Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
5d6507fad84bfedf220a87d4abb101fc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d6507fad84bfedf220a87d4abb101fc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5d6507fad84bfedf220a87d4abb101fc_JaffaCakes118.html
-
Size
7KB
-
MD5
5d6507fad84bfedf220a87d4abb101fc
-
SHA1
6ab5345fe9402db897a3880850b51bea5f5e3bf4
-
SHA256
18c449a2070af917176099d580bffc604edec472df41bbf163bd3e997a889aa0
-
SHA512
fa25938fc0701e7d383ab9b109750cfdbcb0f44b74aa30782be1208eac6c140a121c917f1f26ea265cea99de5b22eb476a1ec2353dd4582c94a9b9810f002614
-
SSDEEP
96:SIniwv0HXt08IMnoXKjl63GL4X9U7tIm6DTIBDD4HsfuyxCDeD4XKQrgFf1Gj2wl:SIniwvePfo6olKGmNvfu046uw1aPve2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427579950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ffa6d013dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009d6578ce6e7cf326ab849fdd15804c908240558c0c39dd67e02a2f5e26bea2cd000000000e80000000020000200000003a8cc11c99f12ae93e6387e7c223d2627c00bdb776f277adcbac6878484c0584200000003d244798b2733bf60294deba9229f4326efc192ca42d6d8932fc3046b27aba38400000007f73d7b8168d6a9df416da88df42b2e9b210e7a3ccc8d257525e4292ef9f3696f75a0b8d4e17daeb087472bab782ddfaf99dd060a2e34a595c22b30dbc6943be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1252231-4606-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28 PID 1056 wrote to memory of 2864 1056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d6507fad84bfedf220a87d4abb101fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad166b74eda2e86f341b89c27976d7a4
SHA18fda7353ddd298bd3b088bca5ffcd837e5104040
SHA256fc023a9a95e22323b2b271b202e78170117853828abbd886dad773bf7175b2c3
SHA512dabb3a032197f1bbb3e1af3f097c9f64eea1abe1fa168a7baf57c8960a9fe4956c5b8a74931fbf1248d570a08af09fe491174d2ee34f3248f8f7785fa0191247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68b1114783bc5f1e701ac628884a76d
SHA1aab35d6a6e0800be0cf401a78c5c28d4b7a7c426
SHA256577369c02a38f418f5dd6b86f3c64ce0708e85ba200470e3c5129e31870923e4
SHA512df24274e8a0c6f409249fbe4c4f97b4fdb6a65556d6e27fac5b290652ebf45a1681a9908a2e2d4e1e7460d9dd5a97f0eb042a4b5a6042d6dd8d05bfac7b5a6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520223dd3aa169a695703e059c3ed9c9f
SHA1ae8b028ffaddc168141c4f87d1f608b0e3ca7791
SHA2565c567180957844538909edd07624a60b8f7dfbc63ed4e511c9d22776ada9511f
SHA5129086c996418862b5f122efb7b9aad015109be3079bc5286a3425fdbc79c8ea89201f4af046871ab0c6556cc25fe6e47a63cd817bc8d212eb167ee36dde571ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daff09f8caf11427b71fc4475fe30e27
SHA16e6990ae18d49e3756fbae2c682db0a2029c82a7
SHA256f4931e7cc2dd3afe9557c24b723b6c2b00985d37f83b9d0e1ca86a821973a11b
SHA512bea9a57e49e84f5dcd7aeba3166bf69bf80074869c09f966e761ea121a4d1b11714f26e86aae7311951fd60065bdbcf2e32f0ab34779ce6107b72f978314e590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e5e60b0ca16f0fe8c8121b6fc01094
SHA1ce53b19a8a99213f7e285c8ff33ed4c42815454b
SHA256266a5f31557d7a38de4fe3104684119f13e2d7479690f219d07e4e4409a22c59
SHA512e9fcadabcf5afaa25ec3101061845bfa9df9b59eef4b788be9bcb1abdaa10e99bef451e902a900a9f9bc2141266cd3ffaceccc92f3a0cc0c03c8ba0ffaf18041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24084675ac49c660fffb87eadc82919
SHA15550ab646d26528345a65d756a55e7b0d893853d
SHA25660a19d564f7f46fa864d09e9981904e70902988e7186d6cd420260c4ce5bcdba
SHA512c0fe324c44c4e858d5271db012e2438b75d14f9ae9e2e3c63e03041eaaeda8295ed027803a20cc8ab1674fcc74d869b6211582adafc6466b9705b2b8daa560a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d2c5fe623fea4655c26d82ff322448
SHA10fb2bb7d39b52548d67e92f795bdd15b173e9ce3
SHA256dc8a1eedba12d027e6eb475317fee10a6a986399c14a2260f3e8ead4eaee8e3c
SHA512ded9d5980ee383d538a151708c6bd33006f4412ad31c38722cc1f0d37ce514fec8d50067d3ceed3eb91684d28a12aa49bec874fbea54f4aa5454edfec22bc1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55172379a94ac408bda027a76bf487f03
SHA1ff0f0aa9babb86a9a54d3cfe2ee5d04c308470ec
