Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
aa6525cbda0a1752163bdfc49c804690_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa6525cbda0a1752163bdfc49c804690_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
aa6525cbda0a1752163bdfc49c804690_JaffaCakes118.html
-
Size
21KB
-
MD5
aa6525cbda0a1752163bdfc49c804690
-
SHA1
ebe76beef2b5d68f6a49b6668c2be1fe879b4483
-
SHA256
2f3e936890f8c20479e6e251445b53f98b11e6012b658a3f0cfa3c75701392f7
-
SHA512
f70cd6a735dc0ce6d986c595ed107bc9f12bb78ba2b077e2dfdc0e38a3c6b005dc12e344ca29a31c788e607c13ff618f3d30380c9ebbe61b7e7ee12be2ca140c
-
SSDEEP
384:zi2KhgefNVBD8c03R15kfImEfP4ycbp50zVcrbDJZTO6uP4K:ziRfNgc03z5mImGP4yHqJZTO6af
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b056b3786ebeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424540299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A361B2D1-2A61-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008f3327645f9147459973ed50c88722130000000002000000000010660000000100002000000002c6cbb5ab27b636c48d79af0216e20b39403db0e53f70ec686b86512f5833a2000000000e800000000200002000000088cbb9adb848c5760caa91c9f5ee6a5ea9a4cd4113ebe440dc65a25e32be750c200000001f335fd68211e50b228502d68d602257143877a7c209c812a88b2a029ff98f2d40000000cea6232cf60a77f11b3cc3c06455939c3448281aa562267d3183ba3cd6df425629f1eddd68eb0b6a7f6ea6bfa5b2895024faabf370a2dd0940e74ee9cdd581fd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1280 2336 iexplore.exe 28 PID 2336 wrote to memory of 1280 2336 iexplore.exe 28 PID 2336 wrote to memory of 1280 2336 iexplore.exe 28 PID 2336 wrote to memory of 1280 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa6525cbda0a1752163bdfc49c804690_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540044775e9d9186044b921d8b89240e3
SHA1731ad941e5ad129aa4fb0638776ec33c1d5be09f
SHA2566891616faf445c1da1e375b6f9b3bb95018a1f1c05b793298f254573b7b0ec9c
SHA51297e05a1ce23864e793a257c56757f3159b4b01a80719bc0754874af021a0d9f679f55613fb1124684cef88ac129d06052519a45dcf1a56b51bd9cfa9f0345062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd98864a2507f2cedc779b0f32e18dc0
SHA1bb24bd2d97d8c4350fdc17f3a0c9a9075e959318
SHA25635dabc8a5c8883622d7565ad4f1cd580490dab93d7291c821a76201cd4f9236a
SHA5123cc7e011d4304b5af02a2ea52338118041af6d470c3434c4115bf85363028eed03239db5ee662bc128a63cc917ef862adfc78be6ac0a5fb41256608b7223a82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c85a4e703354838ef738c9c6d4c26e7
SHA10bdaa78506e4617444309a30913477e5ea9c7c97
SHA256db25d76a5cfed9c0e136ff411adc8e64ca2f84f7b1c90a01da6b903b6a4064e5
SHA512b483ff5f36cbcf690d9cef59122261291cbc212b558320855a3f98257de0208af843b2fe71864d429cfc0592ad0c178bf88e1b30c0b00ef333284420a1b8189e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca60ad63a1ee90631a711cdc733f5a9
SHA17f91bf07a88bd23c6542fc8d0b85b5e9912b1419
SHA25660cd0598194127e732ca0b8c5c8424a0d4e9553896cf126d23a2af7d7f001d87
SHA512424ac80ae9c453478fe0732357fa4ca17995aaf7d7ccfd6c98288049e66910deda82fbf23010e99f9e14df4478ba772f5290bb5936b074fa2e61521d35641f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910495dc31db9dfb1b24d046dca1ffe1
SHA125126017bfb5b297e3158e47c51c77095562d08b
SHA256bd900a29e5e624dad774d40402bb0db07c1a4b5d96acecd7fe723f7011d8c353
SHA5129f57617dbc40417d86bed9b9b81c0ff7d78d02ab7d31367f13edf015430bdbd0553d58b1e55ac757b9cf26ff686d249ca1971e6155c6a3481cf51ec8387d9541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7962d402f689abf5e2013fe2d295986
SHA1ca10e4baee8504839ef02b59cfac5b2de3a19b06
SHA2567f28857452533de837c5d8258285912571ddd5291e845de14239b32d801688af
SHA512d7c9b603278fda72b4f0317171f0ba4531b5afd1c4b83380f3363b1adf3dcc5b2b12e611a19a86ade9990fc26759bcb7e5801e73ec9f7ca382b8509168a55f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538c61a58e797e64aca7172e4c7c17cc
SHA10ba846333bf40ae0850d97d52e37f6e6306edfb6
SHA2565522ec8cb130465025d413282e7d9b41e12154fbf60ab291fa21519babc10a1b
