Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
44618172f500aeac72c19efc3cb07785_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44618172f500aeac72c19efc3cb07785_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44618172f500aeac72c19efc3cb07785_JaffaCakes118.html
-
Size
37KB
-
MD5
44618172f500aeac72c19efc3cb07785
-
SHA1
6acefe0a791b00f676d32cab81bb35b27f5e85a9
-
SHA256
c323c157b3ea45ca2dc4821b1a22d46e2ce1de1c50f4a81683aa343b1ff7453d
-
SHA512
ac16a72d2eb972876c5c27f6a6c924c6c843e1ac916ed3df999da806737b99395d08758e39317445c0a29863229e3a91b1a21ed06c906e65563657edcdf34998
-
SSDEEP
384:8yaotURtgIA+JC4RqDcfLS/MCoVTgLgB1M6f+mZjRJLNMG5VQgLgkcGzQqYjRe72:8boemaJc8Ggv0PXZscTax3G+gGI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d474d132c6a461cbcc5e7b1e7e4460e91ddd036dbc98c3154fa23f7e5791fc32000000000e8000000002000020000000d30cbf554d9dd7d5898696b9edcc712c0572992e9feedb0ef362d178a5d7f0e7200000003e7b40d5737fed7327f5d5329ab4d4d7260223f74c6b685e8e82fb6643906ec440000000dc1a5a48d03f8fb3037903ca40e71424faeff666ac665be5ba4457837a003cfe8478726c6540699d8a3918f26b5b7f60335263caecc0f8120ab75e575031e407 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427094641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206bb5dba9d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBEDD271-419C-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3060 2252 iexplore.exe 31 PID 2252 wrote to memory of 3060 2252 iexplore.exe 31 PID 2252 wrote to memory of 3060 2252 iexplore.exe 31 PID 2252 wrote to memory of 3060 2252 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44618172f500aeac72c19efc3cb07785_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aec4e6d24aad690b57b157a22220c5f
SHA1037a17a0e040aab69f30d951310cdd579b785d2d
SHA25645ee1047c069d0eae3447db7b7f0d9f7b29fa9e2a2217230d51538e755639f9d
SHA512f00125e36357f3e65cf6eec082ef55df0fe20544ffc82b6361cbfd11792b53bd70a67c21112da514902699ac88e56ec30571134f4e528ab943ccc7e08c5584d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b70e2ba43e2f6e5124997c0a70d312c
SHA13470ab4496f7c5a8ad9b2c1c5a309de7bde2bbd5
SHA256f2d2b20de0f509a7cc0177a5cb991923709dbcfcb415436e4d5b18dac7669f6f
SHA512534ea845cbe4f5e42ec5bd2c8acc8a35db3cd7a0ef3c0a2c79ad4789233cbfe5c62a8cdf9e8ca6f068c6a4b12f063e68bc0dd78b6989f05029172a130a56d123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515dcd1be1f1ef27785cac68414e44c15
SHA17257c3e2ed4c329d88a026b6e48672c23655cc06
SHA2560a1c9994062b105c30ffd47663d586be81c40a727335a206f76f60d0509e67f9
SHA512ec4edd1aef386df162aa51f453661e86d919a5f6e7ba0f3a683004275e45176630690938e41bc8a4e118bcff701119e26f8a94dcb6e695e46db94757fc0a20a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279fd1ab45621dff2035fc820c2c823a
SHA130fad7859437f835702b4a15d04841358f1dc053
SHA256923b42ae33f78595d7cec75a6ae44490042d01d35c0416dd2f605ad7a16c27bf
SHA512b06cf2a66840ceefe5031b53c8c141b7d8c4a8fddb37cedb8bf8841d798f63ef603dde41d863a3021944900656b4b1e8c8eb7f80123e7c655197ab4b597d8567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ea296acb5512bfc1c4003920c03f21
SHA1a3630ea26d698d9a803a7f6aa37c63fa77059a6e
SHA256fa59dbe1328d0cea754d057397867bd74477a65737f945eec3825bdbc23c4e8b
SHA51213f109056ce10bc00b73eebc9e2b85aa0cf44519a335fd3c95a7faae056b1a5242a005aa9f627f0da694faee5741f676f63921d7acf2f5736af17aea60b585d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93e594363b48c86e23c5e5cbd466b82
SHA1cafc7e5bca9cda87d5bf93f7a1d4ff6df25d73b4
SHA256f90d72a477f2bb157a5589af5379d1316028dec0d2e23ff0b7f4a381a332d18b
SHA512c36d198f1ef8b08ba5548cedee536e985d2f2a2237768381a4ed262dad4a468a7c84a662edc006faa7265d8fdf53d768f8d473d1b599f08827914847e71ed565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834d217c47fb4436302937932895381c
SHA1cefacb037f5857b9a5bd64322403026c1a188bfe
SHA256380a70b7965e2cee7052a3e9e30894a88c913d1ab5168eb079c86317dc090d91
SHA512c2db8716c786ca12c12a722ab5c877bdc6a4e877a235ae845d1059552f6aeb8f6c88aa0f4e696c7bc17138a148ce0f969fef78eaf307659d5461d51822db42b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2bdadac41eccf1ebeb1de1b66f66d0
