Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
a8a79cbe126b62c6f9293f09e62db99e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a8a79cbe126b62c6f9293f09e62db99e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a8a79cbe126b62c6f9293f09e62db99e_JaffaCakes118.html
-
Size
198KB
-
MD5
a8a79cbe126b62c6f9293f09e62db99e
-
SHA1
783a956b97c6f9b2759ee82d114657b378ec25d1
-
SHA256
25f1c86118a919fba5d65763afd29b23770c202dd2d01be7e29d0e5e91a07913
-
SHA512
a7ad5ee03e8f5dec47998eda18bcdb55f0754f951a2b6b78b7e3f0760533ed3a341804db16a3842661a2378ef50981285ea09fe76b7cfd57fd583504a5924a22
-
SSDEEP
3072:HM6eW9K2oin+N49NDv2cVozI+/CCa0eUD/lUVVj6m:sMdP2cL+/CC4UD/2VN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000dd542b1ebdb479848ea5471ed640795619df395756eb0796deb9316b0ae19ce8000000000e80000000020000200000001dfeaabff676170d46bd4e3142f73c4ac243bdabf8078a78f6366800388002e22000000000fd7f7798603426127a6f28fac72dbe10475713f5ff0a09d66c6aa4457897324000000032e149bc5af34c5d33b653fed2ba4033b6118e4f45a7bcc16476c60d3451aabf321a8d03441086afe46e27c19b04d2a482ddce74510373566ecfad5d54b5be4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d430ab31beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5774F11-2A24-11EF-9E55-E6415F422194} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424514185" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2724 2160 iexplore.exe 28 PID 2160 wrote to memory of 2724 2160 iexplore.exe 28 PID 2160 wrote to memory of 2724 2160 iexplore.exe 28 PID 2160 wrote to memory of 2724 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8a79cbe126b62c6f9293f09e62db99e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589017c4f7216ddece103fec6de9efa76
SHA176828c4970cda73f58321b60f16886ee8452e7fe
SHA25641ff90e6da28e8ab8474faa5a359a922cf3fabc2d0f61ad06431878e45abfbd4
SHA5129c099e81987fb819c7154ec95aa2f8481a49c930df2e8bb4b5d65894603874e5488fa26bc29b643baf5a8308e318d25cf87e208e54936a0be92d9e88891c0baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca7627f22d7579910dc3b24105b5373
SHA1b4d441015cf4babc8f69b9adfd53edd1468aacde
SHA256d43e514d8cba3646e00e925be37d9c92cf72a0ac43385ebc95b62dfa6ac73b5d
SHA51279e5eee203c50d2191cb924ca4df5b517217b866d23d09cb4e561293883e1ba09a3aa3d3afa033e80bd95f51e8b3256c979db3df5e3c1420799c66d96cd9c048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e177704e8736646cd90152898b33fe58
SHA10d961be45c6113f0fe58bcce5baf9eefe769c5d6
SHA2566a5a0814b15899800ccac92f9f8f1d17d9d38499de7bd5c740789a2e6455593a
SHA5129a6090c81a9529ee32480d78538ec2fb7fed52dde580719f0763391cd3c74ec184f0e91a5096d74b519c5c65fd6b2d89000aebb73f3606e2342bd68fee08ef8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5504a7c7a461b84008600d5358f90ed
SHA100e069e1ddbb60bc5575ee9e23645be7731f25b1
SHA256feefe607f35fcf39c00458173a4292996fd2f06e5b49e148c40a894b648ba902
SHA512a2dfac3e3e3497f68fce527e21005b3d748266f250068bc036c74967220451f9535b1df2aa7c699b0c27a4e01b95525ba5f58d78f6574a68f9575d6656350c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af685571f495461f3b120273f257f95
SHA1ba1f026bc8fc011a9e147eb2db8e6af8052a28ae
SHA256bc7e81c009156f3af03530b5139a504a1aed55979042afa45b089f883e8405e5
SHA5125f9cfb3027ad9d4022ab7cc2b877a3f87cab193c2cffee62f2ce16417fda63c4316bcd673132845e6d642871484cba71d4fde1a7dc7a9864dc96f12f03807461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b388384af212f4eb04b8abe661402e65
SHA12fffdcf0a39adf65934da86743c62f9bef7e160d
SHA256145c2fd1137ba8a1af21bc56813c814256c3c682444aee49c0e2371ae2efbffe
SHA512ba583fe64f0e56ba681f9b4d691b7b6267e6da32cc5833be0b94b92750649c8ba84fc8efbb957712ff74fe6482226421f00633a662bb44ab63a134144a266e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee6c859ae7206b33a579e7e1bee459f
SHA1d380bb080099db287c186268eef35ad04a7414b6
SHA25670d9ed7a1e98f91fb9ae877affb63b611e7476c6e7385547bff626a816ddbb52
SHA51269b08b276357fad1025d6a04b5efc4778f5e2665d2dc0e4886d983efbff715c3c94072a753a8874dad108d86539a9109a37245168aa90b2e31f2b82454529e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520288d7173279b981940c74520379cb7
