Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
3e321b59f41b6fca9287d3943dccb207_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e321b59f41b6fca9287d3943dccb207_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e321b59f41b6fca9287d3943dccb207_JaffaCakes118.html
-
Size
20KB
-
MD5
3e321b59f41b6fca9287d3943dccb207
-
SHA1
e494d0188d8dca67bcec71c3014e61da881cba6a
-
SHA256
cbb6c8b1878f95ab2bfcea660313addd4c4ee4340d1eaf454539cce04bf10f4b
-
SHA512
b26d10a7a71e5d16e8334cb88567110469890b1d6fa7ae9e7ec341f04c3d4c1055dd3ffabdc665df78d6b895e3c430a2c868ae7581845a72559c44dde20c482a
-
SSDEEP
192:KVaQMBTsB/pdelqrW+tmaqzZ/qLcaKuECs/vryOitTdGb2yFc5KFOM3o2:r0pd6wlW7MQSfybz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60851d1d7fd4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46F83DD1-4072-11EF-A446-DA486F9A72E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001c05912beabdbf484974accc41c6cff71a464d3c9adbf891606eac94e05ec1de000000000e8000000002000020000000a6abfb4a31c48f431a57a41157cd1bfe4da9f1d49e86e3afb7a0c6d10ce1856e20000000374940c544acdd3e7a9b84592421eb18f753d775352a71a75d276c36627aa3af40000000b72a6acbaae8a26e25103d8a5a1b7f30e7e75ceca66189cc5df94f5058d52a90929f8115646e60376015be120a445f4db7fad2c475ea09cdfd94e351b39b5b66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426966371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1584 iexplore.exe 1584 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2440 1584 iexplore.exe 30 PID 1584 wrote to memory of 2440 1584 iexplore.exe 30 PID 1584 wrote to memory of 2440 1584 iexplore.exe 30 PID 1584 wrote to memory of 2440 1584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e321b59f41b6fca9287d3943dccb207_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f6decf6309863c7ad87087a3131683
SHA1fb1aaf555f9482596ff8ed032fc4a4c17c969af7
SHA25670b98c46b44cd93a818c15a39930ef123cff47bd485d3f192a4f0a0659d7569c
SHA512732e0db45ba0d26dfc75b4a09dd0e29a85601bbfc4b37834eeb943c41111afc42dbddeee9e4eaaf0ed16352fd3c4f59a89feed39ace479323b38c3b2f62a722e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc61d7919af83e912aa77fbe610a60d
SHA143b51fc0db1515a80ff0965ac2051102e2a7d707
SHA25644a0623a1b8e93115b8d3dd8aaa577d53e15d3c364497eb0ff238a9e17ce6c8f
SHA512225470e3ee5a9b70ddb74e33e18ce76717e4c533d2801fe25ce7f47b170b4ddb7038a23ebed4be1df5cf424f807fea636b4d71410002b187d5c8d19b95db2653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d56ab35b195bd0149920377832eac9
SHA1331570488147480244c0b127f1f3d6c618f96ea1
SHA25658c818943d8e7335958e35af75c4452b26e7033a0026e707b0e85b2ea9343ff7
SHA512e3aaa5203a5fb345880ec69b77e4f45f854d2ed06f81ee3f853cc1edd3cd1c069492f75616e6815c3abc17f3714d156b5cb534e8d7035f4b2b77e58d8eeb8d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85e911ca226ff676a5635a9761981cf
SHA1c5644d978ddeb1450c1f24893faa923b00bf2055
SHA256ed9da0c7388152293c717c7af5e53bec3feb57518c3cdd2dcd9d4c3fc6bc9355
SHA512fb3a16e1ac61aeef96fff681f955186db1f8af2e9ebe212887d7e7315f8882ed82b8a20908e5d431410d6cd5943ff961a20657f9cdbae55d5d6ae047d64c046c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534141c37c9f641778662d2cb2fa5306c
SHA1bc5b1c22c0169a5ecbd78da7250fe8e5ce3faeac
SHA25620d678dbe07c2ae1e5208fdae0969bf12370ff093d1fb4e733ecd05840fd1bde
SHA5121da355f6920e43a6f5b045184f9b07a97fc212d4fa59020627a6886a4e2f6803a3b0201b5643e70238724ef713a7038bb3fdc3ca31c97e6712b217d1dd69b854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393fe48d6cbb5b635873897860fda0e4
SHA11d91ae17b30159aaa10a22493af2994ec3d2a092
SHA25636cadb72d840f92b86942729d2a27cb6150865271c8cef1cad58c8a38a2f3e7a
SHA512b5a94e97aa2eb7fa203900c06399815f59d955cc4837270ba44eeea48c7dd8eacde146feaf339e698a6fd0783f335d135d0d137de6c6531a1e6d4589484b2299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd579df6b6df458e9fd4ac51bdfa3f3
SHA1934d917d7fb484083efdefa968d2506ca4af68eb
SHA256f8ccdf099b97058e8af3276bfc27ed15d8fcc51aaa4744ec65d178dbd67058bd
SHA512d7e99e52a72b926aedc37aed94166e6526cdd9b1b1123c1d94dd9c2ead247a8c33457e472909930f52b6f3960e95e69fbcb2f29eaa1df67aea57e075c28ab88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaa3cbc3c40b73b19563079908ef0a8
