Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
5c82033f1fbddd2b4bbb8f8fa6125334_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c82033f1fbddd2b4bbb8f8fa6125334_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5c82033f1fbddd2b4bbb8f8fa6125334_JaffaCakes118.html
-
Size
57KB
-
MD5
5c82033f1fbddd2b4bbb8f8fa6125334
-
SHA1
c4d9fb0616c24fb8eccfc501d6ba1a52651a5a99
-
SHA256
92d904897f2e5fc31bd9f26f8cfaee4d8a6746948c01a38b209c1398d0f43684
-
SHA512
ed58ecdb482b9b84827a2cabf9579196d656d96681d4e06a2e53c92355579e462a7eb581fa8c1d84b7293f8f4a524fea0a2b8a53392845fd180c4f1feaf86e7e
-
SSDEEP
1536:ijEQvK8OPHdFApo2vgyHJv0owbd6zKD6CDK2RVroZgwpDK2RVy:ijnOPHdFL2vgyHJutDK2RVroZgwpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005a1234efd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e00a7faeb04fb72943904440f196d4faa17b1e13828120d02bd827ba02f4bffb000000000e80000000020000200000003d694879d1124ccc38ff7f910c7f4c7606eaa8d81a39f349ec36f922b8b2b4d220000000445e8be005f7e6c6cff3ad32baae3c92be9b64c72afa5b817226cf82ce10a3464000000010fe1160b83a24260642592e5839822a0cd5b87a57527734b9d928848d3fb33b2bf93a567e4db3c19bd7731ea7890802209786f5ebdaba4b65d6bc61056770f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427564273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CC78601-45E2-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31 PID 1280 wrote to memory of 3024 1280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c82033f1fbddd2b4bbb8f8fa6125334_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5840a9cd5ec1e7bf3970430803af03d
SHA1f0ba11b7644847291f299c5fa5791d1b1fd008a6
SHA2563b754a44d933f92bac3c0ed5aefb8a4f6e6defb31ad8f4caafd25bbbf5158bd6
SHA512e1570e88fa7474f6c9643aec8b456f641395758a848b6df599ba64829bc2131c05f494100eb1120085a0c57eb6476c391d668bb4764182e596be041fc4fd5171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53077063a4a9fec7e5b2649b6c27447b0
SHA137377abd61100811c88b080f31df57f1e57b2c34
SHA2561217eb9f7d6afd1e9440e2258de3a664bd160354c5ce52f85a83c6e313162637
SHA512396ac31b6526fd727ed1d905b285a3d886ef5fdd91996c1d87f49b8debedef320888fc5a834212b70386d1c093fadf1b643a323750dbbac216a0b44821c510c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a258313f348e89bda1d08e695aea816
SHA123a082b62fd2db784cc8df07e9de638ef620a3c1
SHA256ce33c2fb01d2804e98b314aec1a581b836909be60c398e7be52feb1d17a1a1b7
SHA5121e6d65c0f4827c50ebdbcacbd4648653360ee663e66cc8c0c36814abaed22e3d9df7a873a7a47a30738b392f72cad904fbea76501137c5041c0f8ea51c37c671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fa9658cd8fd8807935b6ef3af8127b
SHA1819234d441ad3a768807dcb6a8f513d5d9f0baad
SHA25608729ae74cd19eb1545d363b210cb23a277d21e54049af2cd4666419154bebcb
SHA512e59510861ebedff42c769d037cd369b9042bc38b7bb394ee2a7159b208cda999c5296cc74fbbf2cae6c6ff93a0a442ee5a90d71fa3aeb8b9aae0c840206b144e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18df51af0657a20bc781c14cd7a9588
SHA1ce499c79b08389f31657f5dfb16e5cd61799bb7f
SHA25686107a1e1830cf5790b321ae69a0a86d493d6603c253f883fd42188ecbd1e489
SHA512fb99814499bd35fa21a83bb721d28aecb8e48dab57390503765b07ed95a6426c5ec58d399c84197f734de5fadb40431f1153323a7e6d4653f2a70da4dfd99f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b63aea26d9d26a116fb8e83257c0383
SHA1de5823166916c97ed05510ceed07501bf58c2a33
SHA256c7d8c11002bae9ebbe527cfb854bf2be933d5a97690ae93619313378a42f55e2
SHA5129ea02975afe989f11f646fdf6838407d3676a8fe1ec01e5a6a70b0c35da858e404ba73cc8a093afa4ec91ad623ba23a9a05ee581824ed51d0a31425a92c9d34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fb998935c28cd59d9775e45f7ffc30
SHA10aa9dac8e852af7527a9be6f310e22c649cf25c8
SHA25601bb485b8b8e5c749002b42e45996ef66657ada33ced3592e61cbd77a954432e
SHA512aba3ec94bb375556937b0d0cc360f2835e9e1be603b676f0c276f9a21f8f314cb10f5b715ceca1aa7e1f76a25f21280757f4f6abef082259d40dbf794840dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f6c5c4ec2acc4501fab3068b3a6d32
SHA10530a9e222f6d4d533eaa8cbf0221741288b8d6d
SHA2566c8b21269d7dc26dbd179f446d6c37acd913e077294ee27dce51637230e8645c
