Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
a8cca81e429b6a2eeecd123556fbe991_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a8cca81e429b6a2eeecd123556fbe991_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a8cca81e429b6a2eeecd123556fbe991_JaffaCakes118.html
-
Size
150KB
-
MD5
a8cca81e429b6a2eeecd123556fbe991
-
SHA1
928e6f2f5be9d28a2bbf9fc31186c86193f708c4
-
SHA256
6f83db7f2e6ad09f57f4e5c0fc143b26ffa3c910188b1c82c3dae9b51dc32816
-
SHA512
c861fecad6916b657ae83999298dffb2366335fe91da5fcd5d13a38a39b62d4b19a578ce363eddc105274b03cf5c786f1242bbb0feabb62b5b580b36f115a7b2
-
SSDEEP
1536:fV5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSnPknal9G+Y6m53B5XA:T+BES09JXAnyrZalI+Y6XXI6EyA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fb386637beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91B4C901-2A2A-11EF-AB73-5214A1CF35EA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000c6fa3641f468311062fdb47102dad9ab3cc7ee7317b56fdbbb9ef1c0260794ff000000000e8000000002000020000000f22cad0c78084eb3b03e4acc916dda86935d712fdeb38cd99202323226333c4f2000000029fc536d2054289063c99961c6946132577ce5733996f8f5a5ac2c1018433c0240000000526178003123950d56920ec0e09916a83fdb8dde581dc4c1fea7c6f96ec6ac692dfef012b3b8ec8dd95a02b314fa2939d238f36f36a5a632960514e95011f5b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424516647" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2796 2192 iexplore.exe 28 PID 2192 wrote to memory of 2796 2192 iexplore.exe 28 PID 2192 wrote to memory of 2796 2192 iexplore.exe 28 PID 2192 wrote to memory of 2796 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8cca81e429b6a2eeecd123556fbe991_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f02f3791c24e196eb7f8a62b1cad5f
SHA1354dd9c80a18b5c1ddcb1c5c7182135421c37049
SHA256f995dd21fb5fcfd9ce93974c1fdbe17f5b6823589ca2a5e69e3470c3056ab925
SHA512c197f4f3f8cf5020197dd97fc30b4a53d383212fb60cca623e0b66f7b4ffd54fed611b64480ac0d978581f376b53ab140d4c3aafed8e1a8b9c810852ba9952d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779e7b36d1cddf7e1cff53a25b8e1e2f
SHA1ee4fa28c8cb3640b2ca2f3de5416928415ddcd74
SHA2569f790a232ff74f1c1cc0f8cfa269d8770e4a55df94c4b6357d219d9f164e909e
SHA512224d13ddd646d795f9e7ef511c53953bca815f585bdb96648e30c532d9f45028cebf6bb55e76145621029c041e54ccc9af90dd2dd25e83bd67357d89a18cd6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5caa399f0deb27df13f2cda2537601
SHA136f3455995c184b18c2139f1e5b592131c2f47b9
SHA2568a163e2ec48430aec80436d7ecac3e1838c9b34ddb72a416a3455af329644101
SHA51212b85a6dfe456ca43930c5f0a6f198336d7da0885e301cf6757abab1378d6a56cbf278fcced542150e3c5bd07a9da81e8eade51f535fd10fadff7826aed880a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ffa76f0e3374dca76db61263a5b174f
SHA141c5fedbacc4aeb85c08cd0dd46fb86359b9585c
SHA256131aa07d402ed053853f314410e71d632eccc44c5198b2746b8d12e351fa885d
SHA5125d247ed5f1e31d0fc641bee2a460d199aa1945b1319859a0050705655c9b1a4c00f13e891199ce22959ba184fff400da8297d9d408208abfa9b54583c62e0821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba6056441423631fe4a0f43c66370ca
SHA10e1b47ead49edd45570b6233c708818ed26bc215
SHA256be892d3b6e08d7568dc1e1f5dea4eeb28b072df92a49fee17d5638cf4d3a5df1
SHA51235b051e3a30436285eb83758c57d4e9223214e1c80d2a724677b5b4c619474157b38a92dc92376a06c8457efcb07ca026c8d1f37fbceab0c8065e6d73d1faf5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54959bf91cb01b74faa4634c0bc0437eb
SHA1d5767466c1d495ca37ff2490f63c0e1375d27e6b
SHA2564f7979ffbe732c8d44350aa6874894d8d7154f9280b1286fe9071eef7a3944ba
SHA5122d86e0a4ac1f35a2d28998738cfa720a125325bba9af72d0fcf89874d0a6780ddece4cef89912db73df879e37c35f5f339193d9781f77773417364c74eabaa34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c47c13b7982a03f4e26350806a400c
SHA161a03a6533b329e08e70c73e1d12a5dac39b7e39
SHA256a2cbc5fe7aa9e929cc0a628ecd70714b8e7295eacdd947aedcf7df5475214f4a
SHA512845487b51c682371ea05bb38c2824ad5aec0f68cd3a17867b881863bbf5e6c6c30f1e009ce346c14f6307b044d1aca057d5626821af8f874e39dd5571812e7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce52abafc57c7dd161c2c22e032a1cc
