Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
5cb6e963fb6184a0f61b343e8297a264_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cb6e963fb6184a0f61b343e8297a264_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5cb6e963fb6184a0f61b343e8297a264_JaffaCakes118.html
-
Size
57KB
-
MD5
5cb6e963fb6184a0f61b343e8297a264
-
SHA1
d560439a0f761ba58fc05203ebadb4a7a2acdfed
-
SHA256
d7aa0adf0d5bbc67de56fec84dcb1effde3b1ab261abfc5e6ac5dad07e321f21
-
SHA512
814c8941648ec8aa2775cd16904d76cc5e6b32b613755fe9dd2ce2993baab6c37d73258ef332917afadf00f45bbe7fa461696447a06db3b8e204481995cc5440
-
SSDEEP
1536:gQZBCCOd+0IxC6n8jfAfKf/fkfcfLf5fof7fGfRfZfSfGfefLfdf8fbfjfUf3fFT:gk2E0IxO4C3cUzBgTephqu2TlkDrs/NT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37892A71-45EB-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302c590ff8d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427568070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000a57e6163b580cab5fd6f4641bf5c6e3a51a971dd45ebcf07cfb2e86676aa1fd000000000e80000000020000200000008dff8ba9bc3c80a782d45b002ab690c640778997edcae771793b47afc92ba6f320000000e9301b1352d6a3f2b9009ab5a14b3c3494609732add9de4afdde2cfbb04303f6400000003645a66a45498dec91e6d719972eb73d453437a82b7804810dd77e5dd8c6985be4af0106795e5ed15e8b3e5032a4a3757fece441d74a835fd52e2d05a11835b7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30 PID 2076 wrote to memory of 2176 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5cb6e963fb6184a0f61b343e8297a264_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c98d7dc94490e7ddc7207196b7cafe
SHA11fdc0a7346295457f63d1f8068554eed6aece138
SHA25604f3fa7bc4052b7e495a6dfac855ffd0f33033cfacaa29f102a1de0f890ebd9e
SHA51267ae3692e3681168d25f801fbe5133c5b45fca9a89f62dce0c675ac6913168a63934641bf6a1a50fd84e5961425cda26a61bb6fa947f1c670426ba0b2326a47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb7a203dd1694fea611c504a7abc8f8
SHA175a6f3b5e50d133217e90130585888d80345a9ae
SHA256b66d6c4e5741bde7a5cd24ddce19f5fc33475bac8a3807decee0efa059430e4c
SHA512f715cd3c6afc7511d8d4e2489b4f8a2914182d27089f787a8aac36350efa0cb751da1c766a8ae7b13520ee857bb4489242656dba8aa449b115153670e1a6793a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1bfa1578376fd4d0c4f08bd1d923f5
SHA19a9b3fd57d29acf1ea2df4466ca6642cec78e112
SHA2567eae35fb33476de9b7c68e3c562395205210fe5a4773dc941dc755a6b1f7ed1b
SHA5126ab1c999348b8f07f4013c3d84b9889239cac2a3fdcb348f609e61428f48c7260b9fd44e5fbc68c01705363133ff372fd357a514ddea8047083fd1dca0f7bbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4311aede2c86e5ddcd3c72a324076d4
SHA12522ddf250454553dd2c33ef6857d8915cac54aa
SHA256dd52408de809a2453da45ff34c96c2229d075a466a8b95bba93d5ab49a145c29
SHA51209bff5202811beb606602694c8b62661368b4e5d8a3574e279ea8de48d4520361c324c66c6eee349345841eef0212d523689721faa1b63be3200ade8217f682d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddaba3a2ff51b6773fd713e135170f2
SHA1667b461049ac760c512b62ba5dff0f2bd1bd6dd0
SHA25676cb788ead93a9fd87340fe770b1a694dd9f142e39032ab426cfc6d86e41f534
SHA512b82d1b601aabf1a1021c3fee56d5145e9126c7cbe0721edb9b572a77a5ff50b36ccab0d4c4c6d3fd4861de9b086f06ca11b7e521a45e1422cafeae0d846ebff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c356388c578a3bd15dce459fc28a8e7e
SHA1b2f978786a331be5e3f41bbf949119083b1d918e
SHA2569d5fe11c70da110435a5ff58f15c8486567801f8702780edb11f71e82a3330b2
SHA512d3780ceb62f1c337c48cdbab337351370f0f0bccc68c6fdff86eb5754dfb3a7a1ec5a71718f8c756f56765554c34d3f0cbdd24a21fefe4fa1bbf57e9f03d2651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52592a685f0fd41d3df1e082b49e550d4
SHA1cc37fcfbeddafbce96cf082e9ebd0a0b0b4fa950
SHA2564ef8e73b193cfb6bb1e4dae0fd8affc6f5ef2b1f94abb0a1c3b0113d08854abc
SHA512dd9027ae7b0f4e7a6eea6bd226a47ddc9058ff551e89a775933a44036a01dd8627b5d8e628bf7aa9bb58a365890bc5394d710e52f4dea037059846344e1c36b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c641a3443f681006ffa83de93e679500
SHA14e65b6b4cd80ac633b5a389ac9ea91199c41c0ea
