8bed9649caf0485c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7aaf56bb618f6378bc4b45c96bab055
SHA1ed5dc38ccaa78c73503ed4abca7a5ef1b8e46518
SHA25673618e7b70e5f2b7ac7cb95fbff682a576df8b7df23b0fd7bacbf4d74b352e3d
SHA512a508e0267877b1568f74548c9cc9c1174a9da869c9d3ef221b1f695b6e4cb4a6a976fb2067e1a7d01953f9e0fba1e8a0fc808a88b5c103fdccaea2b7b761db3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a437bf0373c5f2fa651a6df3cec87dba
SHA16236babdc8ec6b3c3fa73a3c01017dc9a02825bc
SHA25617aecfc1b54a4d31388dd7ce721145bb6b9114d5177f1c079666ae65b268e500
SHA512831c042a28833f0157839151870419ebbef921a2046027e22038cb1f7dd5f3280e9a3ec36a7a9d8bae967e842244de28747baf9c7f82b9ae70c3b88e40232b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cb136e1b5035b67d8d18aea100557a
SHA1f70616ca741a2fc6bc97f2b334dfa95563c20f30
SHA256983ca1d3f4febb694b495badbd64c1d8cbba063b3a7a026676e6dbcb61075680
SHA5122a66845707302beb71cb0469174bf15e1d7e9c4b91abeb955267183ab42c922755c2857ab3e0e60a04d191e3878a6375cde212f08aeabc299130ebe262b8c174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400cc7ae5181409e013477781734a3cd
SHA1623b9ba9f04d0ffb6231b1a0bc45b87941ae0671
SHA256d699f17ce8c4b047deb798a6cebb713c28035c719e5586d3145c795ddef8fcdc
SHA512fa937a03c9211ba7a1066dd7b706b6720590fc1126e751969d47346cb8c5dda153fbcd9df92454d6e1e1656a00c55e7fe89fecac5245115c991f895551729b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50731684662ebb6cb921155230a2a752f
SHA1900816a2297f2cb1afbc38964c7b3c354edf57d7
SHA256ead9558d3e071611cc90c5721021fef27a6e5a638ef594f49ca2ee741cd71d91
SHA5121222942fa3eed44365a50f910557a6bfeff8a0b169061343d185b77e956768ac92abe7c05dcc44e84316d3aabf089e881741457c44da3b3273e39c27c1bd99d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c278079dbe89095438313fc21b8d18
SHA114447f0056f48c44bd1490203fc52ae171660b3d
SHA2567922e8291befef0257e220662ef8f6eecba2f532597270de8b0c8436362d1f7c
SHA5121968fe339bd56f9f59a978bef3eff74158709433bbc326d1b20cd5c8cfaf91a434ccf78bafa994a66a15638263292b74c0f7c0c675f9f60a75ca41aa4f67aa25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a485db1478ce7c468a847f197e679c
SHA1552626d38abc1e6d14141fa1bb044538346745d5
SHA256f68104acc6b430dcd161a0cf95d9f9ab78b95fb6f18a7d2e33119c85955f9a77
SHA51224fd65bca7c5551a9d9c6505cdfcf8b7e1dc4944e34aba3c4a333d09ab53b068daed968a21cce028841d9d1bbf6688b2515a5880f546d9417d509a86e8d9b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a579c7f690305cc4348d3afa7638e9
SHA1d13a1e67b7c18d193672d852d8bc51fb5efade32
SHA2563ebdc111a8afe93f3aa7777d02b39ae250cc6a16c5407042b59b2fa774452402
SHA5124df82955a3ba8006aab96fec58f559c381390d584208b976a8fdc71972582cf56ed7a396daa630c104ef6c0c8556f091de124ced9cacc8a256b3e4f51eec82ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b4d1f98cda163c88dea61011de9c6f
SHA175261ce1e484d0c70982d029215e02032cd0120a
SHA2563eda54a382d3a97300721f376a5c2c5ac7aaedb0e144c6cd385dfc60e3678bc5
SHA512b8dcbcbf82df48c3fd6f98a401d3e2c98431397cd39cf0cc243e5322bde7cedf7e688183c75f9251e7d01fac203aa50b8576e2636491980a645f2448f002b76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d38686661e435e9fcfd6ba4a13cbdd9
