Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
ae466cf96963049a7d33e038b98dec41_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae466cf96963049a7d33e038b98dec41_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ae466cf96963049a7d33e038b98dec41_JaffaCakes118.html
-
Size
69KB
-
MD5
ae466cf96963049a7d33e038b98dec41
-
SHA1
b2da72de811d56e4b9b44b78b977518fbd5148c0
-
SHA256
206aae464fa2388629c30c173b2dc575940560dd9f9849e36dcf8c74bc3e5402
-
SHA512
73707e1ae3eb30f7ba720a7e3d3a4a80bb229456f5112308d8c44aa621bfaac0dc0d77ee85209ca2fe93623e5e1f5178bf0e796e84f0266ae90901ac025aa660
-
SSDEEP
1536:KqtgjfLjx9xFBb/kmbWxL0ghNxgefN3MU39DMglNJfXwJ0:bOkmbWxQgeefR9Dt+J0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8047dde619bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E204DC51-2B0C-11EF-999D-7E2A7D203091} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424613848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e8b38dd38e1ee6f8363734082b2ff17dbce0a1c27f264bddfa914edc64802f3d000000000e80000000020000200000009759a2b7f5908270eb7f19905e840768cf9cbd893947d79d1b12582cd35e94f02000000084261efc7b10108ec9450ccba9a02eff86d457a939d08aa5de7bc307b67287db400000001626c7ccbba1db3700a10f3492a7e89665c8b8405089e6d3ba8a686630e89c142bd78fed3939b59f98129415e3c23cff0c96032ca8b65c7a8d927a9ebb34a550 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2996 2860 iexplore.exe 28 PID 2860 wrote to memory of 2996 2860 iexplore.exe 28 PID 2860 wrote to memory of 2996 2860 iexplore.exe 28 PID 2860 wrote to memory of 2996 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae466cf96963049a7d33e038b98dec41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1005acd0b80a7002afbde843c60c93
SHA17fd8c130fe3d8be48baedac7a1c31ff3e1e3af89
SHA2562395f163d489a7c6ccb726b75d6cec797bd74b0ca2c42310a34cbfac6e7d83d5
SHA512e7a3afccd5e7c3e96c5c2f39145c51d0b274842b1c6f31e9d565bb47b648c05b09238355bafe6e364f5ced3dc83cf6ba914f3168a66de30f9fd4ab592d2e0641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519385423f70e77846c277c368b5ee4d9
SHA1fcf6d39ab68e5ac2e6620bf63ee5a4b06be34231
SHA25619246e27210528a6fe3d8ee84e3ead6842f4d4a5eef2cc672963762b3ca1c09d
SHA512f2627ea2c40ee705bffd79cbd1d08fce409dd75ae45019d7db41994e8630ca7e323549bbeab89265b852ecea76ddc152b8b569ceb8a958c1a3c4ab4168841eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51184efe98cc056d9bbfe9092a25e0a2c
SHA14120dccb1f3d2c5c19f132e86035c0db5c941428
SHA2560246200eca9831d55145c9f19d822fe3a9811f09db5966eea371fd3e4aff20bb
SHA5128ee58cb684f699c6205e84d5727294c6d583c9ab26d76592f414c5a7b57020698723d613bfe629eeb2d2bbbf3a43143ffaeee5cea7caa37f6528f823d0fda2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e8f7b866f457838165ec2919133d09
SHA178508d1f957abe60a499a84165af90d66c1bbcde
SHA2568b1c01deb2cbb8574d75951d0bfdebab0a0e8784d46baf5eed5fb4711fcda880
SHA512d885fbc8c91ada79f59c9b6f67627c85bf40749a683de8358ddaa945f13e4b4bdc66ec3b7cd1f0313f2560633d682905b0a91ebc698e9def58ba24facde1ff74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210b54f15ab63a4f04aeea1484849756
SHA1ad535dc96f335393e4a02e30981b1b8de91db1ae
SHA256590fa6d6b5ffcc10fcabd39be8e6a0545eaddd1ac66c996a6a26c470590498da
SHA51252cedc22b35e0aee6514a3e73650bed3cbc7ab22b8b1dda066269dbb42fd201f9003e2d038cce1c68eb53e2913e20795bf33968e98f1887ed311b5b93410d19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c7b1228e292220f21ab3c8aa821966
SHA1883ac6f44426e7fe422e04dfea692485b7255b8b
SHA256b6cdfb5c39282d3ba03d9f917a8fb7408721f3066e901f2b10e4ed5c51f8a762
SHA512be66f09d63320cc7f28ecfa7b6b92b605319341468e780f291f8b756cf4ad9f647efa7e425af9160796b07e79b53a473d910d7621a7ef0733945939445f4c4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cb8c478526544ebda1aa5a91a482fc
SHA148c9209429d95059286d2e3aedb7f92da97f8754
SHA2560d29adfd6396b96bf12a3bc0f2deba6a46cf5357538c40335696ae3a3022aee4
SHA5125911fe18108e76cc78c8a6e1150bd6d6afe240413ced8108ffa6a9d74f70dda89d635fa1ee5188e45c9d507e8d7183191856683184bb203099981ee4a5ec415f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8b59d908a7104aa93b8dd07fe5d48f
SHA1cb6df8da51f28a5fe77c74820425ccb7357a07da
SHA256d26759040c99f940005e9012cf15afbb5bffa9785fee5bdab03e0ab72312ccfc
