Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
6049846be1a31948262b6e0ce482dbcc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6049846be1a31948262b6e0ce482dbcc_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
6049846be1a31948262b6e0ce482dbcc_JaffaCakes118.html
-
Size
11KB
-
MD5
6049846be1a31948262b6e0ce482dbcc
-
SHA1
83398e76a2e618c82e4305c1714afc530a1ba663
-
SHA256
470cee90946c781ed82d96c577a32a5b1cbda1a161ea6659e90850c78d34b520
-
SHA512
205e141c6a0e5ffee772b674e76b64a2bffcddb1392f22deb95bc7240881b6a11fe438c4a7a5f8b125e314f10bebe4d802d7dd988e08246382794d2cc16af557
-
SSDEEP
192:2ValIsr0r57M4oxaNT8II/w1whqJkR1y5uBuLbdU8d:salIcIQ4oxa1I/gGy5guLZ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000805c073d048f0583bd9b99cfdce0ef84d3c5bb9e6c11b48fffa1a6e3ca5729ac000000000e8000000002000020000000268264e5b4c832ea8b5e63f1b4aed21370fbaf8597baa44094bb472c37c94dc190000000175ea0f1ff20d711310d4bfd4f8e29e4e5c539e96cc0488d64942c10542c8506b8bd9f6fe89589824ad064bce3987dfd4ba1fc727c8a2bb501a738dab018ec1c09010703c432105aa9d02c024b6db0e0df2f99d237e6c24d978f431076986f0fb22d38ca91927df6dd4111e18d624b17148508aad296cb2865a98405771ff8dc44af854da96f11b298881301fd6ed155400000008a912855137a12b016d84b5987e242467a4321fd8287a23edaf5d07a5edbb827e37a312acff1a07068c3c5a9f1a9fc2965b624e30b5cc312a844414e84ed7401 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB6C72A1-46E9-11EF-AD79-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427677464" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0374feef6dada01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ad96b5d1b72ee88ddb19a7f6d100ce6f4bd63d3cc8ad897a366700bb0884456a000000000e8000000002000020000000638b392157853f7c0053fac464436aef8e54e2451b1eb612b284d6d72c5b744320000000e7f7cef5dcb756179b71f42ead06c2e099ba334df83d275b69796bfe57a6b80b400000004dafdc58ee08dce65d4db0d75e4cb48b96196fd5ba6139464e8bbae9d9d2256434f6b475017794ab79fda7186c6a579a083ed307126b1ab96e6653be55502568 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2464 2872 iexplore.exe 31 PID 2872 wrote to memory of 2464 2872 iexplore.exe 31 PID 2872 wrote to memory of 2464 2872 iexplore.exe 31 PID 2872 wrote to memory of 2464 2872 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6049846be1a31948262b6e0ce482dbcc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508013fa31dbfba697a8b3a9df74b3a46
SHA1c1fe76f7c80dd9cdafb868377f14cb2f040e90d1
SHA2564f41845b2739b2d785b04303c8d3c23816d1bae79785a9a60aea7b867a9243a2
SHA512c93b7ade43e065a8ed11363b99e573cf0c182e48d5cfdbc8197345049ef2d8cc0e6b5378cd7725767c780b184868916aae7dcc2bfaec76a7c66e153667daf875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c8a1fa9d24a8e1abecefb9d1918595f
SHA1f382894f89465956407f809423432e15f9a1403d
SHA256adf610d90c9a523cfb0c200372d05487069c4491bb01bd098e5476bf4d9e4095
