Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
614097126f904fa6182cafbac21916df_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
614097126f904fa6182cafbac21916df_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
614097126f904fa6182cafbac21916df_JaffaCakes118.html
-
Size
460KB
-
MD5
614097126f904fa6182cafbac21916df
-
SHA1
59ad4f78c989c510ded354bc550ce43e9f40454c
-
SHA256
2b3c3dc3d5b4377e7384786b3204ed9f8681cd5e7a09a899cc008b6b01927e43
-
SHA512
2ba4dabffd10aeb298847b4dc7e481f0e63884f2d945f80dbda318c433b9bc582a0ec45ecbac8d3747d3cf521b2a64f09f756e24c6c240544f2ff03ed06dd1d7
-
SSDEEP
6144:S5sMYod+X3oI+YxsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3n5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{734B1761-16FE-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422408626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a5e14b0babda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000997678193b506d438774fa0e83010cc80000000002000000000010660000000100002000000057cc9651341248a7a7bb53b90bacdf4519915331a6b9676f8f37792bbdbb5de1000000000e8000000002000020000000106f1ef2f42d5587e329431c6ff8c70d51e53e038164de0297579bf6eac191c020000000a2fa4843a754242f9c5684af7659968b8c138a349590393133be190a15e2bed2400000005da397387ca79a50ba397b110721aae6290282e403306bbceb71d0f8c0fa904f10768092d7a948eb268166b57153eafd2a4a95b6acfb3ea103299fa626108a10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2156 1640 iexplore.exe 28 PID 1640 wrote to memory of 2156 1640 iexplore.exe 28 PID 1640 wrote to memory of 2156 1640 iexplore.exe 28 PID 1640 wrote to memory of 2156 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\614097126f904fa6182cafbac21916df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40fad5bbd00782bffdf9a0ba7cbc837
SHA10b2819701aea54adcc0581cde1c05e0e2b088267
SHA2565492ac31cc0a49547221d6cb6e7397c921065fdeccbade956aeed1b50ca0f88b
SHA512d3c39932436b399f8a718d3ddf3f9018bbce355906cdb326505aba58bf8b0bd9e2fab77b5c4c548f0315fbcf3a4731dd34adc3cbb1dfc46268d0d9f2f2253e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b879a1fe38698818629202522a87291
SHA19f2d03bcd46e94a8e25a8bc638fbdc1e90ce0156
SHA2561546805668baedeccfd5ca723f2bb17f28dbb563967e61926eb477baeb7f6c60
SHA51281c298649645e18d6537623ac0f0dffa1c201bf7c447e3f3ef0257220a880dd6b81b49a38e5b55afc670fd4868e9f6f0e09e6ed057b3665ff4b75192f8f9be94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d1842951c14f31acaf209c94cdd7e2c
SHA10b00420eabc2a68a8fe3648309eee33d7e61a0c0
SHA2563b1d7baf4bf769ba21a8f0e6e40ae02adc0f0559052b9bcebb1efccda101ef46
SHA512c6b84a2819f8febee207ecc38ba8088fac97cfd0c5c3288f38bded8d8366caf77e10339f0d0bc9a327bac81063801ff6fecc00d07c120ded3f11a64f784d5846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb4594bd82a2998b3a7f94918b9ff599
SHA146662cd907d66321323fd52e350cae4f3f10297f
SHA256bcbd5efb724ab941bc540d6bda9766c51e6ece72b1874d8174a655caa38882d4
SHA5127dc52ad2178a81d40b9705e363f420bff5bc88ec8cc8c6bebaa4648de982f05aa8fc59550298ec2d1f3976ee0263ba82b33f946862fb2e683cded23b2fa8b716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5145237758e45f163989c952e75c88d66
SHA17efeca99414c649fcdd567fd1d15221575c1a389
SHA2567dbc5e334127c0b6e408b11565f15fa48282bb5b56a7d5f4d975791bdc78606a
SHA512743fe2859b3a1394b04e8a7b832523e5c7a261e3505ba597f4f6e93ae3e829afc41e0a32bd4d612e1c3ca8503147fe9bf8b4b4135517cbeb95c7211ad8d21db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509540f1e95cbd81f413d6976009d194b
SHA1049e792128484c6f17baa04824f03251fbc38841
SHA2564900a9cfcaa0dfeb229923fdee1e8b6eaa24d8606039b78d3b6fcd4cc7959d2d
SHA5125c007f20f996a4617c351d3ce6e7afea1f64374d59c4915b87fd097ef56f4611f614cfe6be04b04ed65cfc8c301669078df34299f8cf498218761e75344e1ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca57b34dd9f88b3d6712b9718ab4aaa
