Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
6ed663f0fe7e18a72e09d0d919e904b3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6ed663f0fe7e18a72e09d0d919e904b3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6ed663f0fe7e18a72e09d0d919e904b3_JaffaCakes118.html
-
Size
461KB
-
MD5
6ed663f0fe7e18a72e09d0d919e904b3
-
SHA1
da0e5a8f7dc6433f88afe893ecde6bbe6be72ffa
-
SHA256
34d125c93d7ffa0c15f708ca0a4a91c52f6475dad825ffa805a974cca005708f
-
SHA512
7f39dd465f2ee2e3eb8d261fc3eec86def6615ae010d0a3e12b8b7d37f9bcec14cd2354632463ff654f519869cd6c3f4a742ac8a076c4ae662f525817692caea
-
SSDEEP
6144:SfsMYod+X3oI+YosMYod+X3oI+YtEsMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3E5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10165af0e6adda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17BA0A81-19DA-11EF-A759-F637117826CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c57a8d7f5b17d42a347152dce317d6e6bd295aa91a3a00852b2a3422dd5016fa000000000e800000000200002000000047316fc7b3d857a9907d656e5a13f855b9d09b4710709cd2cac7aca45d231f4b20000000d8263b40498953f840298a4f3fad74940e625df0e869850891ce1c3c105d0af040000000b39ede6e4208a3c57e1de6770a605ba5b740b53817136d2fb52abe45297108e9b51cd07007b303db1a4d270eaaa27c491f8df130fe6057cd5892b2fdd77f66d3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422722867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ed663f0fe7e18a72e09d0d919e904b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59156391744ed6566e84a65a91f6f5c73
SHA1144f07463e417b999bba3757640a30ff9a040226
SHA25675d71d3e667fcdd5c937dc93f3702f13e49d1ef79eae8e2637c2ddfe8936c0e1
SHA5121be018ad6a0ce8880dfd1d4fb4186ba27263d3d9c5fa18f511a9e5129ecc7de9b88d64f03e780cd669c9c130c7d57df518dd2f306d64ea070937ac08e6e4191c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746cface4e4531a150fdb98f269b9fb3
SHA149ae74d10d2b14ad7daceb7a153842a1ee102952
SHA256c9634f8ead116d3e7f73c643626be5cf4067a7083b53efb6915022320f9234c9
SHA512cbd9a5424a8d5806658fd24bc430804a1c7b85dfe48c5fc5838953007f170c76b8b6ea72ce91e9eddf25abdd8de7839c2fbbaa427b1f0565ec31d8ab4ba4a3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50958a6c53c33aa59b97322f0804f2d0a
SHA1394cd6d0f3f2a9700f11f1c7a46df23ed2c71cc5
SHA2568d29201f0084e80aea81607cccb033d3d763ada13f9b122bb3886d75ed8e237b
SHA5121f5a56099a35a669cfb26e7ebce86a63e3da8ea5e2a505376d4d12e6beace89c5bd90277c800dd3609d127c1838f3f8b40b3dec5c2ea1727fc4223c17ed8e418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd3f30c758161a77efa80c1e34354b0e
SHA11ce31bfa037fde0818e3029a75ccc5024cd4dd3c
SHA2560f57f4c487fa3a2e38af6500a111b2afbc1b2f219fba3bfeee7dedde3f6cc91b
SHA512a933a5a596f38b670453385dcddb8039d5d364fff4a300e64a8721c3c998bcc64a78b100a75a628906b8c8a23210a5cebf70f57da27e413a357c08871a19fc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c4a8113505d4aba18f281cbf37b39f
SHA184168325e935f57dc75582ada7e8622ff3670936
SHA25635f2ce8498fa2afc9dea283f65ac7cf98636b10661e12c58b1e5e19839a6ee2b
SHA512cdaa8d6156761ca8a3a19a8b93da24f56cea1c3f3a2590595bbff28ff65bd0639fc7ed176a31533ce30745fadcef5a087ccd61344ce91c675cd565b01ced16d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3473dbc0cba548fc5860c17d29dbe5c
SHA17f99f2db448e9c58566a0a526ccee546dd78d911
SHA2569bf1f291b12b8cfaab8e3ac859aa084a5cd81b30a1c4e40c6e709ea2ac54d020
SHA5123ff54bf91046ea192160873376b6d0a7cfb9f98e689c20b2af05aec147c924b1902cc7845a9bd15e90ade6013f3f2bba87766bef8613c428096362b192aab26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1cfa6a2d86102fc81c61161534be4c
SHA1b0cad0dd3be8b94afb62fb8f83af96ecb6a49784
SHA2561c8c7cd77b8bb6023c8efe42363a7d30f7005c5a4c0be262bb2b92293311dc35
SHA512f5550e9ffa83724e1816f273b5db17f6b5d9dbfa024995d48a58417b269f60ebb2cd1110f0623ae39b8bca28c58a08afe5bd394b0339f1410ffdad26188a1c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b2677f18062f90b2049652cabd82b3f
