Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
ad06fd5a707fd46b467e0778f8412dac_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad06fd5a707fd46b467e0778f8412dac_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ad06fd5a707fd46b467e0778f8412dac_JaffaCakes118.html
-
Size
54KB
-
MD5
ad06fd5a707fd46b467e0778f8412dac
-
SHA1
1a39cd4ba98ed94a764e06e32aa7d1b64a45217d
-
SHA256
65b674ea5e5f1fd153ba9f0104c578eea0d78648cf3c81de3787e8ad9d912d5e
-
SHA512
c12637a6ca38bb3a4db07a0e0abcd9c22209ac1c8cf95579f2debb5f2c68965bb275f5776b0492b62c4515c3a9780b24c736ff361470c5e98a91df3bfa47d270
-
SSDEEP
1536:Yn1J7/kOwUmoW2Gju2j0wg0HmUG/ijv2mTMtrtMDE4:8JzkOwUmoWljuAhg0HmeMtrtOE4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8378F961-2AD9-11EF-8132-FE0070C7CB2B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000f1479d45a4760ba502abf8a57dd436c74cc959054140b4cd73396cf9a63f2d6d000000000e8000000002000020000000aac75aac899fee8415566dec9c06c7ad9866f7c33482f7d0b7ba44a6f4c08f6c20000000440ca33afae829ac6300c983f3d922892b55eacedcad8e21af58104b8d5e457940000000252bed2789c782d02cdfe1a8d5e6b5181443d7c3498e64fab61d18901e42f375e3e9e37b489f8d6cf2cc083da94548ac36adbc76188f877e1fec68b467dc4987 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e01b5be6beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424591785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE 1144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1144 1696 iexplore.exe 28 PID 1696 wrote to memory of 1144 1696 iexplore.exe 28 PID 1696 wrote to memory of 1144 1696 iexplore.exe 28 PID 1696 wrote to memory of 1144 1696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad06fd5a707fd46b467e0778f8412dac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ea16d123bffe8afb1dae20c49d119d
SHA1d370ef844485a7cf9281de57dff6df353a22745c
SHA256961a37f566032ec9d1bae2c3c5fb03fe66f2b41269909a7eab113100e0399b1c
SHA512192c0cd4d5b3cf17878e2aa7e18b885f7ada7dfcc82318985af6fd75c814fdad586541ab0767a48ca24eb3d4b3cab69730923f50afacc2a61aae9a4f6e59d0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539face857b61ecaf9986402488cc53c9
SHA15bc7519fc8830f1425cecddfdb8b6f3de0658678
SHA2568cc81bd4d7d7fd390941dfd2a5a3824fa79da563a59647c1effad13270a9cc6e
SHA512f210284a4ac4c2b4efa223a9e0f9dba8ead40c8f0e66b13e68e1a99199cba72ed47f547edf0fa9f88ad1c53803c11247a5ba5405fef165420469758b2ed0997c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a884c3e40894ef1016adcd18fdb606
SHA12d876dee669f9d3fd37905878ff83111e92002dc
SHA2569e8571a6b9e469bea04d72d7cab3a54411d76b65c08269a8d1739522dda4acc7
SHA5128bb4acb8b973fe6e32bfe23bf5bd53ee029a2a149d32837548363521f816ea8fb957da3ba8ee54f43906526e6fbcfa731cd7aaf4a7a45514dec63b3202c042db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa3defd9f320c80209d695f4aea254c
SHA1747344d04781d1918291cbcce547bff8d04aec85
SHA2569c0c24d1ccb6f97bc9e4652003043639a96387a4884e8827add040cf99e9d37f
SHA512d98db30fbc58c6ca8c86cad31b162a38240cb723372a35edf0ee0589a22fb3641844bde378da7218b454f34a10913a449ad44f863f6411b31cce975dabd95249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c68b648f13f137e9e04dec83f41b132
SHA1d4ea597e71a9558c8b3e571eb4f915c28dafd503
SHA2562f2ffff5553525cd4e23fc43b1f73dd7dca001ed5bae3f663f8c33fefbd29f3c
SHA5123776dfb085efa9ef9263f6a4af5905e8526c0f2bb67f261c359b0fce9ea68b9e4e0483930c34864e5fb9e85258f1d0d860396c2bd19be584d6cae39e3abe5034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba5a8885ab95e48ec516a8a3c48bf61
SHA17a335b3c6b485f2be4ad25dd201993bd759d8c76
SHA2563e4bc79c9838a48b6c717762c3048b290e7db503b8f6f6fc8903ef40bdedd848
SHA512a35253f908863819c3f9f195161d04ef242b72b30ee7066cfbfdfe4f588436c05022024b9dfb30d4c6bf84232b8465aab31487b3b26ccd15561c72aeca755e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a891754e32b63f36b32fc6e8734d01
SHA141f51e1de5891683aecc4f70f15dad797c8aea48
SHA256ec58891b0e48d6333e7f56143edb2f1bbd2d583411948a4f954d2b9dd063bcc0
SHA5124a6842ba89946c94268d4778d182f17c25f15b711a0ef9e964ea639950ed59c4926c40c216b36962eb896c95b02c8384b3c49b961f47bd7be0f7eb9f9d788bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc501eb432060634e80884c84b7c8173
