Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
a186a03bdb73230003539131eb6c8528_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a186a03bdb73230003539131eb6c8528_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a186a03bdb73230003539131eb6c8528_JaffaCakes118.html
-
Size
65KB
-
MD5
a186a03bdb73230003539131eb6c8528
-
SHA1
b3a92924d8ea7e23e1d9c5252b903432406b22f0
-
SHA256
50b0d271332cf0988515e95f746d1876b4522f6908d5201a0a981af9e659032d
-
SHA512
a00a133956ca83e3ff8b9b84e93e641930e4f4fb5726bc4f6858d01323c6d2b3950e1b236b5a20d383526bf14b2c98fa4630ec351979457e14e92c7aa247f9d7
-
SSDEEP
768:JifgcM0St8tN99OIsZCMpvN1tNo/oTyrhCZkoTnMdtbBnfBgN8/oycc8QFVG8sPq:JV+q1hTugec0tbrgaCcFNnzAC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06b3acceebcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000dfaccbd29c8819ee014427a9eed1ae79b4a34e1ea7fbec5e4b5e95ab9eafd213000000000e80000000020000200000004f496e18e36943cfe8e1779e4cf45a7deda4fe483265f5061b836b3df732534420000000aecdd0dc514b0a849506339caa67434c79f8850f4a8e3f41baf4b09950afb9af400000006a25dea1187c4f0222fb51abca89c4e263258c04e6d85913ab1d6ff95bbc741801a4f58f566239d2f1cb9135df81f3492bad321fccc3a9f241ccc6094abbbd4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424375512" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F60FA5E1-28E1-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2652 1688 iexplore.exe 28 PID 1688 wrote to memory of 2652 1688 iexplore.exe 28 PID 1688 wrote to memory of 2652 1688 iexplore.exe 28 PID 1688 wrote to memory of 2652 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a186a03bdb73230003539131eb6c8528_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbfb133f4c4106bfb3531d5a31b59b0
SHA18690084536139f47180347702dd630a505c22c05
SHA2563ff1ce3e6a84245c6c14208b1ad0fdbfb5a0bb4ba51edeed4beeb8cf82965660
SHA512760b1a26eb47240eb251a7de417e6660141f0e139e8b5b0864fd31672153fad15184c67768e3e94a4ca986f7174a1451fc50ddb96444fe94f481213fb0e1ff19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a70ad0fc59a4fbc3866e087c850bb0
SHA1bdb0764de607cb01fd069913afaa6c2e668026db
SHA25608fadc4b3b3e47b2f961a44f648999012f723ec2e30e3f9ce41e4af73cc792b2
SHA512af9fb52f811771619d8d820114153aa591a86904f40148217bede84c44ab9d76ce4b6d37ab42489f3a7a143be09e2f71dc1f67aa5716ef8ee1b2fc67a32a9125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50496f40ba6bdf90e3a96038182c3284e
SHA168e362652ab4c53d36a9e0f0869e9fa076a7f6b7
SHA2563ef9ed669d52eec7857c631890fdb35506eaa44eaeee9267f692d3217ffdb2e9
SHA5123d1606d938800125ea7d984fdabadd1a605ebcfcc3c06358d1705ada857387aa271bd3f170ef8197f6ca83aa4cc8576fe22910121ccd2c81c038deae526c7647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1cc4740f9df40dce3fb55fac5303f8
SHA1d2978bcf62bc4d027a67874a8e2abb1a01bc0d6c
SHA2569d3a2b515ff7ae169097da0b2ea8dc21623cce7d6a53d11b9961752e9c6ad570
SHA5126c761b16475dd5c9e9bbd7e28456d264204f7681105b47f5e5bc4e43667d7a0444bf6663233f86a5b5312acac6bf772d19c6108503fde1cd218cd59219f633fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac3e040d2d59ac5d178d9bda3edf234
SHA19cc13b1bfd650dc77183d27ce0507e42dc960f48
SHA2560250c05845c5c3f9bd1f9d5f049a22b682d92e61349b814c7293d66cdaf091eb
SHA51253694d400df09469a044fc4f9d8a8177205826cf4ea51edc61ab2657f7fc11c5b3cce93804da2619d0a65688f62ebd1e92d9c96d371ecf09ef2d7b009b84ac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abfed6be2be6a4348ca109c67276bea
SHA118b26be9d6396ca2a7eb32c4c1c0b4f18cec423d
SHA25686916aa1eafe4c65ca4e6e30e5b3e9f1545d5640a87812d8527bc9a99fbb0f07
SHA51291433e2a76146dc0091fc7c93e5fc36e6cc0009df3cbbf9016d0bbb2a86fa8e946bf9e24a3e5f3cd4d347cf8581575761bbbe34a77d27610592d73a5510f0b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bdb1cc8de1992a1d0862b5b02f827e
SHA14902678bd864f9c9622b97e9ef83ecf6c8918072
SHA25624d4e08d1b92f0b6033627722d926a77881e675865a4f64051f6487bb63f1569