SHA512f13901c9c67dcc148fd8ce9a622d59cc377da085fd793ef10e835e27ac4b93285c1d32350cfb101872733a439243004beac36f36364d2b3df7b24c1571033510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1030a7cf15f3ddf2cc0274d22629d31
SHA150e7f9486959a3e344fc647f031c242ad3df83f8
SHA2566b423c74b8848be8318bb1402e297a4ddfcb2baee49d14772fccc7201abb876c
SHA512d720152b406104e6695f2f73ceb0b3ff5bb0b4d1c885fff415122314eb8b8a66952ebb5ee1f7cc72065676846f81a0b768395004f158386697d347fccfd7a7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bf5ef4f61d32ded33c63a979ed71e65
SHA1a42d2c19b334e91123a407a5a124ffa715e0a475
SHA256e46146612088f9c3bf9f4cbcf55c5e0e2ffc65572c393659bbf935ec9e024056
SHA51200e09f80334ace3d96e0a1d60bea8a614d71dd221f3e8baaa2b1e0a9f2e0fdc7c0f9b267aa0f974ca6c1121df89ede54b6f7b7512e21eafa7d748abb203e3580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503f50daf14ccb4cc363b21222248eb78
SHA1825a9f0fc6ac34a9155e139fb55feb9ffbb091d9
SHA256c733b57a48ffed2d476b0c179fadfb24bbcdbed43cb20badeeeadff1cf481e69
SHA512ddf43ba78fb60113c8a4bc584e9a38316741e2782897f33b416f2cb12127df9aa1342e3c91a4606638f9d9a8f619a2e226831c332ee1952ac32d06c9024f9b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a0302e7e75d2cf635cc58672763b908
SHA1b103653cd56de71caa2b94be6dc9e90919495fa0
SHA256072a241a3d7347e72a4c49ffaff5a0482795126ff680eafe750c287b96b7f322
SHA5121783ca396eaf89eeaa54dc03d4451eb161a02dc3345fc3b00a0450f0721b6482cd4779dcee6270dc9932efa8b62fe25fb5340c2947397e539442a1ecddce08c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5753dd128e8c0018425a8908af8873da6
SHA194c481978adf1fd5534b11551e5541a545111c77
SHA2561a1b61613202b7e3d6de47699210b1a4225ecf759fc19127ff333abc081aebec
SHA5126ccb41a3c27d8460dddd1c8543cfbb71f8f28ab7a2853d5a6c01188508b05d89712e688b740f4e3a20b1daf30566e6179b10ff64489a1c55f080a6e9e3547434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce97f2451fd1beee5c04deb704d112e8
SHA1bdfadd3e10aac3eae7eda6adb7590c947938fbc1
SHA256e166687f48bf412c76c76772de7b318d9e41fc2eb7f3e51be37e20708009bfe4
SHA5126fae8ed82731d4405d6669191f3a5eaf944b4887d5108d7be78ac8b94954d93d2dea189214721ffe16b0ea50a7e42d054af419be94d2d920b1583a9c32b8759c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c33e3e8151d678f17cec35ce6898c985
SHA1e1849fca235486578c32bba3cbf945142f3beb36
SHA256cd605f942bf3fb709779fd2ab50aa9d0f59c5cbdb9f406bf190073407fb225ff
SHA512a5d3ef10392815b12c7de32b2fef0c78d7654e043601bee654278047d6c354d3e3a7d66e2a42e8f7e40d864b7c4cc66f9f6377cd3ce6b9e5ddcf610c33259922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d485902e3a230aa80960126ac061aba7
SHA184ba2798c968bf573b98b5a0e992cf6a4b10bcd0
SHA256e01e6d78b5603a3636bab02cf5acf7739c067e082123d6caaf546583f13291e8
SHA512a373a6597f13ffad2e41cd1f33bff7d31b58cfedf030d3100833eebdb50563d9a5c1b71aff8dde27c1fd6541ec6889ffc8f6724ba146e95a885e7da369b130f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad4400c09f7986abfaa76b29ac1d595a
SHA178b2720a9e679f45c6a20ae785461120bda4fa3f
SHA2565743d3b9113af3e8f19882c431dc70334316fc21c27ab1a68ca06347c3ecf6d8