SHA187f3d6ab6ba62f42ea46ea16ac33a8c94784c828
SHA256d76a10b094a371cf3186cde23b273b7b78e5773c0e891c49d1c21b0d24c24882
SHA5129535b9edcc940ea5dcc868d6e5fe7fc01ce5bba10c2658426c522ff81c146e7c2f005f18c5b9044ff3b3d3ebb06468902f2b65bdf7c9e75b5ffaea019f08a52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868e8ebf208878f3b35b477ba9609176
SHA1459315909d58a3d20a06856866f035d5d2a46adf
SHA25613154ac6c236b2da9cd4cfc7c1d93b9be692e0b5a8dab5fd7f741f084ee6e148
SHA512c298e619507ed81043235879862dbe0ab7f4534b8fbc18241d4cf6d1b646c6ef1917802699a5725bf6422a92a05961d94a061b8c1d19cd4412fa2d5536146e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08c95bd759d2963eb2f789648c71538
SHA1514a5119361ce2b81809a7e642b956afc0041d4a
SHA256d18700dc90b79624f516a0fec08caef636fbbb881b830222b6df3173cea5e79a
SHA51237c1a41a12c3faa88c16fe2dc1f4ac0d4ca432b26514fc215d4dacb4a60c8b0b172773d649d3a1c40ef22587ecf47fff63da67c0c02171010d7f7d497c0c4e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ca5fd2c0798b6dd539f5a4b6d38530
SHA1eb2223062f280816404b27acc85a03acf54ed839
SHA256b0a924d1bbd4e44ab2c9a149d246e54e32e8e1726241f7bfaf9e70e6de67d40c
SHA512946161583111b5542be5ac354945f3669823df3d4136f41452706e7fcb1409beac3870dc31b19558ab1847c79a47db3d51135a39c83716d6ee65ffbf2be9e06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55618cf1ca44ae23da93c7a3f434237a8
SHA172424cccb43dae5102a865efc94b256a54441257
SHA256c03fad209894f459b546cd22834a7d89936750af061afe92ab9472a7d1d4d044
SHA5129eca6d6245aa4d4356776620e082baf14c185897bf660bebb661dd6e2663734751b2362fd3609a1a35842d022306c7157f26b00198408416054ef3f82486e37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42eb434d9c9de565a55639c99fd145c
SHA157b3045332d7c9c9de4ae1a391f674e6f4ad05d7
SHA2561f0d0de10a457c6ef92761639b3b1845626ff47cb848fc415d3868a7451f5326
SHA5125f2f6cccd5a442e385886d9d9da5974b63b355aaf8d16376759a02a20bb9977d90d5359366dd03bac754943878725eb07336d2b3ea540f9d7d817f5a84c404f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b741b773265bf3dacef4cafd30e57b1
SHA1e21294e254390df3bb5da1ce6a392df5433e71f3
SHA256fc02625274f555a7919b201d053d5a29673a5696dd3b273bc9d4e64525eeba6e
SHA512169f9be44cc8c786c11c7fa42ae6386bae1834b37c1cb0f4e8a2aa51d4ce555627560ce56187e1130bb4c6aebb5d2ed2d639062fa8c6aff92fa145a9a4d2cdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088a4678dca4c76b1cee9308502f7d16
SHA18172d16bb69700daa0f98c2dbbb069d2b34c24bc
SHA256a12216c8c0509b0f9fdf199dd85c97f6604b8403b922d0f17c4f8ec69c832e84
SHA512ab3183916abfb2aa02752cd4b3d426e075b7eff61a592426b609083774e77199b9e7a2dfbd8df34f55379a8cc048e46e683a3bfbcaf1eb8ff1b25da8bcd31578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a1268f7ba853f418f040092c7e90f6
SHA17f97fd010f85e1434bc3fbf8582b4448e406331c
SHA25627e648336ea395405f173e0372ccfaa6f848122d03b1f5895909b03bded52452
SHA512e147297041a07ee3da9534ee785feb3f01ae0c8d7e69a3e69bd3229615ecb7b9bd41d56fb273a5ad2ff51b94f123c9ef5c517a21389a84fa129c9b33b7bc7510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46c8426f146199dde31cc46539070c3
SHA17b54fac4f5186d1dd20c670b2f93d284e0948413
SHA256940b33118c70ba6e17a4c032aa01decca4a33d811f9b47e4f4a0a22e7ed1630d
SHA5127262276e7c4d6a103319ee03a42c76237ef104fc4e790880c25a6241496b0d87c000091dac77c51d83ac1dce3382727125146c93872974159e54a29aaea9d9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b68b07c36db505e1ee79df0eec20cde
SHA1944a286b83da8480a81ee74c94814a4ba3b33a69
SHA256194b6a4def093561a5571133e02a3345dba5ea8200e7626f2549b975bb1eab6c
SHA512b39246386e1c503956f52aaadff3aac5ce5dc6ae1652dad9087446436a8c0f917b6c85d17da88ae78ed04420f7b262fd40e8846f74d99ec21489d43f6a9be9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0af90bdb9b32daaef3245d965b15b99
SHA13f80705e97ce14a24e0e9256a601e3670ef4526a
SHA256c940274169cb76f72197efad4f00079895b1682df4d10a7de5d061b775fe0300
SHA5124d76f8fba86e098f10bb0b2c649e3bc79f31bb3952021be81f65dce837f62f5602833539f74e90e2edecfe7898083bdaad7b3181556cca7df96317b962f54006
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b