Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
5a4fb365268a0aa79434da768eac68ba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a4fb365268a0aa79434da768eac68ba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a4fb365268a0aa79434da768eac68ba_JaffaCakes118.html
-
Size
53KB
-
MD5
5a4fb365268a0aa79434da768eac68ba
-
SHA1
7a29a164f4329dae5ca68db749e7c34d9331a8a8
-
SHA256
96b75c658a8a35e82406a55d1cf5049fbf713f2e88b2bad589b19d9ede4cb51e
-
SHA512
ba8898e534ae66a6f92c3571243a4fd96701725b8cfe1c2e5a776f781bcdd12217b2f4722939e80facde9e393ee8d9f98e5cdad275789b092b27b22b36a785c5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYS63Nj+q5VyvR0w2AzTICbb+oP/t9M/dNwIUTDmDo:CkgUiIakTqGivi+PyUXrunlYS63Nj+qo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427522020" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00315451-4580-11EF-8419-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0581ed78cd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000005b1ff9725b7d9cb5603165e4c52885765eb783e7d354c89f3f2a81fd60bed270000000000e80000000020000200000009f03ee791aefe2044a203e8931202bc3e9f3bfc917df2ca176cd581c748d3867200000007b792cd04a3d4bbc547433a694e9aa2dcd2f0522b491d2698042c453abce48b540000000b13fda97da1542618c8297fb73c77ca5558b57bee7784900779bfb2c83dcbb4a9ac6675df8e63a7f3f14c9079d15f6bc2376b4c24df533c50039058a20a5ca4f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2492 2412 iexplore.exe 30 PID 2412 wrote to memory of 2492 2412 iexplore.exe 30 PID 2412 wrote to memory of 2492 2412 iexplore.exe 30 PID 2412 wrote to memory of 2492 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a4fb365268a0aa79434da768eac68ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfdb16af4934daec1d1abe3d60e45eb
SHA1576bb7c396da32c2dc55cce0b303f427edf65e49
SHA256232b53a1f41e62e52fb7cc03ea6469124084396eae4621f96f9fed720a2a49cb
SHA512a83ad71ab9587e68635a12d188b5e2b788181cd7eb29fa0ac5564b91bb341bfb770f89b884b964366a28b748d4a4f02e071076535ecae9e0150ea5c17c41e386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc26949ec5cef01ae43910ee7cddb9f6
SHA10aa54bb64d831e0de04b9c4077b274865ceaf36f
SHA256231f9572dd6db3a9931bef30f53c847da93cda862ef1add990b20a4c8f8909ff
SHA51274a6639600619677d4763feb82a0d9f90d21b3ac791ccb6c21c0e4548c6794d8359352af23b4bf743ec7d4139e8eead96e40616679632db022698626c9516479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd856b2abfc922976fac475ceabb1019
SHA19352bf4f137aa6ca011b6fa6281f6b5534616756
SHA256dc9ecaf5e373e5c04ea46981cf933495273dbc9655b424283014c3871991fd2d
SHA512da33389b8529a3e0b14e70e76bdd668b9f1ceea722513fd0cc7a43b19991da2edce12971c49e8a812168ccaef2d7507f1ab1a117acffed70e698a600ec144181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2ea7d37da70914589f4a236b2670dd
SHA10095f3f64f76467e1dc793b3f4f7d069b18c0b7d
SHA25669daf5e7338a7edd75226d57ac21f8f251d33428a2a46add6977914ad92f1b43
SHA51233f68938a6ce6eb406a860b6d82a9ef157b01426679fc44d7abbd2fd16a215554f7b09914e90226299730b1d92cfbb235966bf0d290a5fa6d6ed1dd724df46d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ecd0301e48659c0aa47468ccd12f1a
SHA14f6865fb5e7c2831edcef2719991d77fb86354e2
SHA256b381541be3f27e6fe22e19b55425901e447c426743ac9493d33d6e26970e2850
SHA5123c628f896970cee756cacee541a5f3dd140c75f0ba68454edadcd637f30f5a95f31793264ed3fda8deb494004e13effb0f87a3deb2f423daafa205f2a43281c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705eedce17e00c3c1ecfa009a2f83928
SHA125de1dda0104165321306696fb7c056d4eb93e4a
SHA256217db78e2222fcc5bcb4ca9749360d3084f772d4c27684d898bcc477635d88c2
SHA512b58c18c79dac920a6b6a71b966aa335d69f5df400278262b2bc46149be3080cecaf32a282a6903d1b648745a4bd2c35aa5e3a52b2b2fae21c4689bf076a145f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a264d90526d53d13ed5ab6d6946780d6
SHA1f7a2df39b7b281fe31ceab7e435fd206d284dd49
SHA2566bc0aa44652dc65752208bc9b98081cbb289f66fa25cff80180e12bfbfa1a246
SHA51216d86f4177673e0a0b9593af76fcebe4780fcb0cfba1278a45350dd6f499560cbe264891636e61601385fd9addfc043ed8dd5b5f982c459846e1be91c62b1822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1be11950a0fc5832755bae7ffd1fb0
