Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
a594b9c47b57980269add55f6972c138_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a594b9c47b57980269add55f6972c138_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a594b9c47b57980269add55f6972c138_JaffaCakes118.html
-
Size
460KB
-
MD5
a594b9c47b57980269add55f6972c138
-
SHA1
d6cdb0318bae8ad95ac5d542a2f38ebd503300bc
-
SHA256
eaa9355cb9b98c3f7afff3128bc0c3de5afa53510d5dbb4a034325d7dcfdd7a1
-
SHA512
bf13376513f1b63062d291890d4d66ab570278f914e1e058e7f08fcbdb30bba954f4cb93e6b9b96a77e944e43c591aeb1837ad97a022fbb36ad8b286e92b6fad
-
SSDEEP
6144:SBsMYod+X3oI+YxsMYod+X3oI+YK/sMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3v5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006d434bc76e885a499fa4557cfbce8066000000000200000000001066000000010000200000002dec170e105f1ff6fea1819d310924db9808d4bff737b63b540350f28b36be33000000000e80000000020000200000007682dfa8a732b6fcc1c6e195b37bc4c34457bebb65645fb39fb5ec27f2fd8800200000006d8ceff35d18a15dff040fe29347bfead4c5b22071c439271b64f6f3e1a1e18440000000769eb1a6217e626b3d94110c725c05d961a7012b3d1d238b11fcfd6b573c3218f636f52f6709b76ec9b8ae933406d216d7b286fda81b5103cc50ba76f9feb305 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424444216" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED6FA661-2981-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b075ffc58ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a594b9c47b57980269add55f6972c138_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0b3de1025da815fe0f017fa6eab7ce
SHA10fc7ff82936c8518dc32cb9e4fd6915071746857
SHA256ffddadd750a106bc22724bb232f52cc850ce367bdb377aa2f0b977d41df7fbb3
SHA512c6854611266ab888c5eb7d008ad58ef85b5ad575653fab55003f3211db568b0e3d96b4737349221938457a6417d3a353f90e5e6bf161c171873480a8b013bbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fb8e8eb26257b15ab1d8c5da5a1996
SHA18991a1d9ee8062a039952ef77985a3b30fe87c02
SHA2561e6f66316f7b43bdb257ac25e10515826d798d7eae1f8e6badfdd4650adb15a6
SHA51204b1a10fb857b875e41d43e02bd5a477f48d65979cbe66a5f0495ec51c0776d72decddfb2123f7ad60ba6a2970304701b29274731905d483eb114ed566e87ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2117c605468fe1941ed1886846edb7a
SHA135b8bdcbf20bcb09f868af1ef5aa30069777ed87
SHA256d5b751e43ebfe675e3e2d710d71e8e42eb5aa31754e27447a09a62f408b56401
SHA5126e45d068ae91a5ad1f62799bbf19408a48c688317166861a542e0df6b92a1544ec9893060190f8be6fb934273155ea7be1ec2d573eb7af1fbf5c0c17a4a58f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ebe8c38505e98f326273b2ff91684a
SHA1f5edcc1412d91d21cb04029b521cd6911cb49340
SHA2567624489b60c6119cff363d54297aea6af1668be6e8c87209933660e583be7c5c
SHA512ed7e731c5667fe02971ac4f3170d0dc946e27497a8f99741a7cc6a3729237255b6d51c2877e2c56727f0958e98556ce34d22c67a23990631bb6bd4fa14b23de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe6ae55f94d9cd4c45244b80cbc893d
SHA1ab4506a433a36c2d76642e7e2177bc980533ddf9
SHA25628a099425dd3f761256a8856c831f6bb69476b196a8d44327bec909023b40ade
SHA512fb29bbceb39913199947867cb82cb257fbceb11ab12f74db085eaf02d100f27b74cd237dffccc81d71533a50367e9731bde63c317fcbcd77d260fbde452c8887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4655ed1063924334b631ff9a00be51e
SHA1f845f9f2ad403d740b43a480fec32a16ed8b9d66
SHA25685fb674df0a244dc919a5404ad5790557c6136444f66b79b74023fcbf64a3b05
SHA512404eefdc629f663fe98f89949fd2cc772a0d6ecad379dd4b13e28e650532c7a432c3e772e29ebee6ddbf906d503b41d1649c9900da70bae51e136b9b5a0b87b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74dd53eb7df487d9ca32216bffbac92
SHA1b0132c9bf2eb9d8b98366481d131228f9976f70e
SHA25698d167fb13d26741c4ec32f7d66f24bc2ac1651da4194a9c5817af86abf1e69d
SHA512bb4c96521f1e5104f6e45a532dec09c589e9b4f626aec31bb5cfae27876176502d1a36b418c1bbbc1c29a5e7b40e136982c8ff26f50093735edac115d3817d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916d748e2030ebbb2139785ab3505665
SHA1a8cda4e5578a52d25007f8a8a08bd511088172b4
