Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
9e60b7c636c5f404a37267f1924735e8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9e60b7c636c5f404a37267f1924735e8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9e60b7c636c5f404a37267f1924735e8_JaffaCakes118.html
-
Size
26KB
-
MD5
9e60b7c636c5f404a37267f1924735e8
-
SHA1
d4cbc20a950f2437b5fa588344c19dcce6d0678d
-
SHA256
680bd482145838746a470891712bb2b2aad31a2027cfeb456bfca51ddd07a392
-
SHA512
e0c057d116665553eca29e5df52e0fc2b1243a7606450ec2a213b73dcbdead8aa22e8e2d80516164eb68f702939fa675a29e3b1a6f94250a79f42f1f983e87b7
-
SSDEEP
384:SBezdhi1z+qvqbCb1DseVHDCUUajEXRdxR2PVXYmNTwTVEHBK:S7zbvqE1iUqTXVEHBK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a8c52505bcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a2bf4d1acc609d448f475a4154b50d4f0000000002000000000010660000000100002000000033c2cecc388210dd007411a62db1e4b1768fecad3d7a354f6fe53b5ec0d5fb86000000000e80000000020000200000002ed9fe31f6a7671a7eb8fe7b467bc79fbd10db8f02d5980984c8c273349b2f5220000000ec1dfb7777dc9e6cd748503565dc901139292350fbf25bf578ff22dad64d554e40000000be790d66af7a79faf117c33a69d72efc86fb4e7ef90cb765492259c025970dc1b34530c08bf9e64bb0fe2ed9db39d8982b5c430eced126da8474e94cff9488b1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424275161" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50CC2ED1-27F8-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3060 2372 iexplore.exe 28 PID 2372 wrote to memory of 3060 2372 iexplore.exe 28 PID 2372 wrote to memory of 3060 2372 iexplore.exe 28 PID 2372 wrote to memory of 3060 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9e60b7c636c5f404a37267f1924735e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a448aa7b1bdc068aad96de1a6df4b4d
SHA11187adbf049f75a4814c913f513d103b65cd431a
SHA256c30e6aef6b7fad04fa0fe6c0eb7ee4f0d95d3c80bcd60b75f8bc09ee3cf6881a
SHA51250f4a6d87e8f0c58c518602e6bf0491f716369ac3633c86023695afa6904a2cecbfad5152ea14bfc3d737ba56168783f16698b00ce3ef65171ab80399f509588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d054cc60ec4f3dcd49d68699d2291a
SHA1ab3acf11ed948a56ad2277066168d2ddcfda73b3
SHA25699990a4e83cca85da82cba1e1011b039417fb60eeabddc35ab8c2b4d33f31157
SHA512174c17d924487f73490bfdef2c5d6994c9bb36579fb3efa415c21e15d15a2e0faaa1879063dced6347efc1220150b4cb8c5f477d49933f27347a3025a637c944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab74b6af599b6c21abcc9ee62f1d97d
SHA17fe2e9524e2c834a366031c3b93f2d6c537f081a
SHA256aa6eca113d024df579ad4985c0d1194f33526a5235656d0da8a078f502afdcd3
SHA5128a3444243a751897b7ff858189f7d6bc1e9b1d342dfad651995707de1731c38b87646ab72e1e50af217cb2d4f8f682311ca6fc2588f2233d456b6265997c8b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b62f794a69e3e7c1fd29e51da41393d
SHA1404dfae7acec9bafc1791a5e5d4a302a69da1f6d
SHA256380bcf877dd87c372c88f01f24a582cb167cc26f8fae92ff20daf48d11a9bf1d
SHA512db950e5bddb3d98c39e2d774d7237f7a48e8268b8ebea0deedf67b1f2637e056b83fe72a83c01308cae3de478a3a7efacf186b08844d9d5b8117b056d6075fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06ed6fe217d05d7ed7b73b767afbdc3
SHA1074f84da85e95011411171bade96631aad3743a6
SHA2561cb7de2bfd1caa9bf7023b83f18d96c7782b389f37121d16a85cc2730e7c948b
SHA5127bf353d3453846580028ccfecf5b327ae9a08d6b74b18079721eee0e9a63a3a09ccdc1941e8ab19c302ab05deb3165b60657ee5b6823ea3bacca01f9721834ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55182e4418ddc24f821c763bb15835431
SHA19fde83c91cf726c02e59f525eaceb7c813223c5a
SHA256544ba509e6ac3178de77bbfb14a40f3d3dbbe3692c2c6d0326cd7e73270104cf
SHA51289eb48d359026ac03d5465abafa66865ad8ffaf84a4fa65190f67ada8c39362b55988b835a0a8467bf3fa4bc94aa4cba179cf70173a4fa387ff2b8b0da9a9ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bdec89b8b5e208cf74f75a57ce85750
SHA159010961745dfacf1d932d62d5bfe6e6588ecdae
SHA2564427ccd7981376effde4b99ea74ff2b749bb9b6daab7f33ce787b1721411d99c
SHA5123d51837a8d90d60fefc7d693492cef45dcc787a1413856271408c46bbba12e14e1c83ded17e83517040befac5895254d52f30fbf7bbda92993a304ed97f25c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b20dd650458276fbd0c5733ef2288c
