Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
a406093f5fffd299d30a43fb734e754a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a406093f5fffd299d30a43fb734e754a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a406093f5fffd299d30a43fb734e754a_JaffaCakes118.html
-
Size
349KB
-
MD5
a406093f5fffd299d30a43fb734e754a
-
SHA1
cbc507fc43faab69068a49824b0c342c9ba34a2a
-
SHA256
de04e823bd75683fc57f7f64cf1b37defab5025bd13e667a2914ecc4aed37607
-
SHA512
35cd92f1fd77b6b3189db29b0f64e91e03af150bfb23c24b9c92294f1f3cb92535f4ade93c8c70eace2142d9055239a900ff65c4ae4c86634d63e4959dd0a65e
-
SSDEEP
6144:SmsMYod+X3oI+YRsMYod+X3oI+YAsMYod+X3oI+YQ:z5d+X3/5d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5082c12d54bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000109f0e310ccbdc4ab9c8956e7f6d5b44000000000200000000001066000000010000200000001fbf73224c2f5b15cc21cf788335c90d9df7a40c97a2ca20225e63a4988bf705000000000e8000000002000020000000e85538734b0005059433ec07224d6f255fbdff20375be696d5ac11cf85fc57f420000000f23b367e56b890d7bf73dd93f4560214e072da693b24987f3ad4f09e6789cf2b40000000bc4ee912b9c8a5b82b74874a7ed229779114ab052185e1bac0b3c3045959620fb338ee647fcb7c9b6008093de40ee28fbfaa8cc70004b7e530e5cd51d8e61cfa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424418951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A57A8C1-2947-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2944 3032 iexplore.exe 28 PID 3032 wrote to memory of 2944 3032 iexplore.exe 28 PID 3032 wrote to memory of 2944 3032 iexplore.exe 28 PID 3032 wrote to memory of 2944 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a406093f5fffd299d30a43fb734e754a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b54c7e6081b872ba53e426928e4440a
SHA11d90e04e16792f83066b1438bd1cf004ca18a724
SHA256b9956ef0f004e96be8efb402f2491322bba7f8213ad333c5e0dcefe2c52a0699
SHA51240acf8afa5858a6f257a44c09a7cac77d407a2f37664f37b61bba808493a8c072087e6a396264875dce94f87af3b1ec13bf29bfcf4a9eb4fd9de6b53432a2698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ac685e2fab271555d5027728061b70
SHA1247c8523ced7e1583c50813fe2be6f345fa486f4
SHA25629f7047d00ada82ba4b776b0bae5ea3aca0ccf4a3767a73c8e4bf9de5ae96558
SHA512220617b19694435cc94f6556dafdd931fe68a34b372780dfb729f9f62c722cdaa4b2bd92ba815dac670bff5008724bdb29c00773c0a63619c0a49718bb90d0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0d60dc8a11150ebf97322d2a65a94e
SHA1bbaace695c2856ac93cfe2930a4ca832bba5f4b4
SHA25629c26fbcdc88a5dc7c6b0f8b505a14cbb5e6623be0b9c4f7a868e00425925a9b
SHA5120dcc0863e5e2bd7937ae14802834b7353bbcb202ce5e1ab59a5c8a33790ae26993d2be67155dd6fcbe0ddc327210ff7a2f0283dc5584d5c4238653d7497891c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53550c2a7003878863a3516fb06df8ac8
SHA15369da9c6df3e590530686212cfc6587fb8a5b9e
SHA256c0576b0dd604a43689566d90bfd4ad916354a7fadebaa97a97af25231a991eda
SHA51261dc069f3d8bde279d4319e57c9a5609a69a206fc5a7c8a80ad29378c82b67e96f8851caea5549015cf5bd6d1ea2b8545a91fd6931f3d650a5bcca4f6258b5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519255b2839ab4d0d6dc1969127cc1916
SHA14b67d9c3ce7ccb2f2019231aec68c9a7ed0063f8
SHA2563cda98ab20453fc95e551efe016f7b385aac0d26a38ef0a34e8e1153b40c4430
SHA5127287686a7d3d334a57527ce386bb06a430e3ecb6225f1f798b12a273c00732545591ab83aa69689cacc655b9afc166cae9499252bfa8a9864500cca7b0f49bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cafd616c02d00706c017fb7c7b0b10
SHA109698a64904118c62e00b999cd79d8065ad8f191
SHA256aa4ed5e871941bc688a909a9d3036f5ffe8811d683f982f0c2bb384a0f551798
SHA5120f590772362c0fe3146e8b0d3f55fc606301bff52a27b100c01e5541b85ae452526b9679c43ea312bf1783e589b271c979ecd78c19786008f8e6a8189d1e1ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c8261e55366cf05c6a278bd094bc39
SHA1d94210d21ffc1270b477df5af4deaf7f2511af2f
SHA256f92a3d54b19d3fd66292cf679657dfb9012b8dd7776a80a2a3106bfbbfe302ed
SHA51207f862349dc089022fb0870b946264fa93f7547471cfcb7442f993c572b33234fe377f8111e1f9e22e4e1bb4997dc9026c3488e6afbf863b134693ce62cd83c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd50e495217c1b5b318e215355f99bf
