Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
4d0ef1dd56345d9e7b6cc9bbdf17837e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d0ef1dd56345d9e7b6cc9bbdf17837e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d0ef1dd56345d9e7b6cc9bbdf17837e_JaffaCakes118.html
-
Size
57KB
-
MD5
4d0ef1dd56345d9e7b6cc9bbdf17837e
-
SHA1
322d1420928171cae6c06bb5866fde66ac807ca5
-
SHA256
d816b3b91e8ff0cc7d80c66909f19cbebfb2c0d398efedf754b3b0d36ec37c5e
-
SHA512
d5543281efee21e52582d62a559e89dabd7f6bbf606e94d696b87618a2a6d20224fba333a080a89af8ff9626e7141be41e6cfb74b71fe3195c6123b026247b04
-
SSDEEP
1536:ijEQvK8OPHdsARo2vgyHJv0owbd6zKD6CDK2RVroDWwpDK2RVy:ijnOPHdsP2vgyHJutDK2RVroDWwpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427271073" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000034f55a14520b0c7da58c1af564b513c9abd239ece20b741858af05c597d8ea76000000000e8000000002000020000000d0246fe0dee2fd89530561e4b3adcd0843b66f773b3eb21e45a84af1ed217b352000000027a1cc5ae64dc7d9634b03a477e4b7fd7dec87053e9dd221ebef0171fbc1114340000000699922fd9d14a5c110e3e5171daa98c366d233d31fef8319c9626d4a35ea83bf076a47bab9450197e6c0b2c4ed1cb9900984133bebcac5bb3cfa70e59b698629 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e4bb76b1b2295dd9b6114c04a10d5972fbb4451e5095b4881b9fdf9a6072a55d000000000e80000000020000200000008af1ca894232d47d77c330c732539182d526aa93323b27e3b6cf0bdcb63640ff90000000c88b9780875e284d72ddc85e7f774f225425704b04d7d8369bfa8cfc7bf40ca1c5d85cf55cddeab72db83f9ea4004118916fa696852f4326b719fa657265da1c542341ee26e6c7eeb43b1077262dfd664572f9899bc0a476239b040e4026f18f1b6b20ae7bdf999d3df3cd1d188ddab7d958a8849586eba71c0a2dee467fa3f71677dd5c651b481d24ab21fe8b5cf65040000000ddcea28dcb1ba140980527a76ec9262e075ab53b98f5be2a949daf820781b721bdf15c49f2f870dd0a9e09761edb8d969e7a252535d9651c0f64065c305327ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08bfd8e44d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B64E1ED1-4337-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31 PID 3024 wrote to memory of 2452 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d0ef1dd56345d9e7b6cc9bbdf17837e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8bb9ec38ada4a794e25e123d7ea2c6
SHA1120aef8f7069b44138b1678965cc365fb2b09631
SHA25605d78fe538f1c093196153b52e5d1ab577f4a7419fe1e0cfa52d97227e5aec60
SHA512f54264ba6876df45b5f055418fb880a42782db56f578d83b60faffcbde278134a08bba807b1f8d2e653a123ac5a42d68b73d4d5bde03042aabb0514192486625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d4cecc507099979df7b2d109345808
SHA1ef47f8ae4244264ea1a331caf67740c0e213fb5d
SHA256e990b051a041c0c3a307a639c62675e34f8511ba7e282c16338e63179ae4f3c6
SHA512cb16b642a2d40cd04381da473fd442fa73e368e2a835e8530ad26d39f82b82c1bab45a8a5f73ffaf22ce9f344e89b7fae14f71d48b8717128595d5967b0c455f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb22d4f4373a65ad7e1a98d4175bb129