SHA14f196ff6d8d766b5b54abdb4cba2d937bae3ac0a
SHA2565211ced28b22c50f015d7882336e6cf32f072d165524d8410096288d52fc096a
SHA5127caf35607714d9ef8d792a780b4113ce329eaba94f9c21d7bd786e72ee984d881172bb59d75ae4127a109d88c03096f4b98aab55965ac438a27f1b52f35ff839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbf4f5a8c9071578b209b7ef5e5743e
SHA1b20b984770fe55d77f9b49623c61c1839a39374b
SHA256b9c8b8ace61135978b24d9bab8dd91250ca10e24d64c5818e2218ff3ccdd5efc
SHA51242d04bb23e5eefbf91ef9a9b6fd30663414415c5f20f8038f5dff4f61de0c38e8dabf611c80e928c6e8b371b931fcef4806afb91531f69cc6121871b1a1b29c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf297dfbad6db0fb1ccd30b72870269
SHA116f5361378978cf730e61e86fbc4743f11159ecf
SHA256c410a6e0af8ac3050f29d8f3a94beb5d0ccd882e0aca1da775fd231a7eb2a797
SHA512e41cd60f69793116f3b63a6769c2e7781f1574d5e4f4c9e0801241a29556f7140d8dcfc40361a18e978a512b92a42ff7695c46376cf3ea0c1050d21eb9f89aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee85570bf50923298ad0d1f2ad4691de
SHA1b64b7376ec6233fc546b96a524a125618e3c3d7e
SHA2563830ed7b841fa917dba61a65081d338a21ab8bd569f719fbfe5baa920a325078
SHA5123720c3a8a544b56832e878a979bb322fa54cce79b971da415e40326e207f2d89af1cf37626c518b1e4325cba4781c0979491471ac18a5ba38ccf5b9799f38012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe586e305eee668a17ec99d1de346486
SHA1fc08c5814aabc5ef18828564d24a46f601a46046
SHA256029a556708f355ea6a35f11db3f5560a7c48b55df8eecc1f96b54dc1b9916151
SHA5121b7a22c9730b36519d177418e035bb0dc3c0a4dc7aee13437f1092c889529a462898d02bc317226d49fa9af03113a8614982ebc0b5552e511fb7667a23f81bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc17dfff17a3f53518b8094258a920ee
SHA1efc89659f67167d51b063a49f58690c7a444465c
SHA256f241c2c2643f5bbea7c908ecc6f7817fc5ff93376bf57d04baafa659d69b81c3
SHA51223b195a8dc343ac39489da698833c8762abfd8936ab94a0bc1c0d779f8e8c7c5fe0972811cff076d4982495e7abdc1129f004912a7c6b6b66eb24fe0bbd0ed3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524b08f895cdaeeebf1f5f7980efa719
SHA1b9cb1c57977a4b80102414fdc17162393b93de34
SHA256970cea7898b1dff9b6a77a90ee85c14fabbff5b46e715a2d333ce76a8ae84c74
SHA512a1cda18b5e79ffa9c081a51ab4c572885332f839f5f0e17c82a9552db14ec965796a871ee04327e6bb59dc9733245ffc4fe0ada76d67bc7b8e51a110c11d3136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a725518d63ce99be8af690339dec47
SHA1c126f15e1c04b07c6f3c3e5277336f7b6ab3d9c8
SHA256c0bb460881718877c03299068ded2ab5ba6e0da8fb3eaf125d5cf475b64dba0c
SHA51259756505d857fbcd098a881fea443029dddf4a2b4b3ddb3f72e2ce8e61cf8d25f8260d15da0399f3a413aeab943ae70ac75650b59f6c403bb029b0dcfe0e3e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9c61f0e286aa7c8efb80309cc522c9
SHA112662057b40b7ac28d939916f339adb95e3dd753
SHA256080530bbb85c87bef0cce98cf48666d453915c0b3ca7f3e6b0efeda8d59cf582
SHA51254e541c779b509f781e669782c86ea6250f4375d40e9e9a14533414be270154cb2dd4aea27c9c539ecc4dfb04c60f47c52533346e42ae3caf6cdd5cf8ec1e404
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b