SHA13dc0bd47f617d38d3db5c91b40c134dada3c1dd8
SHA2565db7d47aa35cc60556c7688463f0b9d10f1442305221d2775d559e547340b3ee
SHA512e7f603a4e9966a27829a83e301cef37b7259d0a5786baf34a626c8bf4814ab565b4c621142fc0deccf22e58fd6914ec241c4fa369b9123c1d9b563b7977eae87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003a76f58b93e149252aa39b27be307c
SHA1ea5dee130725156f66fae0f7d2dc2f9280584f4e
SHA256ab00922ef1240b4b615029525a8b0f27e9c0b3294635a45430eceedf7308fd70
SHA512ccdb66d22cdbbd1fbd2772e305ae360703d6c5cfe73eef4a3a807dd4f3fcc4e69cba879d4cf6662eabccde9426fdc0ec88aa7696832d344e468b5b79afc7f7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7236668ecc7be69e9392d681ec7a040
SHA1a9008d005fd74ac576c01069673a8018d193fa42
SHA256559368949f4d00a7e0d6fe4155905e709798d23fc251131651a0005889226444
SHA5120769681fd3d88f243b637a35dbcec81b45f64659a258ce2dd29c5951fd48774961ee859d8e7e1e05a5d7a71d05ff867fc4358e0f2c0823e498fd89597f3fe545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd1347039890cea5d4dd763f1e83a19
SHA1dd17fc35aab86726a01ab93b769a8a1f81c93d98
SHA256b128c660d4f6324a442a9112eff0cc8b9d10454f0f3194112cf4e59a8480048c
SHA512494f169dbbf4e991bbc03fbe8b2de99cff463570e9058d02016ac900cb26ffb76651073d3173e8c1d7c4a36ab05632023a6b747dcbe8ca643e9cccbd19c1515e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502d59c201574b72bc3f9d5d46ccd36e
SHA1777f9bd05010ee508058a3c89b95cce6b7f6827a
SHA25687413a282e8646d600157401ffac7cb3273dc49783ac2dcbe402b8765e2a2e8f
SHA512ca8652b8619a454d150d63c15bccf67d39612dd7485db6af9cc3557c2f93c5abb4671f7ffe89ba7712821184bc68e8712e78f76d1c5b94a10757bbc297766c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a56c62e698fc7f833ff975bd1915ce
SHA1bc65adda43b0c79bbca325243252fb38ffa1e975
SHA2568697d3bd83816107331e64abf391361ccc3d60bf6589a10ccf9d89086f8e5724
SHA512b9285c7371973f62410ff9abb98de1c0ec7555df5f11fbc255668b33407ae1d0a7553e2c601d423c5fc17b9055520bd353105f79aae6b4a10fb53ad96f9bbe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a45339a128f76db4c14d59db1d314d1
SHA1134b2af68657f4eae1c568e9f0ba1fac18d3643f
SHA25662e2e8ee83012cb54ce7194a91f28e859d7b00115db80a67e48b702bf76687d2
SHA5121980548721907b682054d2ab43d1027c722317ec1cb05f4630de163cfa98659bc5b7e9ce49a53bf4f9faa18f158a45dee2ffb9acdb71fcfd9677502d86c775f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a418a1684de38a6e8fdd69bf9f2be77
SHA159b9ed0db36e0c3a9d6de9679b1e9f16e6e2de1e
SHA256770ef54c39c70c6185670cd47c838bf8ff6d3f1d612129d0d6aec9e9d2c5578e
SHA512a0dba36e94ca682b913588b637b8c6234fa5c3bbd3b848df57492693cb47acd1903aabd00c0b7d88f4f8837937deb2c69d3d7d819b5a873d62bde2f9a5b0938b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666c1cfbbeca35757faf7be123d78651
SHA106e61683f822306020d301ffa5dd1e84bd3cd788
SHA256d1d5ad16ef92e3f25f6556510690ce1e3092b2a663cca2bb512435b35853279e
SHA512a3d7c6d02d5af26f0340393fabc5a35cb5d3a72b0ee8f945bc1722830b14a2d2b60e1e0ad884cbdcb37da6aee376fcdbdabf57c16ccedd94cde736007472fe98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525430744f7333c2096fb9fb7d61d60a4
SHA10ea4944c045af2acc10c534054209822bbcbf8bb
SHA2563dbb64a02e53fdf1ba74f12414a71402d27fd9dcc9ae500c15c48e5f76e4a944
SHA512b42ee49ff10392d17c2baef877b23e55d5f03901483b99394c9ebc88f73df17e881bb1f4aa28b12395ba32f6eeb431ed36cf447e81b91d1a31b0a3549bc29c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81ef4e60ade8e916ca0dae10ba97f3d
SHA11664395fa46a12bc1ff955868d8a72bea6f56c69
SHA2563f4c118d39a02ef89ac20ec46e9f15b7d1a990ec7f358be19357f11e26e19b04
SHA5127089b489a76e025c1ab05a352a70f67e8868356e55f47235ff28ea3847e43d812a241526995074c4cbcc32b02c98f7deb296da1cf05943a6f1721cd14b59ba78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8170dd104b12b26291cca06f398a67
SHA17a19c0f3747cc9033973234c01caac1253dd22dc
SHA256c5e9e6e8e6369f98a7e30df2db524d05c61cccc7fb3296a5515062416e57ad3f
SHA51226ff23c919981d39d05b656a4c8a92980ac685dee943db2e1b9064ed8c894f87904e28fe744db5c8553a5cd088c8cace02b3d3af66da1ccb49654684c6b204ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b