Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
9b5137737434c91b5bf64b80eca6d811_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9b5137737434c91b5bf64b80eca6d811_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9b5137737434c91b5bf64b80eca6d811_JaffaCakes118.html
-
Size
4KB
-
MD5
9b5137737434c91b5bf64b80eca6d811
-
SHA1
fb4d2703a9e1d549dd072564038f718991c3574b
-
SHA256
5f63114ecb7a68fd8e1abf4d4ae9c25d059f00599aadf5f2788ac7fd21dc244f
-
SHA512
8c6f4c1319200f7314e77a72e6166107fcee903af2886795366b5ef44db1b02edc6da1617f0792b6ec734533cf14a8e6bfa479ec29e47d59d6e4d0a91f6590bf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oL6pebd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F596D6C1-2746-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000085b16066cbf7414eb0a941c7d84a835700000000020000000000106600000001000020000000f2cf4bcdb4e40c93e653b58a0dacc6b7704cd4f47e9477468eb5db32d91e9674000000000e8000000002000020000000cbbd6c3fabbcca6cb106eebd84f880fc5920d036f4cb59fe98e6a47ea8be28cc2000000082290238a8ab8cc16b556ee0c0de68da17eb235e753498bf3a54c9296879f6af40000000765fe0947c047c7bf14e04069556a9aa6d380873e5b5024201d3b8b421a100bc8bf4b9d0fcd8df9a3b04d66ba5b3f3413c3f2ed7fafcacf75a1e000844b78548 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ee14ca53bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424198987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3044 1888 iexplore.exe 28 PID 1888 wrote to memory of 3044 1888 iexplore.exe 28 PID 1888 wrote to memory of 3044 1888 iexplore.exe 28 PID 1888 wrote to memory of 3044 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b5137737434c91b5bf64b80eca6d811_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5082119ed0dcc242038526016072e05
SHA1591015c081e5d1ee92fd025374db9e58c06cd5f5
SHA2562bc0f4df190f5952a3336ae005bfc088090e2c88c17924fdd73c774380fcf928
SHA512dfb36efa01f12c74b039209e65b69efc18d8a5de4216a159314de2456156e4f348f653d8e785da13a746237802571f7f383f5cad930b6cdbbb0a5641ec3f531a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495a6765d74db9e7698f0d5c22c9105b
SHA115ca0641f868fa8bf44866d7459aff1b152f35ca
SHA256d297379236f796af349a3593f7b86c215f81b94473d97b6660b126e070167b80
SHA512da320a2aef65f40759a004410642ec2b40f2f50416e80eab3c1a32df52a26e4e18dbb7856a5800c4d2ac884256e9b85e6acdfce74dbe9983902bc6243de42d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54230c5693c23b22f50c643df679526a3
SHA1190b9f90db514a07347ffa476e3bfbdba760ceb7
SHA2560e78b18a6d287573be3572bb47203869d8d9c9315a899d8b6b28896d58c59fd3
SHA512cca005d2a077a0afc97ec30c7a6926675e089305c444602a4c31b929417d2920fb64ab286aa51b721b94b9ab21d3e99d09813ddc2e423f02f050585685c0c132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a16945e22eec36256784af29986972d
SHA18ce986311120aa5c520956c551b3da2f34c7f018
SHA25629dea81ee209050bf4e5d927a8250e905a4907f0e679267e84422065d369ff26
SHA51297302506a34873d4b055e1ce95e7c85585bb7712e3d7724180ba277dfe8f473d049184bb3a4f3766a2b6d86945ca0c7ea7701273dc108751565302cc9c1acd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0608a3315abb34090815057a1e19a88
SHA19efec9a88a93893d57d78dfe7d99e617b66d92ce
SHA256b7b2ff3890dd5caaacbf54e7ca697813fce7bf0971ffa6a69d2cd0195c7c9723
SHA512012bba92ec0af94299c6de8eb517df12191b959812c710e2240bca00c16f5f3111a0fae96e031f8a845533ddc7c0daac9eb58748480e591e48ba4047f049240f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a88f5f556a30100a5cf469ef7a5811
SHA1f978c6f653de7a7153a9178089b1a509a6248062
SHA256e54f28ae808257d2aadb36e074a487a7973ed81b496e3cedf2f6a5cc5e56a897
SHA512ac552e1f03af87ef56077d66293a9a598d5fb86bcc73f3e8b240fb9fa03285bcdc4517321ddb727fea879417210fa16c1e752bd1c60dcf47f2eec2fff37baf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ecdbebae44909fd4d66f3772edef7d
SHA1008566135e24712defae35075a12ba18a48554d9
SHA256245117f8ddc1a9954928f073c82ad5090597552431d2115db95137f35797b366
SHA51217088450bd9cd133aba8874f966540e69eade5a9739aff9e6300c682989815db867f148ff4167d93f9c9477abc32196eb95cf21c0e5fef46d6162112eb9a8942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765d92b67465017647eadbba8c7185f7
