Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html
-
Size
9KB
-
MD5
aa5068187fdb62cdb20ffbf5af42a4aa
-
SHA1
9f7df7b0e2e0f5cfd5d505df36ff94d6a0a90d36
-
SHA256
56e721812d82bca66f59cd79eea38dcf06426dc5aa04125bdf8df46ce4c92530
-
SHA512
329d8017cfcf17675a46ea4d0d60ad0254073567e3555587dfca66d8a6ae4ea78d40e84f4c5142c72df2ec3819fe10b93e66693dcbdf4d54571a55dcc6c08b2a
-
SSDEEP
192:/Yl6zOjLOTciZLViVvO/jIBh7ix/Cbqq+:HzOOT9ViVW/jIBRiobqf
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1584D021-2A5F-11EF-9586-DE271FC37611} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000e1e86833306487b5f2c1ac0e316a8e5154beb0681b050605c23cb96a056d75c4000000000e80000000020000200000005c0a4187d5ab208bf69dc054ea8a707c5a35bdcc238db4e2d1753069e4cb03ab20000000878c9b24f9f5e94ddaf6aaf40d7094ff1b8789fa44a6696ebf9696b79e04cc9440000000bb694d75ce7db66f586525f5223d337e95d21a0dfccef6feb0d4cbfadd41c3c0b69ade79f9bc8510270b52fb659789bc71cf64ba3b8cea128c9ca269bb483370 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424539202" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07d9fea6bbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2924 2648 iexplore.exe 28 PID 2648 wrote to memory of 2924 2648 iexplore.exe 28 PID 2648 wrote to memory of 2924 2648 iexplore.exe 28 PID 2648 wrote to memory of 2924 2648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa5068187fdb62cdb20ffbf5af42a4aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24c187833ccce632daa89ee7a500584
SHA15a6f3cf59d9d5ef918c297f1a27fc4022821a48e
SHA256bc0861d558e3d97825a4b96b5fc3ac4286cd19d1e40c7c56ebe9688088bc4644
SHA51246e2a67abe2d8dfbaab40528ae7db9326ab931abe11d0da0fd25e6410042f87057e8140e59e3ceda54ae445d6f7b7e68d535f656dcbe85168d6bac1cfc7e23cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555be0886fa76abe73a4904771f6b431d
SHA16789d804dc56b2fee0f76ead77ea4083676273c9
SHA256fefd17cc64882052817b8f7229b2f44c4bdd4d88da2dd0415ac477d9a7d4f41c
SHA51236199cc3fc4bd5517665f8dc26045b25ba5f5d88549d539004eb52587ed46ba95a7dd0b631513b369799c6e8d28a23bd49c108814060cfaa1abc385140935513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352a34681537fb0fe8631694e173dea3
SHA145114c80de606124efeabddc2943bc6c3ec40a6d
SHA256070ab77b14ec6ae48825a2f9395388b66d802fb789211035765608d9d8884ee8
SHA5122791a66a6eae4b16af7f713f79601394e3d9a10ad80d66a6086b26e2e2ad278caecfb1bec20d4adf954191c6b7f14331a55fd4848ea19ae7f3d98fd9b497050a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dfad4ccb1400abf3e5bda4709d6d2f
SHA1c335562c6947d1d66a56bca5ac3a65d9ac137b47
SHA256f5bbdea8ffde99f7a87f0b280d3f32f006f6a05c1dc18fc88d60e93cbd956b5c
SHA5125eeb82a46490c26f0d14caa77f5471e70d5908d494c78101fc641eccef1baec084bfe64c9dbbb2b5fddc02d062b348f52fab7d6814db6613102814d50b77ac63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973fef4ce29e55903e8b37f1fe7058fe
SHA1e208ed9e167ac34796d541fb4db9ac653770c62e
SHA25624beef6fe81e68b7a3df199384cedad3c9c1620129318bc6e8c6444ad6d5fb17
SHA512ccc5d40ca788370a6d1679544fce6744880bb688a422d722d6128bff02a83c712353a6a7d743deaf20fabcb8225c63bea865f5447ee94aa691ce5c44f3928b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ce47c70c8a9f5d6102e463a149ad17
SHA1e95af207c935ba0dd4b0048c20a28afa3edddcd8
SHA2561ce4682ea2d5c4953b01ee1779bea2a12f808ea5c7c227607850bdb1d422deef
SHA512cbc7e751f2c4e5caef7f581c543d305c5563c40d4424f9b8257cf896531f3a0132fe3dc9ff53329d06ca99ba1849e129e390bdc6def36426b946c38c03cf0ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35efe5afe6d502961f98584a57cef0c
SHA1908942904b0b4be2cb4c45802e77b5eb60d9d4c5
SHA256afed69361ebbc0060efc53835999569f5ff54dd43c2035c404f23630ac68b718
SHA512008ab7a35897294de926f6d95805c09c125a0d819e41bd593228db1eee22b9d0776f335718d517f22eea843b55759453d9f8edd11a4f0b79e8c187006088f106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d48669b3ae7e13c57305874b00b27a3
SHA153af23005acef6786f056a916d452b458b149702
SHA2565155688128137542896b518ac6e51ef36d88c87605c6029864b11d34941c3e64
