Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
a7502343142aad9e671aa64a656cab3a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a7502343142aad9e671aa64a656cab3a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a7502343142aad9e671aa64a656cab3a_JaffaCakes118.html
-
Size
460KB
-
MD5
a7502343142aad9e671aa64a656cab3a
-
SHA1
c95a868c042d8aa3e6b54ac0fe4d30cd5bc9c18c
-
SHA256
386d79311d0426cac34dd72e9298d7e591a647fcc1998b20ee9888d625c148e8
-
SHA512
9a23d39195efb4a781c48a3e3c330d2370fbed9f35ed30312d5c973d593e7aceebddfb907c084c9887fcda682d84ac5e7c49108cbacedaf5c67070f1cdf23df5
-
SSDEEP
6144:SSsMYod+X3oI+YAsMYod+X3oI+Y5sMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3U5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424486768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00798421-29E5-11EF-94DD-CE80800B5EC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02e06d9f1bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000003b3d4e49b3f3973304d837e3568d545df4d4b11cc667438b568e2ca633a74589000000000e80000000020000200000004a3d888d9bd88facb03c8ab717f39670d19ed11fc86b45bcbb0c51d6d4b3e4c220000000abeccdc436ebfbebcdaf7509252d33724f6bd04d53486c16444fa4cb17e295484000000004a2b5b11d787905bd5834906e92ca3669bd196a9c288c8adca9d0e573250f99bb801323322be82e7599d57f3fb82ccc7f4159d0c5422257936d7beadc43834e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1212 iexplore.exe 1212 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28 PID 1212 wrote to memory of 2200 1212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7502343142aad9e671aa64a656cab3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a0418362498deef5bb6e026ca93421
SHA135eb9871a07df904069cb61852c414fed5b35351
SHA2561e1e66371d7041147b0f8aa4f0ca1f03b692b12edd7870705954d87e1155a23d
SHA512592497490e737ede97a30cf6f1a73a315a2e2e5e12e29ae1c557f4952e793036aabb7bfacc85fe3df91b0b7d2619e72b3f761c7838dedf1e539b5886090f0cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c95a1e2476d4c289994f8e7fb23df7
SHA1f49554b2340a35114ab0907efd4d57df18b01389
SHA2561b121f16e44a815f5247c6696575d362229db8ca0691e8a712c9bf98667bc42b
SHA5120753ba49c132d432cbd632719f9d35a0191f3be49a29c709e842bf42c0e6b37a881f0b646d0012dcc29f6fb9ef4debe0fcf452263a0d1840d315ace67c5cb5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b072e3f4075fc96fe2386f2dd4cc7d4
SHA1f172b6100e10f1f69895da28ebe1ee02f34fee20
SHA25680825c16239fbf20489af3db83c04e82f7356bd94442b19c70e199f6d36996d5
SHA512834aeafc46ee1d7b8aa500aff80da236a19443e59f24519baf44629cea83f1662347548ec928969efb75fd12c35274ba78bbf7c1d3f7b9e7347a02aa6dc7b819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9a3cc1fb068b6804078893ba0c2561
SHA1f7cd691d215f5af3722287c5fea831c2a27b2789
SHA2562850aa52bf3692f4fec3f6ccda05757ecc597fe21de900cce43a9e5039e4b96d
SHA51290266495dcc23c6cd31ac9dd9cd47ada4bad090c93c37fba3be25a4b27ca082574b7d017fba8be3a5a12341608f255ba21259499baec85486a8e585a1e737a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a065a4958f34f27e7bfd8a140de4687
SHA174de030412b9dc680364b5a68990a469cb1f594b
SHA256cf2b5dadc0248d04d14be40288ce53fe2d2c97579fadf7985130073e77777a20
SHA51287a8f0545e8e052a9ea7b3fdf31a6da1b38be74c4ede72eab06b048c5b09f543ad7b6f0148e3ae7eed0304c3e9416158f0030ba880a3f9d00ce4ff8dcec1413a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880dc54b93f602277facd591d0f268c7
SHA16ecb7140d4146263baa09439459c6a9d96102e51
SHA256248cb38fe843a7cf99675f51479125f8c142d8fcde7e9a6c36096455058d8911
SHA51277d1440d5994edb5fb29b6f576213282aaf1322e6a6df4246def0e3fea29538a87b7d7af59f9c0421d07748e3579dc3f0c3f79748c67aae5e29abd0d94495bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d61a7c7bbd94dbf04fcd7824e90b1b
SHA138919fe35acf869527a656fd4c996ab9ddc42880
SHA2569da07b3d26d35438dc09b12d26d9f32d3ae838c490cc6153cf2706cfca88f2a7
SHA51251c243ff17dd7d6d8479209f1963808ace1e5187205667314676ad9ff51f5af55c288b84cfc939186855062c244410c13102617c01b5b5914155908d2e9bf514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596178cf898c756c76d2fb89c443439dc