SHA25614f43bdff97a6ac8ba950a82939b70a1fabda2d787300dd52a1899416377f832
SHA512417c441f9ec3e287eef078671d282c60ee17550478563b603bed218a84bb9a636085c02d25fa844646a1cc7ee4369337ea04899617f0a4fbc38d1f31120af438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88bfff6de7e3923bb22bbe3b35216cc
SHA144f0e03b1e0943a3473aba0b2c2ba1656ac69ea8
SHA256917998f20ce88567c8ab2d9b4be944b42e8fe462bfc8c78a054089a3740c339a
SHA5122ce24fb43cb35c936a4e827d3a851eb219666c8eae7f4ca676b6ed118731e65aa36bb216ece9043d43aea28236df9ab2ce470def459a0f62d80d0cab58525ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7ba1f461b870c092af87ed54caf40d
SHA1ba5c914ed284f94a7bc6433ec7a40a0542624ddf
SHA2568865be5bf75e797c4ec1c448584794593d72e2ba46679a849c2394ce2b73efed
SHA512fe1e846e149f65f78bdca26f1344f8c68e4830deb633e1b3ba7bad911d30a92d134e4218171598f7a4296aedf404f9ed92646f2a5dbd5e242dd269a2bd2e4669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5e49afb6a9879760b10cc8567132a2
SHA1e77b78922ae140095f5146a76dbafab3880a2804
SHA2567d570dec41d2694f80532487494e8d038122b8fd3059dadabf174e15ebaf0f74
SHA5126cbc6c2f2ceaf7fa83f8a2b3336e9ba4902dbb9a71a1e4799247fc9c8bb9da6fb0ec96eff68e731a9e41d87480938f249b902a0b276e70faf7b070ebbd002653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb72224d8ab0ca761b6d5f1cc0fb7246
SHA1467115c2c9a21d5db12ea256a4ef3f48615ff17d
SHA256322bff4d03243715d74302d5e8aebd26320034a91acbe2279367d7c0dedf9fe3
SHA512c6606a04621538bcb40fa67239825926899a6b6e38536c031c07490bfe4e17c1612ab701d295d1491c400b0750fddcb7ecb4f9b6804535dbc025faa098a96505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55196c08f33f321f079b33d41f4c73f0f
SHA11fe39a2abe4f775237c6dccead7d79bf4e376fd7
SHA256e9ec832c91029905fa7cbc5cceb8a7ddc02a09369a91c986dfb59b84021f2e58
SHA512e009acc24f91abb3d44dbd52618bb7956e96e78e7253b6444c6aecad375b925bd86ad894e633f62f579eded002b6aa0d6063aaf5bba36f1ab01dbe1826a93d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb794dc045a16e2a742fe1a9cdc89653
SHA105bca642f1c3d9e54804b00f4a11c2830671d7b9
SHA256edddddb48891061b5b5a7d4ec01d284dde81304438d1093f755bc4006dbaa20f
SHA512fdd7967449e0ece486e861b804c4c18d4e3e323441eead883b45f3793eb07cfef8dad8dda3d5b3eccae5e0dd79ae2552f9d394a6e4e1e3420cd6bc3ea377173f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4a86f9f2944440784bb289137adc01
SHA12bcd8401ce105533ee5e2eaaf1c721e2ff19aa20
SHA256c3e0807fde039c0ab7513c758b5e2eec22b4a534faef825aa921db7aa58bd554
SHA5129f938f980decfb6bf7f70a9aa96433cf84b25b95b3120d7511be52e161e2e445393df12277adbdcd45a53b27a0868c93ff472774c8154e51386218c99c041bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196f1c16b60e1a577b5c17d07893d8ec
SHA1dbf5c08e9eb187ba99b8e04c0c14e1c9c1ffbc49
SHA256abf46559457c06ddb78df4eca8e4855041eccca0c342b2b59ffc0e0749456ac8
SHA512da226b42fa003c362b5d7fadb2c10918db52ac6fdba95601501829083fafd64eb6257020a9c61362e03ab6dac51cc301cdcc7b7d06b175ef371a9feb77eec1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffd8c2bac9d82be83d8e44cea202520
SHA11d314b94cb5e68ff4b017cdb6cf244b34266b976
SHA256b375a150de3328e3275436ec93d0b5644390e7d9ca2f49af054ddfc0b3fdf482
SHA51250b15a5f1748988f5640704953eb4aeb55919aead2b20719e8585810b73f62b6e5dcb3f12132e722dba1c68cbf455144869ca2539b80830823cef8e8e547bd38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744bd042b6a2a3ac1b1d4617f06e37ed
SHA1148662d039b602f185243f2000da38d1d44908dc
SHA2560c650e7afb6e0c9de489e8654febf86815d36ceea26fafa493211fbc926ad3f2
SHA51244a108407343f1bb838dce5a90518bf5f400923b6a61e3cc4aec1fa5978e46e3d3482ccb3d03e65e57e90d1bf4b96590267dc12f6201ba585c999b09d2296114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4d4d98079387602241ffc24645f915
SHA12d7e46cc4ed7814c7cb398b221ddec7b55694785
SHA256ade9a5824d01bcc78a79e2c5a2641d4663051ffdaf748d19d2d07dbf7759cf99
SHA512eaafd348f91019cdddaf74691b676f65ff9a66a2b2dc65f63ca8207b7e18fba17f7723432babcc32101d9736e20728d42635d51b47f32b5ae330a408077b3295
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b