SHA256108ac16878d7a7a8b3f7ea45ac646e6b9d72dade8ba00faced84d2ec0d8860b1
SHA5122f4618e005877c92b85676e75a178f9e858862a07c3ae66aa042d5173ca80ae778a0e88de597e71e8654c420ea940adde03a57353b03cee325886c2ccdf9cb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fcb36947032c55919b4f5bb37e6b22
SHA12ef02a36e45c6b895ab919c053199fdc0cacd9e5
SHA256260783e8274f7c8797881ca7ab216d9ed8f8c3f44176403d897210a476c55547
SHA512498a84c0191a9b55ee37e62be04821c083a027f3fb2930ba248f908860688e707da5855c028981e6df9fb429b973be4ae15759c77f32637afcf9bd928d935126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536325aacd7f1772737b4323417577f9a
SHA13675fcabff4bec7cbb7adfbab28bce800527d8bf
SHA25633c864262fa338472b5070ca75fdc04677f6fc6b917e8f23ed33339633859c9e
SHA51205f0a11f4a71f9fe07113515a245d1ea7759d1eb44cada1e9381ea78d995db17c134c581c485eafdce2498de7bf41076e919162a12d1a7e0d8f994f29fdbcd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292b8c3a0277b5e120fcf2de55612e87
SHA1b97508c49c6388ba71b12e994755a0e22b9e2efb
SHA256e32b99ed72f7f612a194a5323d30b32f7c72f172923bc2cbf51eab9ec376fd4a
SHA5129bb711b999d2ec82f817d8891910cdca228fa9d196390921c4b24415e881cf837c4dd9bcdc96a19cd0d314ec2ea62f5e9f55b3216941004cede5feebe37b0ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779d62fdd43a337946d003fe86bbd3cb
SHA1c0e18e423578f436068ba46ee42fc31daf0e7f96
SHA256b69d47401ebf79b8058794834c542ae50516b6d7f57a2cd890c471e879c8022e
SHA5120b8045b41ce6f1a2c06077d756b66e66f1bcf2c4592eaf5a5db074fda592e6551f4ea1cffd65801e6a6e5ef12de2799624ce99c65d19a9b780ee3f71f1bcbf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfcf1af17c8df3f26607aed9c12e89e
SHA191326a11deece43f2dadabfcac1231c951c21360
SHA2568651c609ea504005e8ef6dd3a9b61415dbfd7f00fe88ec9cc4db3d95cf56f484
SHA512f2f9f20307474eaa5617b680d067a5cc86a366a74e816420a0bbdd0afaadf63bd039a0685734b331ec8633818fb1a4e77dd8f2dea625b9da6a2cf90c034a68ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59098527b79f370b872c2916932a19ea0
SHA111de6593dae602aa6656b1281953a159917dec43
SHA256720679630494f1921143a2bdd2cded5834526dae9a5a2992212d56588596fad9
SHA5122b150acbced78b094a8bcce5d52e0b88f4c42e9de59df794146006841974cb3bf60ed2441664c9daf9094f3b6e4a7bbb49d80a36655873e1c1f3c0dff23bdbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56536947eae35f9e8857ce683529bdc1d
SHA18871b4ec3e5a606f5bc5599a5f191decea437413
SHA256c8f4839691db74de784ad4c4b529bfc29f27fba415539dae292921b0363d87cd
SHA51224ff92f40594f82393e65b28799834d7badc18e736f651d9d888d7599c92929e3adc98ff81fd7ac60855f26e5da710cdb82f8cac9e8841a3484dd416c1de1879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565462285c927c059f1ec03a4998018ef
SHA12e44e46ec99f1c696d507b3c8852349b8f094bb9
SHA25699a71ff9c05dea2e6a088040127feae2d958430a36099c6c399274d415c0b5dc
SHA512922ba6f3e306d18b6f08a88b62e4bc9e32a5af710eafd898e70ced147d28adf91c1360a202daa3b0c024edd8fa1a6edcbae28a5388601a5803e3e76c538d1f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474b55b85055341832c679952034adcf
SHA1a83c6a94db32c03312b59d53a1c7719c1acf19ab
SHA256e6d42be7f4598d15a761e13e4bbf7d197fd0c0fbd16fe271fb9f643b89e0ecbd
SHA512d166208017f8eff01da97d20eec1939616cc34981531b8ae9b83ca27c62bb3daa9709f946da74d313e9635d22e2ee181d58f45e9f12a124a28bab88e8533569b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66d6646cc6814f4bd695087021f81b6
SHA1b9c5a158110452b1d3722efe81b0f5a409a48cad
SHA2562afe4f114e65224c31f78700650f720843d76a59bfe74adb22f4e6882b929a71
SHA5128c074c1f3cab6c6c4a074ca1a1a9d06783553ad23765fdfc537c924262dd8ab13477e2d149f8a2bf5be273a27bbd2430cae5d34fcc6d214df9f65d231688a365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9692e30ce4da3b79e2f9f9d0992f7e
SHA1b835a1a11a4384132b16ffa5ddf99d90a012ba03
SHA25678edd0bdc59901462ecb985664aaa20dfc1459bf7657f6487c81f135f903eb52
SHA512feca5fa2a609a5122789782d2b14fea813f7a02eab900f64cb9c1805023ebd147403f7a7d78eb1606b894ff4ec4163dc0532e021e86bc9f4f35336c1926ff15d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b