SHA1b7d46ea25b258789226715e9c561586133cfd592
SHA2560377f9b9cb079ca58a940a2b8b22ba5b2ff8c3368f2edd340a66c1c7756d1477
SHA512f621e3a7c083ac79a055e230a3ceebb7d40bf0e19cb67d7587f8500c1dfea29b476a4b6e4267d5c62030e43d78564f6cc900707c19f6af8b2d77dc38aa8f5220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f8b0e5021cad233aca563c685d004b
SHA19348354647893766d968e0b0f13001ab8c18f123
SHA256730bfc768cbc70eb08333d123044e6989e703af3b3ff23d2fa1c3a7c482e70e2
SHA5127080942b0b19c026b7c115da1841570bcc98200dd417953ce43514d2a9f94e88f2db5d021f4d4d428658a91530666f73a420dd12cf6ccb2e2ce271c39f3dae51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0f80d7d091716976a5116c81550563
SHA1d50bf4ea0dfe83292f666810049af4fd12ebb58b
SHA256f54652e91f24cc17865c47fc7fd8d8f0a3a102e9c6669b322e32f65bec730525
SHA5123e11e6d181256399dd8cd147038a2ba29f3f729c59f4ace13b9f5bdbb7938452281370a7863bb648b162d90294d8643347b4fdf269ddd898982d34ccfad3b25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b186070bac65215c211fdccf811053e8
SHA196d3dcf16f17e10afb57544c4403989acd82e513
SHA25600700ba49dc8ca479bb5a0435a6b31f34475ab9958e5eac71b444db1e40144da
SHA5129b88db58b04a4b9f9942ef2e761d577f01f3c2317da17f95b50986731999d294d5e3a82c4c0a6b37478176f3d9642adb1162f2dba2ff459b147a69f2589efeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8a4ffc588eb16514bfc02baaae5332
SHA1448d55f5e0b4efd0268caaafde433478ac5d03e5
SHA256e02a6730d1237f8cd64caa0f15536286e2e936adf45a933f6d63a7aca73ef15a
SHA5129213023a07bd387b0abc4b4f384038788e75c8e32ff55e0a8b5ee8f4a7201a803d2f856560ed734307d71350bbae0f20282e0c0c2ea9ca84e3e77b53f7a2b988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd46663551348ce598763d662f11bdf3
SHA19857085b820ef1273770d9da65d0e376467e6252
SHA256ea608ab5a6df9a585fa918ba7b499883742adfa3105b3c4b2d665b964b653758
SHA5120c40a65f0296a9fdb97eac5ec226c5059745cd7e75a903ac320f6bdb924c4ac4bf181d8bf739c9c6c0dff189b05c0bcf8e43d5d668c47c5a01b4fcdfc20cd49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ab708eceb57727298f315a407def71
SHA1aaa13b7762573ec552585289f5402832519bf636
SHA256ef9bd7dfc7a1a0ceb896f0eb693ab2611b34f9202c21fa431d6e06f03eb1ba15
SHA512b6f856eae6b57d1a2d71951f9fb204d481ec7b0a9153895c6c09ae2aeea986fdda18b305d7b39b23da5ccc1ab40b77a4fa3c4a581eb5917f191a67e77d370fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560c4e2d25b14b91f9cc07f23d970ae8
SHA19a38923c4a28dba19eb2b032a847a1005b37a359
SHA256c7e342618ed682d7e43762423baa35235391e0225f816534b392f77ec4e42098
SHA512e7ebabc1bdb0c6e66534672276b9a28a6665966070b65e1bc1d573a829868d5025be7da2d098246fb1ce7398a67470759324a67cc7e75a7d5d2d52ab451a2a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f82a16d23690bc5b0eb441c759d64c
SHA127a197abe3579357a64730538d09f7537e8988aa
SHA256735228a2ec7792770b3c9a598f39a6df95b33cdc594507094becc39891c40d22