SHA5128cbd8a5b3724cbbd8596779e1e8c9bf8f23e6c657676dfe40930a315183289c14f51043c4ab22d8d499a06c8adb072d8095e872a156d002544faee73e5b64aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bef933270ab8a125dc0e1de34b8fe12
SHA19528c53bd433fda716fa54b5622446fb1409e3d7
SHA2561f947880dc17d2088bcefead6a5c4921708c11d1f60ec9cbb181045f49bf84cb
SHA512bacd0e7af951f845e17d12a21a21cc5e2304e3f4b4189c9ffc44be8376fda0ef31b63b51bec6be5859ac2cec99a5768db463cd323a294ce75d3b287976a8d2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaec7da03937c1f60e8ac99f11056518
SHA130508dfd9702ca4fa5d029840df44b1371cfdb24
SHA2568878ba6fde139d28e72ba7336681da9d20f6d80b8c3b937eed47436ac16a6302
SHA5129d0065a08b6fe092f3633aa7405e105422f70b97a56e65f2c315b4b41e5c080803accfb5360edb508f643561498f95f52ccdb999ed7a8060fd117028450c032a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1758149a230532be1dd310e4d40a993
SHA1476782b0a11aa6c10b6190c83a7177b8469e0215
SHA2566d33218ef5bb3dbf742288a4d92ba5ba119b650f1de62fcd64e76147a6546027
SHA51228c9e4aa92a3315e682a55c0d9bd24f08ee155669621478d921d99cddc49c76597a6d1538b81ad6081b3b14db3e8e84823a602622e9162af4becc6409ff2b9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa79435919bcf17b8bf16f03c7dec81
SHA1e4ea9f30079d1106ae45cebc3b713d0ba41a2e76
SHA2560add23c9232df7eba620865036b5da334d35fc4c5c2a5045dede02932fee8512
SHA5129a9b6a27b345cc2f98c8a17dd1d6df13007f06bd02df82726297756f374e23594d05fd87ea38d5242ca9bb6c8dcec1cdb8c90a44c19558dd16d7f7dfe7f8c5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b203f4c7457288790752a750c6e46c8b
SHA127a071bd8664c11401d7c4c2ad0f5bb4bf8d996c
SHA256ce1fdd455965a59e112273762c70f1d08f8638015c6dda9cdc851fa48a1fdbc5
SHA512441e90733792163dba6462ee28a981a60a25006510d75537f7a949ce2c01535b8a21be1d6d1cdc96e064f6eccc3ce030ef9c2e3191e8d602989f18559bc19493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeba8d7d99cf933c51564fa7908e7853
SHA1f44f76c015fe8880aac4a416c3f1b44c7fb081b1
SHA2560e8133b9178520d0189e4d15984726f382c0f7a306f5a49187f3421a4593eda8
SHA512860181b2ac4a97a86ce6113ec9e97c6f7a7cd067eda2526bf1044e74e9c7eaf65d8555b39d6396172befd2e72bfc7dbccc98ca585a6d5acc0757e31807176319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1cb32f10fa14cc87da82281522135d0
SHA177239ccd90b8640733bf1487553e19c540a51608
SHA256ebf08ed0ed0eb2593c086978453700ffa3972a459584796b6c41d0f4ebdd650d
SHA512b46a979116b01e4fa622c2e1a55491a130e5ca86fd9b30cd3431eaac7eb82c0041fa29f22c0d3e085b3e561ed4ba1ab82253adde6f0ddbbaf59e2891b3f8abad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d467c77c0c5e83865b9c7714ef5e8688
SHA11c22644f1a5f37c1049a959d2cabadd511b1fa88
SHA256c280149636f504710d447cc4bf73b2e065bd4cbd63640136422fd1185c4e6a9a
SHA512798f8fb22362f255b022d1c9d50d7fd0d4b7117fc7f716c66496f3136e1769d4c36c980a0a7a3be99649e337d6f7abe5ace21cd8cbf4fb41494963e445682984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7d2909a630ee56e74155a461cb6ffd
SHA18466d76a587535e5cbcd8aa0f6aee93b48696f09
SHA256676df375e055b73e04f8e5601af0182403b45536205ef3fa5fbe31a4673b4e2a
SHA512febca9774eded087bf6f8dad5d1c12c0ffbc9af3806ec8093ac2b70d4954580a97d861593e9a04a3b40ce24872cbef80c91b13763124ec4522e61a196e97312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551be8c0ee5196f20e7f5fad583f42b89
SHA1c73492d92db6da94418e65a5b60a077b5e43cc86
SHA256688218d36548b6296cc9a8c155d76120280858da986267f80e215c50780e26fe
SHA512a1d4a1df0b11eabda0b01e2f3266b275a14392f0cd8a9b0bdaed4043978575546f22f1e6ad7eae8ea804498a16a95bfc4e90b0e7dd86910c46d226c37a70cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e2ef419bcb1f63386d2351af0e36a8
SHA197eb2e7bf3ffd2123511fb5009787c0d8877e3c9
SHA2561167b48beb3c18428382fbf16269e73142a9bdf8d8d445af5d897c5d080c8b63
SHA512ec22cf2d39909c1a92683aad58296d2e530a669490302fed91c27c4fe1ecb977eb6735c900ac572918d235e1bb51c953c32bc4d6d9ffa63c33e5bdf1a3c1e8d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b