Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
a441c721f797ed89547ec2f6156e8840_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a441c721f797ed89547ec2f6156e8840_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a441c721f797ed89547ec2f6156e8840_JaffaCakes118.html
-
Size
29KB
-
MD5
a441c721f797ed89547ec2f6156e8840
-
SHA1
842d5b8238e97b42a0ba780ee8c58cd1afe1be2a
-
SHA256
20cec2f72e3101a5fbdba6a50f6a5c58081f3574966e593133739ec666af96a5
-
SHA512
66e638f6452093f91bda4f618e3f5359e49f7f11d2e3b5961b3fa197feb7b4a55f8e78bf56c5177b8b476d578f67bc37bbb404529ca48fba283904c1d8aed06d
-
SSDEEP
384:MZ938FWb52rVs3wqfZ4bFMVTKhfFTeJn+zEI:Q3IWVzTghfFTesEI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424422866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6093fe255dbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3872E8C1-2950-11EF-9586-DE271FC37611} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000001c9f79ba933d3794029dfb36adc3f04b4b6266bf0e01416ed930e0de509e8e69000000000e8000000002000020000000f4c3417110024636b8191d7539bf7cf2f099cb9e441a8c1b46acd6b827b610ac20000000d0fc2187926300d66d9a9d13130462ea04800ff6ef86e26e7f2de6fc03ad84ae40000000401407737ccda63e6d646f2dac4e266a707ba25f6523cf11e483186ef229cb47483b4305d4f4c51fa77250abf7dbc63468d9fd1e42296a9c79be7e14c8817b11 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2300 2948 iexplore.exe 28 PID 2948 wrote to memory of 2300 2948 iexplore.exe 28 PID 2948 wrote to memory of 2300 2948 iexplore.exe 28 PID 2948 wrote to memory of 2300 2948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a441c721f797ed89547ec2f6156e8840_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ebfc8c40d5712122e50d6507a5d66a
SHA102f04bd3fc44dfc3a3794512665ad8c84a499a54
SHA25621f633497b96c11db81d6adea90493646b1285643e66b52f0825fe3c83649753
SHA5122e4144a533767d3ac9ddf1dd040a5643c1c7a0fabbda617f7d913a94f654d48f2bfa4b3c9e85019b8e744af6962f058632eb7966d82ff1c2048f4e821fab8ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513975ca6d695fc7e149d7d0c896f4c78
SHA15553e0e44eb0105e062f4755add6a9fa4c87c758
SHA2560788742c16ff41a7916202b0f949d8f2006e57fc6af9644b4da401df59153123
SHA512b53a9ac146a5633aac620fe94364a0f9fd23e3306153fb48602c8d2d34dc6fb71916e08e3e9303add1d79f658c21260c26149c6f6c43a0187440e2268dfc1eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1dece442f24b321a2f3b520358960b5
SHA141d5572050d0e9731c549d891e790af3022b7c06
SHA256883bca43d978f0d865aa9b054499b93b36e064826ecdde27573bfdbfc4d59ef2
SHA512644b75a063292a1c315616552431dbe13fd4d4b5517409bec4f079ecbb423c57bd8dbf99b9fe63968f69c993f31d1dd6e394713e333742c4cf52439f640b674e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c58d14aa3beb6a4b83dc76d3dc91ef
SHA10f919b8667f16fa438a4752126a21e18bed20994
SHA25640088e940c97ea2251068f3091fcf99dc188eca4289223908c61a229b673117d
SHA5123ba167fbc2b7af558fcc7a47edadb924d757683ac4765d6f254d5fa15ff1bf14569380af621147b1d5c1b36c9e2c00e470620374ff57366763e9afc404c720ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8dc505eb9dd4f307dbbeda5bf887ca
SHA16e104319694ed044a41802af002820bae4b4a6a6
SHA256f5fa26dde1c0d2728e2ae703336924bc56aefa087a1c3cb3bfe76a4144daca46
SHA512e7ad5612123b39420a0250b6663a9701bf9e5e44200283cd45314196f0bbf401c822915bdd78612ac163018b80fd5ebd4529504c0a7c891bda14b00203c7413e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d9fa7d7a3d4d57a5be221b3677371c
SHA18d9e180b56ddfd7d417dd7bba370d43e9f19e25b
SHA256a9b80cffa9952a6940af4bd0293266ff6e92c381f3984eddea175497579ffdfd
SHA51235df056b85eba433f650811f9942ffe7cc0d16dd104b95eb41354d89f1f53cda856563a04590fac398e4bbe8e25b42035777672bd9ec727f968c6bb41669d735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f290daeaf542d81fad410ae80661df2
SHA17e7fe78f876ef6392ce811449e875de7021fbd9a
SHA256660983966f65e05ddd82d005ac09ab68ad5c8874dfeee2018bd7f4e81f9c5c9d
SHA512bee4ec1be7870ed594ec5d739d77f52a6e0f8cf540af170914e7e9fa099a4ae6fe876830f2ff341779bb7b9d9ba6c5f019ecdfc15eaa1e4a02f6e638f78e83cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dc89aa99ecec4982088a6461972886
