Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
b2ac2f116443efda96a36eec6b39bf7a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b2ac2f116443efda96a36eec6b39bf7a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b2ac2f116443efda96a36eec6b39bf7a_JaffaCakes118.html
-
Size
229KB
-
MD5
b2ac2f116443efda96a36eec6b39bf7a
-
SHA1
89c76902a00e61fd5b0ceffe66d91be7aa84420b
-
SHA256
3c79433604b45a3e7446d86e0acbcfd7e88078e5ee96d679fcd02d43a67ba815
-
SHA512
129c9adae7fb99247b096767933921935302dc915ee3b6b2def38764022784795bdba7d900dfe90761975ebf180253429e7576ea362a46ab36face6ea56fb707
-
SSDEEP
1536:duSTyZ8zI6LGrZIIjIepSZw5mlpvvV4DyZY0lxYqrZTtSvpHuBuVnLxbPOO38Z:l9yKBO+1QHuBuVnLxbPOO3o
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000009643cbd7517c90bdee2b13a1e3abbd63d4439ca026c2fe8a6ad86fb5848c2a03000000000e8000000002000020000000ae5ca75c92b3447a246ab93ecdea7253c7c35febc04eec4c56653656de394f072000000084fe9fd3fd909f57c1337bbf8c49dca23d11d130268ea160c4c6b934c85b016840000000a731ffff116365211d239e67b267a6a698eac9663277b47514731c91a7707ba089625b26a4ff4727759962d35cd6eea43e51b062b1467b0e6624376664f492fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AA49DE1-2BBE-11EF-8875-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424690125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c4967dcbbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2940 2016 iexplore.exe 28 PID 2016 wrote to memory of 2940 2016 iexplore.exe 28 PID 2016 wrote to memory of 2940 2016 iexplore.exe 28 PID 2016 wrote to memory of 2940 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2ac2f116443efda96a36eec6b39bf7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57182adf317b0b5e6b475bb6ad8c5cf36
SHA1e408dca115d6439a49413e6632df143c84f3bb7b
SHA25622025b21584f5ba9de736ffc53be826a71bd8a5e7c37cf7f8b9c76b51434a290
SHA5127e13faade47efb6473e9d66e517d35b8729648a032a2cc36c23cdd6881151de9cdf4104ac5eeadf5ff9be2684bd51cdeede1f70f0a1c84864b8dc6fc3d462c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577366921c1693f03e7a22dc0735500cf
SHA19d6346bb8bcd0350c36caf5979b6916d6c91ca24
SHA256bb79b8ddd2fb206b4264c552a31e00879f90671781e46e865edf94b376a6b357
SHA512179bfee40ee573961d54ba0e75edce323411af594c01fd1c189b03bdcb165e74f529fdf84afaa3deef02f075a3fdd55f9a966cccac40a81a1ff76cd247f81452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694213d04fc6ba891597d1b33a6925a9
SHA18656ff1ec321d727cc11b119277808567996194c
SHA256ed54ed66f8efd06c95939922d4400cdde9c526434d9f296ac83cce81753e8e30
SHA512174b11a1c68aaf2592b6103b21ea384d1f9b7e1a5a2b2879bb1a858a761ba07bec5c62975ef97ad315dfac93d294c044a67489b7e1105d6d76f80bbc09295db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19e6216ebed63ab3fa99d1e9c5cf1ac
SHA1e86059e5f7655462eda28f4ae1a9db8f76227f23
SHA256d06f61e2e6609463bd350ddf0771977a3e2326b2135ddfcb8d76af47159b59a7
SHA512b7cd93e76343a9f8887cf87815841bc194c92e096221f3ac64ed883549698aad2566910a5edf28191dd9a7da655e6351fc5ccd13c52530971517200da99b6fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2bb1ee0b46c7431e6c48eb1743b15f
SHA15b7ae44d407062cb704dd8e4d27d170e11278caa
SHA2563bc35fa0e702eb2dd2f0219499bfc0916d14a37fca2213fd3d3f59c41777f032
SHA51216953366a05c8e32288ff150e56a46530edba370f9a33f3756de1334f078e2f6b11f9a1356feb631aaab0436534282678dc6f503ae0ef9f99caacacfbf8dfc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ddc6f41ccf2d05f20bc027a1231a11e
SHA170fa7d2362573039af2684848e2688f1ca2158f0
SHA2565186a2a90cfca39a5ed240f139d25d7e1c920593e5de7aeb02929027e261183b
SHA512d9b884153a1e0735d096959a559d727f592a92505c3eb5778c97767f5be34d4f22080605a21af506dcdaf9b6a98f162eb6986ee2fdeda1122915ea4300a5822f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c6e2526141cdd08a20720e36e37a22
SHA13ed78203d216cd705dfd3c7bd9a6a8da5b134b47
SHA25644d320adffeec8d5984e00d0368008855dd17fff3004861381cb49e5c219ea39
SHA512854c6dbc1c30fbc67832f57135aef8ac959af00669a77762f73d4d0d5b02cb37fd87a7578066a60fc825bc072bb542b55a7a21c3a0c921c4179168ee57e3401f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be568a617063188f865adce5fa9f7e3c
SHA1a9ec17877021cb66aa8acdad52de344d1cdb7b2a
SHA256f9b58dea6472aee65db1a64d13efb0e9c726412bd25a8759dda0aedd124ef279