SHA15e69183f9561aff25637192a0b0aae6f6f216e8a
SHA25684bbbc2ecad1701a848324a399501d92483bad5ffb0b647e890f577272c6ce7f
SHA5125cf842aef39c77dbc34171fedb15d003b3ea58eadd8da4618492e56d9e72297ac1d3bdc5c776140cb24ceaed696ee7d8dddf7a4bb1a7c74e3a4d0dd01a2aae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f453459332e82d28f6e111ec6a3b04a5
SHA1cc059cd7d1e43c25e73c141d7c95e5294b9a0f3b
SHA2562f44df63d97503415d4e696a028e36c5a4625f56b10d7f2e4d3f71a88fe73d33
SHA512cb91252b9cd0c2fcf6700c3c7df235005ae25157f9cb0b72a06ae33e79075a35809af403d2c9c913e7e2030fe62cc39eb375a5dbe9e689f50aeea93ad862aaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ace956c3bc6bc69befccee2d1590986
SHA1107232c6dfc67489cb17937c9e79c43b765e4479
SHA25640ee48080a0cd31e2b61c89cf88a915fb61133a1bae6d6337bfff99af20e696b
SHA5127d411dab007e3b6d14e67e2970921bc0130ca66dd2c40cbf50a21cd46c41b637dd328a67964f194956b3edd0bec71b8341f0d74dceae50d101a6432e9c197f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd2ea41209741a686fc8a2820fb1ddd
SHA1e5ecc5dedd26ebd98c8273f1524abdecd2ac4ac6
SHA256bd03895a8f751ee53bfdfb3aa199533169ad638ee01c685881ac8c872a652627
SHA5120cf2fa955c9c2cd425813bcb2c483fb229987e809b0631873d43d7740f053665c637ff94bffc8247861ee07fb843d8f13eaf7d2be3ca27cf745aae281019449b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587947a166dd683827381056ee2c48f8f
SHA11a6ef4e17964d2e836a3429748abf1271e01bcf2
SHA256ee87590b6afcc5c29da9c9d5977cb8b7091ca0fc63e89de89c5ae41dc81ea460
SHA512938dbef8ebf150988f55c40ece33df24bd4c560fefaeafb5eeab1ea04f2ba5d566ac71eff94409ea854fb8427982e83e182145a1eb9747a0f1416091d07d3bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a72d9d4fa4d4c4b14a70b7c0a4ee765
SHA14dede326b9141ce731b87310ec68225835f71e11
SHA256b7ebc6f875cfac8052e000594d5fb1f0f6ca746d50c12f34e2642f8f2f36a89a
SHA5129cf6c47ae006e01ae8ffe2f685b60e51e8243beeab6f5e53ae3371b5f878b8940ca50e0431cd0120947eac9c4070f9e59bdac48e2dfb581a011cf5b6f4838041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8353d11ad600a4bec39be6329be5c4
SHA1586c4b45c8f3c86c6d4a768b3e5e738f279ff5ca
SHA256c99f03122bd47e2d78fbc86e09cfcf3a839fab9c2bdefc1bca8fe1d6f1a3ee4e
SHA512e79be192fee346cf2e845495eb4531926d397dd64e8096f5870fc54529a60d6872762a72f2c188915da5aa13c043f6b042d5231cc829be45b29c06a139b058be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968a8675ed335f8e0f8356d4f12c2390
SHA132e840747e9c4cfbc00c4fe4b8203d0bfc824804
SHA256700ab08c3cb62c00dbcce0d2a27f392fa52101c72b47bb831583aeb43c900510
SHA512e92b7c79c7805472ccfc2c27efeb9ba1cd4d79ac3c78960bbfe71424c800eafc9ea4918e03718170c8a83cadebeddd44c19d1181507fbe450ba919b990b94c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0605e473f8d9dc0042e920ac5e2131
SHA155c9b92552b49eeffef01146304b37e9544d922e
SHA25614031d055ac5abd6f0c748a267cbb63be0a6b5a3bc8dab5b8382fe22f9611bf7
SHA512635d155945161a42c320ad3cb224343c6c0e82762d81f13652c1bd3d22dafb0bfbc050848365aab2f5cbc24014ada851e1cd74e7ba172e30d84a092cb900e01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6323049ef13c7a89900542aab37c241
SHA10f567ea6ed95783fba2d080be6b52d0055f964f0
SHA256dc6c39499a73420015e2eb48c9856a9def11e0b0fa699fb9b24d3dab97bdce7b
SHA5120b3adc65f9b930fa0f5288a04f0dc58a9ea591d15a2b6815f92fcb3db903bddd0ebfe043c03c9bde2b4e00ef49b523f6a9ecec949ad76e903680777b9a1f5d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8eb096f070b3362b272e1815cdc576d
SHA18e5bbfcf9b2069e4013472c4295b685016b13712
SHA2567c7351c1a382c3aafb0112f1ecaf23896d066b12dfa6060ae02db5649f0da367
SHA512ec862ac52960f16e892d61451af1a11bce89197585b84309a01232ce889d3f182ede43c47b31e4d2719d3874c7edf50f1f8272ebaca9cdab803676dae011a9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666f2c7c314240beb2b377ce4c401433
SHA1c3e81c925632491d86027b8ff0c00215a65c45ea
SHA256d1aac2026e6319269534d4e685afe57577dcbb649137f5e07e4a4d3706b7d9b5
SHA512df7fcfa3f30c5b18c4b8920502a1b6a019512f4884c57bbcd01e93c4a905620e3d1dc45593d536458cd88180b0b011e7acef383ebc20cbbe73639ff159457f6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b