Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
4a9cc15cf99de606b717c7d44c768a07_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a9cc15cf99de606b717c7d44c768a07_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
4a9cc15cf99de606b717c7d44c768a07_JaffaCakes118.html
-
Size
119KB
-
MD5
4a9cc15cf99de606b717c7d44c768a07
-
SHA1
c7f1031d098738290f2184054cccb53059394bd7
-
SHA256
5c646040a2294f6d7e4de0ec36dcdffd4815ed0ab56996c674c337bd761f85cd
-
SHA512
8cdac0532373ec1697925adf946be082612307b7855f0f2c9ca0b21fcdd5aee0a20869842b8ef94cb37f4aa0705c4ee90d7a548a41dc5b9c049a65776d09026f
-
SSDEEP
1536:fKkuYu7soY14CYRTfZDt3qzr4gATdNsRQVJiWBIC664s+:fKkuPooY14CYRTfZDl1n5G6/g
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000bddefc234496b796cbd4332619efe5e7348a679e4a355d11b54706489389b849000000000e8000000002000020000000142024e6d96e7dd935943af939b737faa8741262e9c7d60550e3d7a1cd1a9591200000002c663534816e96fc112dddd5fa87cde3be950848ab0841aeecf34194651b3adb400000008b09342c9e1ed0cf540560c8b2f12d4be707b8eff7c86c100b715b281ab15aad5b4b44bc09a8e72f989f18473bb93ed41cad4a7d152c971516506b14e18ed792 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427225204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c486e6d9d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC145DB1-42CC-11EF-B5D6-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30 PID 2704 wrote to memory of 2556 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a9cc15cf99de606b717c7d44c768a07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4519d6229facd789a052666300c97d
SHA1cedd6d480d7970d2b1628d1f90c9640dafc82874
SHA2567e6fc9a49cb3efe48250998e295bffccf8cc267e23f3d42613f68fa70a09cbf0
SHA512b9ad99aa41ad50bf4a38e0c8a055fb62a515dd32dc5cc7587c12361a827f8ff9739e86a9d43e5def21b00592f50cf947ad809fdb12fbef975c2520b3987e7a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ad69c573144f829cb6110d5a9d3299
SHA1cb6fabbe58155ed65e32f09da4a833e85c7b72b7
SHA2560d62e657134bab36a8cd9cb8317b5d80965fcc11fcc6b6b3b2d245b73683b969
SHA51288bfda2e05e17ee72d5f49ceebb539a7d4d56cb1b2548f36f314201e9ba594bc5fc3654ee6ab2db34beabed55c006fea5fd02421bc98697590d69e9cac61526b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2fe77cede26ca22cc1c206313618c6
SHA1a8a31e6b991b732ce0e92162c3713566fd444d70
SHA2563b026d688812cba4bb38a1c2eae95b4b39e16391223fe889512c177f544c69bc
SHA5121c78452c9b911da8831334580665f542cd6de7599a0c6e2c730c22a4e99389a414d1c8f69856e8c826998601448efc1f52ff833aceab28e92ba6d5a1b9e7c7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5796128b6cec7958eba0935b4d35db0
SHA119ff960b2ce6d564384d883e78d5ef261fa9a456
SHA2561a9272261c82a1c09e59de052cd5c26ce4fdd324846d6cc00a641867876a7b5f
SHA51299c3a6c8335a44c9fa1fec4b29eb0754872bc4476cf1e65b9a03c491297cd1ed017da665af0b7940d526d63dc806b9d839e1f8e95004383b6d4a7db392eaed48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3b9f89fcdc0f8c6c509a7ea5165482
SHA10e511ea494ab42a3982a25a40448cf3cb7475d6d
SHA256e48e70828d1f6f51383bbe8fa6d3d90dcbf0417d37e1beea0bc058bc63c96daa
SHA51235572bec49f71eeabbb4480538987f7489ffc91ab3c7d59e5140354deccc77dec657aae2505a314a59b4b9baad6d9b4ad6e0627e371dbe32d426f76e9a1c829a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22851920d8871b554451313fc078866
SHA1f07fec946a8bb5094da031ea4cb62e46b2a5c54e
SHA2567e435558729fd9d764561104ad367cf785ef788d88457a531170b0881ad893ef
SHA512d8d9d2d3c6ce994d1ab8c18dcb2a337101ebf9b6bdec09df38fa3ec97c0acea1e8c7c44062ffaf2e19e0e8948978d66e8e3c4cb3af514a65d672d993b846c47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6adef5f8352eef74c94a2d0fb7d73dd
SHA1276aae62c9ac14d5231bd2a144c0383085311855
SHA256018ebaec3b27e74c57efc287aa02ae8954249047a1e782d9bee7e3e2f381ef8f
SHA5122c1ae73f21f6cf6a79912851eb15d9dae0bf2d0bb68478ba935c324e0241babe6c477537908f4c14be46a519b0a5a4a78b623589961fd4098474b27c0d8efda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec5477c73e11da6521471ddf2c0cbbf
SHA17bc201d8c915da508e2c9fd1c0833a6aeb57481f
SHA256845f562adcc3e9a0afc0d76518b6a069cad5cb8d4c8317deab40f60e8c5a25d0