SHA512918d9fb89148aad4a9d2ea6426f771f8b61ed2c3465eacf2b3b6df7a4dc2fbba59e9ae01b392854a5665c30e714997199ce0fdadf534e31902d41850fc2c85ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d168a200a185ab523a0fb7fb6013a470
SHA19d2c146fedaff6d17d44361f3590c7c2e8ceab06
SHA256072cb2d90c15280d2a566b16c096690fe4d28adc954802e558f69462a5bc0cd8
SHA51276a1bbd439e069bf463361fb98d3ec47012478904313643627c443f5fa72d0f3124dfdda641fe1d8d6d206e5d6a5d6e19ac59dc4748321af266dbee1fa74c286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b92e7727a0117fc300451c73f9ff30
SHA172c76bd4a3f1629b5ffda1310f86785c024fef62
SHA256052c0e7d42d4fe0334589228c4637c3f4da26811734acc71591652ba46ef4605
SHA51287f2678d463d20d857c635bc5f48821b72ceec6bac24b3b80692f9ae35a8963ab0b67148a4cbd40edeca7cc3edebe5e869ba99d267c8612220f74dddff596b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8eaf6bff3dda4103b8ac6273bf386a7
SHA1e6acada80fda1e72f303e9b747a7c05f52477679
SHA2568907d16617b4e6980f2b0033825dad81be1dcee663d2d8dda01264c38991285b
SHA51230d5074806b017aa4d1404d61b0bd442f922d3d8b75f0954e735bc030b839556ae49709330e6dc4ea6e120e2aa7c563feb9b628836860b39bd8712a438398100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433276312bb70557d70767d9e38a58ef
SHA1d73e0a5249f2f34e0df63d98847e5632dd53869e
SHA256239bc4d0e29287be88b94053953c1fcb40d80611dff42c751b44acb2b4755622
SHA512c2e575909bad120339975debf1b9768d0f8a0e09cdc61f6956ff4141104e78f57754d08e8ebfc3ac980fdd7acc1f2ddebaf2cd24a98aa3339eb1963e644aaf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560faf0a66834f2ce83d89a6440a00386
SHA1ec24d78541809fc55771131054597720489f617f
SHA256545e45f086bc86521dddf9d9fa9417f73fdd6409fb8cb112ecdc610efaf9f17b
SHA512db68e4ad279d0110d535ea4ed2bb596d2c3464c8480378fd2c4eb882a6e5b85e6eaedbfb44f8a37ddb6cf082dbc20f88e790f2c9c0bd96f8d97f4199c8409816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb507f3ad6912ac83f42043e73741120
SHA1d374d4a0eb0945c8ccbed2401b55e1489742c177
SHA256bbc597a4cde81ea465817c046f6f154d7d7325e8d75bd263e67387b718aabad6
SHA512e5566d1c2e6483aff2c2a0173acffc4b4422a07d749e7c03032c489579c53f146da7635db986d685f0f2842e53fa58b9aadba1af753aa0925d9477f9f2003d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdaede7a2fed69a17c7f81fba0646aef
SHA17bc8d145b2d8746c1d89b0c1ab3677bb6008a401
SHA2560e58d28728cf58092767ab2548ef8631d46c006a69a71b498b9afb79da827238
SHA5126ad2bb3d6e79d1744f2270aaaee59abdd9042e5230b191f3abc2d38ebf84e91e0cc509d4e40f3518894f44a924bb34b02a710c6ffc5efcf9d7aaed053521bcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f735a7208115fb60b7fc26ad1cc0c9d2
SHA129929413dd99ee0e8c4fd64a3ec73a825f4834d4
SHA25607008e6bff14e67c29c764dc1bad94927880a70873a965c9e62ac056f38bb29d
SHA5126e38067876cdd334b79b1648f5a71f9837aa598e79eff2152e75a653b2ae0ec6b775b946fc3e55e2693fa0ca13763959882420ede1e1cd98e7875af28d4d8ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb26ff6d71f5e82752c5b5cd92650a7
SHA169b3afcac68de8cea9028a12abcdac8b0d4c87e1
SHA2562e34aa2142e53e8ddada431ab0f464ff1848bddc90efb931b994dc849877b72b
SHA5128a587ee4f2b5ebab767e445ab583b9ac2f0a42868b33b48fbf1ee72d3ee9dfafedff17f49c851fa4706148c32ad6a282a273c2be81baf3c8c39f45f8f1d75d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87b0d446a2394ea65201702cffe06f4
SHA1255406c9c099e0842663aed325cdf37808776a27
SHA2566dcfbe59fca155176480618c1387d4d0817774b5d22f2477089f88237f812aa0
SHA512dfcbcb7f3926dd3ebccc3b15f692f9725a369179a844fcce08c6035f4f68e06060966d4fd14ab23104a3d17657c4285679d02828bed71372ce59e36f89daf487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd60a563b8e59258cbc0122b9216ab00
SHA15eef69bc0eacda17883b44439cb0ee20235ca463
SHA2569c8a628108d32c05ce4f19697d05bbea7e642b7b4ad88d216c0a37b1a47c3e77
SHA512cfcbdd861116eb334acc323bec7d526d0cbbc178f2da53a084bde73c677e03a981ea158927cf9c5d294c6b3456a930a8a6d5e7c36100115ba37b04d158e1d311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d4a173c6ad0eafd39ee49307c88116
SHA14a770efad701ef92e2c3d8b048a4148bd3c82a23
SHA256c359f7bfa5ff60125856303f73640ffab616a74ceaaca662f4d09ed7932f2941
SHA512889b6542c0a70e46264e7e97e67582e66adf25b0209236bf57c82125154696e836cb5165d85c8257b8e998485ae4182d81f5353c756c30946f26c871e179a9b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b