Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
ae7573a1b50c387cd6c01e66ddc4a512_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae7573a1b50c387cd6c01e66ddc4a512_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae7573a1b50c387cd6c01e66ddc4a512_JaffaCakes118.html
-
Size
2KB
-
MD5
ae7573a1b50c387cd6c01e66ddc4a512
-
SHA1
d46be4bd1f1f7afe656e4859fe4b7b16382eca23
-
SHA256
153ec5efd86099a7e995d346d3078206eef47cc034576a39dde569a1d2e512e3
-
SHA512
d638e4e4d847df9cb0ef6fb8c62b9b81310662a5eeb9252abbd60373fa5212b4f377112041a851a9037cd55daa5176de8be9ffcface5c31766ffbbcd325ebc72
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424616832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3E83431-2B13-11EF-9E55-E6415F422194} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000009f5608c017c3003682a35317a2ed137023202b3779875092b43c75357c41dcfb000000000e80000000020000200000008e6cacb27a7c9370afc537121c6e2ef8e9c5f9d74b8d66da12b3aa5969744c402000000029c04cc084e2b814e47603d52ba0d01e1978d4d08b35a11629cb525e6062116d400000000b7d6857fa099cf096563dfede774dc6aea60cbb88810b0bd9a8c7be9ad5172c4d232f89aafe796677c71530c737abd7711ae45e5912b952dd2bff990d3424f3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206ee9a820bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2724 2200 iexplore.exe 28 PID 2200 wrote to memory of 2724 2200 iexplore.exe 28 PID 2200 wrote to memory of 2724 2200 iexplore.exe 28 PID 2200 wrote to memory of 2724 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae7573a1b50c387cd6c01e66ddc4a512_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de83d8334e88b8108a9f5854959a8de4
SHA1f6bf9a784a3cd88c90e7272975df45dd361ce169
SHA256b374d2c2a60de3cfb4b789e22db70c4f07ea6bba99d04f31f578c715b65b1b56
SHA51268eda790da1a78c448c88a68fd94762c0f5db912ca37b240017ed9dff7844940150ee369e7abb4d0fea082def7d7d3403503b997de4f2791a746829d16e802ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc451df2e6c5e2c1c5aeba9ff39ccbc
SHA1819b5c3c2abaa25b92895ce9759ddb08273f8179
SHA256ebad611c7a5904168acaf1decd6875e7184fb5f1ebbd5aee2f9837110c1cffd1
SHA51237556be6ac396979dd4e22acacf0812fd28cfda374e7c433483bc7125cb03ff3f738ae675c16074c1aac6e213bd8c3e354c70a8008c1b106418f598902911429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2be56bd9777605d8ed6370568e7562
SHA18dd984d860ae26ae2e3df5240bdf03a1f903b82a
SHA256fb0740f14a1b519ed6c67bdbc3007534054efa1d0e75a9cd76375f633e6d588c
SHA512396500ffad82ef578b17a9010ce87a931116cac776138e561dfc1a8926cdcd4ae45d07721e3b1d4992c7090d2a598896fe4312a0ee0ae7b23908f20b1ddf98be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b0d014e9f373a7120ba8ba381f8f26
SHA1e3004a00718e955a36d3595c13bb9366d86e15d4
SHA256afcd9ba42bdd3cdc704444aff67a2757c5551dfe9973678c5ed26b00ba226ee2
SHA512bed6bb01f61a0e6c4cec44ce568ba9487cf2de74fd4f14c30bbfa717cdf8c2c9be0fc9b8a8b19c0da31bc4522621d87737ab4e1417280d11cbaefb5a85fa2dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dde907d37daaa534fd14ccddef0163f
SHA18d4f784cf309ba66173f53ecf7413e5eec09eb06
SHA2561e678392581d0e985f12c52d3cd3594daa1910be1747129fad5fe6ece871ae88
SHA512d15debca63574ee934107b2d4ee9d36135a51407e61697a7678dd12d17c26bd2de6afaa84ba5b3eacf3e8638d28389ec3015262bda0c23e5f9889a834e31cc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b966508a48f667635e4559d305fe5f
SHA139770ac9a6247776ed4cbdf34ec59807adb2679a
SHA25688c5705f377819de1e4c0321248c3eb077ec53ee074a44ca016aad99fcd6a5cc
SHA51277e1b803fb6420dd7ffafcae53bc48ce4b3cafaf23936eb1aae151ac97fd1d610adf2b39d8870d8c5482e68b9ca893dc1a10ac91e714a8de6b13657344db1b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de63c7ae178cdccb6591a0e749566197
SHA1c1ffd45fdd40d823a6c467a1186ddff4c829d6c1
SHA256842bb5110799bce98bf02619b43d5c877e39f341481f0fa3428c05f8cbaddb58
SHA5128dd9ab261f914784bd1e66cf76c363be2068b5837f54346a341b6b287b8a895f6f825619d376d2036e1f204023ab5a39b3667fe6663999a1fca67296316c24bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c014bb0a41d0f598b29ebbd341b9071c
SHA1bcba1da8add61ce5dbf702e2c7966f47776dd004
SHA256ef70872faeac651e91521229827ac84afff91829f0aec1893a48a6e062fb94f0
