Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
b192bcbe87a5e3b0df7253ff4c7993cc_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b192bcbe87a5e3b0df7253ff4c7993cc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b192bcbe87a5e3b0df7253ff4c7993cc_JaffaCakes118.html
-
Size
65KB
-
MD5
b192bcbe87a5e3b0df7253ff4c7993cc
-
SHA1
935dbe0d6cbbca31e6666d4114f4a53936d61bc2
-
SHA256
e114198790c410f792d18fba1f19280d48dbca0a7e20262626363eba28adfd79
-
SHA512
79daaea8d72bb7aec0aaafac16a42eb52028d22d6c2f31b49ad9615a008eb4cd6044663ea887b489af12aa1ec278ea384d172eff07e2615a23b7b61d461d2bdf
-
SSDEEP
1536:7TIXMCo98eVUDDkKugpPRJCgvN+yT2Jtr8934z:XoFugdCKyJtr893G
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000581f75da1e1ce87b9946d019081d903797c6b97138499230e0c43191e006b6d8000000000e800000000200002000000054e8cb1574e6ad1e349b88c6a6fb59c5b634aea9270f7cd5f183b2f836d7333a2000000096e35abc01a7831dcfa40002c9b5965fa45a0752632a02c9bed2491ecf73068c40000000b8f16218b8c5b4d00db53c0ef0f4e5796edf240aad1748298c32bded28681a03d3670a01dd9e383f2bb8f603c5ac47bc3d6913ed8666cf51322b80389f214cde iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7068f4429fbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69B2C5B1-2B92-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424671200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2652 1056 iexplore.exe 28 PID 1056 wrote to memory of 2652 1056 iexplore.exe 28 PID 1056 wrote to memory of 2652 1056 iexplore.exe 28 PID 1056 wrote to memory of 2652 1056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b192bcbe87a5e3b0df7253ff4c7993cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d62fdc02889f15d8f55f1bc3fc60d79
SHA1863dcb0e7124cad45aa364120e369539b88705c3
SHA2563601597cb8b8c0e93a5ac1b11cb98ad16247c8979f46952ee490751c21344e01
SHA512af1cec0518565d69ab8ac43d266e600034921ba8e412dedcf63bfe4cca371a09000eee9ed79a591a2090741aa813502375ba2e6641769f5e86d7f138b226d2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b9c8c2c8be7a9a3cac38968b157f16
SHA193660d51884fb3a1ebae4119a2b458dc40271ea5
SHA256ced85c5949064e80b0585c36e58b12a9058ad7a45fe2c9e43309828a0a91ba09
SHA51271a3258d77c44e7645d1572d36c7bbe7a571436ab63d3c4027808901fabcd02097ac48f2f3a4e93c5ac4466d626e1d7cd20d3f1b9fc4ece2b81a45c31e95423e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55222e612f1c3ad083703b804e31efc95
SHA104dfa8093c46c1120091398f1e39cc33fb8a06c8
SHA256eba8bf3260c0e209256d440fd856e9fd71b93dd261d1c9d6bdb808675f296825
SHA512c52946b9ecee70a96abcca6f777a392e4935917557482df0b277faa3cd2c5f7ef9ed73c23f6d5a8d6ce772cfcb4c419f5b8c9c0233a98d363d7e5d9889bf5a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937821ea1fde249a4df2a0d9f25ad48e
SHA152897dc770349a87b9e8b996b672a42d364613e5
SHA256f4d6ce50e18cfa13779279b8554c2adc35b06253e8e7ef224e8c33d9fe961fbd
SHA512e8401a7b14d1252c73d457c6a6aeb268ba099bff9adda2bbcbf68b2fed6f98e9bf8939d054f5bf4ea527e5e4e5358c897a9be3a1dbd196e4878057b9e1070b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7677462875a7746cf040ed1962c140f
SHA1ff7ba3f94f4a1a4bbaa39e31dce8c08aeccf3c7b
SHA2566e0a6f9e07ec5341146302770ebd0879cd333d0cee49e925de79ce5372b77185
SHA512e733cbe6eb8df755377ea80166cf26fe911f58acf08eece4d02f0ade44f54ed90b8a9e0649a2ce18a1ef1754b1e59702f9bcc92aa8d7f21e9943933ba044fd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6869d979f111479045fc91730c899e
SHA1001be6115c7bff23b58baad1b1a9eeab0ef8b7f2
SHA25616b1a016c2ef6d248e8be41ecc0b0e1ea350a8e73d51ed0e2a651b383df734ff
SHA5123a05ed396914e8d9a5656646bc1336f4068b91f2a39c6c236aaa2d7c3fe05b46d1e2b1728503310f7ac6a520026964281c1e7b85718639d68affe4219ddeb0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c0ffd3620509199bb86f1868bb635f
SHA1551193628a2a9dafdcac7b780ea5f3370f92314c
SHA256e18893de58cf4d98da7bdb128c326bbef5b1c5823f58d5ca16d32754a2d4598d
SHA5120d4c6beb1533ecc0ca577f2573330c20c1a5fd4c0faa3711be5a93fbe822bb47ea35f53d4a8e7e56194169b6e242350dd80be2278547cf6cd73fd35f67d02c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cccc9caa9f70d76857efeb4c4000b6e
SHA1d8a8e5e95bc1eb9e46b8a29b806d76a79069a940
SHA25644e959597dce61a21258dbdf6e07348e55af823b09ba27b41ba315419f50fb2d