SHA5123a19a95b4a1acc97e53bb96054ca045c360cf32f3adf6d822fc516cf2948a2aa9aa2a1deae322e74638d968a7a390287470d4bf268ed00984c22baa99fe2526b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae50e07cd4c40df96679bc7b660a62a3
SHA10e89513e193919f4d285627c4df5d61381e3854c
SHA2567a96266afc5ea3e4fa9337b84ec816315c5d35af4733c4b320b87fe3f6f00e1f
SHA51253550a6264a3187161d083dd2e1bdc321678660def2aec7158a5448731bdda86e0c97021ab1b0f73276fc0aba5b9d65fcdb142577fd088be57d34c207509a966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576edd2ccf6a6b2e16cefbc05865a0de
SHA158b80372b6c28ed5309f7af060c1d1cfc1a14a1a
SHA25635fdebfe632788cc7edc0fda48629b8c1133dc33964ef16de58ecbc2f1502c74
SHA512b526120ca377e6ac3f5d6a0b9aa5720028522fbc51c5c211df327b167a05bb77a9e8902bb628b732a9956ddce26e61c8055cddce113e7c809fb17f208c95e0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9945d092fa85f9337b5f319f0a9605
SHA1742c544416c166c1b7b2a493ebaba0113aeff10d
SHA25600b100a7dc094ceea939858215b637b09d45f8a39ef38e5406b737069c1cbdf8
SHA512371fed86c619ff3dd74dae9ce2ea7b4eb6daf5bbb76272d0ac316df25f5d9ec43cc14a8328fe7a2f0a511f28096bd85f6a64ab33ae0dcecee3d2c8dd015ec82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50fedc19fb989fc326bc4e0c57555fc
SHA190302b3e468b5eb2377057837a736363bee4a44f
SHA256b3c2a4c29e6a173aaf06bfcebf6f3e94079ff5aba5a79b3436c70a58fb048698
SHA5125dce613d6a9bc9ce585ef536f86d95e4c6a93af7dbe69e841297595867d2a4f2b1cd177086f1afecee16c8d1c85f10a43a881fa68c9d7caa0bc1cf1c7a723dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d078e5421d7e71b4992a893bfdf21f0
SHA15c47d1dc84ce93451445a8429415543609ec432b
SHA256a425c529e152737e5e60bca77973368520dbf4e2ae8b034bade2100a13289d93
SHA512ee97fe698d80d11116a170f688d590a423ea6d7016dcc1f293f53283947adba397e0fc73809b32ea130e7a623c64eb03e574814695d8507f2e7e1d4d9c832f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d21e103d6a6996726d94c3978b9cca2
SHA1d309e7394ad3791fc7ff544b84c37913e79ea79e
SHA2564d184f29d84c11dd677d6b2204c5fb7e83573ff8b190c6c590424dfc8ce3cb46
SHA5120051e0bf302a7acf63f183d82a3ceea65f56bae675652a15239247f3a1cdad56fe471d7166c715023bcbeff5cce98187273c4310dcbb6387845bd648acd8538e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3bae1f0edac67ed321b6940bc5401c
SHA1db76ba36fbe9d14e2c6d976201bb0ca6e5682f0d
SHA256db0873ee28085b66f8433ddba56049225f9528c6c532db5a8d3fc3eda5d3e691
SHA51209e1fd93b158bd5764bcdf5899abb5397cba1251cc8e42112ef068052c52b8e5da712a8b2e39225688e47ce6e3b4f0f7c48ae7de2cbdd8b04002de3ce4fb9eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a12e3aba1f3cd853af84d86e36a5caf
SHA1a76b284a078f2f37583dbf63d91583d75b50f0bf
SHA25646edd23fddb18f87e474d323b5ab56b7c21c4131b2a55c7ae5c434f9b20a18fa
SHA512187aaa940d45a76d3d99928d6e23f78b78ec742c3e9bfcbdf3ade8bf02cc232af1495aa51316acddb3ce7d0584f16471487280ce869c25512217d2d7afd7763d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579c2c2d776beedb0c1ba6afe7133b71
SHA1888b9485461393ab892c8572d37494a45be95d56
SHA25687364ef17cd079e77c13f448e2382323de8bd58bf4d1cd6dc88e6d750fdf1b28
SHA512399da32d54178a881fcacc92e1acb3a328d7e691fe585dfb9e7cb5fb74088f2c17a86bdb06e6950cb3bd3fe4b4a1599001d7c4f8d2ca8346d4d40783b7cd4b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b866a5f100ac694fa7daaa7b51f46ba
SHA12422daff5b4f984b25a67ff35cfbdccf5407cbac
SHA2562a9d2a7157ff9e844b93876b7597b13717ad71edcefb2e2d72c206b78084f6a0
SHA5126daaa405388afb7bde86323bdc355b20eb7365895124a7abed7cd3ad5bc1f13702dfbd633de915593c368b389ff100948cda8c8f74e8b73ed65921aee66ccab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430b01e953ddca4f49fce7143076e76e
SHA1945a1a09d57a8a3d0f2f63edf8a82e473741dd78
SHA256fc62526e15a1604df0d07b06f97bf7db8aa3f67a1ef560da7b4fd9ccbf3b93b3
SHA512efcee25303b1f09b3375032268295d28504a6a967e63f8e67e136e9bf45f092d7e3fa51888dadf1f059d39542ff357c91976895b9ab00feec5e76efc4b6e4caa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b