SHA178c9d8f42d758deb7218aa47fcfb7cd222f2bc24
SHA25635f319d32f45df497a250e267dc3d2508953af896cc5f3580fc8fc7163416670
SHA5120bc5339e0b87896acfb69f8bafc5728bc01fca22d51d336ddad8e0021d7ed498d18e2129501a522839f587cd651da6390a6ae7b00df64a17e0d1b8d18f2e0680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b34f8c1fe1ccfc8fdf909337790c1d
SHA163e3a6bf0cfd3efd48246feab6cd6ab2d0ccf3d3
SHA2560cf306e32164d055a7178dd5e9806f37ab71fb0c9d80f9feb62e06c5d595cd00
SHA51222b179887a6062e2f75c2e1e17a569e77f990ca59f8a6d64938e937a86ffd4c8dca8b5a776af9bca7dcb3c4cd9d1d5bc532b2f364d025316b0e6650e5295c820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d343fa2721277fd30933d9420d66ca
SHA1d1dbf2f0b5843d55c81e4aec889277f1f3c923ba
SHA25607c27b58d83b7281539e8ff601cecbb5448d5deb44bac53a652282e411b02fa3
SHA512b7928f7627b3b02f3194f19411106098b6b26f363ddbc13f0fc8362a031365e129cf5e4463d873bb5ad6249f5c8af32bbb10adc2c556454bfbb274925eaab4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee70f19996e9de7dddc11fb8e9fb505b
SHA1a67b6c1e3906dcf1b8360466ea388b2ec048d5e9
SHA25655a9d05ca7a181996a04eff699e2e057ea89aa568e8275dfc1bbb89c024e9215
SHA512a3d64409833d946866318da64720d3c186209b449e50c60e8436ff94fceff8ef16061f9f0b8d62cb3eb44d3021e6437d4e1dedb4a741cab9701175d429251fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e6eadd696f27730f345157fc640a8f
SHA1262107e5622a334b8ab2b64e417681b5d0791558
SHA256a3bb3317ab69113ccced863281c5098ccfe4b12e19b3c6b6ef117e4ccc1520f7
SHA5129791287cb013f44376103346cbdf41a206fb9273ebf6638ba423e716ed80a5c5997e85013b00aec39c0773881fb5c53aa8957b395ec5a931ec17aaae5f4ddff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc26e7849ee1661544d16273890e275
SHA166bbd7c8c0c8fcb8ca9e9a0a4a4d479aececf066
SHA256c6844894b4388b29a37b2cce84683e8d1fb220d7649f1e55660275d0d9f625a0
SHA512a5b98c9debd0d3febf2c48da87369cb8f5a9f2af229cfb2825de9bd549cd8c981064cc05853a8330d5be560c527487ba0988d4000e05d58dc88b5ce4b821587c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8e2ebb1361c8cdda8283833d28fdf6b
SHA1ba73c5ad9a5c7e50cbdeb19e934c743aae7b8979
SHA256dbf111f47e33184e796416a3488992203e742b14689a02a4083cbcc553a0d3d6
SHA512889bf18d3abd150b8b5cc5bae5aeb52b68bfea202ef6be3d0b7fca4633326dc6d9e7b6aae263974de904a4ba54adce9fca24ea4029e9a3e045a6888629a22e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee99f711a49a15f4b281b7ffb0c2374
SHA15a1a537c8abe17574697169511b428186de49285
SHA256d3e45776b1fa83e56a6abb17f8d850c8dc745774a4caa6044a871f8458229ad2
SHA512369768c62abcee34893151512a1b8e00a975011a965c7e92e762bf7a7eb9cf55a1220406a8cd2fc73554086ec889a714dd555e3bc6cde09137c3e58d80ae1868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de608aadc07a7e7f77425ec3c0c34c23
SHA197a77b68f61d888a8a984e030b2ee8e48b469da0
SHA25697d09c15d22ee664d1baf4159dc86d6de8fd5c314a26e592e572dbbd79d472db
SHA5122061e77e62438406f30d94ff27b9d6345b8104d25047eaf436b0b1e4af0696f4387bfee608bc40ddedb0dad333d49dd8ab22eb4bbb2026589cd76a67410c0975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4205b157e03d8d00bbb96e071a3c3ba
SHA11ee713ab56fa6a10701a162aecf0f78b1558cc37
SHA256dadfa4fe55f8e2c88b34a35d86750abbc3731ef3c98a3ec2eedba149a6dc6116
SHA51256595a18916dfb00c0883cc2e8f34fcc6da370c4a554ebda4de66fca33556b7570bf600f9a13ca93e542638ddbd19c3212ac55f05ad543b6d4e17711e75238af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cefc1847f6f5c1e357befd0535494b5d
SHA133ea2841d576086d7f4f807e3d4cc075d4b801fb
SHA25668045bbc8bd9ae61530c0628774a08696ed3ad6349757f396d3bb16cc2d84976
SHA5122359c9798b370014539b0fe26dc9e24a54e158df4c30fc0c9691c7d05be953513ea1af551091fd58122cbaba9911eea156a305af8a80095b9139cf2429fca20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd56fd5d5134237e9f9421578bee52e2
SHA1e344ff3280e7c433af78d8e6264689208294e34e
SHA256a03a2483919c2dad4fd67977f43df884a81b34120fe7804fbf5be206af86afeb
SHA512fe9ef0ae8b5c136a48e90101e260508190eb1dbcadc337dcca43e7dc895ec852e47026501d764327a76422becf5de2d0a9096353ea5d68d218fa273592f39b4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b