Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
b398e5af39fd404c65f2ebf148305516_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b398e5af39fd404c65f2ebf148305516_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b398e5af39fd404c65f2ebf148305516_JaffaCakes118.html
-
Size
14KB
-
MD5
b398e5af39fd404c65f2ebf148305516
-
SHA1
6874bee7798b069741355edc35bdab39881e3549
-
SHA256
84abe99e029f3d93266e35a05172f14d8569a0ada84c44437609c950ef754406
-
SHA512
d32579db3f18084ce44fac34db84cdd093a8846b29f04de6a09e33b6d0d1a5e1e38b00fef139ad2a94d68e2d0029f4ff718f4b9d8650e04cb3361f8f2a044d2e
-
SSDEEP
384:CyidFBsZ/X/Wa3YmFAi7zy1wXM/2L8aerJ93zvF:CyidFiZ/PQOAi7zIKMNL7F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FB7DD01-2BDF-11EF-AB73-5214A1CF35EA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80249ee4ebbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000f5d1eded0b0b8d83e729308c998473764108fa108246275e886bdf5db33aa2ce000000000e800000000200002000000052e812762c4d4ce7eea2c3143ce9c4c86cb3129461eb36ed3aecc129b2ff7d84200000003c7b38f3991509471513909fefd77e91d8cd56dd947a171f21d4cf60aced4a70400000001a6b0e76ca1eb3702f13bba1d026e34973939507d04736e330910ce9261ebb77bfe760f062c37cc613d7f92c6b4572d38b891f6fa3f35f92157ea8c5d7302bbc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424704118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1808 2000 iexplore.exe 28 PID 2000 wrote to memory of 1808 2000 iexplore.exe 28 PID 2000 wrote to memory of 1808 2000 iexplore.exe 28 PID 2000 wrote to memory of 1808 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b398e5af39fd404c65f2ebf148305516_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36c5b53ba068983a4a0b6e498e1198e
SHA1d73a542b766542ebb7b10c2ffa1dc7aac5857f58
SHA25677102b58a47572df87c3e0a6497abd5fc37ae4a25a066b968299e141372cdab7
SHA5123b65ca8e92f0a8aef9e1c26d26bc7993654b42131f00bf986296eca8913b416a8640ccdc6d01a74073dbec1277e7b76d5c84d7f87cf1218c8a833ce330157dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae416794483b666bfd3f3e0dac126d2d
SHA1f525d117d005be007c127114e5a0020add2757dc
SHA2563e1067f8fa4f93e7110a131905f9b9e3a2b7c80aee765f7950dd3e1220f1b5fe
SHA512f5c318c8617bd66a2b0dbdc532290408d16a7a209b178793688f4565b8dd238773b5dda343a9cdc63b0ed94a65f83b86e6876130a01d39ca1e891d84be92916a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fbae5e0824b246a8d3934d6e739d46
SHA1c9f612788a914ace5883c4461e41d2ff8fc958ed
SHA2563f67395725df7cfaf84e546826a3f3c8ee01c946e11bbf14184fe499a14dd65f
SHA51206c4061eac75d871d3b8bd74a1171e3a47103e3b8841c1eba4f95dfd24b6a5ad0171d3f1b884695ce74e8376b833dc8252b7becdfa532d94a456eb8cc5dc5181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9448c04700defde5861466fa8feb3ac
SHA127032e8eac9b851ae834ac42dbef7c9aa32fca55
SHA256f8b25f98d1912ca63792a1f9ac45099433e8e5ff59bdd925009ba7288d196110
SHA51222616b94da596fb371ec942d48a0baf2b00695d0873db98ad950848e0f96c2b107ac71ae5bb0f44112b82c145594e62d490b871e1789267ca17f8cdcd12b6134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67e732c69316233098b3f5d268042ff
SHA1d1b95176357671def20187062337b8044d9fe393
SHA256c3ff9476b119abbc7e37771a1888c96183b41809e08ef7762c1fc80e2b246925
SHA512d6b732f5cab30a07b4f8bff00387f3371c22d2db528de4b50c10132ed2374bbb5e526b9ac077ec1fd6e365c85e8a6f5415caff4ef91a683e4a43a58b87a9a44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54faca03956a83d7bddeed42c4672c101
SHA1052d7603345402184716fa85d501b26e8ede8f0a
SHA256d3e3b1d6c18b938c9152194778e32ad335eb1ba9a31ed9bb82a139c0c3168580
SHA512e8c4ad06f996193c1715d5ac689643774dc32d3b9e04a069cec41fe8d6223aa6be85ee84aa585eb967f41ce4c6d9d6f85f84385f004d5f52ffdb347f74ee7b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516eaa31aa07a2e5a7a45810cafb73747
SHA1790e119bd0e0eb0ba95091100200aa6e3d8e1544
SHA256aea4a20cf3db8ec8902e1709df258119820979cc543a740ef862b73104c9333f
SHA51210236f686fda80f68682e74be0f3ea395136f0e039537e84512baa77cc2e2240c367844ae0fcf170aa5a1a1755626d0d3e85ab7b0ea1552092708752aeadebf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d219d2ddb9ed174df2cff6ea5926e75c
