Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
b319225c317713e88fe56d90abc7fac9_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b319225c317713e88fe56d90abc7fac9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b319225c317713e88fe56d90abc7fac9_JaffaCakes118.html
-
Size
460KB
-
MD5
b319225c317713e88fe56d90abc7fac9
-
SHA1
30f30b31d3cd2c329a37505875879e2731c4d116
-
SHA256
1530db3fbafd1f31ac7f4f0957189855c72d380441038728b4e5b011ad59963d
-
SHA512
48a5e25c205643a2843ccc5ab70436f4b6f12ffd03234a99b3ebbb6a2926544d8bba4a4c1d788a1bf877bf3c4326848569933bdf14a91dc6bd2e7059af635b17
-
SSDEEP
6144:SVsMYod+X3oI+YeJmsMYod+X3oI+YisMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3QJE5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000373016fbb3e8a2929f6ca2feedbebb3a2d3246512fe5b2d9205d05b44b040c9f000000000e8000000002000020000000ff5a9e3d2f9b4af56fde9a54996fa1950eaf5de5ed180ad410aa2435edeecebf20000000959a1cda8cc39ae00e50856819657cc64815400475534ebfadc5e95b0fce41cc4000000064724e103fb95ba19104bc4b82b84283c0b674d673a9516288a158cec7d21a49324b7291c7d69b3a5adb778fffdb4c6a639a9eef56b34bdbc7d2a75a0305a362 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909cd63adabfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424696529" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61EBCC61-2BCD-11EF-B3FC-D2ACEE0A983D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2188 2860 iexplore.exe 28 PID 2860 wrote to memory of 2188 2860 iexplore.exe 28 PID 2860 wrote to memory of 2188 2860 iexplore.exe 28 PID 2860 wrote to memory of 2188 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b319225c317713e88fe56d90abc7fac9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfce6b852a7dddb9ae5bba396ddec704
SHA1f333694e7b25b717301cefce93115fe6e7b3fd14
SHA25660b7ce7304b54733275706ddff6f26aeb9894c5f9021c840f101a3ea2f578e74
SHA51203e60ff52951ac1032d7933caf543f25dbc93e8b29772b16a202ec69a0ee327019650e32c8f1c6c2259ac3d008cd58b1fde24a7ea02de5f2ca9b7e043e0dc07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cf42e782d52bbf5c40830f2b0deb9e
SHA1043852b54e14efb0918b3f6f58a5840fa221ecf8
SHA25627f61a3a6fab0649a014d7040318690c8d7433b95fdfc7c74c66416e14069f69
SHA5122f4299c12a233babec9f15926cc961b4c159079c188f020ed858d324b919e7eb06288f403b71954fc0abc5213f4158fab6f671e4a862a980bca782e1da26d7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515297444eb335d925f66b9db33fc6588
SHA1478ba61aa88b828ce2c9e0c87483a5f46a371185
SHA256ef86c81b0d3027f1708f9ec76197e366950b4caa34fe74ca4a798d7970ebf59f
SHA512841479071004db15506bf3cb8cc790141a59c57ad8d78464df457c7a5a64e05632dda0cff66e4ea8e512350e94004bde1b500f1fc0e570eecfc043e5df905bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e2cc6d151c621812df0446b3202193
SHA1282d197c14e14d91fa2a508736a085a5c88ae0dd
SHA2565d8e2885904697728f967e3ecf1de70ca68d606bd5c7ba503715b7f4d0311476
SHA512d0ed0202f200d84839fb156326b10ee75e2b785d6b01f8a467819e3992eaf98789d78c1c21bfda7d914f181465cd19be1fa67a6e714280e7901e208f5837b2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee64b262a5e6d1da788710ff7d9c0ada
SHA1b0b40c9915d3cdd7f8c5c6b8773195cfb651d342
SHA2564b072159ddb27105e8f217abfc759f2bc2263809b0273ff9903f4827e5855354
SHA512b5c3fb0406b6c674c20acb4eee9ce7471aa87f2647402a03cd711df7c3ce4c85d0fe8a99a1751fa9530645671c8173b809e8e5117ebb19e6d6d47b7be55f5eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f9b6bdcde78f416165003db78a1b2d
SHA1d79917677564c0c8c009db23d16567534c2c9cbe
SHA256fb724e1dc5046967a7307b2f3a0a55590ce6672b7ed7f4eb36d3df957e73f724
SHA512099665faa2b13afe95eb79ed419c571d77925c5aeb57f946c1560e9d5031960446dc476cb61df0143b1257ae56730eddbafac64a10b7ceb0d75d601428e399d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504dc6ab6d220d38d7c4e07cebdd2c396
SHA16be9798dc2722c98ef7b755f7d9e8a99faf2a37d
SHA256962c2781f1e897745f239f41e89901a7ba900084a733e1f591216bf6dcac1271
SHA51271311829e284741d914ab3efd13d22b89e7e521c24060b06f4be18a94193843aa647fc87b50579fa5e6eaec7b9e66c34f9ffef06bd242874662a1ff49df2760b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095b123c15468a0aed65294ca6ab9238
SHA13ac8cafa4c9a83d68adc9d934e1acdd008447454
SHA256dcc520bda54085ea5372d04ab466fa0b5348dd1e1c7d9bfe1c0c652dd9611719