SHA5121edb155e640903ac5639e3280f928f73f7f185a2bf7cc7abb597474b66109dac6eff3a06cb2daf6c96fa95d56a2a33a911c0087ea3cda7ce1901f23de0ef63d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58394ad6ee6483a1d9deca9d8efaf85dc
SHA167002cbee3695916edc25a29c555e8439eaa08a8
SHA256ab45a0ce16b086bf120e5642b82f92cea24d09ee22142dc2fef50d55c3bd6005
SHA512c54ad31b576ae6db357369e307d9dd0ff05dc3895df7663f51465eba0c8b971bdc8cc36218d7228b5301697278de21565212b43cdfb5e83d47640639bece9932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aab4e94d7d2b2d9f354930eedc95d94
SHA1127aea039ca3a0a6b50b3da9faa20df5f7f285df
SHA2566d2407090a393338ddaf79bfb97dfd91fce71953a4fb29271383c76883be4d11
SHA51206f572445140f7385a61b77dbcf731462a63aedbe5bdec689e5774c714e2c54b961d474cc0899dc95bc773ec9c8915e0ab509f7ee21e2433a177f975757cddca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008cfbf328dcffab3a8d44c11bfb976d
SHA103cd097c6c946f5ff8c6d0df34ba212211dd2102
SHA2564324b4cba710a9a97ad37362647dae9d8b99a9fe3c397867cecd96b89d377ccd
SHA512a6e59ed3c82a5abdb72343f7ef6b5a65245b3e641527dc95a282751d799a9dffa0c022f78cf93f2a937675ba6d7a6cf65de9558bb1fca96133191e1ebd4763c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4debd463ccdcf5645c5b2884f30cd33
SHA14cfa44c7182cdecddfe4a3ba4c096ea886ca5807
SHA2567007db2a7cb884a3448fb295e32dd26427e81bb89abb5195cc8b1cffc978cff7
SHA5129eae46f23a8df23d6376ed3ec6b0130dc1fd5bf72232c75001f66bb2099e0266d01007632947e8b2cd25d47ec9f24b9eb7fd6867968fff00cc6b1f9bbdf90001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d53da5e5251fe3b8160c7d16087e8d
SHA1bc08cd94640e988a5f885579a9d5ba3a67b2256a
SHA256e4dbdd5d7b865348055dbbba84ca7d138451d43f6c088abf106434efd7334d1a
SHA512bf358969a6eddb803a471254e4253d707bae1a28c7bf50f1a0960ed06efa9ae35cb3ac5cf6d96b7ebb09aad3eedade9e5d5176b6aed3759d1c54a7f7950e9e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56480f8964eb80bb5d61ef50bad03b3e7
SHA121d159097881c7952c03dc05dfa5b49703b99496
SHA256fde80aebab702a1c81827e9799e48b4855b54b7527cd2748e8720f76aa603dcd
SHA5121a4a02696691a8e71a8073b686aafbde68de5890ec8aa823a6eb9bdcf968789332f37a4e7ca1917cc1e0bedfec0092d0019b05f0aa13176feb4b2a6dd80545ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb21d1fec1cddf3e96ce772804d2568
SHA1089810de78704256212e3fb95d5f8715e08ef314
SHA256c5fdc32b8d82d757b89847a46cdd4715a70601e04fec842baa567e302fa36a83
SHA512614106c26ae299682bd21ce9eba1ee76749e77b74592926ddbe3eafc03b7855151a97cf5c647e08cb0f161b1ca4d18f3e21c03aa1420d8d1fa0335995a4db81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522450420efe16d4e38386e803b112aa9
SHA1b325d5bed24e212c742096be8491555dee9ba214
SHA256f61e37ec71d3d3ec482840a2e1adb8459d5ffa6f0455c8b752a2fcd689e9b525
SHA5128516be2e185a4287683a2486025205145a00b87137a0c1d4dedf3b7e1f2d6cd1e077d0805e3a6f9ffa2b5a0b38092e5b20a9a162575afffdc463515d73dafce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59567047912aee6086a1b43b1a9c28ce3
SHA137d9c76d4ffe379391b0849542924d0fe40223b1
SHA256dcb7d312f84c791e2b7610cd226899fbb0ec82b146a4f47a22d28e9c4339286d
SHA512057d495c63148ee6ef43c897a09e662548c00ef2bae4e42626b39a740294fd3f5613fe62e8576762b970915c356e080cd586ee559798790e0ec906cc07422195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e650668ce3ecdadd872e85716da9475
SHA1aaeef2d9d158585718b66ed6497cb91d461c755f
SHA256724535e11ba9a348e4d967aedcf6657a3e4419bfb63f210e0a1edfd6f7d37c46
SHA512411969de64c2f35d88d5fe71279df67494518e90ee1a576611461fbf68e5dd5896a26812ca5e1a42d08e212cc9e24039c75b7d3784a10e711c6abf248a7454d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546758a8bc2abf48f1d59c4b4747cf81c
SHA1df469c0ab2c482c901367a2ce4533240c82c9fee
SHA256e91ed480382cce6926bb5c5ec158708a035847ef8e79fc0081220a00a05ab240
SHA512ea758aeb843fd71104c88d3cb97ffdf9aedb2f927086f6e8a4f82d7ad98a20615852851f10a35aa3bd90597122a2357b3b6debf9d39ff3be73a494788b50c6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad3278d897d0ff8051238969ef1cfbf
SHA1bfdba678d29a7753fd27cdac05924f6938f81165
SHA2566a51942c0148e4cd4970980c32e76224a7c12cd3baa9d9d3e49a4918fadcab92
SHA512b1d8443361da9bc787a88f6fd87ed35388eccb3fca779d81658232d1703a1bace03ba48a18f1612d480cd30b26c891e96c81810d905f427d6ca1449d56b51a0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b