Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
a0c69bb87aa84335f50bad1218c6caf0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0c69bb87aa84335f50bad1218c6caf0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0c69bb87aa84335f50bad1218c6caf0_JaffaCakes118.html
-
Size
460KB
-
MD5
a0c69bb87aa84335f50bad1218c6caf0
-
SHA1
20d765d84f89a4fd5848f80e701359ed5801e464
-
SHA256
e0a3eb333bb910d6f278c4be4cc6f4516da0df05ec2af006ac12e076a971c5a4
-
SHA512
fd39c669619312dd7fd62ff1cc26474cb01d93b133f657cb1768324d90b455e3f0ba5f085a136b973997496e9d02f7d5ed3d0ee7c90015c6d95c9543577160f6
-
SSDEEP
6144:SdsMYod+X3oI+YbsMYod+X3oI+YcsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X3Z5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07fad8cc9bcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4256901-28BC-11EF-9267-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008fde7d50bc4938488f5d482dbd4cb9ba0000000002000000000010660000000100002000000057b41f3ea424990d754861cb681aeda10433d8e17ae12c4b4364b412f28a6923000000000e80000000020000200000003be21c66f344f1c35cd0f8a898e3c07a0cebfee0462b2ba59ef20c519ded814820000000db4df756f2c977663c82be7616a8e91d7df61fc82a0b4c270647fd9edf774c1b4000000078227aefe44fb96b8302c5fe208940eca8fc37004a6871e3e6dad677945d56cfe3bfed904e7fd512631adb0467c828c50279325c3ec91c6f0fd325781e226ea8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424359508" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28 PID 2940 wrote to memory of 1032 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0c69bb87aa84335f50bad1218c6caf0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec9a31a20f89a37a472170dc7e98c24
SHA14761b09872aab900733d7b2be49145915d14ef68
SHA2560ad4f4defa463180eb3873435ec7de5c415cf27b702e2cba1bc600929108e681
SHA512cfdc763c5b0dd81d16edde7d0dbe0dc7487075eaf7bd4f5f2398c5d72132ad175964fc3db0d4a84114df571ab8e975b1ae3f031058847aa7bd8743ecbb4210a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1089b6e9cfd37d85bad36b57cd58b7
SHA1cdb9030363419915e42eb82be1b38611d5536163
SHA256820e955871c275a76b022ea95e70cf8684e3ebe0c0e11c7ee7f85cd5af1ab090
SHA512138ee19ee682f027fcb996a5cc2a832ccb0e4f7664fa2143a41413d09a347b7ac7fb7ff1d0390e5e8ebb753e23a0a8ab25751b927641d86a1f261b901c5ef217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7aae36e8edc1e9f55bf4f2e4311e4a
SHA15c964ab6a1a839a0be5d1cc320ff926000853bdc
SHA2567a2898bbb0e1bf0013ef320117b0444120ed24232f680f51a3b93315d27c26ed
SHA512b4a37df2dab16ea171d4b16e4bef10d44b24eeddd07156842af7f6ea5b49f62f13f6c62cf91546206a73d94c6f05dd22a0ee3e29bc826b3cf9a6ba8065088fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513eeb179bb35155761a7df013b5a749a
SHA1e5c5459b1392688ac0255aa684eda7c903ad2423
SHA256dc2905f45560b559cea437a9792b826d44f0e1d285a6e3a27d2ca3a46afac4dc
SHA512c21f9a987d399471fd590b1709a1cc5317199a89c8fbea89deb2ecd10aab38252d6f48d79dbac5ad2b814dadf932312fdeddeb0b5402574022aba02633aed176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50776e296e960196b482c17d0646b09da
SHA12bf32dbd5390358429a63b2db6f8b0bb0b7dcdbd
SHA25611deaffd0944dfa6a66fea995a77b0f0a718e437df5d9aaf38591c965ab308e0
SHA512a1fba849f23d1cf70b8c20c3361e637c319b0bf9d95637db6ed2a3936a48a9840bd9631174303f043ffbd4f4ae2e5915a96ccec54753d1172ffaccb33f81a65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f785388441a0c9d6d8eb4493e058b5
SHA1ace73d18add3122841346a7835f578ded1b4385f
SHA25650ab5b0c6e5e4a78551f11e1bbbdc98eaa7185345010daea6670d6393779f8a5
SHA5129c7341bdf1a173a980f88cf6c48081d5c8da8d799a2b3bf6eea894e602bf00e1b3c6dff5b4651f41542c85bc04b3a9dba6b904ad536c75b53df9856d305d8d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a6d04780bdc920f9d53add23545743
SHA109b120e7ff96dcc1284583e9b25c1fc7ba4cab61
SHA256593248b1ebe2ec6a8305ade7653812e3956bfed2c2f52b498358df5ef4f5ee38
