Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
b01e9e5ca7324d1f0ee39b0b23d7c1bd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b01e9e5ca7324d1f0ee39b0b23d7c1bd_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b01e9e5ca7324d1f0ee39b0b23d7c1bd_JaffaCakes118.html
-
Size
113KB
-
MD5
b01e9e5ca7324d1f0ee39b0b23d7c1bd
-
SHA1
72cb923af8d04b58f76b377be5e8511983a34185
-
SHA256
5022d6dae4c2977f5016070f52839ec57b402b418ddddb0f941a0f153bf1ecf1
-
SHA512
597918c2de92da2da468d8d447f35a308d4bb4f4d74b0b2ff790a4faff423bc610845697d1e33c87db88d34e7f9bc31d4c2783e802875faa430d2813f8bf2cff
-
SSDEEP
1536:0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:0yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10182c3369bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000379f47465f1606375e234e44981e8a5db35d65185d225df603dbe21e641842f9000000000e800000000200002000000021fbc395c3baf4bd3d7cf9d592664aa5268ec72f5e8d726a63cf6d17d618586d200000004aa91f8ba7fe57d2553560ac771d4ef7fb0b16ce500360c85294b0c44c09a66a4000000027c2d94ad08b5dea6e0b62282089033a99173b21d8998810f48bbeb8e0ea76e95f323e98297407cd7169d7d514c18d9b842c91eab0a89f67082554a909d6f45e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424647987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E86D131-2B5C-11EF-A85D-46C1B5BE3FA8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2840 2180 iexplore.exe 28 PID 2180 wrote to memory of 2840 2180 iexplore.exe 28 PID 2180 wrote to memory of 2840 2180 iexplore.exe 28 PID 2180 wrote to memory of 2840 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b01e9e5ca7324d1f0ee39b0b23d7c1bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d710c67b01e6e4381f3e002e2182721
SHA121ea5f5da56c3eaf7b555434279adbac41bedf56
SHA25639060ecac0b131c42acdadbf98275dceecef84ca4dc4ec65e9f3f7a49b98bdc8
SHA5121fb34628a72045996cb69f31506d4a441a83090074dcfdce7f4a2e39fb22caee2c8663b058ebcc806e03030948218cd559661b4a0842d68e655735e8bddd6b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542af7465397b36833381b30616c4b6c
SHA18fe0f2f3bead87341c0c3a14548c48f49690912f
SHA2568be575ef976368ea292ef2762eb6a21c7b059154bf4ffb612f68b1e282938692
SHA5120e4527dd06f3bfeef4f82ec9a1b3cbf29a8395aec2eb831259b3122871b1f2e391f9d7f620b30ed0c23ae41fa4491246bcdbd1c08ced5574b5e2a4afc2ac6218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f097a5f4c91b963dcd31cbf8f5fd016
SHA1ac2594c04a57993bc0c8e76dc905566e652a69ad
SHA256317af99b4f28aa7f85ce693c8cc4305e9daa7f34c4a527203489b06bfaaa2c64
SHA5121e7f66d2c162568f68db52d1b341bab2840846676d299bfb38a2e4a8b2d3b02354761f53c9293d06769d360fd508051a876782280797cd8fb806e2cf923c5213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd768ff82d2e2f1f2b24c31964c67e4
SHA12672c6fbe62c31e8ee2a7fa51398266c54bff19d
SHA2562c2c7f38cec0d237489d95054ce1841aefc9825b7c6e9770c08e8c90a718bc70
SHA512289de5c031a1fa67c201694ca645e35b40889ef350e0cdebe8c6a45476ab895123ca3f6445b6916dae8237c198224559b86dc912e5651c59a89b198efdebe449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd95cad3e06b1198757c9633f47ba728
SHA1d5633195da385048b2004e62049f7de7722f38ab
SHA25696369de0d7be37a5ae446592b43809690fc7d8e96eadd72269e97d9a9a4f1a5b
SHA5128aee77d9e3f3b4fa23edba8a563feab879832f30e761a2f6d3dd742ac8c3f945001caa19233697b85c409dad2f01d1629678577627d4d0af67500e466c361928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d45842618123038fb19f45a27640688
SHA1dee9e369b075bdbae03318c0e18f25fecf855edd
SHA256e215d8a77b453496720a96973306a0a2fb679e3e424f751b769992c406a5180b
SHA512fe5e48513622c3ff80f593490a11db3c347a96b2edf1153f392b684cc5bf81d63a5c1c82b231c46978e5e4acd8820f3f3b29cd5a4d4c978cb45b05432e45aab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57073d42ae359b4c9a684fda8e3432939
SHA11f070da38963b097850572b8f43d0c242717e499
SHA2567bc24b415545879f6b2898ce4b335bc97af035e68e210951ea2b4854f9ecc9ca
