Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
60a57122f25597201c6c1924d96f1220_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60a57122f25597201c6c1924d96f1220_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60a57122f25597201c6c1924d96f1220_JaffaCakes118.html
-
Size
2KB
-
MD5
60a57122f25597201c6c1924d96f1220
-
SHA1
0082c3e2a1eb5a0fa21ea3eedcbeb5268f700856
-
SHA256
744952b7320975aaf48089de7868169723e413fb928e4ef2200a89840c4c06db
-
SHA512
8337f91bc128ea0091bafc7940bd4b22edd43806e0a7144e092924e4f121701427eaecc7b23ebd28482986da078c018a9238b5a7ad0c5603abc76d6bc1388989
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c68cdae6aada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422392980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0621F8D1-16DA-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007115bd9bb81f8d940c5f434cabcd118e91886448eb238fc9f77374993c5210cd000000000e8000000002000020000000447cdf255ebc858b62804f223fb67cfa7c5d9c71bb27e85530f2a4a0aa027628200000009e67f82be1dd9f9235337ac545a268eac02933771ef3004991b59ca4a2593193400000000d57652c9581dfbbe6ca9999315061169bde575690ca5fac5f5349f7cdfbc60b612e8396f59953150b92c47f804f1d228ef1aae37325395f18e414ce6710a474 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28 PID 1684 wrote to memory of 2180 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60a57122f25597201c6c1924d96f1220_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59423f15f6c7dbf1a038dcd62d62d698f
SHA1ded15ca29106bab570c7e7b648c6b17b8971ee44
SHA25686a7e4e86478cc0453591a0ad07b2efdcdb57ac6630e566155a4909554a57321
SHA512d8f10d4f10ed6e7b3b4cdc7a9a2ddedd06e06ef183b4ebfe08a36e5212641ccfe15c012395a75b5420cc566755c58f8e439b7317e2d9fe502c8ebefcfbe10567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0104d11f0e128f002558ee731c9328c
SHA19f401372de8a388a26f3a0d6b096929b5e780ff4
SHA256c56e85095c17a71f2117b52f18eead12a8d0a23a43050af8c389d1fd7b4305da
SHA51269afd614f6c5d2dc9605b07509cfef422f1bc60b1e1a5faa611d38624ccb60f0360cba7354651bab62120b417b36da55dff1cfbba3022b92c3aeb863bfa6a6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fab0fb84f37d49ad8715c72dd76c8e1
SHA191b4b541d182552028fc40ab4677b98b6591beee
SHA256a8fc02426fd0c60e0f3dfe7f0c2410d032deeed08f61283ae7ed12e0e65639db
SHA512bc08a116a7aae5f888218246e8cb98f8a4aa2859ad89ba4733ae30e5ad0a4a49dc48216582af7f40faf5668aec5b92c99b640c6474214432e02ab0578199d381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e961932986df1a11a6a074241d2743b1
SHA105dfdd8b9ef25810add95106bc49fee5923ef65a
SHA2564f70bce345fdfbf48810eba10657e6a8da85364346e8b5bbcaba8ec0d1c6a412
SHA5120608cf6fda1117504b1844ccb3697a5d851e505dc835be6a2fbec65b34ce4688e809a94fd166518cfb481545c6b1aa1f6b5944ee63fcb756fc23a1852b1496e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ead902ecd9452006e590e38800b50dc2
SHA1bdff9d9247d013ecb31dfc6b8d112b4db723a5ba
SHA256cd22c565d8db2ef75455bfa59c572186b99f774423ff3b18878e3659687f3a4a
SHA5125cb1284605e7aa9095d99491242c7550c80d8003687ed8850f5e410862112050d70f84d2d81b6cf6a334f73fb73336c3c818eb3fd3795b5933cc9946d56a991f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9ff3566946d2ab0937016571225fd4a
SHA10b60049c79eb1112eb744d56aea6e37c5faa0d22
SHA2565e573cb621f91f9ddcc88993154054b425f3104a88db6584c8ffa24b0cc9145d
SHA51208b0af4730ccef379c7aa8183393bef461d2d152c95123770e083325cc06c25f879065858ee2a9f9d31f5f461c72dda665ac60984b283e7c2ebdcf668ac5607d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5998e9e35a3140a0ebdec762ec9e7ddae
SHA131354c7e79c8d451d831dd6b437c0333d160e8c7
SHA25648334ebb8f40d721e77e8458fe0bef609db61b30fc0bef4a3ccfe25184c8f15c
SHA512e51f151e435b1ed7bfd208877baee99bceaa57e767ccb5b87b6f2c7b3c772a1bbf00da267b6c7c7ffcbb44e7350a6915d6964d9ea26c592cb7a30101697c6d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cab9f2ce948decce80564831c28d266
SHA13b7e21259e21a1704ef75142fd47222d841647c9
SHA256079892094377907a07db5d24d20aae44402579ba50b06bd284ccc29768447b84
