Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
99e099abdd160ee3efbffea6f926e66a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99e099abdd160ee3efbffea6f926e66a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99e099abdd160ee3efbffea6f926e66a_JaffaCakes118.html
-
Size
578B
-
MD5
99e099abdd160ee3efbffea6f926e66a
-
SHA1
90a706b084318d02516496d3cfd8136e8cf4175c
-
SHA256
c60f18dbc9d15798514f56a7216784386a97bdb7b891b46aac6f4b69ae6fcb1f
-
SHA512
e275f932d06f448f010aaebd290aefebaa22345f443438e3cdad31a67598ba504b50afd0c112718559385d6bac6bd2931d35b481b1c3210af35d3c775db8e5c5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b66c67c1b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f2558e570fae84175a5c3d7516fb194b2ebdbd437549cac60119871bdc9c321a000000000e800000000200002000000019f61c80e9fbcdfd7b8bac7972740bf905d49235cb020580589cab6675660585900000004c03ec97e4ba8d524bed5f2254cc65f07370c152e924bc6b7e023af563fd09747c4bca1991cf7a48414e8bcfece886d29b3a834a376c0a3d749d1c60e2078d453689b6e8b029c9f4f9c94eac5533833336042b03215921e9d611f22309d294afc227f15ddd38ef9e03545c9684789e7398e573ebfee5e467b2025ea58004003bf8626f45bace1564004a2e2ca75fdf2b40000000af57f58f4f39ddef5e0719ce91236ff7800c39fd670923fe19343ab0eaf5d968bd3b8e354430ab5b2b5477f9e5ed30b5222060ef02ea3128520a63e79ba2d7df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0F0BE01-23B4-11EF-BA28-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f853f61f76b615bfc33e02b0895f297705db9b2c227dae3a447a8e689870c75c000000000e800000000200002000000061c990a9c5ece223c4f63725e380bc05236a4d93e0b040c470af8d453a2e8e792000000014af50cad8b41fbd09ac22b134fc9f936f8860110dfda70ca65026abf0180e4c4000000048686eb143aed27e1d969eb228c055dc0bb20eaa3b57fc7cc653e51891499b0a74bc6dedeaa47a12e8bad98e235960ad04b935246fea14f4afee6590ba0e6152 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423806284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29 PID 2140 wrote to memory of 2612 2140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99e099abdd160ee3efbffea6f926e66a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fc319dedf0ecab2e2204df12a7b733
SHA1640a63bb0a9ec5ddc6a128a6c75bb6629573e70b
SHA2568dd83ae9f86e74142a53376e67ac663be9200467faffb64728308bf6e506e3dd
SHA5125f47cd82e167277f40f7d582bc0de23e29a9c9d410af6b550478f346304bec37bbdc182952997080e0a7d929ff01fdbd5eca6037d601f40b83eb88ddda3cdd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc3f6006c507f891dd84796330ac920
SHA1c566f7c035254bf165ed8acdbab8d63f61e814b6
SHA256fb38b608cca6eea0cf85c42996e8bbeb52b47b141a7424ebdf60a070e286d9a1
SHA5127aca87245d159c6801814aeb04e2892276a1c536fd3073fbafca29b54171021bd037e6441fbdd151d7613dfdb5db438eef8cc8279bf2d445d56a274fd8845b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b06ead7c3db8a90722e083a26e241f
SHA1e90725c9e8690c4c425cc444fc4a8d5910518da3
SHA2567c262bfe3edb2bb156087ea7fad63924752a7ea9809b1f67887eba3e2a1f5449
SHA512f7c6bb378723bca067d4c0f09512bac2f33f99556c6eeba217aaadb76dca157e24fc94349326263692f80af36306acbd4cadc6b6268582d64b13400148583723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903351548f950d21df669fe83d9caf88
SHA194bc1d07894791f44d032fa76d35a6b1d15c10e5
SHA25676d8c8924eb49a4af3dc1bd3ca7abd8780ad3d078fbca828551941adfe355891
SHA512d3da25e9c4cfd1418dc4380b80f8bca4efb47d3ca07eadedbe0822c0447c7d607df5a4e48cb7eeb02d5a9f5a0d68334649000b6235585edb08d03e1ec6d63405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea83ae024fb384ca49dc8189202c404b
SHA104f3e8c99ce63d00d09b202397bd76c8bd83e222
SHA2565d28a52423f60191fcf40ac1f1a1379ad8e208df46ac92c5e1ec03fe8f5c0450
SHA5124ca733576fe96f23e57fd96f374054bdd54a7019755ef589d8739b9c32511bf0ae839e767e8cf82acd51bb0a941015af1ee92d24bfe319f4c9da30f54dd69669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c5a04b29c0b105b0322a29f9b16a96
SHA1af9d6f69c667912ff308b1305a20ca49cd3ab5ac
SHA256f8ca0e04c181eff8a8c53e1aad4e5109fed0f15cf38d4324f67c751190837112
