Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
b3f3b44665a73c257c807261dd9f6af6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b3f3b44665a73c257c807261dd9f6af6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b3f3b44665a73c257c807261dd9f6af6_JaffaCakes118.html
-
Size
9KB
-
MD5
b3f3b44665a73c257c807261dd9f6af6
-
SHA1
30f051c50ace63ec13b7af82096ccf29be664d9b
-
SHA256
0e5c4edcfd2432f0b28bc14409916e2d67d4ad172cb35a46c765a6c30c6ddbcb
-
SHA512
318d86e8976dd0316cadc95386e318dbb214d72f0aaca275cea936fc668efc8b2b84331362e91c5f72b13c4c8448f8322138a46c47ba893def3310e33dcdbd7a
-
SSDEEP
192:dlKvZVnGZ4cwC388F7KNJRDALT+x9AExh9hPgEu/hXe6JpBwG6EHoshyrUb38to2:6GZ4ggR0nKh9hPgEKhOkBkEH3hyrqMyu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424709423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa1a04d16b4e8d4cab46d09743837844000000000200000000001066000000010000200000000c02f81fa74a9ebcd93d169eb666f9d3afcdc700856fe7d2f2582fec7f2395e5000000000e8000000002000020000000402ebd6b3e526434a2f524e3bbe6374875d0b8a110ea88f588b986673850833520000000885108cab58e5f351f580f7896459d35a5664899544aa9e19dc7d646b33f048c40000000f7f128520d7d53c1516afb4e6258194a0d85709c1a6b394bc8e00fd51009a4f99108fb9fb0a3d929a0b1a180b789e3d5abcfd3196c00c8ce1f463f860ceeda79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08bfd33f8bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{692CF671-2BEB-11EF-BE0C-E2E647A5CFB6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b3f3b44665a73c257c807261dd9f6af6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d063caa7dcb1a9261a2be1e56fd7083
SHA1ba21d25e5955066a4bef88e48549cc038bdc5270
SHA2567e9c435fac31cd2a021e6a4b092fc0a94233070dc45ad40fa64c1fb057487041
SHA5121607a926015341901096e4fa6754af4e40972b4c9b0ff689c2552536fe88e890a0dbe5cc1302387f93d8f2ae80f661e9f1158444e3fb4efa328c44e2b0575504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53816368432c546fb431d80601aa10e36
SHA1ee1b369dd18d7475fe3cb34de37b58dc300ce80b
SHA256ab0ccdb4f3c99413011fdfaf9cde80687c28a849d753a998f54e33da368a35eb
SHA512731c04a29202fbd2d4c8dfd8ba6fc6d678ed7ac4c9b3cf2024e509e22f33450116f2d88d8e832c503d2f0ea135eae5a6fd7f4c21c595873f3b9969c55a40bd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6125b39dc48e9912a41cc20e7c9533d
SHA1917326ed21d42f1f6ef217933e1fcb22466a2d51
SHA256bb7ba168483ef49e5e82d4a1d938087e82a796c3f132589b66704ac83d2f31fe
SHA512a609acdc7e04d46dcacae36f81860452703fe49ad3c68c85a53b1111df598f7e30d381e8b3dbc061e50ac9e7c3625a1fc3e70a2b51e2969beb6863ba5b99ce3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363824da2d56ac00da8ac221ac07a21b
SHA11ca7aea3e3752d33dfcaf8d66641f69a56aa7629
SHA256e4ea428dda79f64172f8104c11bcc223e0389e73850d86a446dcca12f70b90b1
SHA512b57a0a9f2d76b948eba4715a35f538555538eb4f8699bdf5ac0eaae2a971c2015273aff4a1a86e49b37c2a64949a4f680fb97674c553b8a8ff7e8063da3aac42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522eaab5de5fdb2ee578e54eb672ed875
SHA1469e0e7aa720e07d403eb981f3a9f87c07ad14d0
SHA25669499aa70a0451c3917f9d0a7b1ed027f03b1dda4237254f689e5f45f9eaa5b9
SHA5125cbf614b62abee9a65d99ca993f4410a746e9ae757802c43c3b9dce3eca8768171e89296ff5095c8f46be226240f83ef507ec9f003b3974fa98f3225ea425cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fa4e2445dfd47088f9eb70bc809541
SHA1c8ef875855dfc0bba41236ad46c2003950861acc
SHA256cb9c02caa66417229926981482aebec13e7b17ff82af7e2ffe1d628f2a4eee4d
SHA51291d85787629ac75b0a49c7bd1d9bc31631cbe457ae0f2e56b0b772e1b135b74cd2c540439d3a66f4e1399d31873147e56e42fc1d186f2bdc3e7739730dde5824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff9cef22d5b64706ca806445a33e611