SHA5126fa51612eb5ef7dc27bef068d643333e10b197af6b112891ea0d1885428a9f7964a7f26e0b162a7d50863097b81444b798d18eb45c4567d806aa327f8c0e6e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2d08eed053fe4dc6396acde9ca6ec9
SHA1cadee68e34d42be1059550bc0bc7d335c7361c1d
SHA256ce6e6f000be8f783f305b88a4abec76ac5c97609cb5723885155cfd8bde707b2
SHA512b3e591f025ac681c455e17bb2422d821456f677a0c9bdd94e1e8b2cc13b007ad7077d4e9cab52bc068dcf4ca2915a895a812f85dfea53971fe1aff2c05f7805e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54522f4308e3a11c73f7dcdb7b7d58926
SHA1c22cf06ee068b10907a83a90b9de593861a2bd81
SHA256dbcbfd66a3ab9647ac61415d237f68bff07113f8aff7b3e639f8b1d5239fde62
SHA5127bdfd10d50ac8822844ff5394d88c67ef44a0ede0aef7f96a7f9d25560ed5bf47552c0b88d8fa1a7fda2ed39457ce1e8e470f94644ce5948e537425af80734d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3ecd6ddf20c3f3462e9ca03b9fe4ac
SHA1e3a2703cd754f51619d90be60edbd83b456d9bbe
SHA2565b96fcd2ecafe0ded44bbc664f65421ac18af25c502a4ffc550ab6ebc47dda55
SHA5125c7160ac555c64e3d482d1255fe3396a780451244123e9725ba38283a8f692707b0bdd96a12baecaeb0527c6d26e1d2c7ee4a41988dc952beb8c16b5538d23ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f09900a124ae960b35a583b1c59bcf
SHA1580d5c79e69ddfa910c492b3941e39c914b2f0e5
SHA2562e64ca8753d5b4c364ef19bb57d8dcc4f9cd34e9c9c0bd99155792abecc35308
SHA512bb54ba02be7abac23fb44cdb4de7912d1103b5d173dbd0c2ca8ff3bfb1f4a4ed07f099d8590b1220797ec38ebf7661131d7f71e7f77cc9f333ae233a954de7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa7780a08ce85a2e7cbe1aab83eeda6
SHA1dcafb15a2a23baa5044003a544c92750e010289b
SHA2566a3a1d4708d4d9ca5066902f04cb5088d0e482e729ecaea1bb24cf9248530bba
SHA5121aeb53c4252d08f6182b3b4bb2c6b885a8d69cc62d7110a270ebd4be896b12bc5ff3a182800c90163c5ad37d4c88d5d2a556915c0d2fdc5b6370a2fbec8729da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6e01aa7d923c31864ab215c11e5c5a
SHA1d38b4f2d32d9a233ae60e58316ae96b2d4e9ecbc
SHA256811637b6f3e134bec40a5554e6ad5174a60c847ab840753bf2c54bef0b232766
SHA512c525a20f150d528ab67162ee1e45de04af25e6dea69c84c387da2a318ab775120fe3b02604525ffc62b9fb11468bb1c3f7d6e1fb247dc7d3132fb932aa91ac59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0a2320bc3c44a5f89c396b03287ad7
SHA14aa366515fe4136d8da29f46f688e9c58d6cf5bd
SHA256de3e77a52cfaeaec42938f38dc25c8cddbb07270f9bfa54db377b7c6542bf907
SHA5126a9f0bc5087dfe59641b3f679d9f4c0728e9fd502ccd26eab490ba4ef434b6aed66768950d222bcaea8461793dc37eec7f8ba90ea257f2f7a67bc9ec5f9c6fbb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\f[1].txt
Filesize40KB
MD5d579689368519015638bb80e8e368ea8
SHA1dadbaec1aabde02c161fb878123626094279f39c
SHA256967adccc3141351f7d4cf1e6582c1aaeffc6c657f2b0871f0ab8cc027784d0a4
SHA51276d1cdde5aaff9d7c44ddbe011a18e48a848f79e489119d8ea626d3af199a84a319e5e0fb27c35a9835366626d365dd8618a3e948c99f4c2ace2b72d3b25ebea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b