SHA5128701cc56de5f7ea71bf45a61af151e998c5ba5daf0d32c15e1059a8909d70fa26a85c1e1de3931ce191e9240cc35b4e55dbe4e67b24c1d04e01c002de3371912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586af36392d8572f4d4c1d8bb75e31fd8
SHA1b6b08eb826a382a92168c723614bac6d30530141
SHA256a993b630a0bb05a80b82b60799c7b139b0d40ebd0f0b846e91ca92a65eef5c11
SHA5120d274008fb6c79443e50334bdc5f73c365c7863a3862008b9130d0443b9e7d1f91d84219e5b3a41c673d212b52e9400189278fe7c543a3bc514f9f07d9cc5d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df73657a064cae7044737ade681eb51
SHA1dbee443316ae5fd7e65b355a3f8b6c9b06ee7ef6
SHA2562df2296610a5e0c89387520426eceedb03e843169014f3019f9c171d2f433f7f
SHA5124680e530d5f85d3fef47e8bbde3d8afb4fe1082a962e7d3b1034c9e4b0659f42c2548dcf0daa9765f82d9a7f3a79aa508572654d9e92ea18b30a7ea7d4a78a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b47cf8af2a233747bd05680edd5cd5
SHA19421dd5d59eb4def11bd0e8de6f22857adecb5bf
SHA256b683e7f96a296924fcd663a1a32e1d8bdbb31433df0f73e7b6a76660ba056137
SHA512403baea5dadfec4918bfd199eb87cefcfedfcb8ebe464f769998a1ea14561fbb54ae5ea75581835bc6a6060eb9d262bfac3bdee589f6ce72a65b7ac53deb77ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38d1cd5a2288e46f09d29a081b673ea
SHA10237657a9bf242ca164053f3dfcf07dc1b153664
SHA25665597c11d8120194ffe2d5fc7cbd3fbb029cd5004bec7b0f16cfaf4330b8bfa4
SHA512bd1f5c095b978e2af536f945bf2590b93a61196ae1fcb8a29261d4f1ebcdf8e32815ac70ccf603595cd0f3b2df7d1e706d54db3b89f3022a0671e734cd99f9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599bf018c570a8e1685d5a73f22523f96
SHA1e560c56f14e3225ca23990f0684dfe04b5b0d69f
SHA2566b8d2139f7532a8d03f05ccae930688782d11827335466347a1478d8f79d7950
SHA512d5ca711eb8170080d0c2e60112db7f8f90c65f19ced856253eadd2afa0b8a1d110e3305c82ca07b36e491f7e9b33930c56905cea1f4da8a02dc19097cb9d7d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78441e3a204a0b6c15606f8115ea122
SHA10c432ee2c961228b4b9a3ddac358126d3bed58e0
SHA2561a6ca15ee98bd2bd8b433336f54483e4b82b80db745bbb581b69ed252f558295
SHA51249083ec113e5582d184acaa9a8d4ef144fd8b8742ef31ba22588fe8560d0dc9f5c7938cb70f5c0de060ff3b4f17fc042c4a00d4cfe7f61e417dd2113dd5c4751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e31bee033770cb221b41487d5cae7fb
SHA19aa486ee445c56c0c0d6ab03e5eaffe587639e1d
SHA25658cf295c722625a445d2816369723757be848743e3cc93aefefdb99318faaa9a
SHA51250c617869821c21d265afd860b1b852d024ff10e7833b503dbe034e67b62c57d39e4d9dc2de2b3b19bd9b3e43052495f4fec9885496bf6adc5ec3f0ed5a6a3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f10e89c4608f292d46b56d2aa6d678
SHA1b074c56ce3384ee9118fc379885e59d3feea2fd9
SHA2563beeb0a0ee0bdaf2c1a2044f05399dc0a676bc5f1f7951f8281f4c416c55dc4f
SHA5128eda22f23877dc714880d1a4d8f0765e74b13defcf19c1526f08dd8f4182b36a354d3499271b0e0a66852ca81934954f9de4d37ec80929a310337abc64a84fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c70d70882b7831fb19ddb2da6d27f7
SHA1b2973c7e7bf5417acafa16089221b0e7c6505402
SHA256319109317a3346a779081d16e04b5c3f3d19ff30a7debb7bac266d1d1d84e71f
SHA5127088dd5c918c06b2f7eb1cce3a99881f98107197d0addf70ed11ceaea94abd83ff3235c3023494d837ee72c8bcb7ce4167b199782fea31df683449f02811be6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d739dfd7ae886cb98e5d0b8ad8c9a1
SHA1e219cab87ac8d1a7817cf6dd049fea6c96fdfd73
SHA256a1299f0548b2b8fd371616b848a87e26b786ffed09b856127a177291175d9f9c
SHA5125d91fbab2400c727fef56cb20e42afae2d36de67d5afa4ccdbadfb8367d5d045fc27c1a17b4db78478cc2310f8ddee8fb9ce31b9d7dc880be000d10d2eb1c778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a705526aaf6383f91a9134bbf175f2
SHA1ca0c6fcd4f37acec354fd772f894d4f7f6219de5
SHA256e31c99df6ff71f9b0cc353ced74309e1b0ab4e0193a704a11899df9e9b0ac7a1
SHA512dbb4ed6ee21c150117437041513f9acdc7babe97a9c7da8a181945df29762d78a02ea7c1a2215de6e9d8119250bd45a86408bd459c0abeb8845198e4c2652074
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b