Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
a974e8bc57ceac17a74404b72e2cf77e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a974e8bc57ceac17a74404b72e2cf77e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a974e8bc57ceac17a74404b72e2cf77e_JaffaCakes118.html
-
Size
19KB
-
MD5
a974e8bc57ceac17a74404b72e2cf77e
-
SHA1
0165eef350479a195be1dccb495eb441786ad069
-
SHA256
6b47baf1faf8ca3f24da79e66d42bfe20b83a1de31deb98a956eee9bb8947eba
-
SHA512
8d5a495c3323b207c4533b2c234b45e10861f3ae975294b10be978a62e330eafb556640b526c51f8751df6eedf6f71cb33bfe8e68c7213637a863cfcc04782b3
-
SSDEEP
384:yHd2X1ZPYA1QOQtMKuYNjKZHrU6XljxaxjxIC49TYezzi5QGVOTFOwc:7Hy1uY2seSnMy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20043bcb4ebeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5A50441-2A41-11EF-B47E-DA79F2D4D836} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a414a5d2218e987d59ffac014bc6b2fc4e6fa8898246cad6dd2533830ae2e04a000000000e80000000020000200000003c2e39aaa0f6da62335bf5072affd19d95bce0faa4ad62edbe4e56e28a164bcc200000001c2e71128c3c43e680facb4ed0ed09914cb0fed5baf35f72e52f750af987b65840000000eea1c0b5b41ac745d2bc952301030f932110784c723126f7b2a064cfa697052f66deae04a5a6a493f8527c94d1e8624a4b6439e28c03f26af378cca0614cda3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424526695" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3028 2392 iexplore.exe 28 PID 2392 wrote to memory of 3028 2392 iexplore.exe 28 PID 2392 wrote to memory of 3028 2392 iexplore.exe 28 PID 2392 wrote to memory of 3028 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a974e8bc57ceac17a74404b72e2cf77e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543179779535907a3d70b1f140b999d6
SHA1e4c72407775b82e3baf96b04acbf0baf39996e6d
SHA2562092cf3b3b3152d5cc37a60fd5e18d5adf87ce5d69eafd8ff1c85a5856fd7e20
SHA5125c4562b884af4db3b0842f057d349ec56e9756d5919ac46667f4598a191d8731d76c9fb7b4e01d6dcabba40214bbecae46675adb3761156568678eca1a166893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581dec984423fc2a661441d586bead5e3
SHA174531cf63d25f52867d14507dd37277b5d33df72
SHA25665c7c12d51e3cd501e1c23c272e8b15c99bdb9484df990bd22281d6829644588
SHA5129a6549ab2e1fbe40bf796411f4092a06a1c59db00dc7ae43c1cc5a861d7bff695d2d3eaaad006a4d6739b94e13fe358a0ee48199f1c31c7d5da1c9b323190611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6e1199124b60ae0c8f0eca0b76bd48
SHA11a0498a4e5ef53622e6424631119497ef3c13778
SHA25667f1fb63ca44969bb2048f6fd1e4e37a64df599ac1bd63bba7f56f5cd61f8e94
SHA51239f2784454258097402050c88de660b329883aa03366832678b5100287047e3f8631403e2168c10471514fd6da369c14dcf5b533e2ff78b2147184b4b7edad53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560793ab355b76e572a40d1c61c26ce25
SHA118fa55b4ab256d95bcebf3345f92c34512e85954
SHA25626a1d9f73646cfee2efc0d88dcf03fb9664f2558aca1b45957c07eeda1da28db
SHA5129eca1465baaac761616dd0bd821884ec212b0ec4ce5a91a9b107b01a568a24a29688e4160fac4f59573cb555dca8beffbf1dec1a7f0a53477cd1f745c83611cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301509ee7597cfc3aa073eda75898328
SHA13124ceba94bb7f1457cda09ad0d537af9879a5fa
SHA25662d9538200b70146f416a6cdfe546d20ac7df2fbdf3a42a4a9941a3f17adb121
SHA512204e8a22b6fdd3318d16bf388e34c76bb7815fdb37b63089cb0d7b6f60aa48e45c6d9acb2b40494f6eca7c589076315a20e9bf3903fedd87fed5dbe292b6df3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f3948b60649e18c48e0a8f6e37b5b3
SHA10099ee3eb1d0bc3cec975d2e909a10fa36733f26
SHA256554f839f24431c0fe9b9e71c7a87cd9f72f24489f5b90094ff1a08940612659c
SHA512ca276e4bed406851e3d1e3c1f181cfefbb34a5c04c358fb24e0a57aa6c9300b4598c4f21a5a2e3c466e7ebb2518f644db7c62ed86e8cb6b52db8665313c166df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63bfef215d17853c82eef88dd029a0f
SHA172615363cca2127897725da83888b3c3d26bb9bf
SHA256ecb36fe70175dd00598532084226acf19c7d8fa2d21f674131ba82146c64e57b
SHA512f8793e7530adb493daeb3e53eaeb935b6685a0a2fedeb316c37f16638bc3f0c9954d08948c40bd43f18cf0c751c674eb7b88c7066cdcccb8c0912be28f6d67a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222852befed28f1f0f6ba835831911f1
SHA1b86acb5d5389a83d5ec04cb3b8976091146a3604
SHA256c2744b0cd2cdcef1bab113c75811efe00cf241655884daf4de019f07ad853897