SHA160b480911bbc4795318ae1b4999bba0ecbbaab0f
SHA256294b503a8bbf534abdd15ec2c264066e334c7ff0324c1e00c36429b732a91989
SHA5127a498de369b319f84b45829d491ba915aa1818e70b53dcd4b4a558cd0304c5f93a32978f2f1caf47219a1519bdf462f39fe8ab792c8623a31c4978c2cd6b0716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215126348d8702edb424897576ddb816
SHA1a092a2c2eac1e5d85a1e8a28e037b1554f96ae12
SHA2560b94e513ccb38727ba8942e305c8026bf801f5f5f401d1718ab44f286666c16e
SHA51236c6129e8d6c3999e850ecb1125840402de617b8cea976622375f8e58bcbcdea5c367789d4c31d102e90fff46229d2ed2f1ffccabc2d9fadc08e99c3004448a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec58f4c3d56f9cbb69246c89cd445581
SHA1ccc3f1a92859f53822564403fb2152b5703cca6d
SHA256e38e72439a3c11392e2fde6207644d41fdea52725693d0c212ca1175c25c2317
SHA51248230a76846dee79394b45740e4dd131b763ede9ff55b9f87db438b6ddd699f5096c075077a7d6484c10fb38dc02cc73a482934254d45d1e20b186a290ce1684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e696c07c38442b846d0d912bfd23909c
SHA1718ea6d74d71f6b85115ae61df045a7bef98c8d7
SHA256b3aed6be84eeb34858f00d5155353e0388d4f30657013a09798dabb7a31b6b25
SHA5120ed0fccc47f1eec1c436831ec1a8bac6c056c949800f9d4beb8727aaf0c3f0f7e567c9e0422f00c404d11226a235e848ce6c3510cc17ded1a1868f1123c379c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a44364cd90585cd2179c94477bd03a
SHA1700cf310bd7d941000d83e23a0374c3d2956e3f2
SHA256fae1bddb7ec89a999763a77a9856246301c571f5e65e26d3e6555334c3cd6442
SHA512c4e77ee6a3618f9e646a6ea73ccf0308ccbbaf0517aa99fda84f67b64e8f52efe8a06d3885eefb68ae147a4494501b6c95cd7a1d5b446d4d0a03daa3916adea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155b8d07c70886d196570f4f2b98caf7
SHA1d2365f43d1f88f1d318349ef6997e3dba8cc3092
SHA25637f7d2b5a9300f2759ca7c2792e289d6d4ffa6dde4b708265e0f5c8a88fafb04
SHA5129a63ef51d8815f3cda15922e8d1a4241adaed0e2aebf4d348f67354b0619b955ce2d7efa7ace013caf9d688a7fb94bd1d818935f4f52db8585af7f11ba8c641e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573490f0127500a67cceaa3250056f33
SHA1c7d80abc085e603111fd31a3989120b56ba9dc9d
SHA256444d8484b8c017e4445c48a2abb6879329e480270b5debd6e7eea282f1581ee0
SHA512aa76d0ba09208ed6f672a3ff96da1a78f2d6c814771e2d7b2897a2d42e10c7272562d6ab318ff36a4dce85be6a4f6097084f4f5048df5a5d0e3fdd7f75c02b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d50a5e352a609e3a7ca4c8bc9bd92fe
SHA1d794b499f79c3de6b0c37aa40bd4c56f0b61641b
SHA256de01be1c3dce711778f07dc5d81297fd91a2eb41c61c8292e48bc981f207e688
SHA51284b701bb28119c151bff3db8341d57d9bd7c7d5d64508433acef201fdcf41e90e5856fa83667649fc8db6f2d456fba2ebf84b47dbcc4e526c5fac351e908b925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3f42cda739eaa35f73353ecbeeb5a2
SHA14bd6c553b46cf0e713dc9c4e2de97506caa06ec8
SHA256656c63afcc2e67515e7ae99a4f25816e747d2df86b99a4a2b074c85c3d9c701e
SHA512527cc2981f61282139437999dcd4732e42fc70b61a79891eeb42ceda8034b47d1f5ff3d164b1bebe442f1534c1aa1a8c92a53754babcbf56443006856f54dd36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ffb0c342109ad8ef637649b24a8bcc
SHA143b0acb61ba25c8b0af7ced98b0b2fd9de27131b
SHA256d7ddfe5ee35da6a09df33af754604b015ce5eeaf4c791d5f8f500ed495111ec7
SHA51228d25ea14be73c86080f8b35d4b8ed3c35b526b351df5d449e3bd4d2ad3b1448837261b5b5685717574624698f0652904c494d8a58c00d581913826740d1aa0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551149ba15722d69490f4d3c19b709604
SHA1042a927c5c6c26d7d68dec670e66e3861971c6d8
SHA256ca0fd4b7da9f1f2515e5063a76abca31d1efdf203c2fc5172e8c15888e380d48
SHA512b6cb60ec9b8251e75f5be15d5f4a46fc183d9f3cd86fc4a3deadb7fde2a201ba92e1c200bb40e18f4b4eaa7e07c0cecd53ab186e07d342ad278890c665da35cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a945ce439683a11154a7a3a4b1527de
SHA1b87c5811a7ce649018b43c7f25352f089a1dadbf
SHA2566bcdc882fce3cd4648fd73c17bc99088355be08de971642a4e807a888e886ab2
SHA5126b99d6b80f5a8eb9881ad6e5e1344d64b181f23c4728d187b922a2e1933f2df4411b8df623edba9e3d45478eacec5009fd60e9d9f6d1bab37969ab717b593cae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b