SHA1ba5eeb0e6f5832a6b5cc7339440728201e8c5027
SHA2565262ee50772db3ad1ead6f2cb261eeac4ce55492ad1d6f2b86b63b11d05ef95d
SHA5121181e881a9233e5ca7b2cb23b053cd09a5b8671a3c65fe8d701226dcfd752c0bdf27a27faac51be31087ca8959631db331d15c492fc45e007370bb2022585053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c5df795b707763c2523909d7408296
SHA1c6318fbc6b584180eff03ddd73542433eea5906a
SHA256feb244675945144a0926e2f9022258d7153620a6147a85fe8a9669cbb8cb582f
SHA51270e358390cdee55979a1154d477053ee3a54260d4716a21e78d1e2c1d5c59f3bda81f0355f506fe756d6e34cf3b678f5e3dc932992ff6ab13bb3802815b653c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644d2b21cd01181a28523a8c96f0eaf3
SHA10ecffa7e58f4feb890cc12e01d58d86a71871687
SHA256b346b4fefbb77a9ec2856e53fd82241478a6ecf587dc1057d56527b83ec89b62
SHA512eefd464993f0d3b8283869cb6a76509e1d12de3359739836324e6acb541f700836253ef6559719653e982067b3e3bbf76a5235920e52ea6a112139df3b26efc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a38aa1c097adb028a1e8a1bbd494bda
SHA12e8615775c86076a7ee15aade5e258caa22278e2
SHA2564eb0280a8fff16dc594f47c0b26ef6a7c943e7c84e6773d7f77712b4e814228d
SHA512b7cd70661a13474021844eb0de4d8985cf9347dd3ac2ab12dcea4012f41952994c75a039db966df765359df68de3e1bbb4f7eb6d29c1b73a889943b447401b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf00735b2b6cd9b47ff9e8a0bc17bc00
SHA1bedcd7567f90c0f0e2d47e6261c0231a92369098
SHA2567100687df5f106332c7a5b29be439dc9310bb44a6b7ea20395cee27bb27a29ce
SHA512a9506f2e3dbad11f43b298b9e903f24e1a045a8e6f4748d201b108c30a3299a4b4e11699cc7aa34c67dac19eac4adc4b158ab435c794317ba79bcd96d2709959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e96e904f52ceda573c4d60e8841b6e8
SHA103d57ebc74a11331f3b4a285cc23c85355c499cd
SHA256e9a3c343258a8dcf35a64220d0651c3ff8f3b9f12bf76e0eed7909a671262e3e
SHA51289bb8ac24a9d1a48b9aec9730a91afdec04c0ded8c88cdce12ec1ae14ae25946c4b46ff17ed82af0d13b8219c11596f59124b74db03d4229f2dc901bb741ce80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571fcccb8f9ff50e67aa2fc142d47d76
SHA1e504192ffbe37c608c515b168247efbd18f797a9
SHA25616c670c71d7c262a485a7c27f4c6d90565714bf4041e50e83078d8df8f25b751
SHA512004cb2254ecf7ce47a326be4d1b75571bd83fddd15c67a39a4e3d19a95e0f31805c303db898353effe05de2c19bbec611548f0afde1982d83db8d3058980a8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097f67e70c4cac7007a0d008c2e8ef67
SHA16ec290848bc13f29f5c8d9a54a71750854cd56a3
SHA2569b93d107fac553ae6f89e1097d344e75eab9d8c2f2a35244bf511e4a58bb1ddc
SHA5128d64b5ecbf0ee3dc16307306536f935f99bd929995d484f8860f49b675a1164a604256c9aec8caf459ca369b2eb16de920577317afe5d1a184c14da89c1d3f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415481601fa2aaa5d8430bcdc2f76d08
SHA1036701f534552278218a658b271a3cbad8876841
SHA2562e962464e2038b1408ae49419f2f3db2bc3570024a8cd8653672e38540271134
SHA512ea96c616e25390df278faa56d2309caedae8cb3d007ef285cb247eba3479894bafc7c6d7d33716ef3b18717701c0088c906288367f1a2b031d26b7f1408e00ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41513068624ffacae43255b11b3cc97
SHA19ab3194b1e2360c8fb9325c8b01e319ed86e5f76
SHA2562ff252dc1ebac1f0e3b0de424235269283e89091dca85be26e18a447d75bcb49
SHA512f2b14f76d01511e590380f6e5c452150f7a30c6328814ca1da085d344a2d335aab7e1fa46f7f0d61651a17415aba7115b444fd178181306c65e18f7caa946a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54733ae6bcae5d44b73f384e1bab6a767
SHA1f72c0fb48e60d35678306cf5cc6444c0ea0b0425
SHA2560f692ace69f30fbf0154c9de7bf09e71a633ed5ba6a9fa4cf11f299a60b05767
SHA51244ac9b359ff1929c213fd2a18a9306c36a6b191f2f4beb3826d1fcc0b85680802ce25630ed848ce9788d44f612f6d78b9305c3ffb4ee5a245a6cf50202140c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25f43be418e8a635d0c8b1aeee59f0c
SHA14bd1bfeccd5af66c10823a61f574021ae084d841
SHA256d9b354ce228acc69aef8f49a9bd88eafb05d68277d3d4780e33d171c64030ec5
SHA5121c1c4c789374fe54b47a992938cdcef65b7ed0aadb9815bca38d85887318232792f5d040b372766a8013d760c78c4fa450d4852bb478c21672fb10a5b1dae18e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b