SHA1f241e5aa23803101a029fa59e31f2eb1cb4cf0a2
SHA256c03094da63e80d8d9c54d08134b9aeb3e913a10af5dcf749dff34318c2617728
SHA5129f0ed738fdf5b346d20eee99dbe27ccd26a2bdbb309fdcd919b95472259e17d0d01b480654141885b1bd759bc0db71851dc273f36030c48648c8bc42596ea7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d817523b7012d9b4892fcb860979363
SHA178d66ce7402819883029065cdefd6d1d2a86e73f
SHA256d68a9155be7f1e86a2b4a22a6d8089b56f4de842c4b93acbb1dc2316b8c775df
SHA512a0ea066ff78e5909edbc6e7e147c24b6748b497991c1bba227b2c1e1abb4c2a8cd411e7cc71e4842fbeec0b90746a298eff13daac99d7dbc827b3748a266bc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674d05799b08e5413285b75d0b5bff84
SHA134f024fcd1e94b8f72d74a96561f937486e76b04
SHA2565aa9cdc3ca59a78dc74fa789afa743e11eed101daae6c7cde3dc95bdb6dfb776
SHA51245e09ef4b2711b22fc1b9e21840f7ee3f0fda97e7999a34ae470c608b0c01c618672c63f405ca59b879e16bce1f9dc754928561c0340adfc769c7370196991e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb561223093d1f3787959134a317c97
SHA1c73cbcac3382c49bd3a3c4cd7cb51f7eba350d52
SHA25645173624787f5d9ec4e915a6f40fba039160ec5a4f390b256b7b0a058ff2f73f
SHA512d97a87e263582c208d0d505b42462d2a493595591a81fb2b5f610f9e552cde0fe450b738441895fb7618f3db0b635e4b315e6284076656ecdf6c925874e548f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d6f5c2a74e42a5c17c92bbe33184b2
SHA1fc81a386dd3dba227a2d34e903c8fe2c10b5debb
SHA256d4fcf893de193d1363d1f4c8a82cd54959b6d57c5c685fa842e76b166830a3ae
SHA512d19c7ffa0513272788e0d62ad802f4581a1ccb5bffa89402bffceb076b4eb7da1663b8be5175c6d00f4654d40bfdfb0e2daf3970a10103ffa0efeb7255819c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428ffc5fdb8931302d73c5291d639308
SHA194515e8b5486e22d5447ad722dd45e9e714397ef
SHA256a5488738792767640ef5aeb69b59329ebd6da963ba8dae4466ecfff947537f23
SHA5123875c0581941495461655249c4c4af90b53ef33069222a3464da876b608088cea3abde1b991ef9e31858eea6c9bdbeef7b82df38ff00899052fd64d846dcbb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d00b7816b6edac9778ad2a6f91780c67
SHA15a68d3b118f8f446267e0a43b3a46832aab01afe
SHA2566a5db38aa0066792958fb41642414ea55b8cafda4b9b931398363363a61d7080
SHA5128303ec428921008f3ccf1ac77f3ce0d7b612f21c1cbce986312bf53e13eedd20610ad279f5ab35bf8f205bae862f31916811f8c946eb2b1733fc487bb54d563c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5384d26ba12e30ce9770db9904e1eb
SHA1e9bc8e04d95da67daf5ead87bed2b0064d536baf
SHA256fc00f55ccb06d51386413776c6def78d7f653aa73fb28b5d8b20a24dcffa5b7c
SHA512c960915c636ad750a7c0115ae317a12393cde4653ba9d0f1a37161f0585986e5a381709539f220eec123b00755399d4723a1d41aa18ce718f4ea0e1a4188408b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5350afef9202c9446daf5221864a51fa0
SHA1fb490dbf94ef9d3e3498bd1117bdcf8c478a38a0
SHA2561efb29031c6513991de0258a1381722fdb9beec661e26f841652804d51ba273c
SHA5129ddf4f0a38bdd384a569e9d84f26427509622a1fb8766eea23946a4b1bceadd73da40f23748c935f5ebec977c1329c6a9754261d997327a59d9b4b03652c8f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b704cf2ac220735cacf15a8bf88f86d
SHA151dc8beef6fcf00b53bc65d620659547f864b568
SHA25683c9c7f478f9f8410713bf3deae0e80eb59778a995b1f134ddc8981ba048b492
SHA512b09ccc6c8aa8a1ec36c98485209af46044128f0ce40ad6b646f11fe0a80b200327756bf9622310efc495f3ab51a17d913870c4717cdb32baaa494e9d5f3d2bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559290385a027466c6ed8e8e4673297c8
SHA18b916c08d615438139527a5acd7fbbd693653d72
SHA256389eee77d3cc6422ca71b970b3cc70b0b68187eadbdc8ad1764d09fbb9e3b372
SHA51262fd3e7a8f9c940b91bcd9657afdc9ebb1d507d2cc6c6a30856389f7b5c70364df5e0b219bdd2618381cf0fc8258a74773b8e8f745daf3aca7d371a31b3441a7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a