SHA10c8eb265d94ef3d81004bae139a71fac72a594bc
SHA2567b1cb054b6e2f70c089baf652f09e63a440e4fb72c7fbcf4f5e61ab31466fec1
SHA51272ac5af14c648666e4f93fb3ebd1efc913445606885d4e27cb3d7c89880521fd30ec02b253b2ae859a5ae1a3b6cae67712828de6b11bae767ba1b02f53ebb1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf2684766327882b9fdb6d1f8bcaa58
SHA118ddbcada8ac5e06f8375f706d362c58f81d37bd
SHA2568ed31a3bd235c9f5212a4bd240f2c4e305ba6ff17879aef043bd81da266594f2
SHA512fe245f0a45597422eea7084a0f5c0b98a1b22c893e13ff5726c62e69b24e5fc2d64e15795b32cd52b6743ac1508fe5429fc29fb989022a3ec304a6f635e895ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe4fe2fb535e3736f90d94131bef8d1
SHA174bd3be3a5b17676482540d62a1d8af4b6ab6fab
SHA2565a2d8c8e48f42e4c591c4bd0ad71caa17c382c996dc1d773ec6370835b703b4a
SHA512f02792f1002cf01fd4e0dda0c20edc001d53f71463d1e62dd395ec956ce7060728aa101cf090894959fc484522c504bcbe19be7935a6d05986fb66e59aa20c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5348bb9a6579b6bf39245caf0d623d
SHA101f3da1691ceee2d12351aff41c0f1155cf99210
SHA2564f3a264c5149326c76f2feb4500ffab2b473eb3c01cba78c1a057ed7e346a726
SHA512ef10f6bfd8145df9683108d9453a39a9bca0bfb5a71d01a61d0e442e51e3bb5982835742bc0642b3a78b15d847c396c0bf568f8f722f2ef6463a8077e8d92529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e24ac047912dd74ae4b24f5e5cfcd19
SHA150f3aa1dae63b3da6ca6815cfa7e78d230d71834
SHA256567d7ba196bee60de401f824de7aeb12a51b7f3d49fa934bc4b79189b6e9450f
SHA5122b966f6a38c67db1a033d645cb476e8075107a3dbf4ada1d08c98dd7a3eaa71c36eb0b76e23a5be141f036b0f9e85fe061b2d6afc89a009b793a9b89ca736e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862f8a5a70dd13ceb4d6a5fc2d1433eb
SHA143d795cac808899a124c0b04b75bf205b5827c5e
SHA256372477414ca449aaafbc658b64b719e836c9c0bb73d8d60f3791f8c2d046a1ed
SHA51243240c941e273d312e50ee81a3030141804781114a9a00ff563323d651c8acf895cac8bb76795c578b084cb951696e84a2d6bed98070ac1c087db5fe83370443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d32bdb5ea91fc61fa0d44dfe4311de
SHA13af444b308db2ab0955a05c84dbe275b0a5b519a
SHA2562065754f490c301f3b8279ed37f8d381c8e9e3227ee45f7e6816f84a2f25a997
SHA512584bc42b17dee9297b6d04259859733e8453dadcc5349ca6cec3f60cac53ad1416b1226aeaa89ca5595e3e1df6660c155e73656771311cd358164f8d5228919d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5fa5f64604631decb056c59a2cdb77
SHA188ba33fc811e0d92236a1231a4c55bf1da309f7d
SHA256fc01a1f1fbb4a82b8fb1c9fb6b595f8143fa6e67004b90c6979323f13b675028
SHA51243897ee6e531b47043550998049d47d376ebc6175a2ba9ce824e6fc3923d6630ab2d137b8675e9ac82097ab8f92026abe59f908d0dc49a3056dbc8bf4bf5d4b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe76fde3df7b8980d1dc24e6d97fc4b
SHA1c9bc229f005f4ce487b708db2ac8438fef1bb1ea
SHA25602f073aa5933592592740250f41dc85ff1e5a6d497bd00fa1d5e8296eb432eb0
SHA512811d27e075ba293e563070efeb7385bc2d8d05f8974ba8478a204416183e0766aa0d93dc5115a1bb5b1f6dd8dd7dac5faf836b12de2ee56bf2452741d9f6b05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50212ffab09dd0c0e94bee5f2c07a652f
SHA100c1a92306135aa8b2e93386744e58f2c8fd4ccf
SHA2569f0d9f98d3a8b539cd9cab943c857bbca6d3e6c098a6ecdaaf6b3f0346016725
SHA5126208ebeba5d3731646ca6db32aeb8e154d836a96a96cf088a33bee49dcbb92d25952e0b8463edf8cb8b612f4257050f6970f2780297f79a42331709e5623fe38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ae7f8d0929ded407410a05be3dc644
SHA1787435ac2945d9c794537524b5f3f62519af207f
SHA256f47389d94b463056b1c40e91e9e5546aa4501b64fb84c4d083bf67b594b50268
SHA512ae3c84d81d22838517aee09b5f82681da0a117e68627ae7cecdafe9973e7a5a0ec32d38b4b399d5e9e4903e370bd3ecc57c401fba71359190dc374b5443029ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b4bb32a501fe96caaa7beb477d61c0
SHA19cf6e0ab748734501948bc9dd8b8cc315a4e5a0d
SHA2560588bbd9293b36dce9f023463450df09eb39c501e41be86ffff01d3768e9f4c5
SHA5126b0c879a2a1ab9aa2cb3c6fd1e5236d9b86661efd2c7552cd1be9d62cf390bff1fe51a5b653cbb3b1b158e15e968f5ec1d7018b2915237207634d16864008e4e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b