SHA2564ef595a36080243e83592ce79e768dd19a3b00c6d383caa46708c16c4ea6151a
SHA51246c4394e12ba41faf5679b2624ebd7fe03630bc792dee9f490a83af676ceab52837df49f9d9e9a0c1a3db4d5d317b69668a47876d2eaeb8c7f584f3e75bee608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc20b20448a451e4c2706ffdefe3c7c
SHA1329a7f58c48dfe72a9ef5a906905ce7ab01bf801
SHA2565fb47664c154527ee457680bc52101a2c501f31c15fce57dcea5264629e3c521
SHA512cd468644a2a47765ee54b4802b34ec93d9a87d7c78c4550b3f5607aef8ef248b06715d5e9e1ab2e65b180fe75077663c7a398faad3730a9d657d5584983e9afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594859c88f99c2c88036857f00e06b679
SHA1217fca55852488e591df39aea115dc32eb421b65
SHA25676168cd1fb7d2793b6faee2d4459d68eecedd586961ffe819035d5ab4e272ef4
SHA51296f0b4afd9a797bdd6c3727e01676ff2c58340f03f5cc19e9a5cce5a56f0194bffca0c23be80db17f88035e8452112a12b0a1d4fa98cd7f408c72aefff1930ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4314968961c91d236af0a8643fcc31
SHA1fe8d6d9535922fe680f94b3a9fc1576e4faaf970
SHA25684bcd6eb36dbfa500f4281b5108b74bb5f2c598e91caa0b794e188801a7e33d8
SHA5126fe522635ff961bc11aa4851d2f2d437bd2be330968dffce3e844c705b8f4f518c3b611504bea2a7c525cd2863f86e0311645a98b57e5488582fd354e997dcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e2c09f8081220b945b9101b27b5a53
SHA199bda21db239730d64b8c0ee99dbc7dc9670cac9
SHA256df01a8227ed71a6a46c9e3ba206efc51e7a72b8089dff895df54950791999e2a
SHA512820f60b2a247c1cc32a5d24039f5c5b56a920666dbca97af474e62dc930d7b894ed147315894392d02549b788fa85d1e0780765f06722ab30553443adc1246ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f500233b8fc8a2add35664df633b6692
SHA187faaa9856b5ffd30d24dd542efd89d3a3b38b36
SHA25666f8bc7ccb455f4b3b35ffe82fa47bf32cff7f57daacca9d7809d8c62c0d8260
SHA51297e0fab8504f7ced9fc60e279454ddfc863a8f5b299f56116ea3c8dc5b4b507544b06a297a361af7fe3e5e9ad4ac585634458fac88e501fd41ebef29379be91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c022c7b4f662138713824f7a887b6981
SHA12be2cec12a748731a9246d0ecaf693ce9ac8a6a0
SHA2564fbc8f01156fd68697699f83e9f3b6ebe4f675297a307692f1140e9f1ae70fff
SHA51293c34155ccfb2698dde1bab54a241358aec462d29998dc6eca8ea7fba770fd4454a10bf16b12e6b0e606aac45c60c2b8baa969949a479181984e9b71402e9034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51205354be126b021092d7e5557ddb747
SHA1304292e669e72050323238a411ae6dbff783486d
SHA2569048414e048a59ee05873f2eca5444468a8c5606c0cf695774c20f59dcb5d1a3
SHA512e5ecdf652357840314d97bbcebcd38834eb2cd6a094618f7029057d6c6f2fecbc119ee077bf134b55ed692a2de7d7341020dac6c18958b99cc268146bf3d88f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066322d2177c011c1695bc0274b63353
SHA19518725825f863966b4a01c9f244ec6c89661071
SHA256ec93ff3ca21a861b4a40d3defaef048274496e473ef09e0982e3c7e5e9b8e73b
SHA5125ebd493224743bd727fb59bce57d67722bc20a60003c770ed4ad85883471c9d51d58fbb5ce1ea48b785c0d83c92cd084f9521b00c9258ca72e70bb484cc8245f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9932b952ff7e09ca437c364292e3b0
SHA1e081232222c438a8b47578fbbe54a87451089d41
SHA2565a3d75dd80daf8a4c12d4675d0b2f9bdadcc664b2bbe9bb42618a40cd09c53ea
SHA51210e45e192d523cd0c25f8424166984e29a2f289d4606b3ec03f5f4e0b2786d225fc7a1631fd4ffb6fef3822f33f8b93cbea07599e5c23b3920caaf8466581e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e249dab68ea67f92e9cf42aa4ead13f3
SHA151fbac3e5f261c6551aebc57e80fe0633e42432f
SHA2562b386bcfd9dc15f1390255dfcc16e82171b04e76665b863cef0d9ea3aa8e9a17
SHA5120d527c3401470a8b1319ff054decf91d938209fc13f7c82fd41589382c6b89f8beabe5bc16aaf6143d2daf45eec664d6e31bd63094aa18d51d9d3c032b9d5534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b3dd546ad7aa735881393942a11463
SHA1eba201e31d333a841d4bea57105ab6903bb18d67
SHA25604135448176ef3f09187c7a0e23af33eed2357c29a6e8c9720a34d5a68a3a261
SHA512b83d51c4ed036298362899b044b1cafafc8506004f782647d55e9890d6079e706b118d150d532af849e0b6045c84cd5f533dcdbd223edcf987f9b63887d92fc3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b