SHA5125e16e94e38a6ddd71183b325a10acadbadc13042f8a9719885c05eaadc356d0baab38714d22e1904aab9df96eb04d1ecda5a0e648f32849a3d186d2239cb0619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f178503833a9734d96a14c7c105f66
SHA10a3650e284a789a05e8bd6e32609ee380c24ae80
SHA25688bed885f63ea88c7e6b95f8f841a57003255a25a9d38567b60b46dac0fb4f8c
SHA512afbb5d60da3650522f8fd28d2f0d7b27a4fce28e4c30a99bb920a1bc47b5c4048f912dc19e279e756fcfb8cfb8f560d64175742ca5ef1484f5c3913610d8fc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3502140760f7a53112aa1efcc485244
SHA1221c5aa5edc1f08ef7af2aa061ca708f9321697c
SHA2569d31e83de43a39867446ad7dec81e1dc2ee9a2f5e88f0dd67bd4095790f7fa88
SHA5128016f9cbe92cae20e93f6f68dce02e21a9f5f0ac9ff4b4968a424c8a5e00bb963192e247b7e9ff93ec2d87ec729646b3c4c96c6ea9434b51ec91ac3819466245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58338ed431dbd20761a2017bb25105199
SHA11186bddcbf004bd040b108aebada1985d29658d9
SHA2562234c6137089ee6e85a7df29e0cb7b02d978274a32d4b4725f7667d8bc7dac6d
SHA512183a056b185bdac70b8570e328b9b589733ab96a67eebc4e885258c21bb5656ec89ff415956ca76a278cdfdfde64fc1d7b4a5a89b3e56d0d0ba72772529b60be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c690771bc782b2592664f3f1fa29db
SHA1f72094ef11fb8e934b70f0c4088b8ea51ec342ec
SHA25683f8951b0ae33783137c1383af003315f57d0ad08dea6dca20439cc887b98c7b
SHA5122a8f3279823af1f911d9bf7608eb1292b28fc74941ff38813cd0fc15ee246fc8536b8f05d464a7b9236086c8e51e2963101c7f6df434f9700b738d1609f34f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53540e74ea510ed5eede821b6d7fcd857
SHA15b6e952d7f0dafa7fd68bced7c6de0d305d7356d
SHA2567417e37d0fb1244a3dd6f0f90a4e98588b7149a27b15292e1eda2b4375d99dae
SHA512ce6d18a28ab4c4594d40743bd70c09f9255a0eaa83c617baf3369da6aac4a9d1c6a52dbbf6302e01f2cb4ac77ee6fe50e47c8f7d63e7a2fc39367bd778f44fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529289ef00372eb3d6635a1b4b109906d
SHA13f4935d365b9e5bd185fcfe11242abda411179ec
SHA25626842ca249308555ad3f090ba812ba940d5344ec64ffe641805a4747a85b26f4
SHA5128010c5ee46e710807019f3ad8ded79e61d605f03b65a8413b25625f1877ac5c59899cb4eaf5dbb6cf52ea0109a5604e4f8f61f37c98c32479b7974262d2f511d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58338b8e9f09eb70e7bb6319ce615aca3
SHA11f25c5b41d7f129142ec523341de3f0cb35843f7
SHA25693da5cf4a3d24c51a331a7a601b158b9c6b1f730a89f3b82dc51dca68e079dba
SHA512d0710320e261f8ff8425223ee8f3b648483b4e9fe8e4c73eacbec75b06cdb844a0b1965d2ecb46a732d2bd30854c7624e3618089598e0ded0e02cd31b8a9b561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e7603a1cc0bb1a2153e664e9aa4dbe
SHA17cdfc8b9edf9976f76cbbd5dd903192bef73294f
SHA256bc69e5ed1ca3cd357ea3e17522e9f4d3a136e15b0e3cfe753dc89ba1deec71ec
SHA512e0fcd9801265cb7c13315e30e9eb514275f0aad7e0e81f648197e8437d651858801d0ba079acc376c8a881c56eec40f873d6e45973c980355b7e358147298e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb554d234e883fdb9d8316621a25c37
SHA15ff59bcf2f772ab411dc1cedd3093cf4f7edec81
SHA256c513b64eca556099031c4995baa2c64aaee6bcd92a89468ddd791b4d54b1ba15
SHA512b53efde21279eb22dcd1717b1a8186fba6124b148c63ae3d5b107b8c301e43db2d592a0a2e7b0d4e3801c5f6105fe46323eefe07c9b1864217ef5c0f9f489ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb5853122d03d6785da2ad10193f202
SHA14f0af659b03bb69aea642461aefa76c8a2dc822e
SHA256a66dc0f9874fafa9e9a3a7643b1206fe204acecba0a56132668f1d9aefed5f83
SHA51215e2ca85f526cd93350fc0e8efc9d176a08944d80431dba02554c963de44721c4e61912b9c66dbedf3ca268001a6e1dd4baac9bf54e0747ffd81545a935cb216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6ebb0c0b77a41bdc593aafb42806a5
SHA19a38ffbf61581c213c0587e4be6ba8768ab2fd2d
SHA256d53ac1b67555d956f4a0ede7fddff15f5ebc710bec71677b971bbb9df7db0ade
SHA51200497f66b583588bec1559f4699653283263496bce0fde17685316a5327bd6f7d5acde8bc83ded411d595e6cde261868e420a02fcad67aa4ac260b11b9638d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdaca481ada9be8abae54e9aeaf3e71
SHA1103e6cdfeca450011506359886674364665c453f
SHA256faac4d8be5e71dce3ff0f1a09095f0d0663b45701293a317f73f65a65b2ab752
SHA512551b1cb13bc4d8374f172544b11332ac3afc116fc9b717a1ac7b23afe48704584bb3228bfb93dcffd70e14e99e33f4dd235aeece479ba5142fd00e6750c7d08d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b