Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
a65cc594fb57c73cef8803b0c59088ae_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a65cc594fb57c73cef8803b0c59088ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a65cc594fb57c73cef8803b0c59088ae_JaffaCakes118.html
-
Size
23KB
-
MD5
a65cc594fb57c73cef8803b0c59088ae
-
SHA1
0bfa0b4e646934612b3f3c0a325cbf00217ef270
-
SHA256
64e7569df9d434df6b2702fc3ab0056618324f0256c6f8bcc926f5e8408a40fe
-
SHA512
bc4e3574d065f3c4f1e9b88be40eaf05a1de529bd25f1a2eb31d5263faeb64dc1f556676c876ead30d9a18e160e534a308d02cb817e1277b239bd146cf367027
-
SSDEEP
192:CpRSJ7dsUzsbFbyrwyNQZTrs52rdH7eHOut6lHjsg4KSPW/L2/5+vSkfFTeJn+z7:iS938FWb52rVsroqcSkfFTeJn+zEI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21AF17B1-299D-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424455900" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000da3a6fb8d27b3a4f911bc1e59882826a00000000020000000000106600000001000020000000785babb8ae5934cc67a472c7390c96c80c8aff8be2f79ec5dd1f5ae5dc9c3cb3000000000e8000000002000020000000d606b40917fa2cbed6a814ea1d76f88ce05c00291d5fb47f7ed9b8684c7f08f220000000714c823dbcd7d2e009c3061fcd24195a3b4f6fe4beef1bfabf72b9483987730f4000000042ff1e174558ea6c6ed3990838980b67c431664b0111a115cc9ae8bef99e52137922d40bfbb54a058c93ddee03efbb2c6f49d08751b6712ffbe2569553b1034f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e056480faabdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2124 2196 iexplore.exe 28 PID 2196 wrote to memory of 2124 2196 iexplore.exe 28 PID 2196 wrote to memory of 2124 2196 iexplore.exe 28 PID 2196 wrote to memory of 2124 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a65cc594fb57c73cef8803b0c59088ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da270aac04816738f90db06d8933c01d
SHA144ed14c23af2a034221fa94adfb14b13bcfcc326
SHA256734a4cf427be230756fd1fbc23805631929a349fe48b98e88a5b88bd2e483d5d
SHA5123767d3fc1c34dae54d1613902fa6af9608cb8fea906cba92d9ef19f7bb80b87353f946a8a6995dc34e53315eb678f132b995d10628e11c1124c80bd1735a5460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c894f63598ea2c7a49eeb227c91404
SHA192ec01f6cebc1c4c1f5e53559a2a1723d4f9fd9a
SHA25673ddb81d6f0736f0c3090e302cf74015775cdd3b2b5c99ed2642ea0b42a30ca4
SHA51286c5abe391d8db5ea7e185a91a836a238e1cba9ec21c8d72f59fb5bc465eeb44f9606eb3e42d7dfe0ca490d29d5c2497a57dedd0e25835926758cd0443089dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073883ff1cdac507e04d0f96963270fb
SHA1e39f3ddbe3b7df35f001af7d353c911ee9dea37b
SHA256000edbf197fbb1df362b228eca804318e5d94efd2fdfa948f7a7f1e37196c3f9
SHA51286704d85387ab569c530595ee630f00bc309afe5d2f4f6eb30a86477ebcd3eb645edc2980cd3e87dfc88c4f2c624ed33099ebb540ebdf9d2c52891cc1daaee1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8d47c25eac1bcda82d1c28131faf68
SHA1cb7cc44a8545a16c508beaee7b0f9902f30d5719
SHA2562105503ce822ba4c494aeeebcbe3e82d793854f257ef955c86a1b3322676729e
SHA512ccb8af1ddd961be674f1bf55718fdfe2d9a35ba5446657772e3bdada098e4e5227e0ea4dc00e7fbd33f98ea5aac69f7423b7de2e7212f79813a1f1e22af7be72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76f3dbe36d33ba36f68fdcd7f77f6ac
SHA1fbc9a7f25e760cbe3d254b09e8134eb667e70936
SHA2560319978e0023c64bcef21333342e84cb02dfe1ebddf3982569c7a31930f1763e
SHA512bea40492c6e2396e4f94013491f10a4ac5f42393407bad0a35a962e21a8465db5f62e6b5c45c742d0fd9dbcf35de53ed83bad27c4e3d4a7fd3dd12db0ae4a251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da3d29acd2a6c720b420db8a95c1d90
SHA13637f3fd4f588627249600da6cccb0ee358ced37
SHA2567d7f4f2d80de217b3b8a05a01eeb63c435689eea9e4a4c557455729b0fb81528
SHA5124b75a456c64329746799b5955cf33ae5e9faf17bed0317ea42c08b69a76bb901966a24598e420453bd5083f128629b0af3e7a0b9b6f9407ace6a8d5110ac7e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db04e7a140097368325f4faa9422d185
SHA1282e118d63ea9f2884570be68fc973e450524ca7
SHA256b2361eb9aa043a2f7c4a45a4a95039c00616ab98d0874589bd947d1b66d20a15
SHA5121b4dec5bebe03d1b048b4e5e5518bb6918f4268743fcffbc8a6ad6571a5b98a14d8c1f6a5a83ba970658513291cf74674f92297776cf5e80208d5054c3e17562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4bb4cae7675b56d999d7329f6e13f03
