Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
89d51af68b9917863feaf631688d7df9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89d51af68b9917863feaf631688d7df9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89d51af68b9917863feaf631688d7df9_JaffaCakes118.html
-
Size
4KB
-
MD5
89d51af68b9917863feaf631688d7df9
-
SHA1
7a9ff179c0b75c60529ed209e4dd24ddeaf98b1b
-
SHA256
dbfefa398e26f722b039a42a2a317a3d70744ee89dd9b4c9649451733e34af3c
-
SHA512
b2793f534ca8f2586b810913f759a0128c93dba89ed18d1841e909ee78c22ac35409522142ca99c42e10931dd9e888dcb705f0eef62615d1ba45102faabaa262
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o18Rhwd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B4C5C71-1FEE-11EF-A4C2-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423391140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000167f9004e7de8f301aa04b8c270a36396d1c8605fe5618fad4bd9acb6c9bb552000000000e8000000002000020000000873eed934141936ed1760bf870da007e36158a3dea4a561ca3014a6023a514dc200000006935d3a80fe348412a8e5f2dcd653964bb32c231632f6b2dd717b8446d031649400000004a6381fe0c4cf154faca7f3a74d8b6ff5c216efc65dc83ad3af92dab4cd2f229a5d9970e3b91d219fa0349f194db4b23dece967a87d7499970f98473f449e5a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e050e6dffab3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2804 1848 iexplore.exe 28 PID 1848 wrote to memory of 2804 1848 iexplore.exe 28 PID 1848 wrote to memory of 2804 1848 iexplore.exe 28 PID 1848 wrote to memory of 2804 1848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89d51af68b9917863feaf631688d7df9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c7c23493f6a61868b57fa0ca1ee14d
SHA1fcc10dfecff34ebf1487b34c15ec92c3c65a5fe3
SHA2563f461ec70f50e16d6fcf4d6c29395bf1019f7e4289cc42ccd6acbd533bbc0edb
SHA51292f71ef584ad575c62f28bb5567ed21870f96502da8c21a9ebe62ee7a9af19830ddbc064185cf366ac68738feffcb330be8ef6d5aec098759086903d69168bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868cd6ee0451ca364586b9e32b68f1e5
SHA174c45a403fb49d92fc6960b7a5a5e925f08807c6
SHA25699283667f7e9d91881121471e958f4f8a68a793583c74cb402cb41ce880662d9
SHA512042fd6ed21910835731cb8c998a49958d5a206ca744af48cc7214c0f29c406f05efb46eec62aace5afcaee3b22b410cabf3d78588812af73a16da1d6d1ce42fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d3fbf1038c9bd6d68cac97487b0b49
SHA154492d4605a85e1454a08b74863aedddf7e11157
SHA256e96f17c28e4214945cc952aad22331abf45ab48556ca60cab41cce7c860a56d4
SHA51266d9927ab449b1ac2388f8da7bbe337d80bfc760a7ac464fb429f8757d2c5e5a85d02a0c4d60a2207e7f77e1dec57a558915e3a5382af5dc45471f1eaf1a477c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334b4960bbbcdef2489c3ce31e831b60
SHA1477b1dd78f6849d7f6057145f1f14e7d918d0939
SHA25656467276bb0d2f45d055898d2640a7488d7fda542574a928c1147a5954d8d327
SHA51278c6c3deea0d3845f4d04047fc78cc764babc439a92c836476b2c394418ae6666bd1f695c015fa7d82a5e8e492142230f8e13ad08f74551b4b00bd6752c1ef3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f5983b94cd3d0b640b24daabcbe494
SHA1f73416da1b7b5078fe76ffc21c07610f079babce
SHA256933b3e5d8f1b6acaca24394ec3796c94046e0c066540cf978c8a754f5503d79a
SHA512ccc618fc51e38054802ef938f29195d107896d8eec039f5d03b00c9a31153dea4569e17297fd63f682e8d1f18390250b8ac5c8028b78bd56d97217efcb0d96fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155ed8bd9a15a24ff09f4f05ebd73997
SHA1aeab28c90235b4a02511a78c40ef6cfcfec5ba55
SHA256a6e49548723d570a568fe8ddb7f4c97d6065c807e4477ed739c0b25e883b8cf3
SHA5123054389039605231ecabd492d1ec0ee110c9916a8f17af0ee0c0bfa3da30622ff75a08e44ceffc4578ab8712163f776505124b0c1b82392cbc0d1cfda16c4c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862a6162460d82a6395b2d3f4c7409e0
SHA1d329cafbca14d0321755b80acf321c483f99f19a
SHA256261777ee48855222769f69edf43a3b3116a40cf94723fef51eda7fe5afb40368
SHA512788c908581443e516532d3798e0e4d11e216b7439696b8d0571d1f92ead188f8821d049aba0d5d032b27a4862ac4b003c0a144d1f92431b2dd10141feb9c6ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297717e374ea0dace993254949aaf97b
