Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
49de90165c7d8db0c065ebd1eb0e3eec_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49de90165c7d8db0c065ebd1eb0e3eec_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
49de90165c7d8db0c065ebd1eb0e3eec_JaffaCakes118.html
-
Size
83KB
-
MD5
49de90165c7d8db0c065ebd1eb0e3eec
-
SHA1
1aa10fc831ca825b23592b538259d09a8f2e5ab6
-
SHA256
32feec76790aec8426d9aa09fd217be884e173a4356eeef474692e5180b30cc3
-
SHA512
86d004cab9c48c1327d3add1c9a10b0c553cea352eebad395f0f45f1e714a4f349e56750f113172dec77196d5f16270c3b67896791aa6be9d6373c90a4ebf894
-
SSDEEP
1536:w9zrHoEwOVtLl2FBTTQ1sCkgD0bUwHmE4UEbGtg:wQUtcFBTTQ9kgD0bUwHmE4UEbGtg
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ca38c9c3d6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427215765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F16FECE1-42B6-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000008cf494a9c91b837a07c767a24456908b8f033703e69b439af639fea7f56f1bf7000000000e8000000002000020000000b349860f08e9bfa85533aa7066c996a32ad621d578f8d932de4d4642cec8ce27200000009780f7ec6642a161ca95e6b9a77773215b6ee549372a558fc6c3931a35b70fd340000000355f2be2a8f0bc3e9c9cb573c7bd169a1b56a0e22576b5dd8759ff636fe8d5d2735e8b666f8eac39a9cf99ac604e876c8aa26840b70399862f01ed9d98417f3a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3064 2308 iexplore.exe 30 PID 2308 wrote to memory of 3064 2308 iexplore.exe 30 PID 2308 wrote to memory of 3064 2308 iexplore.exe 30 PID 2308 wrote to memory of 3064 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49de90165c7d8db0c065ebd1eb0e3eec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490e5f9759f83434abb1feae831f2fc9
SHA1dee109397db5d840159d6fd91e9754373f5bf137
SHA2563b11bb89ec9bb2ef804a62cd3cabc7b84246f0053a44ff4f3a411974d0cb0807
SHA512f5f46a96a67b81f051ab1ce8b88f11e2629da54d6c96e9494e8277c2534a38761bbfc253bb3c1cc82a0242931438e8ec55967455823b733d9ba987a76eb2f366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56065caa6f03c25a4ad694267ec31c2a3
SHA12d848e73a91b1f60034d9831cdf40d204a94faef
SHA2564705ac11dbb9f6773a32f1d72c07f9fba33dcd4c6b75883997c0041e5aae30b4
SHA512e8dde7afbfc8d5c847f546e2b1d19f1afeeb5be82c8b73649496f8b5225effaf1708f7c843e2e15a3ac933af36547adedec7d08a7e68eee0b7163d3e50d9aef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0d80f5d680f7af60345e5735a69753
SHA1f50ffdd15e9e05dd43682dd068e47fcce7ca0e9e
SHA256d15c7b5a78eedcefe7a91d909812df232f5eed7d7778bfbebe22036e15f7795b
SHA51214cfaf460df421fea010f4f07546fd135627dd9ce679feabf3f25b3c770476be0df37befadaa79dc866c4c4790d65b6e0ce63b96cc7c8b53b604f4d98859e0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53217ce5f8d8afc13e9bafb43b78abec8
SHA1e62e0500d04ce723afc6e23794c1d9141648ce48
SHA256cc1695a7dd7be71c5df75f9fcbfcf77747f05208e66eb89629171a2ca6f52841
SHA5122cb7933db5c40317a4d634538a11a5525a47bf594a0090b21ba5e634f804ab9ef378ee52944939fd380c3e0a7b6be557a677d7aab4b7fb57f9c0756cae424d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507385241b08ffbe69553d986d9f9c8fe
SHA1c6a7f526fe3edcb5eb60f58deddcbfe69950c9e0
SHA256146784ed7864463cd1c1bb8c22cbf1695813373c63b26e6607644d5437ba936f
SHA512c9fc2978b7868449c482d7d796718bce36a205d749caaea50fcd6fcc615d4cdc440a79ea142286a389f746260689f2571e3291adaab175a140daacf659b4477b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8a7640690fc6e712bbe03e571b36b8
SHA109fdd6dc33ec9712f4f0432c7c025d13edc54c8f
SHA2561f863cde21ffb9a68f9ceaf04fdbfb407fda9d4551939c1e9b5fc8592169113b
SHA5125624711cab48150a6ab978b20d8c89e350b33c7342312e6acec34cbc7abc498fdbb1ef434ae4cb995d045e71bd772418c7075be6dc032ddc46df4911a7b3ca19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d485111cb602f2a10b3296c93dcc2e
SHA1597d16eb3449fafc8e268c9080e4fa1659d2c78b
SHA2567b5b511bbdd2ca369ac490c195bc7bd46238092a698a8a0e428f249b94f8f61f
SHA512bc8924193eba7c4e2b355872c51a244a7c14d9c7ef1603528c058af4f4050cdc8e79e2c2407e389db1b00fd6d244259ef10d6aebdef5c25ef7e27d40b9a6511d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f184ae4aed744db8fd8bf4ebc4178db
SHA1566352fccf364f84b90c887bd4a9392e4d60ff0c
SHA2565fb79a5f1a810c7ef9ce1c282fc465a4e3c3b758a944c897cbb8c06186450b55