SHA5123aeb0a707854ef8a1239687645762ae41e62652fc011eb65fb3fbf91c6cf7a8cfd5221c0391ecb5122c4c32af9b3e22c8ad0adcec40dd0389be463994737c701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a86203439267bced08020d5dc350faf
SHA167ab2b4b54eda0c066248c52997d8accf621638f
SHA2562c85136fc5735542c085ecdcc6a8a25c0e403b1f1bcc282d69cbfa47c44ccfb6
SHA512966eb0f9eaff6bf3797cc06d9d74d78597cca88d0779f6a792026bc0a9146dfde0acd318e0703627123391063e5aa20807b159ed01e00bd89216ed69f1007524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af50a74f6a1d7b6e9f28e258b759d848
SHA185a8d58ab208ceed7d44b40390c554dcae404d84
SHA2565bedade6da9cabc7e25af70aca4aa74eea5fa65c00a9a7255f813a14bc155433
SHA512ed27a23f855ece684b7030efffd5cbb02f08c395c25f3c46939c654f57ae592cc7d3eb1dd39ba1fadd2ca547bac399006cf49a5a9fd9a4cb7e5b11901c67a11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc22b985f17aed587f51f7462c4bf6c
SHA1655192e4f7b98e21a802c6cd4ca7fb309a1fb714
SHA2563812af724ac2b16306953a7c9cb769b19f4e64ce7480cbb0ac62c1fe897b6231
SHA512941a587cf6f0e51a91525bba1a080cad933a6f16c7292ca7a8ec2a965e85be6f81d519aaac40069d6e5a04548c0a47693dc6e1afc5104a5b08e23827d332255c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030532b26fa2ae10d6ddd4b03bd3d317
SHA164289efbf0a56fa4bdbe2e5f7c6a52938f50626a
SHA256c2752e7d748823c90e860d6909babb40fde4317e92c643a4bf598178c6a867bd
SHA512f74bcdc7b03ee3627cde3458da2220fc13393acb3a7a783f4f3de29c78d54c4f6124f17aceb2b2af77258e44d6dd101be9a9155cfbb6c4ce780f483e5963cca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d353d9d78af1769d2ef58baa46884a
SHA1d80a56a6581355c0a9a53f5ef5f1b0f740ed02d0
SHA2569d7ad2a1a8b96cde8e2785d576bdfb6644676232d7ac3548e417a20c10ddf139
SHA51221a3207cfda9cf0fb48894af27e70a7b93f639c244791fc934dc9f7bea45610aefcac7ac80f85094f2163b5120215166b400550baf8da90fa57c7c5392a50a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6c67e7cb313f6c7940ca2d9bfc0e15
SHA10f1d614babf81fa8cacce3fcd53e01f63774b2e5
SHA256783643b3dbc8dd6681bcd2fda4c54d19e097f9a8a77ac4135f2561c52debaee1
SHA5126c5fe30af95e4020ca40814d3911e5f944e42fde7db5cd7662feed7e83b79ea11577241236b6ebc8e39cfe536a2981289ab9a4a05405b355764ee779d197f430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570233bd3ad627ddc327e091573bada90
SHA18430880c8aba3022bf88f671fded9c6a06845aa4
SHA256bc33fb7a492cd3991504b0d6cb8ac0c1ec73c6187f25d8e055d4f38ade18038a
SHA5124584ff9e379c45b6aa87ecc1f490157bbc43207f16893352661f305bda3359db700e48db83bb928ed11057efe3c68b70a0ccd7cb31808cd37d10edf47ba3711f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d30a25e69012621d53e202fe0ce663
SHA15f45599e6906b8e35e5f0c603f9117ff32572509
SHA25684aa35480dc1f4be7923d867c6723e2aa8726aa8d3ee3d45e84b50d97c1d0649
SHA5124c18e8592b0abd402ea775f5ec861ba7711958dc66603e0c4f2ea530f76dd75dba3a6c70c84fcd33e1bd3b24495b8b11fb12423d5e5652bbdebf828f6e59c38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587566a86bc2181a6709bfea6be18ca76
SHA1d17b370869ca788fe05ee93b54afa44cb1505e8d
SHA256fcf4f047c4f357e9e1470919eaa92482ae39f0407361777c9c84eb87f9431df1
SHA5120158864354a513e9d429f2a315acd5dfa5b23e134c4f8c905804ea6aea7902099eb2d7b290f8a9cf6af770e15d8e576e330fcb847cef9b0aaca2587bf7d26955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e55ed19fbd330d9df8ffbe7bb0549f4
SHA1d9ea7a3412c40eb3e5dcbbd291152389d8d429e6
SHA256d70e6c25e067acd435be9f0a865d6616cfd388df7a9449ce4a2b8476cbf45f5a
SHA512633f26756ac8b2d5a8486b0dfa88f58f327df568f4d84c1af9193997869d9af30c841ef64c7f308ecc5ace6fd7985826da2f6914a474e616a924aae1b2a1c389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160ad57c6e926ce7ce56bc73dd8c310d
SHA1e4278bad19dd6d4386d9449ad39802d0d837650b
SHA256cf60e9db7e4e1276c710a1cdc7c81d3cac5dedd719a7fb1df7ae1b3a616b4889
SHA51254de51c03fc00389eec1cba23008624b96449afa66919e5dd1fc5130e179bc6662b441e1ea76a21516ce48e27287e7b3426c2de0d2d4e1304060d18d4331f6a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b