SHA51262bb6e081261cd95f22bd67cbbcf663eda32b652f71089383b6e9e3c5c31b5e6adc8e6dee3909aab627a0fb0531cbc0f12a92882f06afd6624e192f63a8990d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca69a1c31188740351e960977e1771eb
SHA1fec533ac401eb8bed46702e805e6aa5000e22684
SHA256b2d1a4388730cb70c2dfd36eebe856799f3da40ed5e1bda61aa4081dbebaf788
SHA512d07fb51b6f7e26a8fd2a1c51b0bba1278917fa403d7a7fe78e5add4ae2efc820ab0a8ee4b9f0f545c0093dc5db6aa6c0e1c1456b61fc061b46eec2b411aba7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb91b266c7fec65c7a5ee54d75c0f75
SHA156e9270441e690656161061fd67ff5da0dcdcffd
SHA256d8f5e2803afdf9c29f95bcdd9832f4ee0add934fc5f8481027ece230086b23ee
SHA512b8020a2bd2fb15b1be7803a2d802446cd147b1c6397bd760665c0a496134a994a8d8a06742159629ee3b10e9ce7f8e09ba6ca011f8c850663ae9b4bc1d2f256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c480284d76163ee0f6c5b4cc8cd3fb
SHA1b4e4c5ababd6fe3d3152d15af62aeadbb5af0de1
SHA25622308484c7c4f53ab53e8c72540379faa9895b7d2ebf82365ed868df2fa40c5c
SHA512fae5948c035cc7f029ed44ec2b377676db385e2ab2e424e715dc0751248c757d7505b4b6155ac98c5fe4a7f4c4c2f40a6c22dffab11378c7e296a9d1e87a8cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55901f0af9ae208e9f58bf6c814cc15ed
SHA1f7af87f52fca6c13db39b4569a219fbfb4bbd7e1
SHA2565d6e5750afc6eb7f408d1ac9bf0f3d0e72eab3e9cc047f8c84e3678ae997d51f
SHA5122058c6b978f325c80ccda10779bed5a7da8eaba5dd74f6022564200e0f0d3db80344006c1691957ab26ee6af997c794481cab5f7df460f405d4e726b99caf433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55433b3e4b138c46a021835da7968620a
SHA1c3c492225fc4e1a09ed650c246cd4c3c8e0cfdb6
SHA2569a716d976ac7cfd8e85457e55ad030a5d53fd1e4e7cc69579c0806af623cb119
SHA512461f66c9d94b63bd5f0d75697fbdd3226839faa133ecfb35f90b719e12f154de85d92ac04ef381760e7cae4381faf4ff1af4fc3563f6bbc860e8786429975063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2106bc3530d32f8fe3d08d2faba291c
SHA1eb175c1a8801bab501c40381e76da0a3fcd88e82
SHA256b98e39624f61085aac4a04eef19fb1ab34b0f9033ab2eec384ece01239f62351
SHA51209442389f9aa16a10891d4df1f5d360876a01feb598b5ddf25de9cc522953af31336faf9b99c428de43f9515236fe97138b93309665bab1e83ff9ef84147396f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bbff1d834a865caf9e5fb644029e78
SHA1de85aeec443a82aab37785d08a5e57cd439e1020
SHA2568cc3fdbaf384c6ae3b27a0e15db8460d9a27065c2c4db861fba46c0323dc7c29
SHA5129daf79db8919c1f588785e8376af96d9fcc6236b066e5c826836a35852c6e51f06733cd248d66cc2a776976e6c4d77e05e6d829fe85d5b8189e7a2c8e290725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57499a858ea868eed0d6ffc09aa759f49
SHA18c94f5850a8b9447fe8b4089be480248f09af20d
SHA2562ba47ffffe4052e2df362fd02e098f67f2327f4077d8adaf96e8007f774219fa
SHA5123ed3b088f57c8ea03ec40b16f777731e521c211087ec6cb1cb00b6f9ed210e6152c4127e61964d89b1172eeba42bb9f96beb6c66136a133cb2b64e17edf77be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c1e7f46ddc71a771fad91abc198412
SHA105ef16164e572ee2bff93dd674773a9bee2137d9
SHA2567538ebf5a986330ee948bd4a799464fd6553aead1ec500627757f049870a6064
SHA51214250cc8822a21651758263af84b36c192ee337d8318e8a18df41930259b683faa7b7b1b1c34a06c62176e562857c4ed9b5ff608153fe6e31e82138ced6a0c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7343562872a4a52532acdffdd225c6
SHA18e0fd485f98127cc60d7e36cad02d25d570daac5
SHA25627a0e319403fc285c32a6edbf0818ab015bf6fd92b80c0cd7ee90625daa5ed63
SHA512419724bc398286f6114862593d31929993ee5e10615a30deede5ee0af5c6b62d3a183946f12962df51a8e0c6d5600a226d5361770e79ba43c9cb98af9fb9245a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740eb35413a8fc5850dc15af203f9669
SHA175d379067208ac1eeee3e26c3599ba3f72bf93ec
SHA2564071399724d12e2e0f828de6d077c828d0fc9b6a1951f412153d698c838281af
SHA512977e7e25e8f9b3fff9abe8ce0f50e5388e7abf75d61bd6b5cc373f0916ef785620a2c3bd327a5b34895257855ad0f297a3b21d6e59010bc4682cb04ada783eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59584f299121541e8793b8dcb508b1f89
SHA1d5473fa9fdc8ad382fe78f307bcd38c1aba8c4f4
SHA2561ec2e5ef77f8025b6a3eaf276796d876a0f25bcdafb274fd1c38f31f6b900ce7
SHA51262b3863a64495fa3793bed36202906618481b55a77955655c34790c5d3cf6ab6507e399a23997c62bc4fb19451f189c18d3f43a5216db4dafa1eb43279964739
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b