Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
5e3584d8214e7c0d660a6e66d43d996c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e3584d8214e7c0d660a6e66d43d996c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e3584d8214e7c0d660a6e66d43d996c_JaffaCakes118.html
-
Size
485KB
-
MD5
5e3584d8214e7c0d660a6e66d43d996c
-
SHA1
9d23947c3ebec1886ec20f1fba936ff6db1bde12
-
SHA256
19546853a6fa5ee40b9fb8e8b20d99436a0b8b8aa6559bddf0de6da41c9caf9f
-
SHA512
7d3dc37e7ff4c91ef9194390d468e7d698c25451e9ac96de529d2ef2aaf6e2a4ecc7b8bd404ed486d21cb9259f601db3ebc0fe26510e526813f7e3e75eebbede
-
SSDEEP
12288:ga2iGiTuS4SqnHA3etJwmGiTuS4SqnHA3etJw+NExNErRPzRPPY2c70Y2c7ycr+F:ga2iG/S4SqnHA3etJ5G/S4SqnHA3etJX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427594923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ba089436dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000095f56085c272a0b026b554a1212d2fa0fc2ea85a25d1f1f34a91a7aaf536843d000000000e80000000020000200000005beabbea7a56f8e75c15701867b88e6f261cddc63650cc47f927c7ae46a6328d20000000828354ff33f1a38c8e02ceb41f1dcf8643cc6bf9de0513f70b44c8ef8d79aa8e40000000c946b7bd788c90082e15f56268a0a7c868f21deb18e3ef233761dfdc3afbb021af4bcd63df2022d686d80fd2b058eb58fc459f72ebd4c802f751fefbc2dfb852 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC53C241-4629-11EF-A76F-5AE8573B0ABD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2440 2452 iexplore.exe 29 PID 2452 wrote to memory of 2440 2452 iexplore.exe 29 PID 2452 wrote to memory of 2440 2452 iexplore.exe 29 PID 2452 wrote to memory of 2440 2452 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e3584d8214e7c0d660a6e66d43d996c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7f02c600707c03ca822130a6f3d1e8
SHA1ce2fca80af5d02fb081e143f5ac20a80ec157979
SHA256fc23e06bd31deb17a0e52b35d56a129a497057c2bdbcd79018dd8213c92be675
SHA512e941cee474a43024940fd261c41fdfe25a85af17c15a05ce1ccf161917dce4eb6cba4254a95602cc438cd78df1555ae5638ea7c1ea9ddfaa8593a8feaba6ba19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f8e2985c21c6d710553d5edf7f3d6f
SHA1a598aca0b6c313d4d295e9f284d8ff4d4996b45d
SHA2568c5c0372295531a2c56c80fa88a84118773b1fb4714c3c1bd18ea91c85f1690a
SHA512bfd49166252eeee43006f73dbcc994fa24b9f263a29cea5c112b8d737fac25ed932bad27e0c7c9f387e7c2dc6a865be1d14b84ea76b488131f25775f1d122abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c411efe3dc34a05c006ed99ba412d3f
SHA1fdc7933e6897109dee27f9dabb8ae1126d3cdae1
SHA2569807aa644b370faacc02a1d19b8a86b68abd64e6053c1744c7ca1687f4febbb9
SHA51253fb5a2abffce8d6f478b20f949c25c9eb305890b7c275f25bd29d9c00f904029030cb44f03042ce2f0b648372230315505a5a6e1e00b4770d8798f9079d9be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653d7711aa7c7cb3b397332afd032b09
SHA17fd279d8ec38fbb0b295774f9ae6482503178931
SHA256bde8661b7c024a9f02193c9a9dd12cf6b2cdbb9e21406b01ad2c43a91ffafe40
SHA5125e9bf63eb14bf832a08d8a80896129846105c12eb4136da06ab68ba0d6ed529a57fc5ec8ff0bf2ab0cd6e79011c7f2c076dca5a4e74ccd9b7ea9f3e74afd7a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8909dd86e2575d0682a970f32be0ce
SHA1f1eeb4f22ad7bd95ca9f1d7398985e6efe27a0df
SHA256e5a073e5dd935778801025ba9ccbc459859f856345906a6dbe00cf015ac353c1
SHA5126b16e8aadc5d7b56b0d8398c4b3760a4541c6a69f9c713b2d595333f86425b387f514acc3ba5c03d2efd324fb53d4a4af36a9ca93a3048967fc33191f2cf44b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51289ed6e9020c44f30aa49cd7cf6f696
SHA118548d5fe7652b1d793924ded9328b503ab70dce
SHA256bafdc2489b3c8233dbacb3b3d46c47be7b6d74a64df38a0473ba462c15a1b50c
SHA5123dfa2cd446a5dafe5c1cb655442ba7fe92e9c730dd641abeab75c1f269b8c4ed7067c70fc73a99b8fa534c8ba0840b8f92b4161f0e2cedfc82c6851f844a2702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb540bd4998952ce06e1fd2b80be52d5
SHA16da4e9f3629a6f26cc3c049141a35b62c0d9d688
SHA256e1e1b9978c56c6f7d53518bd16e73d881e00349b0293bb260c8b7d5f7161e789
SHA512f93f17e427bb2b420b0383dab8655cf418e065962b4651596b1e17f54ec95dad2daa69710f28a949f4a0c88f2094eb05b951261409c866d5d8120ba3a10c2590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c1d89dff3bf5109723b1c46285fcc2
SHA17b52536c3391ff753eeaf4a49b878c098115f397
SHA256a024434144492e844ab7352d4744f5dae90394f938713c41829d7df5d11047ac
