Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
ae208204bbd2da7b901aa2695ab147e1_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae208204bbd2da7b901aa2695ab147e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae208204bbd2da7b901aa2695ab147e1_JaffaCakes118.html
-
Size
69KB
-
MD5
ae208204bbd2da7b901aa2695ab147e1
-
SHA1
c92d5c2dd5189a2fb29eef66ae8455a8a1c3fa78
-
SHA256
e6197c71f2e81af79535cfd23d658509aa3f23b63d4a18a59de920e2b24f7253
-
SHA512
fae10b43beccc30d1ebcabbf6cabe33fc095206c70363eb26f417281b1968b7dffb5fd64b2db253701d5bbfd1f1f2b64274b20d01ef9181de7c6d51d06e2d4c5
-
SSDEEP
768:JiogcMWR3sI2PDDnd0g6W+64hoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:JM3TSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c7ea2714bfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53421D71-2B07-11EF-820E-FE0070C7CB2B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000017c0f70d15bdfae930236f901561dee640a2d217c7d12a6e8d88a2d7280341ab000000000e80000000020000200000000092f2201c29a7675b5c05a767a702977f3ce16cd6d9a107e8312dc4efefb1cf20000000b136e0a758f27a1e7780000fa4e13bb171c3ae6e7e950f4b780248794353a8d740000000b231770559e93c76127e27bc9d3b8b2c633c2042d308e82b7d8c36028387b05804b31d8d3398bfe77e0c58ff64f52aed8443035720cf46fa4b62e622044e6013 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424611460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1700 2452 iexplore.exe 28 PID 2452 wrote to memory of 1700 2452 iexplore.exe 28 PID 2452 wrote to memory of 1700 2452 iexplore.exe 28 PID 2452 wrote to memory of 1700 2452 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae208204bbd2da7b901aa2695ab147e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fad762ab7eb71ebd65463204b0b0e2a
SHA11b563faee46473d8647e38c486c00471171ee1f9
SHA2562d6365c8c28e25689d8f90a8397a9b23d345c0cd8a412d1cfa7a9c4785663937
SHA512276f40145025078d81e054432c1cfa193bfa0cef84846622ebcb37f17aacaa0b96aa6db7d7c7d3afb77283adb054ba76da96eb0a48e4521f14a6c82b7b342b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5049ef2ddfb9e0613a8835608e2a66e
SHA1d8b1c01e74a5ea32661a0250dc2b503e12611896
SHA2567ee60b923581658fdbb04f3d34e36efd80d6ceb3a2cb7c7c84c72625904536bf
SHA512c8370f0d714824c7c53922b9376fc50036a30416c19dfe211521a43b88ab5194c34d3bf2e5bfc1dec75fe1b123a6d02b49a23c014d18c0ee5b8744d5581d253d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172cee7af79b50921598efb3e0f18c13
SHA1398830246a2b9528f6dd5d9fd6f0a4af13fc9d6e
SHA2569b42f0b0809f6bd22f0f41e823f1d98f1cf0e4e025bb4bdef16488890fdf0d69
SHA512307beeb2601f6a70b95cf83860032723ad3dd22c4087f11164c0248a39a442e681d776c72f56c2ab1d9657a8e8fb6589460a475e9acff8c4d54610862c67afc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f8c9e6808cc8e76aa5e0a3434c2b13
SHA123c1921c0645b609b6e2cff9a2c581466c1d0032
SHA25641ee688d06b140073e3f82732133d8cd35d9c5d7005da4d5ff5b299152f5faad
SHA512fc78251bbd669373ff15b9b02bb72211318da53b0f29fb4d46e826eef2638f04cd2fc678ae715f8ac13299d4a86f7f390d846ae1794f4f66bf957351f85d3159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981c197439514cce289b291e0725b3dc
SHA1c2dc3a7bd192bf7252b4103dc663e253895a67c7
SHA256ab41ef575d93205c6d829e7b6eade740ca0513997a83999d585dda246cc9e19c
SHA512af1d88b41dfbfa3acc86d6e5999090c1f6b5993ef6ec3788b29498103cccd014344976ea4656bc0a7b2a92ee9055b4aeab8b13d23be5734841e8ced6a8a5a6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec180b706c4f601a3b0d64ffe52457a
SHA197be11754ca44bc03e58418abf039d585a4e9a8d
SHA25606ec119aa0591e2e040cbbca85bb077f50220fd602b096ef3ddeeb162e9e4dcc
SHA512ba0da7ba2db77179406d61f77a75f96d9da8986f3e2b7b5881736b517653dced537e3e1a24a40c041d1c047409c2d51e651ef2b318508ed739cc05adb369942d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f8dd9d6433a1867d566e571ff50778
SHA13ff95d68cdf9dd45284822957a99c8cab4ad82d6
SHA2566912e5d8e6f62256b0836151215aefd62b511e16f4bfbb2b4b9c316d61b83cfc
SHA51284c1bbf87ad4905fae98d19d04bf45d56a148e070420936f0c9fad5982d858677d0ddf684f13bfc3b0923d315cab88954ce2c1862c3b78f2b876ff10005b57e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b532e6ad765fcd91d5713857af7c1fb3
SHA132318f32ef122fde0f42a16b831bb16b0050c7e3
SHA256d5e13358a5ff5cb45cc4a3eb2ecbdc15387f50becef56e8d832d16ca40bec736