SHA512eb3cb0bc54eed08b3d2176167ccea8b8d061f5b731234e69f503bec55914f82df32f6a1d3b6837fae9288c933d9de7f57759b8256e132faaee9f3157fd34b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b547bd6129ddfad80815a8989821093e
SHA168a9e2832c60d2fa97418d96f2bb51f16318ffe2
SHA25607d933a8c9dca812c61d2106d65b36263d2cb2c24c79138785b9b2395449358d
SHA512dbf4bd57b5fb7a77b7028f6bf1bc4f20e7ca14f1ee51b54dd4f588e45f8adba8661090c1bdf2a0cbe3a963729508b400d5f02cb707a2078f614ba2d45ce24e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573b668047eea93ee680d8cced213c875
SHA120eaa834a497c4a2459f9c25288fc48a5b5e8a0a
SHA25688d620232648e951c951a9ee8b2b27e0f4d2953fdea41807a846c75cd897592c
SHA512c19951c622b967cbef8e0631dd1b6c7150d03ed057b85f712f4f24a33e42798b27bad265a72e8ba7b10b9f385d5291aba20b09c36a6b38f6ab0844a4703fcf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3ac099013b5ae550461a8a7716e842
SHA13cb444bf8fe7239d28bae020da389c19a6773a9f
SHA25695bdf97ab86306781851835f0742a26d211e16686ee9f48a14d38cc984c8e020
SHA512bcfebffdc0ea837b5a7f1e085d97f7f97aa3554c8f8acb1e2ab85bc2bf5a1543756afb7526ba91886a8856ea2ed08e3d2d42f742d2b7fec7a7c7e3d831e4f78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2c59a1b2a8ba75ea132a5b5d626f1d
SHA1dc2bea1539f75a85aab3ddad92719148d04f6e24
SHA256920b308317421ddf6a6a0af057f3df82c1343c26e9d24d648cd4d4f3bee60cd4
SHA512d796bbc25a4df2e2a55417c1084d38f6183871180fcb3b8d8dad8c658d5f4ca4bed49ab7cc6768008b021eeb413585593a853fc4fb73c1dd6c0f7b5a95846be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd4d1fd7a7e802529c697aefd95b8582
SHA1838ea958b45f8ba9cd0e93166be3307374f23c27
SHA25645fe25d9133e081b9c5bf7e1351f79a9fdc4f6201ef39bca079ea6494f09f0a5
SHA51263cf074e41b9c648cea87eea18d020de3e65f4e902c1c7256714ef69db052c27e9eb0f2063c33ca9d61e4ce8964a2b1bbcbe2d26bb04988ca773a8335a8478e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a8ad62ea01a6dd1d5cd85d47850390a
SHA10f2f86297782a879e4f3d7ca5253c4d8b15e54f7
SHA2560d3c661d1e49931dfb2b3df495dae2db4d8d3e7465c867e5567f3b518b07424a
SHA51277374fcc0264198289036c3751ca67518f46091a74644c57ebdcacfb88ed15eccd3e032d14288df63514cabe57fa322e885efa02f1bb20a63c01e0308f394b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a891326d7bad623e8b98fd4ea500db0e
SHA1818a43b5b6cee63e06a1c5238b203f9071b6a5e8
SHA2569c98c424e417d88f11054a258cd7aa6aa742fcb1e3d5cce1ebe8fae4cd2b741b
SHA5129affa55966fd92cc87e4eebea5ed8c0e19cddaa51c305a38a4d945f6aec1e345e77a6b0b654617aba53d648415833cfb1525b759f6973554a0f6995592a85f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f5fc893cd75c130c3a51a1405c0045
SHA1d3f6854760f784610fc1f42561c1bffc29c81eb1
SHA2564bf5c7a5714c6907e1a65d9251053c955bb4e877f5fcccb26c9e92ec02261194
SHA512746350a7645fbee0383ccbacd07974518542d429ab32acbc44aedd0fc9653988611f489b1cf574d7750eb79427beeeefb238378590d5363241ba87e0dd57ba32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525fcbbdfb83c0576a76a61fd1a36e7bb
SHA1daebbe8f8ed0cedfabfa409d918fe84e5e334533
SHA256cf8837ca0f9402bb0d551c1d9082cab7d3e09a4dbaab7460add43a4279927f81
SHA5124c5fbe7b16d26efeb977d7bdfdff8d94d86908725caf95a6b144f88ab808f2710729ca759f1a7f90271d0580586157de36cf5cfc0fa1719a134decb95866198a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20a313415e9b331e312a60ba909785f
SHA1cd03f4d82cdc406e12282d10cac8c1f26f51fcb7
SHA2566bc36d24ba5d1d056193625a8cc502d5db7a2b2889ac778f8fba4a3e528935cc
SHA5120e17441f63f23eab5a53f1417e1e0a5aa3c06a00e2e1a8ba25906e0dc168bf2dc135c80e868ea68dbb4dabd8ee6dbc4d9ac777bdbb4f80d03897705917d57375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b0f53a8bc2a220195bb35298ebc0f4
SHA1f1ac49877e6c26d9513fd9baabbcced91e672626
SHA256b18e2684d73fe19774fd7c20b2d8452f7234a03d67b1d4670aec1e3561ab7d63
SHA5127ce6d8993fa13564511769a2e3ad391092132ed7a5bbf7009de20d22e4f344d0e921823a71feda04a19aff3973add00aab25823901b87f79ab3ae8fffb945472
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a