SHA51235649a6f7262ac73f92976fa675469dc03fa32fb65d80b21bb0d047be1147652a927d4e5b9f898ff245a243be438a3165c0ccf95c91ba5de3a905bf9ff2e4b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42f0a594fcad40f07ffca0d5a12108f
SHA1f8355b37a93aac9d0f72ce98b309021c3001ce8a
SHA2569ea9930974486317fa9202c12a504583a75c3c8f5f8060562fdfa76fc33d9a4b
SHA5122d1b7e7ae13411e07bbf5025faf171162ba5f430b603ae4d4c405fee009a5774a460f0dba6256879cea8157f2ed35a68dd91288050bb34b78b868b9ea97058a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ce5f0e4c32a0479e511d54884e5505
SHA12a2acedc990dd72e838a78bd7b41759a43c684a8
SHA256e88b98f761faf90e3540a212633322d9cd8117bea2b27e74a8022ea6e762bf89
SHA512b634022f5ceb7eb88131df9fff7014016ad1233982298f813cc160065ea83de739407b7788a6a2e5613fdd0f1c67291072a5f8f19bd936eb6617fa6dd54f2aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2280bb49346499f786ca66a8e250145
SHA14e9cb6d97ecbafec2bc9b2d18eefa0f0a70af0e8
SHA2568712ceea5f9250b70a5cdc2fd7945cefde32912999c9c61e501d9a85c8957496
SHA5128e4ca1239b4709bf29088a9780e567267a1c942dc06c7b20e8ee7181d62c0e7b760158a5093987bf982a60a7e2ac080abbf64d2db5a1124f596baf14bd69d08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f72a5aa6b7874f71445c0bbdd681b6e0
SHA1c442b5f3eb73445cfd792562eab8d9b41408af6e
SHA25600f0044b1f432486309acd65275ebda05d7d0ddf40cde8e4fbe5bf0e4820d459
SHA512641ab7934d1ab0f955db1b06f72d5b094c1761aa1d07d0e8fca936b4ffdeec64555171ff7f0e97ae490e765fcf28cceccd044cac13c734f8b0b31a19397aa541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fcf792749f568f210974079a86a7da0
SHA13ae9f86c45266295138cddfe259f809eed4cee44
SHA2565e28eea6a47b2c3d25c2cca568f96038fcf2cecd55b420b1e2cf9fd74bf42986
SHA51274be7d39d80cfb4ebebaaf4b0c9a54ca62a6596c29dea02dba78ddabd2480d2d509f6b59bd877d10b22e8f13b899c1db8b92c239eb4e09618b056ef56ae9a861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84f3d7fc9456d0600b6abfa15e1dcd6
SHA11d95a6483a92edda0b173bf91c096cd219dc21eb
SHA256522bc7c0950761d9f0e6f40554217d695aad2e344635d563306f2018d44b9e69
SHA512c80ecd23033e8569b22ebda03581273253945af8eadc93bd779db941561c81d94e5415893a3e4eeb62738cf91096e97b2c0b12e4aa590657cb72709292f1d90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552952fa11ba2ae8783dde555b38190b8
SHA103bd9185e8de611d962bfd407dfaa4d704cc8e11
SHA256468c6f76209d04801e7a9b55f42ac062c3bc953fb2ae54ec7b6a917a217fcf08
SHA51247524cff780b6365a06215f1a79ce27bb5d0186722ca0b474ff6dd5f15a81e1d1d963e0b4b135d8ad745791b14fd4326b44900d0df624fd21580cb01ff1d4df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a9f11ff38e35560e2de90d1a031b1c
SHA1d5d0b7dcc60d98d9a8d3a072d49a2ecc7547e595
SHA25642aaa13a959d420b70b81d2c3ea395d993ceb80dc0a98521420119f5298dd159
SHA5129ed4bd23570670c18a563db5d90f94ecf481e5fe69618a33dd342d137c195af13eea614938f44bc117c39746f6741de7b964a3fb51d0450adde92daab806a07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e10bf4103fc8e0c1b365f4d386f99c4
SHA1dd17f65afc3991025b3759265802a7d4ccdb559a
SHA256859f52a78fbc829bf039a85cb3bf691e794515ab209d3f2829f5aad764008005
SHA5122dbb276c1b11a1f8ae2730ff4f44854cc1f969e0f7e0ec6bfc51942c2f8e80a71bac77f59b6eaa58d9e3d59adfb5c04bb0999ab874ed3fefa10da886ea452ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073ab760fe22d5f86d41da7bb4a16807
SHA14a1f6d4d196233268e94a6fb34f8630c32164a37
SHA256e1c43e956806e8a02651acb8c2c69378cb9cc8776c0ed238505a9d1a9a1ec6a7
SHA5126e3fce5f3c069854729f09200dba7d50322e73fb4ca07c0991d9655146a566372a8c3beb800224213d3fc3687297dd962d8483feb7f777e644c455369139e943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ed1fa7ae8a22f7740a472a27e8bb99
SHA13a99b31478b6d97f0d9a5425462a50af19ba96cd
SHA2567e46d8fd191012594b873621167a60d0efc87ad723e28b8ee23b0dfdee76e194
SHA512426ad6ec054bf2eadd8524a630e82edc1d51b407f3bdc75bf7e9359bba77cb04c816099433f23ffff1cdda6be1b37729b40c730bd9c1add0e0740f63f237356d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\domain_profile[1].htm
Filesize6KB
MD560755b30334376c48e4adface1877270
SHA11ba7ec684ffaa59523163b3290c1d8e913466c0f
SHA25625ddf6bed11716eef46c26afa4a16beb1258eae36e8f8a6dea45f92fa2ad1e9a
SHA51255c94986f168bd441432dbca38ea04834dffeaeaafc9a1ed9805d8079a01b6dd734ed34e599d7de014327a83180b80129bc840aa941319664871227ab0c8e99e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b