SHA512145bafd2f53eea06e759da481e59936623cdb55f220286125a74c6f799cbd0035b439368dd129fd697ec86a58c018b9532ded8ff05770260e28e63c6eddcdbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74b1012e177d64748fad978c838b05a
SHA1f20a28b90c6e54bbdc12ca3a8b13556b23acd722
SHA256df1546c28b3cdf1e9bccf0891881bbf4e6401a5276f89b9538447f482536cfe7
SHA5123e67e50f3d9d6f577a89fcdf20f8b460402e3283f54d7b63ee624e04395fc67f928d66c63c95b262564894a10442758a20e6dfa4e1b4d6fb56b292df7d70723c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2f36f4f020d679cf95c64536601ee1
SHA10bbf2d888939287888223e81c585830777153f44
SHA256be3ea4538e1c23c0bfaab9b108188626985e4f5d2d42a55efcc700c45211e0b8
SHA512e3edf37cd0bd6c15def4f0bb2bfc5bee04657637d6e10ddf83f6de7a8aa718cde8a220d527a21180687bf2f34c4cc8bd0dbeedf5ede9892300e6f6c2c847fd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f224635bd0e11c4b704d3f9045d9eba
SHA1700d8a11053ee9fc16e516a9a573a2ac0f03edbf
SHA256c83dbfbfa592d12435d2bbf57460af688f26730961593d3a85915370326d2796
SHA51208595fba8974d83b6aa03c3195d85fc0d9cfff9a4a9318c4f3fef377627c2d6b0fb0e6d8f8a3964d549154b242b30ffd45b9cd0ed077d2b279b30bedeefd778d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50031ed3865653a8ecfdb2bbf71a31ca1
SHA109968a5f4c18c101299871bde890a828b4d2dfa1
SHA256c86f18402a5c04a445439ce07c74b362740b5b3db01ef605f967f377239f1d6c
SHA512d4559da8d96cb927e04fe9f3e71910add6048314e53fb35806fe9f4b5aaeeafe543ba3359d37509813923f73a926d79dc48f9a93b65010bf07e2e7fb08f8cc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca6d92c575e6b77ac425bfdceda38a3
SHA183421ab06060ae3a7da1310d5d43f87bbb171a5f
SHA25616c908757e21400a7ce4219560dffc5bf64c16aff5e974d111079bfee3f33218
SHA512e771988fc1a274514542a2b07e1b78108880f76142ecb0bae121172dd812d93aff55f24235c9592a8547dcadeb24c5206e09a1d79582918bd3d1fcb492eda244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b969949e9c862c1768b2c1d89da2e38
SHA10a8c4e3df5a61a650a1f81012247841d9d81e29b
SHA256e6e1b19f06999325281df554ada5ce36782e5ad0f88fda96d6e16143b9842be4
SHA51201e652b2cac767a4460ca3cc641cc1296bd3cf097339105cd7881a9638afc8ace50c510b5669921bb9655c3998de025f13d7b98d348aa6c603db4e687a883b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50268f378f24855f06494830441aa824c
SHA19cd94dc8cf81696df10ab668a8bed92b970e6ee4
SHA256916a7b0bf298822f23030c2b79e24275dfefe233df265387524d4d8a645ebb1e
SHA5123b9e99d90d62291ee6e0bcb247b3aa83d06972bb27a5496b39cd83a90defd62b018b30cfb2c1cf91f64ab55d8bf589e79a7dd44ff208e971cc756d3c2fbaf3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210c9d2a4da9f39db11970c46f4915ae
SHA1d9a4421ffac188532a213a0195e58f8ebbb18904
SHA256e5c9ce498e3be4bdab6a9207081e15bef1113911096c3a05a8a72334752cbc7d
SHA5126b2d8cd27ffd56f1d1c2fcf34c8bb91cf541724d17cef1022c5c93493f6d4c5334a1428c60a69c73ec0eabdf958dda62df7dab848368a5622e97bee27dea801d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8376f5a37ecfb899f5f7aa33ab2abe
SHA128cfbfcc1feb9ce888759ad388214b5c4ce0154d
SHA256ca0c09c7c855b2411a213c3da352d2791b2e60d4a920e3cf61561c3dd814e349
SHA512eb12fecbd67160396b07f13a3fed099015709eef7ff90094cf3643d162d044bc1e8c86a8d0a8702bf84b5ac8d3a3576d21c4b127412de4014003e54c260c1ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a01a8177e9acfb8c28474cfd861f02
SHA18a9de4a5466aa8dc16563de188775acfb2d94dee
SHA2564d18d58add806a6af1ea8349f8203104372b1ba9b9a9aeb13221bbd119cf4498
SHA512b79a6a79d7cb05e2226a7ce464979dcf8b8dbc4d0ca0d374de328f0372c6e4ce585b7360f6b2f2384c20db7fc05671264cf903353606932d04a406485acf1251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d6bc899ba9aaa8e0d54c9b28ebbfca
SHA1403fa192a805cc064aed0a3146ddc52ce3a8eb6e
SHA256ad301442e6056489be558de7d875cacead3f82c0ff0c6792bf4ecde6d4664327
SHA512f40c8bc2301349607fa25f2259d2b818cb2f4dd28ba5eae091df3f4dfca68e04e4dea0da72fe3476d90def3b29b4a3f95b4a0a4b5a5b071c8bfcd20a1ba37a4a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\f[1].txt
Filesize38KB
MD551bff6e78ece631102f59aef061f61a6
SHA1b051cd528e9a52d7e6f2e4eb2dd33e43147a6e01
SHA2565e7820e4498a7dd646b9ef0936865ad8d700b5dbe078c12cce9a28f31b5e6c68
SHA51259d5ef84c0455bde37082c0f4508b61810e409f13683d18cb3142012833ec035c94bf7621fa406be6120cd2e7244861cc89015f0a7985c2ac24a32fa59b426cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b