SHA512e70018878c9fce35531a1c10e0b45192d376bcdc2f09d352e2c31007d0e172a3954f533a7efaa19f3d3935c6395169b1e1af0a398ae2eff54b52643e2ee8c3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c665158efbaa8753fd724703c06c1d9
SHA181d75c3435ac7242c48a9a0f4c1285cd1a0972b6
SHA256aa6bbb342e7cf74d0b98388c6ef15b10aa9298a7e9b3bf9014ec1e3eb65cb1c1
SHA5123af1e4108480dfa89bc9b05878a7d3fc2c2747bd23b2fc0d8ac9213577460955098fd8e2d87ec449d1dff8fe45affe7d98a19b03470466124264fc76b2cd49e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ae42d4927d63399f9df9bbeaaae081
SHA1aafbfab0847836b4ad5676450bda3f658a628d0a
SHA2564bfb18d6785025d4f7248d04b620c58fc8de37d6b2e40886bca892f0bd0c1347
SHA512044eadb264480830122b3ab778efb872c8f3173a8c3dde719159639c1c4bd8886546b698430884c6975a7c8b6d948853d778d89aa6b20eb62cd7517937964364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6a250928fa6960d422ac37bddee66b
SHA190e96e5091ca1740bca13a43ec8e08db896d4a91
SHA2560ad1f632737bd6e24a57e3c54513c1745a15cd5c590b142d6b0b3c2e6a898452
SHA512c0c135eafc0a1c7660a9e7df7fb3d425ed6bee980bcf0f56bf0c3abf6eaa0b5817b51c3e85d883a5f97161188032701bf57d64afd09c595631f40cf686a7946a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841dad34dd47851e00315f64a8a194ee
SHA19519c7944369bc212e77105055025ba772160275
SHA256cb157f5abdf1d6358e054598fd5bcef11b293613710fce26646f057513ffe45d
SHA5126cd6f765b3be17779189c88fae3c5ff5620381d38e0db3554add426846e5f9ee11f2a223c7af06a1b2ba02e2223385f5933961d4bf56c9754b6a51633e26b2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54219b483e404f522f07c4197cf2947
SHA18c7f6bbdc1d78f4385f8872dfdcdb1dd9dc99f80
SHA256434381927ff0a3b8b57ecb04528abaf10126d69f49fb302b6153960bc7c33935
SHA5122ac03516e62885d70529fc552a9c98b83d677a568030f0c433de15600fbacaf447b62705891f5fca5ca8bac52714c7c95f6386f10095a3ba8ff33592e8aac87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42b7fb6ef2d9bf36809e1ffbbdc37b1
SHA1b715af2df0505b9950d4c7facd4f1fb5aafbbdaf
SHA2569276155e32606f6d9cb87d7e37bfab929efca323c6938048ef7e52baf1d83101
SHA5122eb3641059a21659f28d3339785500580112b78fb75748e8c0235c49a9c4b4a875de775e49b1fb9632a8bd19838887a491e1d8fb51cbcb864389405dba970c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088a771e6162b77bb1001f735d593080
SHA101bc1c975719b6125cbeee7c1494d02d4f86ac98
SHA256486ea2973372a92f43ee4f41905b75cd875a99ddfaf329c145c6052df1d64e03
SHA512d259b59aea245a2a3b85d16ef62e4ae69b536b8617c4aaadd052ccdca56b8a4481ae2b3c2a2fa621de61de9e15a4fb45e0be4bbad92c8691119ab7f723741f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bac1428939d130fa926cd0e39df6aa5
SHA18c093a120ffb835f43b2225d2b0397d4a98f60a7
SHA256c6e95d48dbfc5bbea8682c55b251e50b39a6817c3ea4711caf948756c57fd4a5
SHA5124f82453913354ca43405c6fa2f7a4cf55e4b6ecc388cedb876282abc878bdde38a4a90462427cd42c82ac61d41ba73147f8f8cef78064f67ee46ef512dd6df58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8622c50ffe0fd0158ba3dfc01962cf7
SHA1c277f35665a09192c0ebea4b13500f55bcee5a5a
SHA25627926a26298be77f00e56901a17d122840f2562202dd6add743b5084757cd9d5
SHA51250df4e184eabf3e974f2d481990cf918e337c108d0a2994139f8b5260cfb6cdfbb95afff355efe36fbbc09fdd1a9d92581894d7a6f258f1e8fda507d00f186bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d492c42a5e35ea480d69678f92de5249
SHA140594fe17726085d944bc34a9c04dc58fc2636cf
SHA256de07ad6620888d3f0ac9861fcb099d3c20ba2e335fd5578ab3b4ad44fe55d9b7
SHA512337609e532146956bf6a7b4a74e4656be551f8639b7bb544110c3d3cb66b7ac0cd4115fe374deafffdf6c8954d91e1c491f3c7ec5f8a5fa8c80e7edef373ef12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b0cce826b5547bc7ad41af2c61e968
SHA10a42b058654c677e356dbe13ae51834327ab67fc
SHA2561988f8544e0e78288dfb9824f7b79548aeeb277361178aecf08ecbec1cd7eb47
SHA512b6e5f6a2eda053e9ea9ed82edb69f4e22959b14db726263660cd7dc745502831b0d3186efed2e718b66ebd59db5d80950b6571d0636f4e4dfe126db7db668aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2bd957c5132ddba0577935f377f865
SHA10d1a436190c9a5edabbde18ff9e830968f4e9571
SHA256e9675d612c2659c1e7f1ef3e9efde69e55d0f09795079f9c77ce65fe26e5ff2b
SHA512e9c867c11cd793f00b7fa26eff9ab29dcc7f90fe65daed69030b511794fdae74a7518c30775cf00175e576d16c21fdd1315fc3dc788dbf7af7c4ab72dcff859d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b