SHA1f469981a98da2f97d646767fa95edd86d0c7458c
SHA256929a9724ebbdff79ac7f873b45fac8acff26467be06ffe127b2023cb8d1820b7
SHA512f430f95b7e1159e2d8c3136b682c51db220e77b973921c6ae418768e9c4d5974f16281259afe391c1aaffabf3e1c3da22734b79f8337c4bab7608279ff68649c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4527709b52a957e462c7f1640d0c1e
SHA14b6146c460de97ef02e1ba97ef9db4ed4242295b
SHA2569a3b30cc1a8fe0df22d3db8634c0f586f1e71b5938f7ec4592ae3e129fca9070
SHA512a59b27b9a39879d4503838a660fc049e181b80feec6464f54fa01505c2ae1baa6a0f0d10a569ae65d4e55672e19f6edd5dae89da91561ec7fc78eafd079bb920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447dbbbe5924f5bb7891c2e279eb4d62
SHA10662ff686a0cda486b716041d614fdfbc5b97976
SHA256585275750ba147e56519391fa5ff74f7950dffb48058677a4389a84c7e8ad462
SHA512b53742af46dcc4d71bd4cb24d7d1fcd724dc1959eefa26c5b1d264152ce5675afe205cc3d835597001438f60326a45952b385f6751d937891037d9c8d914034a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a2b92147c52bfb4d8d6c38ff6135a2
SHA1915dbd58e93c9dd3ca46f04d31d28095ea3ce86f
SHA256f476ecffd216efe218598b52e63eb3b43ba574f595dcb7eb5681b033615b0a80
SHA51244191056e2f4f00d887f6d3db6e23aa3f0130b047836d94969a04b43d14c35e5c68381a3d5853ba15c7bb586ecff343e2804916d21ac7b54f34eabdf6c604e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553fcb2b6d10120db6ca456ba925a55ac
SHA192f65977162e3c54330535b05a3f04e4685d9677
SHA256300dadc669b3330e5337d0e7d859247323b95a1feb7442cd6cf416c2602a5903
SHA512b639f3224174b0afe35c150a77c9a279cdeddedc3f1b333cb8d14bfc2af26caba63ee3d776bdd86d6d9bbc1a2c81e6f42b7463b2b2de8decf5843fce8bde4dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23a211e4e68a5e653fd407662590328
SHA10ea3a0a77c822bf913a8117bb2f06f00df61bc8d
SHA256d895ba5318c536128a830e3fac69a620c6822e0c51329cc7d6c414d4be3aa68e
SHA51255a4d405e54d7e90a49d6d56efe855ee765ef504e8a684bce0dbfd428aa91c8f531eaeaa5f5aa5406aae39e7020745317b0d2c07855b1600aef4b60ce9ee6ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc03152e34f2101b115a8fe3de0860f6
SHA1444ab50d03f4a8c5039a4c33cf476d0a58eefe72
SHA2569b7489d45486a23f3a13507db7240e34f75fdc5fc71caceb5792ec9c8121bc9a
SHA5124224bd73c3c9fdd6bfc1f8a59bf556947ae3f6d054e4a5f724b4b8e1018a6ab03320c854586954007f1b80582f5d957e19c9a6f9a0df1cad983db936bc06857d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb16dec011af8c2980e25819ce792a97
SHA14146769a58129188ed0462290ccc94e927ccc9ea
SHA2565b8a897116ce065206d1a67b0087e76e3f593816b965925deb958dc54f330de8
SHA51262394c0731a7fb8369a060a6308045e2f37f1c0c94663e6addb212e5f6011d924db937bd8e4a3f793170d699d783c083c7887ef83a2cb34f4930cac46e648b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548cd59681712b0987d8d2379618b95bb
SHA1e8b0f5960c2f329ec65f912a5e9f02e302f3400f
SHA256d149b8401cda81bb335af37964c4a32f486818e05dd74679612e7b179493d06f
SHA51293daccbfe7618b4d4709376e69e0682b36dd213c8a016ad52965a3cf7b827443cffda64ffead80f31af005ebd41115efa7d19ca9b2733fc8110340af028bdfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a6486e84d78af2dc4241a1afbc580a
SHA1908de2e1efa2c3dea7de4e1516708ee5e93db5d6
SHA256e18b4784ad8d428388f0f7b42ad1a171afdf7400ef5a814058987fffceaf4c38
SHA51254be7afaf002311fccbc70a616cbc206a467c6fbb463a1815f5341d53f3fc99271504cbb3527aa17fb61da4f5d20536377ed472f3349de36cf8d746b8dd223a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5908f219500c737f34ae98d481e2ed722
SHA1f271d10f36a84cf40f0511d7cce7bc35a65717a3
SHA2569384d9a66dab1222057f93f6ca9ffc03972975e1482532656bd911f1318cb837
SHA51208d0328ffafbf47d662b53ef4c75517503def9d7baa25b7e3646cc18af91bc423f0475cbd66f441e4d597a9b2fc0c287df27952ec06f2b7f0b959eef34d053cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a