SHA5127355ae3e6b9a15927f7c8614c8155240fa18be631e31649dbe128eb9f1f87ff5b556d0c7f6358eb052a13a9d3ae0c6e4d50e3066da4811d9ae6201153ae64bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2d49fa97a5512fbde63ac5c0334db5
SHA1ef17c48fb5659dfb72307b6e8dbc9e2b85a7c69f
SHA256a4939ecb4785335e3dca3770b392afe638cc7c8bbb479ac56fb615f8bb1e1d97
SHA512c4ac3014d075e39f318539430338ec5b0010d259c727ac3c5fbff9675a00f664c779fddfdeeaed09ab9f6e8bfff5c53c588ffea67f6b3ef45fb082b427930679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31a97f30533bd12f7b66ed3bc833675
SHA185f2d0580d083dbf0d6e0cd33cf6d0610212e0be
SHA25613bfaf4e8e4f361b6484a3f94cb492abd266fe119eab414ee22f8995f2953131
SHA512f431a66da49b927ca8cfe4220b88c630fdea134f239e5e8a557f91dfc9c2a20bab03e2dbe6d8ba2c088c35e2e84159844678ed4fa4bac6238a0c951877e1333f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd77898492ad5637ed2c1d612215f8ad
SHA10022293e21fd2c3aa76b626333d47b82e4027ee2
SHA256d8cfcf9d01862e7e3a4cc8853e64284b16bc9a1651b5e4f345a5dce5fdb61eaf
SHA512e578d39be88b7e92bcd4597e9e5fa4e7d6ba17d7a5670e198e1e5cb29aa27d0c077f241c7116204f20f52ce6261586cb7a86b536cd7ef0d940275134d99b4498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fea5ebff59c033d74ee0b4007fdde6
SHA1c2dda4e806dba7ae7edd512ebcfa2dbc0dc4bb1e
SHA256618c15238224135ea746b3ed8025549a52d10acd07dc5327cd3ed7ffd5e2ef82
SHA512c8a62d8da449cd5347a1623a6c29b61fe3016f224f289be231781a241586521a4c18f0c0fafffdb8051ea77f1419d7be9125c5741d49dc8d1c3c42ec80085200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba96d5635d275707da9e6c67742dd47
SHA18fa77fb512ad64e94d9d40f5102498eae0f9a81d
SHA256b709d672ecd7929e636aefcc309ded7b5744794ddad52a3622afb3fbe64f257e
SHA512203d2fcd64030928cec97921b3a3055619002f233b855e00909426671014b8fad0728dc77d34854862f11d47021f3cc4279766b49307700375c390b26aaf0036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a272fc9de7318356f8aaea1bc5791768
SHA1e7acca8760c6645c2c5e433587a37c77e5e916af
SHA2565e330e75619ab2fa59724033082b483e2d9550328e9f5fce9b3034f8b8f6f519
SHA512d6bdfa0dc80958818abf5a560e0c99bc4b0aeb9eb3809684340359a4dbf450c0a026b254d77925ad3bfb3ac9fab6e7e078dd007ace25b4aabaa159efb0f9e2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58397eab5bb818e70dda67a5b3e4a92dd
SHA100881c3f0953d7d8d3a375d5f281829dcd3b43f4
SHA25697c6bda0d0458c79d7d7a9909682c71ccdda370046d06c22b68ff25cdad9fa53
SHA5127ceee79b3e7b352ab634c13cfccbe5ee8e3eac41dfa89aceae0a00e0592c8299fd7f914bc6f2638a3bd2f66c017961ca9e8cbcbae80f59077123b9633fddab72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba1b2e857ad7074e6a9a680de5e30ae
SHA18e9cd17f842183ca811ee60cceec522b1d865e93
SHA256dde45681eaf36b09887d10a3af5fe3c18f461a96c696432779e4556923679fec
SHA512a7f209fda4ab4d2332078141e2ba7bbf311069f2e91bb3160c04e43a7ae0be3f17533e37ad899dc300fc12a417e7b073e291f2fbcdeabc618e961591338bcbf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe473cad0950956a24e2494164e5e7d
SHA1ed581911b000349446f1a81e2550be407c4a6d97
SHA2561ff8971f29f87a3f3eb36084f14e95d3645fa2ea438a68a62677b4d2936509ec
SHA5123f3efbf84c8adcc362ae1a34cee37f850cfd351d0432c4f4f8f43c5f1e5e5bc6941cdf42b303b039ae68f028d6dd803597a1d001b525ef8059a6c877c7606624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a64fb3bc4dd68b10e5bb9c0b9aba3e
SHA14010cdc597d893409f7ebfe0dda82d5c08956e8b
SHA256ae6e8d3f714641c7ac95e4660349354bc5c21453af98d82e2f6224aae3d09fa4
SHA512fdde4888bfcb7bf77fb9c322efc3c4b0659a3566bc3edbdf44553bc4f5a2a40d220f013c91bb2f677296696d28b277d9f3b070d64a64e6cd739e054cb8b1fcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522443a142f1592b34e2156560b281308
SHA160db8b4199ed6e446bb922788fbca95db266123f
SHA256df3d4c08ebe077f3b418e1d54c24b9d61684e5a256892dc27836ca37896e644f
SHA512b51aeda76cca7a6b6aee0a0da93ecbc43880d2a7315daea95d3017fb09adaa515cc99b40253234f012572a9ed77949f3b08e74d3288cd981d852b509fac75957
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b