SHA1fc9a5b870f91c6197591b10959a1103687712914
SHA25691914dc55baab049cb32b62337750c81be2be826b51274a06705197f89216784
SHA512aa1b80eb6de10cdd95cee413205941b181e537d8f91aa782fd8e8a3a63bb51ac41c50bedb3b15c2ece208682e0498ad29a6d25e97caf3cb0527a2998c8bfcaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6fe5e3fa032c9d0c92ca6bd16660d4
SHA11d89ccb70d41661a4fe2b35d3475b44ca7694705
SHA2561237779faaf1212431a7695d666f5a996a3994e5bf250d65306c907d1dd9ec19
SHA512c63ed4b9934fdfa831169d443f0f995f2dc4dbae2b5324e258ce313f8553df5c84ac59bb412387a41b118929063bfc456d09422e9bbecb7bc1def54f53f0224a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf6d104337822d6bceac2bf8279ed96
SHA1fbc3b50dc9b9f3f7c3d442792e3bf7b7fe109404
SHA256c5c1a10c3cdd57de65dab51b90585e8702765b65fbd073a5d4d9aa37782c41fd
SHA512af884d4ba66daf47a37cbf4d83c9f7fef4af6e64a88118fa5362f84ff310ea1b39c11b043b306e69affbc1e82d63049dc923350e2bde47a263c1ea6c807f0c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9279a51a9597404f076e714eadb087
SHA19e110cc8943546d3a333a1552feae5e76196e4bf
SHA256bd30e324a49ffe35a061e286ad6245103d4889adf9da21e880eea6f7b3e932d2
SHA512c0f705706619cde23d5ccaf117b4879c17f9b7f3a9d19facb1b2a8b498dd8709fe57bb84754a7b13ec0bb08a74e96fbdbd7ca61ce3fd3236a9d01c191b4477ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf1b387af2d6c0379e8143bc6a7e055
SHA15bbaa17a181b80abb0b26922e3025279179d31d7
SHA2561519297e26d6f860efc3735af9ba9a98c4f0de09ac006dbc468834f4df656f77
SHA512348a948c649cb7c2f823985887307cbfef2c0352facf9fe67f35d35f15dd7c400767719599ab65e4cd05f0f3b09a4907a01a959f56c905f5b64350a623f2590a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f00f5d40b437c23b6833bb470d88f1
SHA18c10b9eddd3a8695e1cd5262cb655780412db8e3
SHA256c16276e2629a80f61968c39e8b56849a388dd298e1c595e61a6cdfce0a72bc5c
SHA5123d2a354080be500cc759a729a0da2a99832ad6769976fd80b6ff112e6a78afd277e7992d44e3fe0979c2fac4e4a21ba2e1a70bf9e73c5ec2f2fe27dc3fb610e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044c08ef7c41a18afa5abc8f0562d62d
SHA1423ebe36e1a7187b643990432fd66567b49e8ef7
SHA25658f3914aec72fcc31aaffe9d460b53132ea33277a468c4a730b76af8a71a645c
SHA51223f2aa7edd884550d5efdf842bc548b0c730143f4b65339b5d6924c90346c1722bf7cfbb7c967d1d3bb4003732079d316786b0c0cbd17d0b7aa14d024f8735c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ff398a44f0c473180d1b6052f147cb
SHA1deb5561f3030a67af8cf09712727479bc5f400bd
SHA256bd99bf33e5de7b51dcde11816919cf1c48294d5a94a5ca00b599a4bd8a38e27e
SHA5127ac99e8bfa32de7176453851d1d623c47495ef6af4546f2fcb5b4cbf35c8acb116736e84282be13c1e699dedba082f6ed9277bcfb24096e1165e28a9ca374099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145de897f129826a0d4473ba89b16de1
SHA17c5006079656ca3a0af5aa7f51af2c1d3743be65
SHA256954154cdc1fb2048db068fa80ce6e3b1dff111deea675534d27fa6eab3a53127
SHA512426e497f6f2293b5b2502356228cdd10a0c571d6897ed594ab43b7c58806361d4d3b2b1e095b29f4d0feaf1079ca4913e7abcd4f7f209c92720b9042d2d03f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb238638bbbe25c59eae4655dfa979b9
SHA1a0468f5c869661ceeb97807178f2ba9c126c2588
SHA25678b79998cf92a0838c001163b888227b46933a6a7776acbd942289996040f0fa
SHA51261197baaac57d8984d3ec424ae9f4332703e65363f5a69004bb0515998aa59b5d344a883f95a35bb592d1a4657d87d07a76a6fd64409cfeab912fb4d519bf840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb45c7c99b384c14052a16b89b686f2
SHA1b7d17b70d4b1afa39ef9a3b07a1728839af03c3a
SHA256a98ba96b8707cbfbf4202934885acefa90c135bfceb98242f41f9db6af731a55
SHA5121eca642b981e00ca4c17fbc88a2416a9bbf46e3292a0a3d9cd0454475ddb58cbba7b5a3e7f77d1e467bf07b3c12e7bf92e2f2ba6fe075ada90e13471c0c36f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9e617201a2af9917f757f89c390d1f
SHA18c0c160554a266d6b8349fa578b001f7b7349f85
SHA2567c9a987b9b4ba7d5584c5c23eefa30af69f1af819259e6e9831620af36e6d6c5
SHA512b9cc0b50717f742dc510981f502c3e6d80b0a21d9616e431925f52bbb629df82dd812b7210cda499ef1be9eb2dfd31b01e01459bf674e3b6a4a53e6e7b5beeee
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b