Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
70705930a53a32494d3465e210cced2b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70705930a53a32494d3465e210cced2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70705930a53a32494d3465e210cced2b_JaffaCakes118.html
-
Size
66KB
-
MD5
70705930a53a32494d3465e210cced2b
-
SHA1
f0c3226343bb0a30cb6980f80a6fe281516d86f1
-
SHA256
153a279e414615e1c633fbe3740875176f0ccd566b2e778b93050d56e7981a63
-
SHA512
1a61bbf6e65f2b519062087b8b1807bd945b53651af5a9eda3c6f54609e05e662c7c89c6c299356922c973bc649bcaff3b829777f14a4a64108bd60c9e10d932
-
SSDEEP
768:JiNgcM0St8tN99OIskHhGlhLvz/Fz/xkvz/1hwoTyOqhCZkofnMdtbBnfBgN8/oq:Jz+zsLzJmz7NTIgeo0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f0043143aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C7033A1-1A36-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422762492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000099aad5f0b2f7e843c251fdb1b43dfe59f71e4e02bff114867b38a61670cd320e000000000e8000000002000020000000061fbc613e683d88c030717239bee44af34842c73b6b0fa01cc6765495bb525d200000007fa19ebd9edb6c20c6a527d9fe178c1f743b38d697d450979d10a2b5be9497ac400000000b2f852abc4edae58276ae492ced1a2805ef2fdf461f3591e18a18ef22cbf1891037ae024b5f7678e1f0f7e3e9c8324163a5f20d4810f95bc04a2503188e6254 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28 PID 2412 wrote to memory of 2004 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70705930a53a32494d3465e210cced2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e8a6a735650ef888953ae597619fb0
SHA1cd4a99ae096a8cc29ab5053bf4702949df7404b6
SHA25609a3856a49e9aec05d8591a57678fc6a96c00f676e6ecfd991c8e862db57b5f9
SHA5125533b1741299161519db6478e83e9051759eea6d5cc84249cc6aa8527ff2e5dbb004e08c16a5f06fa1984e29bc2f9e00d58c91cb7c3f4a3777eebdcc2646101e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f42eae8808f2f5eb8d666c147eb4381
SHA16384bef0d66bf441bbe00410f845151ac1b36c30
SHA25649cc56b3322fdc1c744e8b75e81cd4a70708b5a17158cc0c0e44d9d9145ae83a
SHA5123a61947e024f39e5f4206fad0e685bc5c77e15b6636e88e0039f2651f96363ac78888e19f88b3f90a0657aa8d1857e9cfbeff42ecc02432516d775359459f442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7246d1064952f09a4c92613fb1e5207
SHA1b14e4254c6f2f630ee2edce50f4dc858d5cc69b9
SHA256c87fd9c5ebc40bd29966a170b2d69321e39a723c98a949ae4f13148378c7d2c7
SHA512a4bad3fb3ff5bf77132690e04461dae8b9021d7b1608b9233fc9d7f0e91d01485f9fce63d32181cb26b6e06ac0430ff0b9c65cf2f28d9b29fdaadb7b9e8bf3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f2b0da38550904bd5541cbda6bd795
SHA14673de22b55b5bd646403c86dcc7d9c5182bed71
SHA2566cb5984013b663a4b80a146676dd54f41f58cb81762ea75de3f3c3a213598689
SHA512f40a1da936dc3c944fce92203218438e8a8c9c5ca2e026b4ebb203b6fd021269fc413a826a18f9a25e1d26ecb1a66a527d42c0364a75d2fe899cf251bd15a80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f2f992644bf8c68139599ccb0c25ee
SHA19127c90df9d208180382d50908d414ab612145e7
SHA256347601dd1ead88dab1b853cf85a369f6731fdaaf2d1a12bee2ca9da791bdfe6b
SHA512e487bd5da4395feeec1a5f02649cfdad1edf1300c03fc95122b280a9497c9b7866959ef16547eded1a13466d68331fc851ca46336f90f47c8698fc559aa5005e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd68bc63ff723ba5d9e4ff29c4f89e75
SHA1d33d7a4d064f2427c365c67a5e2bef4e3c1d800b
SHA2568bdf0ee55a0fe2119bdc53775e675fe20f9a64a451a14b507d5f86cf8c8326a5
SHA5121ed519bab7e9e6bb018e9bb63217b8c6edbaab91ae3137f14cc473b0f0b156639402848cb7b9b3c620f77caea5d81fd7136efdd5aef9462df973839e19eeba2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b11800c773889d38ea717b6bfe5830c9
SHA168711d5ff9ab3a1b1134c2d0b31c278d18ecff76
SHA256352c922a0a25e88471c7bd232561ddc30488f9a311ab3d66ed80f95bc3475998
SHA512345cb2f87ff994cbed80f964050f758d89cc75fa79556110ddc6b50e0c9c669affbd26dd3bd229e488124a74a9ac855cd09d0aeefbca8cdb68db6aceec1d552f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af92b8bec2e40033a88c10cef1c1cd2e
SHA180422f7ceee9359d3d3d6d40679948b152ec9e96