SHA15d7bedfe0c115a4b90ce012d85934ba27bd4fe2e
SHA2565c5d789b20bba4eb4fce99da307829ab496e3817ca62e94185109339c332efc5
SHA5123855c7d73605aa3aa35a97e388526c5648f45a1222aa4d85a1773c87527dcad553d84e3a596f583f52bf13898bc42b42b3e4f3aa2f90b96f9e86621b931650e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8727fe961addec0c43f9d6c49aebb63
SHA1546658123b30632ffadb06a6a0fbe2627fed1e3e
SHA2569e326a972b5752678404f103a9b1ab4ed1cfdbc4af670e0608229a4c9ec621d8
SHA512c493fea80d0081d32080ec54ac75489dcd77ebe3e40837c0e1fbc9f12740705e58f687376ec98f4b5ad30b748b079e5d859a5fa24d616ab68d5527b08376b153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f106f580c59ce868b83693fde3140df
SHA187457563a09c34a719ff8beb0dc95aa5e1817dd8
SHA256c7494392e3a5a97624b46763446ea3c6e49e75bd547b97d0ec71ad259b386301
SHA512bd135bbabbb3bcb9c68da7b289ef794174debeeb375706e435c77ea84a46fb893ff8ca64e1460428a75c693aebf2ec704dd1656b75a98d7eba90dcab72aeca6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d818158781c982d8f793623adcb0b3a
SHA13ed6fa8eb7abd7e207a06a26ca9efe6c47b4eb26
SHA256713a3873fec4c384d53f2c9cd8f950e613345b9d78378e238010efc5149d683f
SHA512b219a75c3472d83b15839bdd21a372f40b5bf44e38db247d2eb6915e88f2dacfd999fef6caea3275d805f460c39ea2af46875e89e681eef0ca5f9c1925756a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb17d5ccbf87ca19c6f5e464f2c37016
SHA138b8338ec7bcd94ca89f23084929ba00de0fad7e
SHA25644eb724f4fd03942eab6a4bcba01a1769b0d19cda6a792119346362a9c58530c
SHA512c707450134c987371d4dd93b3d1922fe53bd6f43aa9af6c10933b8c63eda1ec8644d36e78b608469648db3a8c7f14455ab895c731442d89a2a6f9d662cb865f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b436893f3fbe0c9ed27c62d94a1e2e6
SHA1cc8f2f1ae7567ac1ecfaeecb52a70355090679b0
SHA256977fefca63d7c3d2a52df1720208c4021855778d7056bce279dcf409b01832bf
SHA512bdbc970ed0f307eecf4065dad7606147e7135030ccc2a8a558ca80f7f7b98b385866e0f3d3736df26d4118ac2a721b929f2a19ce03641d5aae6cf942b07f8850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd253ac15c017f59e8769a312e7fe0c
SHA19a9afb1bbafebaf57e4513e8b6ddee702de06e27
SHA256da1735f0e77b7749abffa540cc2b97a6be3833a3d65ad8be584067168f28e3e7
SHA512e64e2b3982de69e7fbf11135ae6368b80704fe2e85a2446f8d36b17354ce406354f9904a5ba3badc98457b11bf2ee2473c630ddd142a1b7a5d62bdb4d96b1f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b7ae060a9310c8649a422fbd3a887a
SHA1e5d1e62a1c91018e6cf2c729c3a03ae412924249
SHA256b4f1e2f664f95efbb6b5db4492fb559dea242a1997d2356113a925eedfae7aaa
SHA5121d025a33039380f6ccb9341add3795efadb0cdc5af4267c2d6b432088e5d161843832e36464884becab678e6d31b2a6a4076f9ad6af437f1d64afb73ef94f669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2c084a3c4d91bf0ee49fd1762697b9
SHA1a4c8e898f51838b8811a3ca7f3ee85e98789784a
SHA2564f9802b324d37c84e9b09df48331ea123fd31552574ec8bceada81e658101807
SHA51207f0a4bd60990eaf8c9695558ff77067a6516a24257840dfd542262b885a52f7a7751715075308b54d220378f143883bc93ea1869451b13fdec6fb0a94a03a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eda43f4acaaf3ca1052bd768c18f52
SHA1134b81f7f864588714c440acb57970f43923c6b8
SHA2560a77d2ab53c3444cd864d8561e2bae3870e95a7090f52efd6a7b484208fa2fd2
SHA51298abbb560960ef5fd943658bcf7941f5490f08341638259dd7a72f3a3c392210c4ddfeb7a7095fe1754ddfbe30b6b6364907a9965a1bf13df797089aaae81909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5acc656999cb3df6344e89707ec9815
SHA1cd055293406f45086a4de146cb5ccd9063135ea8
SHA2569caf3cb14a502d4f02b013942c7473b74361b7bd4d99390234bffcc10b3c4444
SHA51218c1fad858c4e6bbf3a05bc301aa349398d289d429f3085df5dba96e3cd031011efb8670ff6f2d6a6bc617e05d97d2aca543a100055921b9de63b40a9832daac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ac5be7b8961ee369e8e8af5fd38b54
SHA1f28d3cf5ff0ee5e330e19c02b3a4dd91cadf2e5c
SHA25622ee53f84cbb81e254ca342c87f1b522557b769fcf1e588a2896b286a8474852
SHA512ffd2682647d9c82553676cf3956b0c6df96769d53d83e17157cea9e727e8780d6c29bb5a77a111ba158b36600f1e08270302264a07982228f485ba84ec2ce7eb
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b