SHA512d4081babe44d8f963527357ffdaaf1e43e71805bd651a512d4ec8436f701d93477ca1d4e0c4da260f464c1e83147a9afa975de65284fb6c556968921f8a854c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c527632333dc187d9be4ad4b7ae2e6a
SHA1db02fe9177a7c6806a3255dfe6b41b12c2ca5c08
SHA25699087aa38b122e813916999ae56e5b41cd007d31359981bdf7982c6309fbcc1e
SHA51220613b24e0b13373af7a8b02eb5a9799e8c715d5ca67c18eb5f286ee64562b3a81326c380790563e8641385bea522026b807f51195b3903607042e95f78f8b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb64a1b7a61e7175ef208c86b0c8c5a
SHA1ba09b207328cbbe7d0ff53447203cbe0e164bb51
SHA256360dcf480cde9eca493092285c305089bf868d7574cf98ffdf7588a3087e5db0
SHA512d4ab6e31a46e25aba62b48a4e9252094f3f80cefa9ae18c3a19617f8a6e18a13edeb762c20c9d99f31dc774c2a85fc1c22d3484ec56f21a2c9434beca668e374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874b3e12ddc3c40171338e345159798b
SHA186d33a3bb1c07d2e42332c2cef7af3753b4b2828
SHA25626111f30a5e86e02653ecb93d1d631f53afc9f05b33f99ed07b91ad2bd3d3620
SHA5126f908636b4a0ab52a1e3e87e35dfe1bf9059921176ca4d0d631e9922c0c8798bd57d59bc62b594c64c8acfc1a310f1c9560c3c05135c090945fc48de91dbb0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51253f88a87753ea339cbf2f4b0677df9
SHA1c252e5a7dc173770960355c1defb04f9706a8111
SHA256a61fb6014cd1143d866e15c92bc5596bede7cfb4f46d71dc9d6ccf9d1a271fa1
SHA51272d0f992ad6134cdcdd99bd028c1e12f8de3b1187143c0ec275dcd5d4a205a0f8fc6f77517d80fea833b35bd0bd35299f373e3d5eebf253cfcf9c24c8c269546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872cf7dada80d337a31144cbc6d60ad4
SHA17a9546a8dcb3a1b7b5917b6e56faf87f7763fb24
SHA256047bebe2a7ec569c06711ef41c3585f10377b6ea62bea33ce2bf271a33ca6e63
SHA512bbb753323ab4ca311de1e2b1b46a4f6572a8104f2594478fba872ad25ea54ec4a51862b8d1f503575a007f2dd96ba1f6fb6fe81d307fe69eb30d02182b8d6345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5edf16939b19e624d323347cbd0772
SHA1e96a8459eb9ef7ff72fbe75d354ad9ef9758c30d
SHA256f9e6b403ca57a2a8d1a830afdb20194a4689d4fee5d6898f43115178d424f297
SHA5125464b6765d625486119e9fc428254325f8c7f5dc57ebfda7b325e5c3337b158e503442db8e031da5bcb53eb4813fa117f0745e4b3aadfbadf20b64753854c2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87fca66b68e34ec4e8c66da8ae30359
SHA11031730d994e6a52516197ead8d8e8a610265525
SHA256e0523ab336fa3ec52574bda617ec3fa92b73ca3819396c8ea4d3eac15e2c8de2
SHA5125661965da467ef6a85337c4dc50c97a919508ba40e141471062f23c3221695144eb1c86c4acb3561a775856196ec27225d9d4a3df08cb5978b854ad205c04abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963a244147e8b9933c5b55b9d57c2b53
SHA16c564c69942c90bfdba2d4f4cec93def55105c9d
SHA256fa24a97eea4b75977abc7bab83eaf6044b033a82e52a27783452bc7b853a86bc
SHA512b1c2b194c0d7e07ab545599cadcf0a97355e5dacafc0da7a4e92a652a33c6a42b77b883043af1c133e3d07d7f5628e4744dbbbe6eb6c22e40d3cf68179ceb05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51783c39d44b051e93d541f63eefa6eba
SHA19ffaaa17692e9c46c31c43831b7a155942cbe7b8
SHA2567086f4181e885bcf97765ab2a57ff8ca7a46d5348236f584d882f773459139a1
SHA512162716c0cecc19d46c20a963beccdad78b82df0e4acc66271d58656bc10d32829ace380b50b2ee88198687052ee064704c983bb976654c371437d44ca2d01ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579be93611d37f4755ec5c93681eb9afa
SHA199f37c8b1061dbfaef45189f0b317986d22740ad
SHA256e22a9bbf56f22d9600a43f21a8c0f7d9b16d21b2ccc322a29ba5dde3eda6fb4c
SHA512345c4f9f44340c6bad1161d4c08f2c24006f438fdd3b64d33eaad771e1d85f23cacd1c841d85db6d175666d4ca4b808f72bc09b88fc5bb99cb4fdc9ceb939e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b81eaaad11345eb19af92095f6765c4
SHA1d16550d4545cffe40164278bbfeb83f64a480e56
SHA2563b9c84d29cfdfbdbc942b5d24018b4de069d85db4d3bfba481b92276e3dcc519
SHA5126bac95b95cc7e9925ea8d7d4ed23ce17cc52a665c30d06ca4bf9efee970f14ce0cbad795ce017e8a841b8705e24e9719f4a76c161082aafece6aafea4490565d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b