SHA25670d820c10eff18f6fb6a5fc8afd910b3fd4458ce6b0916cda99bf41f6a5048b2
SHA51295a96ec7cd3e784e23c5996436b23affeb9c1209f981fb727e85ddf042855bc54dd00c0e416810ce0deadaf8d171e96cdad431bb9142c97492ddf907550748f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b0b9a8dd0e99cf3f14dc6e6627b4bfa
SHA1d4a85ea792619320b75249fc112afa75f445fe36
SHA256cd6b74e4c46accf58cfe13b59d4f130fc232f4b99b314d7772b3b21aa2a462ba
SHA512880386673bd8545aafcc5a71137fd097fb5b8e7b507ce2d208b71d3dbba5754fdc5de120c37f622839a82d60b0dd05b2e24e9064bc9c9553254553542552012a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd34f5663098fcc94fa73053df894ce
SHA10cb559fd7a9fc06ec951fbd7646afb4cea401206
SHA25604d5f22df0733f7c9e052898a0b3331f76263dfc0a810188cf2ee358dc73f86a
SHA512fccce41dce76c0ff557d76d8cedaffcd0d7d50063459a293c70cee6872d41383029678cb23f7831cbb1d01204ae0520b79389d7c7ff1deae22895cbe0afad730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d794cc2b484cda140eed2bd1f7ce6d
SHA1de9e047bcf79f873369b52dc6ec28ae3f9a22401
SHA25692475cb7711ff7e85f3d2f72c3da30fd6bb61da202c87d32fa19d1f1d01e8906
SHA512a36dac60e43baf301d7d4d49bb34083b321d6f1cf5bae22416a73d69cceb092fe928e512515388be978839ebf7b9607bc184a2266a76b5930ca60d654d837c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c93cdd0bd9438e65cc6bddebcf24ba2
SHA17e44c6bccda5602d904dcf14758ea95e6c0624ac
SHA2564e5b98789f67a72c36acaab69f09bfd6a4b4dadb0d0f5d879a90b4ca20bda346
SHA5122e832111d43f35ffec667723b3ddd362d824fd2cab0445f77b8390ba753736fd62d53696f10d4e67c1269e66c95c0c8baef4b27e2688423532aad517c1fd7ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb890a0c62d57cf437e29895bf92e5d
SHA1e37870d2c45537378783c0cc3996bf6492480f49
SHA256fdb3b2b414d5fee5baec7f206328b384056f1261ab76b834424b085df7a5cd14
SHA512cd99808466125f356ba237fd20da4e97da9c6e37c27b35f6467f0daabb96e7699874744287e228d5fbe26ca588fbd47ffdc2df8a84c85ae34158f5cb540f58c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518eaa2351854531865b2cfa55202b3a2
SHA159e96eecafe089acf05c6f0af0f05a5dd96393a0
SHA256350c0bbf895457176738bf4ee2492c0a8d918a3011bcfa4fd5b82f603a268f4b
SHA5128f1b038173547ab4aaa47ca401e15a88b3abd9be87a69d77da4d51a23a4c78b6a6ea0e6fae19314130a6f392f1569e9e8bed75473ca899a2002c10f3831c3226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab36fb23b15fc1fd0d0deec3157b65ed
SHA108ba9395d986e6b35eaf7f3beaf40cf3db8af886
SHA256366050eaad2d0f4b27b880f8a7c673c688f9af8528577d63287f5a6698b2ac51
SHA512048c833d1c392e4aedb92763c5d10016fc54da69a90d8ce4549962ef434183dfa40912f1135137339927b19e8795f50fd4e74fe0ca8e7803f121abc60c3c1d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3efedc813c93d0ffd5815c32b61bff
SHA179cfff0cd7bbdaf843eb7650a7fa0106ea630332
SHA2560067eabb626820a14de9e52fef774839e7f4b2805f8cdf871f02e33f54bea0ec
SHA512adef9ab08430fad3766bb8b39f26f03af69e73cf6b24e6537326167b83559c9d26518cfdf0e7cc910b0d93488da18fec5adf08743cd7a0cd26900a2b1549bdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c5b8470eea24d88c8c4257d2ab3290e
SHA15390ffc5e289869d5f0d63ddc5a9c337f96fe032
SHA256ec37a98edf4925987c48b8c5a41575940b19e5f1ac287f878da63e6e3ea7764b
SHA5120af30687c310862e9fb6fb5d74ef0c48bf95c3ca13ebbf3255b35a8c094e340aa90a954d979697cbc48d3a78751938833ef0bed004ce08ea97a29b4ba79c1a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616af85355ec0e7856fbeb455ff6595d
SHA115fa5bcb8f497e3cbef1c82603f2df592f713593
SHA256f95384d86d6d0ff5f38b91b134c7e528257f8c78f806f757279005c8d918fd6e
SHA51215176139d492dd5f4a75845e3a56eb2c1c2b41c6ed91e66041c4f21e10eb359377169e0ab2da4a0c10aeaa520ac1535fa80df2790265bce5e291a449d5233d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513583c9bece51ad64efb1e1a72b98a1f
SHA19203ccd6da8e1d79ced72b2ba5448edb2d6932a4
SHA256889ea65b51ad3f0c65677ce421ff5a9f0fb8c4e48ca665b34416722228158478
SHA5120dcd89c0fcc854800ac74bbb777ee83bf8da0fd362aaf4543120fa56001b5ba1b30bd6d0069e4598306613e61bf6a17615eca8545ea708d4d9d044a94f6f7700
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a