SHA512c29b23cca96e080d68292bb9be9f6a9d99527b98ec0d8b3da111c15735fb24a2296510b21a69ecce74a6167653d6297e0bc91a4f68105a0715a8ce5726747d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8009b4feffea056013f3b2687774fe8
SHA194263a149e1199f52b1f3ca2451323b6996938aa
SHA2563cee47494502ed46e9aeaf1026804c4777316a7fff0c761b84f6dbd4183fd1c6
SHA51215904c9c904e32d0e49477d5ebaccb5d9cbcf99a1f877db563944fa0815ee89fc8a22b9f694597d04958cdd9aa2324b67cd77cf77bb3675faf2a20e2399ff103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871be3124d40db865ab710aaefe1a1cc
SHA133cd97b5d272222cb1b52bed06eea6dfbff3fc75
SHA2568d50cc5662384488e60c9881b80dc4b5693f32d7d81d1b28dc7026f44ae21c41
SHA512d599af2148f9bcb64ed255a7454b845e576dedced4d1e48507f2641ed32e4f396bd2cf5a4fd7c306eb8cb660b7b273da41823ed582258d3ecf57504777fbf132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7d5b7daab76c3cf533da4968f8e487
SHA19676929a3af837be965df9f0587c89980a7b8655
SHA256c845655c606100a71cff96233c62c17a54410f94b32ffa26785f761fc0a41641
SHA512e64477c518099b21c9353d128b29ae1c7c35ae7f9e86856add5d17f1126e7f58154fad8e192f8296ca9eda43072635e485439bd9565770cef4412afd47435ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2b41aae25ab2da82e530fa4b0f8178
SHA1846275fdb4f98f992fe8b971f72e0b7f907a7ad0
SHA2560ed0bd356cf0b82cd43cc0b23ea09c273ce3a8c670005707955d8a1f6eeef052
SHA512e7c73b7b39bf001a8a3694c5993573a2eb5f63398180b4c02043e1f1c49e27f6f9f110f708d0c18ee14ef757fd14d58b22be6294dafb7077f0175d8ff26733d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a465d6f389c4a8dcc16d68a87e7207b2
SHA15dd7612aaf26d996e3ea455ec03893484860dfd5
SHA2563b050ac08a26fa49f9b2190c70fdddce3cff43a663ab8776479c3c55586a41d9
SHA512f0e47fdb5471de9d8cf04428982064833214ce37055cef8e1ba0e1041b289dfb344072a2aa64bfbb249d38f58235cb871994de3d3eaa08f72e3eba8816e92de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6b735ca80c0e867f9950f7549c0189
SHA109c9a43eb004361cbb72085819bdb7ad1ab5dd8a
SHA256ea054e14c4905e736ec44abe57ce0ac51b53f7c290ed52d3d0fcfe8949a013b1
SHA512a3e6758846b5ddda90c603030ca30de55321459628aeeaf895d3ce87d7044dba5448e421fc271e787846d9fb8b9728b9714cbc3f4066c86cde5b7a7ff55ec487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fba5dbf76b61e12b96f5cd4b4827214
SHA10acadd65952a66c19b720cb02d502b4053171cee
SHA256c75b9b2e0e718f714f9c90db0be6695bad4106c237c5643a50559a3fdc9279e2
SHA51236369a1f24d8d2139da7722e87fd12321a56101b567dab4e0070cf284a51adf89698758074c84d745de0114deedb0611226d56a1df6cc9cdcee74367212f9fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca70339bc2f5cde0299cb1c320f07f47
SHA15183e5f4a648526b112666c062bd6ec85cac0eb7
SHA2567e79776b7ed2e684304ca3bce993e00577dc659a13505bd98c905df7723785d6
SHA5121de4d7dba62f56695e5ebda212f029470801d363d86257511321be71af7a860044ff235021139c1cf3d4597d38b3a26d7dfeea00300e46c1aac96c66d40d197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865e6213110b0c841d3fbd383e09f79c
SHA11ff43c9c5db6be9c5724f732f5293ab2970bdda9
SHA256605c911ea8b4244586cffa8e00b162fc223348edc865ae7191ca2cd5a09f02d8
SHA5125efcdb844949cee4db87e7fc39ed847d35182362c9fbee6075416bd8d7ff446a6288ca4ad64774f14b1b9228fb2ab36227321052c0b32e66e6d1e2e473b1c431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22e4245c4c6b5d1f3942a394bb43071
SHA1119b18cce505096eae20a941312f687cec0ff0bf
SHA256419dd7a768dcbc21e0bbd866be34b9a7add9318d34ed551c59e97aaf35074b8f
SHA512b63f4942a89ac076339d75f7383756d523d2087e4f7d14d27975a8c2ad1dd0b65cfb0a7d66474fb076e0dbd5979708f915ee6850a3bb967ef2dc3b13499ce0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f465bd09cf1297af700d87b007277d9c
SHA161d4a26a6abed2cd6d42f761509d5aa4f85beee9
SHA2564d21207e2e284a941530deaae9fb5eb45dd2edd9edea285e7e6cc6bbb65c1bc0
SHA51244445641a9f62e8549531316798d19137f54062ce40a9d5b1601afdb1ac02fcc1cf3a18975890e79cf185bdbebc39f92d36eabf7e94f8d8b8374120970352539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704d25f9307c744165b21ae14b471837
SHA12b93648311ef6aa399e2fc20495b0b6f92cb3f85
SHA25656d1c3f77bb0b398904216f98fde1d506dadb7748d051f8acc94d3d8d55c339e
SHA5123ae8eaf125cac723a1913586b3c203c8d887da22b3dd467ab179b262a2f33d64b58fac84b8570e4898f44868f787474e0629072e59babe974e0b1f7456a9766c
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b