SHA1a4fc719031a77fe35128fc25430a8b842586fae4
SHA256c96dd26d6f062c568dbf5eb8bd2e8bf0cd984fb859be8a20414442b0059f3cd9
SHA512653ee3395f489a13c393e7532518e2cff128c4d37c6e44c790c73165fa12a046b3397d95a4fe7e0cecc7b5b0af9b72ba8fa2ca43d271b48c5489519ee6f969f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f43c134e0e0c33654c4c6fa5a9cf68
SHA1dc1596303ffe4ea8c7039caf0ebc264e82a873fe
SHA256b51f34e2f4f6bcb6cf12aa14da15627914221cea508110f837a9464a506613a0
SHA512640b20565176eecc27df07ab3dbadf5992dfc9a9e13db0960f74806d480ae24c249b229d17d840d1ca53620b7c738c85ffdf20f0d0d7dd63499c71862e12ac7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc0026921da4dd77218f040ddb588c5
SHA1add4acbf88a853e8a6388c733fa401985ac92c80
SHA256c9e4b87b0691e15d755385acfb92004fe24e4b5e81d31ebb56ef3070f7f36714
SHA51238ca107b9f8cedbe756830dc41e39745e26585529318ce90c5731e2cadf0dced54aa1534d2c4d2cc70dbbed4457841d5cebed19d69613dde1e133aa6a50c573c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28dabaf988573cc8c20bf5e2966e6c5
SHA1f7df6566643cfa5cdbc4f0c7db7929fce9c4e6c2
SHA256840c92673af223ffd4250736caaa5a0512d400891bd2781d050336a3aa1c134a
SHA512f1afaf55cc03ac9891cc6786bd2deda02ebd8766508bcec9d792c75505db6847fdc05dd4cc54d44cadfa7f9461dc73901e7ba142d2e045b3dd925a3c79d793bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec82cd7b14a7086b33d7f48d5780e168
SHA1a5efa10431ad9ea03eefeef01f064fa81848a1a2
SHA25606edfdef159e3d3f97d76e982765c978c61acbb3875bedf176888ff2665dfd54
SHA51209f51a03974cd0b244e9163011fdb6e1868395ab49b4f863b4071c6ef93ee59bd799c9de74245d6904137bc0b2cd6c5c582fe8ed0160069f302f264467a802b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad506f73195c3447d5c6be9e22dcb5a8
SHA126a6babbb9250e497c175947416223f5b733ed20
SHA256912a44895db9dcdce166b16a0aa1dbf8839ed225c410bb033659fa2ce8d75be1
SHA5124f39bbcea207570f3ce64b44855dac52ec18131f26cb6cdf791db578ae272f184cde574ffefb6cdae77b2a5965e8399816c112f35aecea6bc03522657c7d352c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473f7ee67ef7b84dacf3ba4b78aa7935
SHA188a7d5395d426486fe75cc2b36ea12ae1f1ccf52
SHA256b0a72419dabc33570c23fec8d5fd8305458cfec739d9d5c145ae9f6fe2b5f93d
SHA512f0a71d1e6fe8f5e635102b4f1a8006b12036110d3bab0b7f01bbf817f40ea7a9660a39c9e09b2ae9d9da099eb7b057940d797d9cbf4507ba7d89cc63838149a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593f9bf7c52b008f878791b0f04e9d3ef
SHA15ad322ede332e67a9f1e7f589a4c65470f91c128
SHA2565986fabb6508f9db9e65046e6feccabc5324b794c3f54115aa97cecb368870b0
SHA512d9151715f78443aba911975408fc94f7000bd8739df13da8494e00e30b2e76d73f2e09abc5bae35d4075c2858b785f547a421c9579d911ded88f441d9d76b009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b820875da5d22154c0af8d250c0a0f2
SHA1fcc36f075a365d8fdd6839b8ab6a3ac518c8aea3
SHA256c20019ca0c89346df95e4c5d4d03032680f489b9cfc7766809a376994276fb3c
SHA512f0e6439e78ca45894f5159d3f7cdebbb14cf413fd03486d9eacd3eaa033eaa5ae26722d1b8650c16ce2173706f2591c9827a2fe85ca75673940609a815367dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51469295895f733ee93e2e9e29bbc3573
SHA1d4647c9ed88fa8c743b7211f7384d08de00deeab
SHA256022013b44186bd134267236921278531d5ff3466c5a4aacd3f9aa8c3f1df90c9
SHA512d1ab603ebbd52e6f570f93f8be10dca46c1dc3291cb574df6d4def2f954c0904378e1a7f304adcf70a990b3be43eea9f9688ae7d29bb76b4d66d860398ff4b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1bc6df9127f46aed0f9d5cf679121c
SHA1510723c7363353aeb1462aecd65889d0dbc38d0a
SHA256cefc965def959d33243cddea51b3307c434ae1da5d82cf32a113c9be510aac64
SHA512adb84d4e78deec151b456302a24265de7ca28f545c2bb974c20329cec1846979a78d2f4025860b8a33c53f74ca797fb6b1320ebf3794650c13dd1585dfe213ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf8cea78e23d30accc3df26d2fd5784
SHA1d2d513161ffde1c8b6a4c4737cb32815edd0625c
SHA2563560192d19111cc3ef0a7a4ae9510a004ac0bec5b26d36b3b59c55ca3574bfe0
SHA512a37e4665f27a1e0bf2baf2078b4e0cb62a9e6b5f24835352a09c066d22ff85262fa08e603d6f358d90b5b18b4d00b41e0e4d58e00ff7a2979f32e1ac8bb7438b
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b