SHA512a7df3d9a4649661aa632b59ff61ad0a6fc4a2ae6e1c8ff80277df6d5e8c3ef2899788dfff22cc17fbf218f1544798b8a86f5b5fff0d41d128e44eae1e4a8ae9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a473e21b9938bc528f6319d777b9af
SHA1c89d07d5e78eaa249d3c9b855e21fa57ee8e2ca6
SHA256b88d42ade03f188592a9f3d5ca76e6219d3e79acba0ae9c06644c557e0b71408
SHA5123ec87898a4e49476040dd2956dd8136691aaf0646823883bbaf6149a6b5f892db93d4f5b1e0688b3c4dfa7f833aa1fff316b8cc0574c07221d2471b5f5098432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf293b3468fdc9452165e53e4397b56
SHA1aacfe2bd209bdce1b0561a72ba51e3236842ddd2
SHA256f442794ddecc7114b16c5d1e9b9564c4f313136fc318b3545504cd79c35d4d44
SHA512583e2810b824b6f3e9c296dd2dad9ba345f210cfd9d6e8f9aba8791706816fd4f462faa346e65fdc427a9ec0682c20739dd1f6ba893f53664490d166b3cc24b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804fda7c2655f38def2f31f5bee2059e
SHA1610f789c672b8b13d530b51d62ee5690449bf6cb
SHA2563db24aaa335dbbb39ff1c413ab3614cba0a9ef7e2a3edba50e5854351affb785
SHA512ba2be70053255758bd9d7f8096e1804694c7426c2002a84f38b70087f693d3f57160319fe71ea890dd1ad796bf5fb06f5ccf84dd3a10d2e7ebf07fb1c94bb912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824bbbe3dfa6e2ddb85f1cc741a94a49
SHA1e7c0f3c9ee7efd584a98aade93096d44f381bdb7
SHA256688a8ec0e5ab8dcbe4b712df8c6933cab10972587273bbb18dee57d910755a20
SHA512197b49e43cf3744b0589401d579d9190a336b33be61951eb2ecfc8ac8428ad374699f78178c7c3ecebff0153464a9361882aa2d1108aec4429caca87d982fa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa228fe87c0bf051bb63b0bf0eb6d4e
SHA17458df90bfcf08069df7ecdcd344994b5c6c1223
SHA256f9340a7b795dc2cfb9339a47831aed745b591a430bb6fc6aa5dec490b439a2cd
SHA5122b0344cf659bcc9cb1e4ac0e8f8e2c1f7890986bc03811f44835f116bb8f2f8ea65159ef6a0d364e180f3f321538c957725c6ad533e03cbf8f46edf5d0272d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938c017929ce185e006888d831f633fb
SHA17907f8dd0763766542cd5f16044d99551f0d051e
SHA256691237cac1ebccde4d17f066b9eb6bf12fbc9c216541b24e223f08237366b7fc
SHA512c35ab70e4c1170de4a61351ebcf234b3866b3b0b9596ba5957bd63481c4e272f2e96954bacfd79e81889eda387ce46545a987859b5c5358d7811e63feef0720e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54363c68f511b295a6145c9f5cd09cc54
SHA18d8ce6548e702a16121285a27c70f2e7c3fb678a
SHA2562b71fd235d3f10acb066a4019ab0556db399e28f24a7920e9d198eafe73f48c7
SHA512227544e0f1ce1a63bc3c6ed7e02ba4c4a84396646782c1212ee97b16ce91d3abf76493672ad820d7ef38b864a72dd4af363bc755f0c93b2ea16f897e8162f883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92042777aef373932180f21577b07cf
SHA15bb062be442b9f90d5606a1265ecc4250358e81b
SHA256ed904dd6a7cca1ac34761f3daca7fefd450bc7cc7b62750504d286e50bf277d7
SHA5120e15e25e8210a0bd163183cfa29148b8c05a91a99f6b8cdb7e93f0a884658d2ba7470033b330db116e3c30d0cee9c72a83d2dfc4638630472fcbcc24f4bb43bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57462fe1ca974db32a64e4d5927ee09
SHA1d37534c718a2b60eb6ba86d0c891fece55de017e
SHA2565fe3516df77fed56001c5558ef4533f57dcb5e9b7953a0b5118a15d9e77fb95b
SHA512089c360a3aedfc86093751eff97f37af8e4e691ebb7ebcae6b96d6b494f102205ccade9627c37b7a3089c4ef29024a591a56ba70239ae282c2b554a619b70e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b12127ce7f5a67bc1cae4bebe0307ef
SHA150773d1e1a0f9b77cd48dadeddee201fe887d0d9
SHA256c65a1e521258d7376c2b40af357abf4c2ffe32104be73007c9e07a4bc0f09094
SHA512e46ddc9233715c84f0f2adce84088a6e4289c0192cf88c6ebe8f77090d92e85369236f5e6930c8b0fd8af614e03261ccca40417c8eee5d38a3eb454319fe8e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5ab062fa092fb45dbcbca15a166c71
SHA16e5e7f993044859db1bea24bfe04fc1324a393e3
SHA256893575c7382145132c6c6db62eaef68bd5f2198a29c52a9da1e2cd8282126e14
SHA512f6df993b0d0876b5066650c36df23682ed886fd8960a063bf88110e56af58d77c0cb3f5447fd4ebac26d69dfa430fd908f3a3a03c9ef1c74437b81760ee27515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6640d0d2b6eef35a04515080134bf88
SHA1cdbed0b00311cb133f4dcfa2e9b12531646c4018
SHA256494e5a5ad91c778774f5c6ad12cb6cdeeb8101062e9b66eaf1a3e99c3aa9b3f5
SHA512bac679e9da57283a2c1fd7f1cb88e245491a2203f1605d3068f3e28df2fc8bcd13e1dab21d85c24ff74bdbba376479458def5779976889b40b83b72068b72eab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b