Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
a25e32179e7399d60b23d7ce1abc5d27_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a25e32179e7399d60b23d7ce1abc5d27_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a25e32179e7399d60b23d7ce1abc5d27_JaffaCakes118.html
-
Size
72KB
-
MD5
a25e32179e7399d60b23d7ce1abc5d27
-
SHA1
b35c5cdb9f912645f2b792205b4b6ddb73c75a3e
-
SHA256
14b1a6ea878f63ba0f0d7fcd680ab7e836f07177f8da66729d575e379f9a5d02
-
SHA512
8b5b5d312693d4c4d70ea464d82434e93bce0b41cf2779b192120cea5fcf5534189e4da3b8bdc6f7fbb34d425689686a9d6546c8a9b297febcffeb99cbd25063
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sg67MBNTMoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3uTBTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000b512b091c1ef9aab0647c40b7d1d8891dc3a6589129eb31ec56647cc1c147061000000000e8000000002000020000000949bdace23b6e302bdb44dbc07888ef019e7fe93c6549fdab307892ec74d239220000000a65ba0c2823347202dabf5e7c6a83306817906260bbb6af6ebf293c83d9d33a040000000fd1b60f010cac7d2548b334c0d2c842d341d29e859ef136768cfce7c2693244803effbd6eaa16082180ce63123a8357fe464b7e2751c9b70508feb9acce85dbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424388267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A93E32E1-28FF-11EF-BEBB-767D26DA5D32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102be77d0cbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2760 3044 iexplore.exe 28 PID 3044 wrote to memory of 2760 3044 iexplore.exe 28 PID 3044 wrote to memory of 2760 3044 iexplore.exe 28 PID 3044 wrote to memory of 2760 3044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a25e32179e7399d60b23d7ce1abc5d27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8e11a0210068cddc6ef8c6507de352
SHA1db627bb6cbf7f749d61656488f4e00b22adb1a36
SHA2565506d2207c7ba4b29d5de810e6302197f33ce264e2540c7db9178fffcb1a288e
SHA51241a5bea7047bdc2cbfbc0b4607e3d11bc1078ed7e1e0dba05b21cc56a4503fdd1f84e22d91a2d9496abb28c42e21f2489687047bbb4825b975bb31cafb7acaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53896834a9f6870cf9abc93e8aa4fdb84
SHA18075cef5597e30ccfa9f8fad0f27c54984406c1d
SHA2564e21d155b3580427facc6bb695b2021f874e62abe2438777eb14a108eaac24a5
SHA5122929dc077fabfd5bdb5ca4d7c2a56674b3a1a8c79cc6e13cf4114c889c74be49c1459cdd33774e8f64b1e16fb55e426eae02307298bfef5268d787ff63b3b061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483a0b7796bc94c1c5341771b835a3d3
SHA1dddbb4f4e9c0e3c777eccaf77e127e23a01f6520
SHA2565a7a808a2f01b4c598f35c47b07fb43bd586b335ce9fddba1034234ac260efc6
SHA512a02df8e0f9d793bc57f769426dda6040d896c36a14c91b27873eff00fa71a2a42336b874fc0c670671a9fc4b6ee7f2cd92e48bf641f319e90a5a5fe075ede072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a8f6ce75ac852a063aab6801f7875db
SHA1dc1af257197bf1d3d1cec58b19b954a2aeb7f6a7
SHA2563a803f0e6e7241a0f1e6092133090155705a1289e0db87048d5e76a4d6c3cc30
SHA512342a8545713ed65eb1ca52e20fdef11766f965e430eb4dc545996af05809cf3fd887b1e4780d5cb206ae627946e0dfcdcb151f44f97d9450b6468a6c07c74c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150bea8d7a87c28d66d649c787805b2a
SHA1fbd02a70695283c8b82bf2fe3ff5fefd048d49b1
SHA256d38f701b190873362a763a2d1ff493de20d7e0ac5440835d698fc527887ded7f
SHA5121e77a568091a87fd2bf0bc76976849558a005b8635bbcd9d5fef41c0fad653f741c02d0d5b97334278a201374baea1fcd5c263398af4128b2ffba1ec74403bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af81065860ed954062dfca646d349292
SHA1d5c9e6b5d466b06b1bc27d17f610d85028b7a019
SHA2564fdb708f6865af298758bbc9fb2c112a416cb5a06f5f0c67e324269183f3315e
SHA51235b4f43b5b8c092046c4de53fbe0e9520fd2bc3541764e93b6626336081ee1a022ff9c1d123ba4494ad60092b9b3ca162265dd9cb4e0eeda75b5dd9f0c9796b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f2cd0e852454407e9395a2284abac9
SHA1d0f893019df6f82d051f91ecfc008932fa2fc53a
SHA2563e2406fa1b017fd7dbaf34ff5fb7455c582f52df0e62d95cfb7979c4e2aeefa4
SHA512a7a6d75dd2f9cbc29e38065fa590e78e8fbb8d3778bc83a240c02dd0e04282c6a1270a25d77ac7136c85b5ef387d029b263a47efe22f2f3dd37142cf98441477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a24dcb89045dc4c481e4964e10c432