SHA512f3d236fa4a6efc629e89b9847bf9c31848acbd64c2eb7f6e6739c2953e31e2d7a2e45ff314d7c6494406fd296c3fdb12b9fa2c20e1b313a6a8f9498b5c6410a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568ed4681e303e831c87975412c7cfa0
SHA12e05a4f1f04936af87f6984697890dc04e181c40
SHA2569c3d3f253222ab2a169cd2c04a2221c020d0a261f948b2cc7f81973c22d00e57
SHA5126acda314df3457602e7b79d738edc13ed5badf818b2087f501e07b0fa0e5343bbd8609eac224348b9b7c734ad380ca83b5c92f2c46459e859d364b34ca9d6831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c04faa3eed35f1cad271135915ddf8
SHA1f8a6cc3a94c3aaa28912d340f0ac5070b78fa2d5
SHA2568732fdb11031635d2c624f5317d7e01a0993491ba38d28f64dffaed8a9885458
SHA512a53d4f510b7cf92b9b69e8dbada121799334be675bab47c2ec4424444f46c28175dd8bfa23fdf7ddae627c3f57866030012e24f598d3e40213d21269431eb272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a24a8fdfcc27dc8878981cc81b8bd1
SHA161ab843c4a45736f2e9aa65a53ab4327b9296067
SHA256dd27c2d5e0f0e56506aeaece67d562ad41da22fba6ef0e38422cdea0f624f532
SHA512b511bc1d4e0d882abfe653f4c3865e2cd5aaf2b4a015c10e15d1e9dc3c122eee402615ce68e168c51dfc259b416c659571cb588503a49e9c0764f2411fbbef26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57804244c3f895b51738aa5f577acec30
SHA19aa2be4f0a8b3311cb1d2e7febc713b6ea7ba5b6
SHA2561efd0e2ff7a6ce0275ace35493328739387f9629fe23d2c6ef28ff3f15524732
SHA51287263deb57062c44e19d7275f77c8a8755fdcb2a4f2032a10dc68e5ea9915806fb32db810331d20b375f695b3d401f352bd52493fdcde47d2a5bba5fc8827625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58695e892302244f17abafe0e07f23c52
SHA10f2ba1c99f5b4a562fd2d83af978c74eee194c97
SHA2563987759ad0826a9694d7162288a0df7af84af6e08e957116fe5994e952b13ed7
SHA51288f42ff5b42fe627b2d0ece2c327b3e298ae9f19613c678cc734ae14daec8488ecc938b07b38b603f6326e848078d66840ab4f9f89a38512a13ffc9ddd0cb3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485aaf9862d92f1787e49e20800cbfae
SHA1bd5118bfce5d31c4ee09571b1b7498ceac622533
SHA25607ec6556a8ebd4c1a004314222d37b929fa96ac5b79db1b629f615fc8515b47e
SHA512d52d596f4631064f02f15b89fece33e32c63320fb0408ad00546200f0a1553884b85d335a8b549bad46e08b82ba7490f2cc7835810a6369fbe4d06ef943f8ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a70520180d2cfd8cc27dc5bbfb868c
SHA173ff0effca5075d2427474334b6c598ba87fc66d
SHA2568bd334a722c7c0c191c034d0e40b6ff7392d89a8b6b1cadd9484e6785414dafc
SHA51204c4054e5ba1761db0b8e6aa39150e03ebf5e5d485c35a693c12be8ab8ebc414d93cecaf8939e64395714664cdf639e1995c1f9ab8bdde7a04a19842abb43452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8f4bd4b2a419705ac8f1ae9e4a463d
SHA1a89b168499f6617da46c6ecdfab8919c102e17c8
SHA25679c20f3091fd65eb8dc105d959223d9b8376fd94dbc2d9ef7589cc12b34d16f3
SHA512f3e77e631509953976ae762193bfb18623e74cc4795b00d0599d84bf8801943c346442fe26a480eaa13031e4392fe936ac66fa37122a81cae504f15897c20e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50feca32198ceb3d5185da2b491be70bf
SHA1ea06777e6e94d9be34f719ae91d6fce2f1286091
SHA256d2e21dcf309c69a08b89c08cbf6f6db8b1990be2e02bdbefd8343b9ae24abd39
SHA512b9572461f14023b56a6c71056988e5f06b28d8819aa28d9ff8bb0f9b92ba5f20799a84aebdad232334583f785bd04e9efb5f6d073fdcfd7a783a54747fb29833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0f5cfe586dd7ea4631848439225206
SHA169f5c8ef811733271f983999b36a3992ba0fee55
SHA256b974ce5bbf24ba7b8af3ecad69a87ad940832ed056f29e820da90767931d0dac
SHA51268ed1cac7fb6ba0c07a0df5061ab81fddb0151ff78271ad90cbacd4c69c02f98dcef0ad991c3caf4353befeec37941d02f38026bfb920f17e613f8800945c80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dade66cc1f6e5c6a2297b5fe572393e
SHA1bf549e64b4b5a941c7da796a967d2d01748a4d2c
SHA256c32d6b3ee8842b2daa9f1f03186c174be96bafd8175d58e09df8954a422e1740
SHA51299d39f165f079753890246962ff7934e8618eb657625fff46cd37c78ae1a4d6dcc46b7d85e4fad5867faf78a704514ee821c40965a4b2158f3f8833ee92fec04
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\lodash[1].htm
Filesize129B
MD5729f75c5f9e8bdebe5fc079ebedfbba3
SHA12b35076f41e63e21145fe303f95411fcf43dfa82
SHA2569eb25c601834492645914f261094b48198a6befa4424de454e6c2f68f3cd9b36
SHA512e16d91f53a24942e9d6ef7b6fe7dd3700ea391fff654087c336517f6ed8d6c18ba59792c405e94f24a12d6ea1b91f4a5061f99dbad1edabc720a767b0809f77b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b