SHA1dcc4dbfc4ec14b2b30bee66b310d15a783f2e5d2
SHA2562d1ae2f4dcd2c06ce8d741e2c4061628f5df129a72fcc81fe0bd50441ac2b8f6
SHA5120f5509aa31eea6181eb4aafad8de41915db5c169c2ab7e005f752b42df67ad88f82e3bc12b132291326908dd2df484d3438925002c3b2a791e212a7cf264ea4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4bba610be9d533c1b6b0e2987413961
SHA10350bec83db45ba278c623005ce9d01c6560e4da
SHA2566ef563be1b44217a3da9806582785c0ecf59dabd80c7dc2826d3902340fee702
SHA512cbaf7b1c98a0658be22415f24b50b3c8eab66686924a64a719cabdad64fe6107064147502928843009678c71c5f16392b267e6ecc46acdba73ef373ae2b86d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3703f820db049f380cbbfad42480d5e
SHA1424430a3244be5571aaa8e9217777b943401cf61
SHA25652c3799ec9d37e67233dda782f6e92dc9917fa41984b1a264f9aa3dd1744e9f8
SHA5122f3c61ed017078ae37c2c8d5efe4f26965f5de20b360553809f7866985a030c169bdbfd490e08d0e43e4033c3803bb3434134dc415d70f94e8d4114d02a057b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53869525a379e6c54824966629c30a667
SHA18bb2b5a32206b95db24f38f85a57e25fd0cb1d04
SHA2563dabbece66c9dbd137d9dbaf6a4d8577382d1eeaba0891669c17e08f47501057
SHA5124b3446efa8d425c74bc6337d7d225374c31faf4252eb4448f502df31edbd27aff2cff098260530877ce6bf03cbb530f76fe233d4641256fe40863a8396c20caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6f369a9f0cf1a7088020d2a3e8483d
SHA170bfabfdb9e8fbfe67e1dac989de709854c483f0
SHA2564ce309d167eb574a701c49d38dfb52acedbb3951ccf4adacd586c76573efc8e8
SHA51257f01dbf6b5cd3be919386558ef861d8bc400aca3ef7430de4e8261d26d216c182fe13c8795814207afa7cba389fff485966d7a751bb7047cfc47fb31b1d1711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee0b4e6cebc27f4662a97bab8f880c7
SHA14110b0cacccc539dfc1de221aad1027875c9935d
SHA2565ef44a23b3c181e496b6ce51049b7a4ef8957b70369c387c4387883c683b69f2
SHA5123e4fe7dc19e4543377149071e88b83b68b9f67315c4042fc6fcecd178f37094db8caf607158ff642894349368eb065d51f0ceeaabddf90209ca7eaab18cf9e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe48b5f493c9722fa382a05424d40eb
SHA18a2d2e3e79164e6f9cd501084a66bf470c48b650
SHA256eb9180f4ec40ad85f046c07e4fff36a0c36e40ad8daa3383b03fc7bfdbb4bf6b
SHA512b9a2709d51f613a5b55354b6649316ad68fca1734cd64d2ac219c0796873357c98474f306bf19dd7954c82b3d9d60e659594c9e1b67300c9b19a5ace3043ee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d983b3a616a01e8f51fa53abfe6c8dc
SHA1da3c65901503c22d87127bbf57f5f58beb556afe
SHA256fff2925c6cdb2d96bc016eebfdcae74b45f05335783af1e006d10c6e751801a0
SHA512ffed87707748a1129f0ae3badc7f4ae5bbd6ab2a70568b836e05e8547b234dd2371de6dc7c77f6afe80e50840b83bdd058628e4e1e23b0fe91052857ca4af88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a07bba83c2f08f5854fe584d10ae61
SHA192346ea6022522ca625dd78b527238cc7f870dcd
SHA256c257a1e30dabeb7fa3145fa5169186e3fc1255c736ec9f345c6de07f510a39a6
SHA512cad20263eeaf71b8795220c3890eaf99d75d515dcf398a868260d994df16e7c4179aec9a85d8c8f9e6fb313384107a2fb235ed4ecbae21f7ab0072b8d9197379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100391a68a0193c2a9f8b981d194678b
SHA1ebcd8491411335089b72baccaa7b55edd253d543
SHA25608a5d650e795bdefe9ac3517b1ce7f4fc7fd7cb37badf8443e3cf3b3ef1677fe
SHA512ce3700af5f8e40ef5008be5e7438d03f659b75fd6463cab14d856839c89d1586403fee0db7c8b95d8939e3744548e5c4eb682e6792cc0fc65352fb597b25d78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58570cd620f5f4abd173494dc7e8c728e
SHA120e4f1e666786cabf208974aa2d254f87faa725d
SHA256cfa4fb59cb63f66dd544f1b51f531a1a54940ab9449b3a0187abe91653647d25
SHA5122f6331d38a5d4716506fb5920bf3291f44a41ac9b454c8d734ef14c2425f5bb37f0c54bf8c347e464d6956aa4e591be35e70fabcf97b18c69774d222f9d231a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b92f1b50c3748fd3cade029261d6955
SHA1adc95720d4faf98fa5c6f844a50719494f7075b4
SHA2564dc501d80fd3e317f7f7cb18875938eb044660c6b3a13c3a4c66afff749a429c
SHA512742e29cd066a7eb77b218fb1387b8c323c1e15650d21a7f7ddaea3ebc4115a2d4d728e109c5b2d1293df274814f8e58e7f301dd31d78046bbcd473f227825c60
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b