SHA148812bda66439196da2156444856b3e7bc44b06b
SHA256d375ec988741bcd03cb09bf8844e5c8e468795ce4ebcf3710a59f8cc9852cd57
SHA5128bc7e84698f8629c30b102c7cc8466caf2cb810a02953b500a6c016168e6f230ba647c199d93d91ee815229360f9729b8a177b9eea94a1896ae0fdb862dcde49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020cf512c6340a0b3d28358ee3fff00a
SHA1fce1151b37866ac928c91a984d14fe32d45938aa
SHA256c1910ea689399e93e0b2b5e3e86417d33ebfe479f60e5018d223400a6987cc06
SHA512d18f4d62ee405fb1c8b7d824a2ef8edda73730e5319105c0faa19cbe7b177bdba9b0e80aa45d7ae72064fc07df2d78271a9c6eaf2caae8ba1b027fc9c77263fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec853a820152c1f1b3763221b1c79e9
SHA19310da7ab5c48eb86775c263526460776accb4da
SHA256e0081dc524b1f8017fd34f9607dc28e069ce0f983a50ba3662ea56644f356de4
SHA51218b0c534f531aa500f985541fc863bf52596027af4dd82778c0b3f202fd5dbe0e2b46d937d855d28d6fa4011eb3489b226d1262d7467a67e770f1b88842c7cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52141a7338c49a6956d7eefc39a26d0f5
SHA170e561bccb3d092b56cf198cf4c973e1e9e614fe
SHA256efd861edc8c032ad96ace252ade5fe4d7c9ee8404b323df85dfcf0cf1236a0d8
SHA512c74656ebc64fcdc3ff9cc2fcff42513a27882d25b24bb0588d5af7fa3939090fbde0ed6e0d6b9c8a389ec926c72f8395f19a0b64e99086fd3ed006a9c216a930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd09bbd7e5ce366e894e0ea1562be65
SHA15530abf7190d2a82216b0535d4b3dd3894c18a85
SHA256b08907c2bffe8ce79b582af364450ffa3124322577be7e74b0dee85690ccfccf
SHA51217a80f091a12bc5e0aa5daeed51c13b2495615fe110c70642b7d4f754d26339c8efb72ac2775ac75ba777e807eac2941712a7ccad034de9b3efabf4b82130bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9051bcef3b975fb78af91b9f4356598
SHA1822c4cbb2da1e7f7d800281dd914b219d5e5da2e
SHA2568fd345a0ecce2857b01b26c4af94f44a1ceddfef81511c7ab06e60aecffbfd51
SHA5123ebdf11b4dfd4c0326865a557ce3a2beb69f7f3886d60be8d4b7e205c2e9b8368afa5bc712e052ee18f1b9ba9631f6ded7aba60ab85ad9be7d3a78b95f86c332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcbb206194b7fe1761f1b8fb102c3b08
SHA1247ac27b11d3235c4d3c7d8aa6b4d144660bc652
SHA256227df9b8b6c982ac14b175335e8414df4ee6e9265719d36dc6547e1263866e8b
SHA5124fc863bedbcaa4f55c8dd11d79971fa2e2e18d7c36b13f2f69914336d5ba57fe93114a1148bb7d37413a584140b60cf6e1db68f29c9895b5376d24fc79f79dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bdcc95e98faee5015bee397a15094f6
SHA1a85a6dcbfd2ed11ae256a33f1e176749c1c6b296
SHA256c5f9b6677de1167431ce54815e52af6431fa47e62b27f1205628df972a9ee8c8
SHA5123723673f8ceb039501a1a50b9f111983e35231002c6bb9ea4e44f9555ae5546790794bdba488a0b4ed7760fa670bed57b27fc571e1cd3cd1e8560ba258dd10ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309a6d78e455035ae670ee3a48ade872
SHA16ccffc7c632580d72cd2e3ef6c2be4272874540d
SHA25639faedcb5fd59b3243add45fca4bd55d602e5c74c9906a520d90abb36f07bf54
SHA512fbb32fd8c918df40cc065d095bcd29afa64fa0ace9c17ad49db97833d5699945ac0b466875a4a573d36d5a67617828cac21f8eb67a4c653f69e679bad0ce6ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d6dd7ac38ade282a99e5be9aa650bd
SHA1da29a7f9839e3bfa94a3203ce9644570c4d6db0d
SHA2567949425995caa8fa893fa3ed5b6a3b71b1848c8781357822706090ac99969000
SHA51241279b5e1683bfc777aa39c6b7ff80980809d80bbf9d8796c34e052bf6c48a2cae09c90841090fc6148d9cc9dff8517f87419a5a8b7cffbb8c925c226ef3f2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427d12ad3e7610bb5dcacfe09a7af5f3
SHA11bd78cef7e42f68833ea525bfd63a701177c3faf
SHA2563107b96b4df4146c0315c43bd3ec897ad2fb92de5287d1c4f9173ea006853bb2
SHA5128d99641da047cd6b1128fcf58809b180d83438ca99655f57395bb9e19ba2b6c2c8bc3f799c139615991968bc3ff0de4bb2bc15c6e3700f161bfb83f670632519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b87fd79904aa6164d01d67b291bc9d
SHA16ceab53ccdd03364f4bf402a0de7eabf47f5e0da
SHA25651fee4e5febb0078feb81774e8dc19d7521c75c2cf24bc7d3b5c46bcfe9357c5
SHA512c2b42adc5756b4c69317a69521d169434631cf3588ca6c72795c71df2de7a259b72f1fac1bc7f19c74bfcdb551d122cab7c683c1cd3c80bee5047fbc7cd5d01f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b