SHA1e6289d63f2845476c2aad6b1bdbb11d34f472703
SHA256149f78c3511c60f1c84702f74371e06e70f63b7f854ff88d881920575c05e32d
SHA512fd41061f9c76e0bd3de1f1489b2efacdbd29a44f8175e73f0e115c3dd1d1533458d56c218288381c01840c938560e33ecedc06038f64124a0c694e54d0394ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed9d3b2353ee7488aef67c0b497192f
SHA1244ac33727a64b16272f485c5fd5c7fbfc8d0e7d
SHA256aedf23fb18b10b98e4e2c39605e428c5002cc022cb0a95ce06a84a428c1c29a2
SHA512cf3fb67a4c287ae1bdcf86455e16741fa489bc8e9ea9554c38f28abf71b85e5da1120de5c99f539b770b96c27c0024127370cc493e61fcc255e9c37e15addae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54420001391ab54aae35e9b9ad1d1cbc2
SHA1d0997cf3cdad5afb3594826554dfa6b506afad38
SHA2563782e722a598eebf1130b3980034ce890bf61861754d456212347e4be971f8ca
SHA512a3331aec839af1cd7e32ffa1a9caa241c5c368ef5deae4c3618ec962913565ca2a519fe3d01a7b7d4f92c053e504ea9130c7d06525484f2f0c1bd689f0c6cc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50add3862b5325db33da7d6ee4b179035
SHA18d1be969cda8ad6c06d4b9e19c9de16fc0931ede
SHA256d8d7c15bc5510dd00336098dab61c7415785a1fe95f31014e01e2be94721ce79
SHA512c7aa80634c99efd40e00ff0bfa5916682e5f62cc5a1c7f2f6fabd2700b91b6403a379c2139a618a50c7755516d74bdb718bb17e51c9c98e8f2e5dd582f1200ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72652c0018f9bc0afea29557a6f97a8
SHA109d8fff89b6d342ce8f4310284d0bc01aed908c1
SHA256e4790033d1586a87723a796449f7c7631bb54e8b6aef3a045f754a211bf46175
SHA51214093f79df50185d4649311969f48cbb587878d73161ffe0805bde26ae467e3b47cfcdef0501f7ac96f1367a2c791e0a9eea3872a6cc8da2597ac19685a258ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52501f1d3b2b413b9c8b62d738e6fa55d
SHA1d784b6d5b6713a2faa73eaf67a5fb01c67e97c16
SHA256b44b88e1d0c77f337b6f1c61237284fd283d1f7c316aa35f6fa04eede5b33db3
SHA512ac4f72af5ae3a678f88c746b2c747418ce0849820d6841fcd2a678ec5c30cfed2f96177b8f0c57768c1260e5322a129370bc4893d085f2bef7d322da7a843022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e941c10b6e78963f3a7767dcebffab
SHA18bc301bf2fb7ae71307b4e8beadf02c232f9132e
SHA2563edfdb7b3d2e6812fe570959f68592c8bc4b3e2e42ba4cf2c493c2a56baaac54
SHA5122ab4fec3c5702a25421ceb74cd746e3ad8c3b9b25af93bb66a9dc01fcafd1d02734e63a34cf75bdb289ec0b9a4d959aa7636913cd15fe9b238f7c97170012da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e81fc1f2b7ee4d993352e633ae9208
SHA12052d5cec3e55754d6cdd903e3f7fd29d3e0191a
SHA25660f8d5af93528724ddc1efcb68697f6ae7e33c1618cc7a89fd76cada5bb8c8f3
SHA512ac1a7d47337d32fdf2be6da34f74aacc8e433ddc442dbeb56c8b6b019ebefd3e889dd7b2cade6745688554628f2111677bad3d5289d50ff78b0c67c4f0e1d16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50deb39b0255ae285c75e3c91e07c91fb
SHA1e1fe03d2e40ddbbed906ca6355b161b6aa4d7aa0
SHA256fa39c77078146f2ccec07644d697759d3b24ff41d09c4d388ec6e236c22a66de
SHA51296b367cbb46a4dbf016c51cfef25d28d3b970d719f2c66c4d237d7fc5dbc8713ee150a43d7c5899193f514e547cb886e82d5cb57f8004a5cd6b2e946e104c798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ba8d7c446d381e5dcc3596bda00fd2
SHA1ee617d0bf8e65495d89c92cb00c9cd2c39ec0495
SHA256cc166d931f75efffba4f994f2ea767ef1eea8b51b1be4e20aaf753d2bc91d555
SHA512b560fbb9c65f643b5cae850be196a0c7d683a2daba5579e758c9413e92a72436dc8b0bb3a68fdc768732e6aba84e2e20df2817c5febfe35f328d447ff5847bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9651c3f2ce6f55249ac57538a131fcb
SHA1a3a354a599bf1c80af1bdb0bf9bfff32d0a9c4b5
SHA256470d148e3be90ad73922e87b76f9f25bc9baa2e0edeea7b8b98ddfb6cde53798
SHA51286fae2fd8a7d51c0b864d64bb97cb445896da86d0dea7e83d9ec924f187e8873f28f46d400c72cd5d75d319618a4efa54c075fc20edfb9cb373bb5cf75a99e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfe3f46e45294336f9115e7f0d1e8f1
SHA183d5fe9ded349db664cfbd423972186211aa3282
SHA256bb672da5fe8b8d90d40bdd7016f7d7ee16797b96154687990d46bd58c5f50c55
SHA512ae6896d37f12148b2eca183129b08bd66974bb7e33df2b27e11c7345dc3b8c3657418333387a4ec9c5857fae687d405210958c8d5e27216f25bfc2d3335c0789
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b