Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
a9559c145fa5c626e82e3f5785ab603a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9559c145fa5c626e82e3f5785ab603a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a9559c145fa5c626e82e3f5785ab603a_JaffaCakes118.html
-
Size
94KB
-
MD5
a9559c145fa5c626e82e3f5785ab603a
-
SHA1
1b4a3e92960504304c0810d56a28e37115878a12
-
SHA256
11c324800e99a240a414df5aa49a008a3792b09d7907c2e4ebe2e44025ae40a2
-
SHA512
22f40a5b3a05cbaef872867da3e4a515055ae5c3e31b1dee8f1f7e74a2433d13c633b90bbf504ec4ff5d96a0fff733a8598864ef4e8b58e7a0726f353eb17747
-
SSDEEP
1536:WMLiNzpudfJ44Sf2fqFLfyrb4f7LIUtupQyl6ZoBdkrY8mgHC+qpEyW:WAie7vBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFB67C51-2A3D-11EF-9A64-5214A1CF35EA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424524886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000008f0d6353b563f0ef76086b7ce0ada58965ac3c1019712acef6e6e232d026319e000000000e8000000002000020000000edd9732c3a904def6950fa78b550b69009dcd7fcc664db23a366a5ad008c42d8200000000b454fe2859b6c20c91438132c4b22b5586807c1480b1905202fc7913e2920c240000000f0ffe10b4215c8b64b9a59403789de90b699b340f5e63e498c7b7c59a32f66af690b8aafb1569c35c051af56d3b89a5455857e667d4bd4e8a894c2d058548992 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d1c1974abeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2444 iexplore.exe 2444 iexplore.exe 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1396 2444 iexplore.exe 28 PID 2444 wrote to memory of 1396 2444 iexplore.exe 28 PID 2444 wrote to memory of 1396 2444 iexplore.exe 28 PID 2444 wrote to memory of 1396 2444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9559c145fa5c626e82e3f5785ab603a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a16b7ce25bebdd716d30a16c8c3235
SHA16a55f7395a2d1e98d0785af0200b98dc32e4a71d
SHA256dd89cbbbb1b537f9035c793493a294848d888a3869bfe9fe974533f19e77cc66
SHA51253c48a9b0d2453659098d720b9e30b1321b61b3400d3bfebf1e325182851028c5c5aa7ed5748fe3e3e4bae6e809fbff1d9129ee043ff91a477f8c20ddb47eea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526103d5b175613b88fb31fa2ba973428
SHA177c8abd8ab93bd8c9957079b814372af32a9de80
SHA2565ef74c429a00e3bf19dda9c4c19071ac2dc1bd83c533036adfc72aa784b9a723
SHA512962139d9c485801463572636845ee1c2dcb4ff58150655ea317a223adf7f42b8bc06984d078f194935f1331aabc9b224e1f3349263f609106996350e3bc0860e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56200d02c3a9b1ea231ac44c5e14db529
SHA1a92dd774d06d112b2e982d426b46e6bd4ceae519
SHA2564037b07b84b4df6f372049356b1e55c2c2cb032be449924d1ec0937fa00495a8
SHA512cd7b32c5add715eab6747e5545c5443b5eb627f8b058db28ef02f7af91fdb005d8eca2cf9c39047bad2240f671d93973f7aae2dbaff4cada72ed0e1e09275936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55690274ee0c6e6fd36833854d01b4953
SHA138e140d0455db74f35134a6a7cc6ea94e447ca4f
SHA256cd4a7b8cde4b4a078ae6897dd7e00ad95b99019d24997e6d33f15f74a4b8281d
SHA512bc79530b826fe001832adaa598ea511ae90fc67a45434ad8d4e8064534e50755383cee663c36a0657271747a7c148627d77ebc6704fd3588411fbc1449f4dd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cfc54d3598d7378b207e8612dd05a18
SHA1b03300152b17413525f3a13f59d77e3f0540b451
SHA2564625e42165f0a1fb617ae68a173d6d8a523ced5c2acee0df9166bbf3f0a76267
SHA5121b5348a8f19b23d1c0bb643de0e9eefaf3e156435a1baf9d29e19f1fb6c8993bb35adc7f11a473ecf91090059a4af75b6d127bf740694b02f4e62f06d75c6fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d827d2f6c356abe4983ee1bdf6b760db
SHA147cfea0ca18c8984beb76226fa33a58310861cb0
SHA2568ee7fc448bd461f429a2832e446921a7fd07bca7eddc0ab9879ab9077225cfd6
SHA5124bf327abadb20abc8c4002dc1ff53c5ba6584f6797684c8e0ceae956f8cfef0afdbbc21aa01de1fb54ca32628b26c5bfff5d5f74356e6a79609c4a1ba358dae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1cac09d25d5ff4e5c73d20e5f0c0e27
SHA19bc881528ceabb49067e6ef43640bdf333648ed3
SHA256648e6ca0e172f93bb5bb9b3e7d5011023b7ab44ba296f43e727cb943116ba13b