SHA5121052a294e4cc072a0fe5dc5279a6195ee9f30a81bf084bcc7cb30af153e6102731773cc4bde1e52118295022823f62a2edf4752c608eedcb4f675566f6570792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdee8a8edeed11c77a500c5470358af
SHA15366bbb2993cdc4bb655ddfd9aeec55943044df6
SHA2568d8b4aa5def85ca882020d5543a851d0ee34b4f6e77ff5cb2da56d763e2bb75a
SHA5128eb42d99ab9d665b6347d3caeeb3343e534d1b1deeb7773718b817b02971f0dc6ccf89edb154f7da4ef741fe198a1a10a285a1a1b95ab78c8d1296b1dcd47ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cdc3849a0f372bea0703ecc1fdfb5e
SHA1cb6be2061fd7791ccaaf874d8b24dca78872bbdb
SHA25664635a6f9a4757d02897f16f529714ecea6b36a54a69c02ecbc69fdcc4120415
SHA51250c3e8b0b4d032c45da7936aec351a23a3571283430999724dd6937d3bbc0ae34f6d34a2c8465074b06460b0951ea4704e38b02e91d6340b30eebd5779b31ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fabb0b43adecef09f64cf836dca9547
SHA1ac72f119fa8040346cbfa0b0b8bfcb7ae1958eff
SHA25604941c0014bd0515700dcf15d3f5953a9b1f3bfea6620ef10d204943ed4e2fc7
SHA512d62143884fc648a839a852dff4f68fba05338e05957dafdeeab74f070875a9d655a070da3504d3bf9d6eb829d059072b3ce248050a0ccf8086fd51f2fb1f48ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8dac304baca3ed2f38c331593298ddb
SHA1d7b81cbcd3a2a379e4ea5faafc6ccddaa13062dd
SHA2565b272993f52dd613d0ac0fd5669511525ea964f569cf5ec238b8cea0694d3200
SHA5120dc11d7797f068ed3c603df93440c76448410eaff1207117be80f38ec365250099d2fd1955a34088ecbc2e8e7b5d316db5dd80b4a198b85f4d8f472927817c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f0edb263d458acf610d0f32c853e43
SHA19d54aa78f406e2c6bfc20156ee023f9e68d3221a
SHA2563578ff8d52fb21c29761339349a2cf96c2c834f777a932e4e0a15b6825ab2a35
SHA5123b093d3105cd318f7017b0a2372e928225539e4d5b50477e64bf2dbb77f2663a9000354105c8f3b16d6868e6ae2c05a5c30e7e5c606a63683ec267e9165cbbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4db47e9e0c36f2eaa882ca3d6bcc56
SHA102186f142605baf56a0bdeeb15fa29e314567614
SHA25650af81e02dbc59b7c7327a08cd4024d2372e9aee5c304329c0bfefba8d335dc4
SHA512fdf7bdd135b0ea90cd53c384ab2a1e46f9c318eda736e91f264e5850a3e9349fa7ffec51c4e1e6294812cf2c6a4d97f632715eaa3b92d67f262e78f95335b95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53133f68524232150333595062cb88f68
SHA1d046d3076a991dec94b6185bc7763883daeebd77
SHA2566762675bdc6385dfde58e1002f9f6f9174010e532f714829beb2b88a39bde152
SHA51248242416b922a96f62113f20c3ba8440c35674e9fb38b9d7cf49d4b88a376e98758b2685618e13938d839a25db4e7039b35ec2f0d7de211e8cc29f6ccc22a259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c37ef376220439eb50838c39d577e61
SHA1097b0cd4c80b57d56c4786080761434e695b110a
SHA2561b4ab98f750969b80cdb6c5cd8e77c8b085bb487941b193989b4c5e4e484d3c0
SHA5128b75e63ca425e396631509cc5c8b7ceac1f90cd29375d1548ab5607517c738e0f7ae31f4665c8b0bc913abb01316cb25a7c13fd8d580c88f085c42b4da1ae897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04f36971f8118e3cd4f13db662c8cfb
SHA13ce8f19bd4b2e41ee9c6b7cb2d884c9b40bb0d47
SHA2563280d675793735d7dae74b5086a41cf404c35d3289911d1b9d1b66796a523295
SHA512a3aa8eef2ec12266b246f64f4e27559b2aa6008538aae686948cf894599e667a7b790b5e06910a459276336bcb92701c9340e7be78ad369c37b6807f1f748042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b88f1c65f9c554398dc861cfc56b81
SHA158fe139c6b649bba74674febf883a6f52d025505
SHA256da0ac2852421ca3262e334274a3b8d553026436d1dd24bef1f9afb8137abfd4f
SHA512367d9b6ce07a475b81416312ea132162a0699bf7a3da2d3207d36a08a9d8ea23673d5fe8328b5f400dfc61427e326f124441ebcbfadc73231562f3dcfcf8d19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b410167bd1bf3337595671c6e59fac1e
SHA1d395845cf6f70b03bfcfaafc760b09182bf7fc11
SHA256240362676725db3d0fe0b730e2b8fc878f80b3138fdc33dced8ca0dd4df82520
SHA512c4351c642c26f75e0f6f3c2c0af0efbc9e117a071cca574cc34e7d6bfa6e482d18511c97addb7148cf3f53fbb9b5cc93868babca99f258e299039d3f03475832
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8I3CVQY\plusone[1].js
Filesize55KB
MD53c3dbbdbbf4872e02524e304f8be81e5
SHA15a2f8e19fa6013d8a3766001dcd070d74d725a7f
SHA25633400ad259cddf0871d1ab4f88169efc596cae3a5b9648c96e991a6cd4b5843e
SHA512ed73c3434b83c26726a6d8b9bf8aadcfc4804fd540e719046a7b4cb1c76cf89d0675b91c341c8ae1e3b8f6d7c2255a52fca941cda3fcbf907c1d6f88c4299eb9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b