SHA17628732ab8f68eb43d0549e534695eaa0fdae99f
SHA256a624c32987f22ff30682d736b26f3d55822e147c881e95c0bdd8324b1f41a518
SHA512d67c10f1ec2f045d7b02c880b05c897365bed335987f63acc9e47d6f8dde6740bd1665cb004aa6b51d1b6c7d22ed8646b3dc26e1b8b1fef061637cbfa66388b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cccc3b04e34d1bc819a37bcb2b9c87db
SHA1ac534b361bf3e397e527b3011e051fa7cc7d3364
SHA2564da8e435e74dcca7c7c2b06fb97b4b71e7b412b25aa30355fca4c5463823b246
SHA512602aac99e84e6cc6e108eaa075e358f945117a423565c6600653c16d8b86838d4ba89e47387f4e8b0784ae9e34a3f7985bf49e0b97a52587408aede0e103add0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da972e56dd59d737c3df9270d7a40a4a
SHA122e99c124305a268ee0029227ae3e703a4805b3c
SHA25653649363647760fb3419b3711859e0deeec954c9d05dfce2a1f32ffd0075617b
SHA512456d8b5f3bd291691eaf1365cf527b047f8126a43aec34f9084f41817d9de29a8ec37e8b7ac7dcb6023427b792bb578d10418e469f73be79b914011bba127efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95d1392041e3375cd4a7052c095b214
SHA1c90b53b809860a925c869bd50c236abbef8a0697
SHA2567027b23b7a1cc72dbe6d40b1ce5835fa4b1f110dd57ba86f667dc41971d6ff12
SHA5120e032d2be6407c1c156b591e6f8c851383bc25e1660164ce899878aa5abf59cb8dd44f5430d867444c48b83844af816b7e3c81904346f95027ad9077c800128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56583bddddebe4923b2d17fc1471569c9
SHA10d24dd342996fa43eda9d749a17b038bbe070035
SHA25696612a388c35d9848d117319f61f3005676ee72d500265935c20c443c60f43f8
SHA512e6fb20d53227d75f7d80bc009402f0bcd3793e2d9313550d2e499ac2b250298555bdde54e16d8ca213937acebb842e13c3e7919f5b7df07721f443ab4053bba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3ae5e3f123a53f861b0b89e65b8d77
SHA10bcbfdb803d50ba066fbdfc5294ac4f6adf93694
SHA256dd1cf27b73ec42c610c8d96cd404dde2207fdd415f40620b466f7e91fb767ec3
SHA5125feb6c1d74d4abf3d9368d2551eb4033edaeb810a040692063ff7b711896d39b35ada229fd7601ea30eca925a8a2db40675d689175a990cba4bda91a4bd3f3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a94d3198f38456f76586463ddf2f3e9
SHA165781e61efd1d45b76fda71410ae6238cfcf0679
SHA2567cb4a4a3274d2173abf3cf965805da03dd88fd0bc5a72657f6c683b57bfedf71
SHA5121f884cc107856424fdced0e44e04f2491fa6bd346a25ad7ae0e3a24c621aa30a47667cf17921d6e512f1f8b70147fcb6e42ead3c5d0af9de6a859661831bbb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9326a49114e537bfc6846e41daa2fdc
SHA14e7bf7f9da7e8677457b74155717c2c9bef71667
SHA2561efd4c76c198dc649367f03364d672cb212fd36c6fa502172674b585ab582570
SHA512410ec39ec3a3fdb24dc5f1008d197c9272379f2ad52eb3fe21659253206af664d720199eb45f2801fde4706970eefd63263428c09206745eb8b1310db642b3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9008fa416c5013e5a110d033cbe2a42
SHA104bcb669207612ad5e2e34ac2d1cd60ab72eaebc
SHA256c6a650ef947fdf999205cca3f267fd81d3140e299650d96f2f3ff72093dff30d
SHA512826ccc3c0831f46c77154a222200b59920ece0cbe9fafa15a08c75b6f5f577298b12b1de05f68c7e7d82c23284f3aba35f54f2412ad538c0b63adee6f25b2f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e17c04d145e1d195525a55c3148881b
SHA1320706b08ccb1f923206f06710a32df69432260a
SHA256f078f0a5ed9d666bf640492d96a26ebb08d13c4b7e15862def71e200180b3597
SHA5124d30144df0fc3a8538a5a50a02e05e89c8068a079f756c0daf7a6f71992a884b15e072e8453f957d69bfa7c25cba0ac87eaa80898915176c55b86bd4cda24e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8d2d4a67001164dfb9a2d4506303fc
SHA1697f51cadad775380be6a430bf4fc5ff812a69a7
SHA256b9d55fa16cb4edc6898f4137e4f20c4fe0d288d3b9512974b0b0f5591fc40556
SHA512dcc4be8fa71f3084eac52d16c6ebbcd497df8799cbc0f0de755f6a2a27e7f69fe832c3d8b24b8d95c61abaf07722953b04fd1f8250b923b7daa1f098932432db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f2afe5386db08d340839d841236ed6
SHA1f0e20804b61acc98bffd833e356cd98787646edc
SHA25670bf838ea39fde95283c8d7ac3ebff282d7209a8be7b0320c352ae5d481bf2d0
SHA512609cd13babe4f253ed6b5919562e482db52486f6570092fa392995f78273256fdee7550264b585dfe5bc090fbea73317d77247ee53960d4d02390269bcfa0837
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b