SHA512455f16ac0d27ec57b00134ab2dfefe8ccf93961f280a89edd9e0abf30db1710601f2aff59375e4892be4af7995b1716a032561a1c3b3070271de30f4155f9d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e9efa7c4eb6f22efdf2d70f48300cf2
SHA16f5293b9481a173b7dd8496408c1c30b81b56e56
SHA2565b27a862b9ac4be92cacc270f0de3ee853ae75c3dd8c2f04e1669d583c40a19b
SHA5126f3923589deb7df97dc1d38e9323430c06b08d44f1a3229f22cf69ae3174bb62ca6f8802b795bb44d478e5ad59ef9c99feddd0838146e0064420bdb9e6b237d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ec91f779937f5904b3f4a103214046b
SHA19d40d272a3e2f6838cad6d462d879877c0689a95
SHA256ab39999b8e544912af53198d20b75590a8a09bf6a7e1fdcf3926725f38c66808
SHA512632435f252fadaae6be5edf730d0193af6798daab447071b1ad8cc576d76587f13367aa1e3a88a3acc3d482cc660e1c1d2d829fbc481be99cd6a9c37b7ff925f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f83205f3ee4eab0743d02b08f1364ad6
SHA16446653fc86546de571e457cbe3a558fbf14b95b
SHA256e6eab4c4720937f306d932e6ee38f75096df102f5a96c1bcc65814c1bdbcd62a
SHA5120aa5bf81bf3335c60bc5f5199a2d3ed30d049acef5be90ae3ebc7b49b5146ccbf1d91e13a77484d8a3407002868f3256b37bbbef2a38c71f86ab9d77f99e57c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9d64e6ed2944f2c786c6d043223e5d0
SHA1f1b5bfbc9d3e9417ea905711869b59ec8af2cf39
SHA256cc82059b3e57641817f23a012995b9c780260651a9354697b3895e2d0d555734
SHA512796ffa4d2f16be060ca78ae8f9d93804adf006967554132e7f2dfcb07e0af9f6049383194b694e11f8d1e2013dbe1741cff3e9fd96385005104638f6a3b9815e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551a038317513aab94621a88a63329bf3
SHA133bfae79f382e25e7e27d56a2ae9cee0836af500
SHA256521aef0225496fb420cb8cc9ba11c8a93c51fa5f98305d4f56dadda3585e396a
SHA512f3c042a257c398b66f44d34c7df048cfc26182cea70c5420954cc5f388f4ffd190655331f72641d98b6c23265ece3062cea78fca41a12decf80d3cc00d64c482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5416bc9523de5e2e05ceaeb8bc38ae0c3
SHA1c33f6bdac0227101f724a913b29ad9faba02b622
SHA25685aa9a0fe6673aed391b66dc39ce532951553c397ced0259b129c95b00e2c7ed
SHA51250b7d8f30fbe849517d4af872ffd428373a0f6cc0a072286bf08b391fdcfa0d10c7c50e284f7ec595caaca1dfbbd9a336b8fe124afabdcda871af03c4a5674c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b90982566a4cedcf885021f6d0dcf5b
SHA15bed9b6af23c214f1a64bc88213a72fb95b1b7b3
SHA25615933961012dd6ea15029e52acfc08b7d4bc5b4af8e36ed809468ad54b88e94c
SHA512de8c73382c81774eb3180c194547a2c9d11511d38784ca86981273845a6cec768b9f6ad196c8aaf458524668b83f4bbc0ec8d23458a63cc340ac8d7e45cc4e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ba10339e5dd53693dfdc051ff313326
SHA1c105bf58b1cabfa3d6f406209753c8846972a091
SHA256fd3e1231fac935597472af9707022e864a20f90ec45b51dc9873dd55c6fbd6c3
SHA512feb7249248e05ffa4b40f6778f7e61c0d71df29e686f4d63b4f16cb39a882f9d63a820dd4c13f3c83123ea7ae21a20a5673571e547189e13ad8b998bb96bce4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b