SHA161875a4cb26258a97a41740c8074589c0e8520f3
SHA256e1fa6a915bcc60f2d32e5fcacd1fd51e425f8105df492441c5a71beebe96f13b
SHA51293e7df1d94a7186dfba85b6cde75acc4abc3404f6ab6e0cbdebe7ed0c46ffc3469c99c018e1c36d7ab872c21f6640c7001e5f1b29e75cdc75083f23a9bbb6d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fb3364d7713bcbfbee9101e08ebb4a
SHA17b7a2e656f9ec146096263b1f323263042804e9f
SHA256179202c1fffaf2a63b2fb4ca3aca2af1c8e6d9d86dcce305e0663a61bc6185f2
SHA512db5654fc931fdc6fe0826fcc116936c7e644cba6e9ea7727cf281f16c14034de4ec3e3d98e9d7830a0a1350ff8330ba05fb1313ff6d45fb8bb5fc9062bac6fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73841ef7888806daf9ec2e7337f81a1
SHA14e2ddcbb0501a80ac68445c59fce212c3546e023
SHA2562858a088fdcf91cc3831c749966b314240dfe20030185910199218ac052926a7
SHA51218e1bc3c57fa94aafebf1268574030a0fbd28de939051dcd85c43d731f3c05e0bacae6ef1d756f83daa44da146a587916d63425bac8649c6e8bc38a7433501ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3af89ccb07315adf7d7494e39ddf425
SHA1e8e5083727f098097a6c2330435f1cfb84dfd6d1
SHA256a2ff0e356455c188f6b14a9ad837945691ca88d859dcf135209245bcb06b28d0
SHA5128f9125f51c3fccd6f2f6a64861e00636659e56aafae5ada966c6604be41946884df0163b80d27405e703b1fb7bbded09966996dd20abcdbaa324b55b3d44e60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95a20b788721a9fa58a7c1ef2b9ba87
SHA192faefd9a3532c1e46745fd2c52347cbfea1eb17
SHA2561012ed1e879c8b6e7d30f5c952077d666fdd49a176933e92e67b0b0a247a0fca
SHA512d7f9a51a56a28a39ac96a7acb78ca195aff79326a6382265c56653f0415409b1f92df7ad59f1c8d95970164d592543175e058b8e6eaccb8f63a6148bab03bdbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5282a131f24e94f3ad2b12d71c79a8d
SHA1be820a6e985c81b25aa3f5e76ebbdcae19521283
SHA256eab63b1701ae3a59fe0222213d4afce6a4ecd32e9812df13aa39dfb67ea08fb4
SHA512a84e1067ae2b5da7e518eae61b44530d8ed8449b7e08597259e72afd9b39d245077a341286ed5c15b5d9315db17fb09a3d958550ba6470a545318f5b9097c24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb78da411a0b13a50cb8702a399509e
SHA137730f54e0bf69fe5f5a30abea784a123c49c78e
SHA256295a76332e17ea4a7ed2ebbada7a3708e2f5cab8803639e0e9a75ba6a93ad510
SHA512393ec3836e5e43426edc6330efe27a8bdc3c30aefc11c417b2714283611fdc1f91374c3bb481e3d85abbc55c60b1de80f8afcb5c6b7f1d8ea6de847f7a04ef8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500039c0772485828c6920e4fc2c4fa3a
SHA195b03c10b2175a9b09d0b370d0b7e8a45ec807fe
SHA256e61f92f7e5d001344182ce8ea14014467d88085db7ad8e32b0567e6827cb7c93
SHA512eef75f017a419d73c1f535915ffb0b7941d0d5823330c9e0f9ded49be4befa5f4aeb61eaa9cb5cecb1cb2cbb1297d7e948e9faf5b70bf52541848940425da9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f5b310a49d53e7dcc15f6093960a57
SHA160c2716ee3dc23c19fe09cf2ad73620ed9673b67
SHA256996c530facacad7a0880286aaf3de43263ad231e7595cfc00d3e1a2ef66cc240
SHA51239b918a0a8735a6312e9a6082747a9d7618cbb04bcd6adda865ab58c33f50f554ba80d66cf2f9ad838246b4acb4de522a9265e3e0eb33849d39ef751a6f5620b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1e06c849d51361c7df77cf19507178
SHA1dfa18d3aefbf1ca14a13570987b8c26081c2b59f
SHA2563a93df03a916c583af9547345fb45e633f1a7f776a8a48f99f35843a9149be03
SHA5127c35df77caef51312eece1040fc1532ec2184b3cf33abc4b9328811d0e5cfe10db1ef273a6cc4ab6bd10b0b943012e1fd5f3e3cf97bb7824732c2924ff8b27f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddda2a0790357829e67d6caccd4db3ff
SHA1296b59edae906a120ce516a029d2fc0b084781e2
SHA2568bb24f0b6b7c4bbfc9796a5a4a7c35fc7abc768342a25244bace6b31f9ce0be0
SHA51234febd83dbd6a1573bb65e7a1282f817ae41c4dff58162590ec2b337b40d166a6c6320c6a2b2387c9f10db44f831a25f2fa0afa31c5962ed617c79ac7737a08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b3ee989619a098634e34159dfbe505
SHA18e092d1843d60e9544c43155abdefd85ddda369b
SHA2568bff858b97bec9373664babe4d861fa15e0d699a0ad444562ba1d0d7716dd104
SHA512278503460f37295b91524daec0f15d3b564ea1899ae1409b698114c25b93f303ee07b829f93ef69b29ffa93977ab60f3d4fe37274dcb01458f6882183c8d3e86
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b