SHA512cf71c381b4a4dc826d3aa324a18f4fdfa6605bd7d9e34564e8efbdb717b69b74132564775eac30acc0c38a071add31d357b4a1bca99f7192ef1413b5eeb24d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ded4e73146eb706cf2d9273b23fa9bd
SHA1885ea0966ee927dee69690cb95c054f365389cca
SHA256777d9cecc70d6eadc336c45e23a2ffba02ac6a3195f05dc3709513ecda4710d0
SHA5121c4039f027e9746f71a6196310cf659eb16046d18e322e53936095b897afd4c724fa594491a9a80b792a76b70b9e73ac7d453342ea3f53a309b8b2a36c17b564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de84a60e7dc3244988a754494042e41b
SHA1c9a64923462ef23ccb479f46c33e2e01e04984e7
SHA2568b02dded8b89af882b3099287f06e5352ecc777ca50029c33c08bc2af9c7e6b0
SHA51224b861c71f78b1251a7dee74f0b80763bededfdceba45f6fedf0bea4431d2252623c4d199ff409e51630f1b051e04895c40c8ab1bd30e519760083764d664545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f229f04e58338f81b87c219d3acfac
SHA14380b00d1d4f7d37635ba3161eb22f221f079f19
SHA256d4d0239dde49db71caedca9e70c482d9d17e58ca87385bde97c66110b1c487ff
SHA512453b8db8d4ac1dcf5bb09b736e00cd85f244333d04608df69735d8c62a0a9495506e92e6c750a47d769d2c15c7754370bcba8d88feb664528680f178690af5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87837dadda1021e7dd20eecaf0f7959
SHA1a6f0d931ec285d075116d62b02d26416573d605c
SHA256625bd47af3edfb41e518ff5a4e5e14fe0281a42599be41ca75cac890294e8b59
SHA5123839e675d6465deec9997d839073cb876fdbe8e70719149a89aa1a0c843cf94fe245e4135ad7e984a95ac6de51b8a212838a9e918a158e928d4d0e297daef46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730e49226b9e5c0e02e02ad01966a9f8
SHA13c46cb7f49df198a7a07d27cda09a18e16d6bc71
SHA256d0b9eb5113e238d9e87c03c6bbafae23dbe8290d3009c2c43f3afbddfc614a75
SHA512790a0d03d981cd50ca64bc9a98b4406741ef836504411bbc9b0ec80a598985b07653c469314b0c1ecbb144f5ca1840faa2d3243ddcb69a60a5f78f7e3bb04b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5fe57d2b107082e7cf27d75e595451
SHA13deee827bd99c4a30492f1f30db82fb415a212ec
SHA2561779689d6c93c0905917a64a810d21dd52bb3ef7a22def7ac74351c494732fb3
SHA512f611bedc3609e938dd4198e3016e07dfc35907cbe8eaa392b349bb9469eecd615bcffb8f59072198ac6a9b9fd02b14a23c986dda1b7e73398f8c643ab6e209dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df49ab3aafb8800b2f2dc8fc10e03ec
SHA1feeebc6902f6a0e49c2b0e5aa2042093719fc940
SHA256c4d59bc93570b47d2e299e059fb3f730fb2ae2f7094a31d7364994bf5246fa07
SHA5120a55d3f508f211cb7716c1db167e0595b12b6af0142076148395bf016418552fc87f4c8a11262bdae7fea1963ccd891a832ad55329915f694321b7634c222b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d380c515036128e8a6f262c47ff9149
SHA1e6493f25ed2ad6c9df263e8a7972d07908496995
SHA2562908de10d8f2ca17b2fa6027b73ad723cbef7ac26f74e9789b3bfcd98fd4aa7a
SHA51213817d10f505d2c44fa19304f1dfab08926c60ac416ecf66ad63f0054025ff3aae638832f4160e1da989333756d282af7a1480010c14c3e692dc18951ff0e9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42c6d1beb6a226b81aeb51c3d24278b
SHA134f5a31445e084adfb9a3ca92311e40c1813576d
SHA256d3c44972dadd333dc2b2044e4065d644ae4f2a96cdd1fa20db619b612d851896
SHA5127bf2a03c22739919d2a01e270b22df6ca146fda8712458956a6b2c1d7314464d47e34483241dac1fb07c4ac4bd9899ba79e2edde3debd2c4ef015b5df4fb2f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f495cd632ddd59b90b9433bb0b2c1ae
SHA13a24b2ce3afbac5baeff845d1cb20737277846bb
SHA256e363b830fc19c021bf6f84664bfc584a73c76c615cc1835b31a60cd751d01bbb
SHA512ae16ae9227704c1fa4d72d9bb014c6ede8ac14b7b5a4348db58aafbac66f6b70fb5c6d6ec86717fd2706256b9a70a686365923999a8dfdffc070fd0b360be2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58104ebc0492d17438aa9d4d055aa2213
SHA1110490e367da2d3703e3623faec6d7d809432282
SHA25682fd2fd37599ab91ceb2fda98af47870d27df493e961ee64d50bb6c7e8e37206
SHA512df404bd1d63c1c1d2135b5b894648bb99299c4cb8f4509b8c2a1207b8e029b9a8559b31411e7c6a6b058d7ad5b4cd73d1f647cd1cc10558567417ca267f67455
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b