SHA12d0b1c26a3deda62ba038720e90c5ba9e0a68c4d
SHA25607de66d55b030bce0ed7287e842cb51dd4b2d1a9eb629c63a8200f1efec61ae5
SHA51221d8bf17fd27091c31b14ed0dba44def7e145ca28ae5eceb9d920414cd500305113982fa37e76b716b1d0795f942d990fb65851c88a5b445ee0cc725005af387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab82d0d5403162a5705523830de9d886
SHA1cde5f6d71284e7756f61b849911e23f8bb148145
SHA256e95bd675677f6e9552ed8cd226c4dd985beb54fa0e29d82cb1022c083e224fdc
SHA512aa59f6230db56aad87e8ba59681e1501661428a9b5c398f8d2392daff5df8af91ce27e407ed7a7ac60131ba3347853bde385ff87805bc25cdd506aedc67f9d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e7e3d0a8876e514f3faff84ad25d9e
SHA199f75a80852b21e557eda78230e26032c3ddfc3e
SHA2562388f5fdc1363756dd82ddc0d7f771213006c00dc5289cb4093d06ba5830d2e6
SHA51238c564641ec11dac24888344c27a0ea7cab7d8e11fc5a0f6b35c42926cb34df02254c2c13ad688c2eef53cf3501eeca63edbe3d1d599449395928dc05e458c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39228dbf95871cdcacd909b263b4124
SHA1854c9ef76e64d0616fd7c4d834cdfcf063134f3f
SHA25647e388ff777a0edc253413bea6a1c431e05f3343f6701f1a5bbd6211c80ef9e2
SHA512a9bb183feb4bade5971f48e847909f1358467ca8a6266069e52b370c5898a7b53d2bc8271dc84e63b8b9b3839c28a827946e41de1360719ef3310cd425b88e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d006b3fb58d5e48ba68bac296bbfef5f
SHA1723715864c041c4ab7625a4e2b78c8752944b801
SHA2566e058c80abaea91d8661a17d028ea2b863ed8b7d63f96c144747fc3b6d726425
SHA5128536f8e77676a4bd6bde04630e5cdf79bd4c55de7405c5c77240381df88db00aeb9e42cedbaaaced1de7c82cd0d1fe7ed1bf08edf8da25570f3bfd7abd39dddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57615ff79a4fcae8a5989ffdbb55edd4e
SHA1970a6b4b8af2e889cc33e44f7abfc5fb40800741
SHA256444c01b89537ec2e061b2f08cf0ca982456fe7a2244c216cd87b6cbe0bdfdc85
SHA512230617978f189464d18b25881b70a16d088991e0e8fd9138be6fcc3c2bf2f17abd2ecc841f2e35238aa5b3bc1be0d0d7484dfc62af234624657a69f3991f4acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d98af3e3bab87ce5eed6d6b6e1038f8
SHA1a1c3d3f1c0482503ac50aab49768833755895295
SHA256d139948de6efac4807de4a7e0ee999f158e617c14a8828ee8011de7e32d39a4d
SHA512fbc62498978574ec8ed0da072ae84ca859ee8b573dc1a6a5684130c3a4e202cfe00f45b51967d8314c9b3052d040c058588e30d8b7d48d93e14f3cb3e0bb1afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a812b5a9a1be80a2f70d370b8ebb71a3
SHA13ff45b9f38427b5fe08524f3d3bdc25164cd7797
SHA2568bb7bbe452fbf170dca1e633a95f800994ae2bcee55b80c5625f4a1d7148aba8
SHA512c18ac1987f15390c340c1d32e680a6e82fbf1b98daf4bdfdd79be5959aea7bff514538d00429d7e2f9a3ba85f7fa9e7cc2dc82d1bf3a672f1bf05ae5951fa21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab49db208e4b106fade736695953faa2
SHA1eb58ffba155217bdef4b4c0d5c54fc8a3e94a8f8
SHA256a4d365a7d513adce6be9aea8de8965c4ff0af7781a8b9cca0d1591c01a33bf67
SHA5124d31e2f2a255d0946c7a9e4603f89338c2814f276f47a8a8f52d87e6bf8adc9de71fbd9ce9c33619337970b5fedaa1267644c7bd2eceeaf7aff532e5416ca2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9f59b8c7c5f73e4fc43c5b39109800
SHA16ef87bf6da6de2fb40a80c48a02b62e06af6b28f
SHA2566e78f77c2a2f4a798cdedcc1d16ef77dac5cbeaff3a30f4304d1d2f84a177e40
SHA5121cc1e5c014f0e2c6f0663a534dc5a40c15e3998591483f0471ac8fdaf17b7fa6a1382c424d34a3207cc50c95ec38da58ec3b80e2eca68aa28cd3e2793b892459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb68b4b73feec4466645b2df9853731
SHA17d90222305ce24f5f0647cc41ad38eb3505d5c6d
SHA2560652197c18f440a2a6335d44ceb97db55e69c35f5b9cb906680c70c81e23cd86
SHA512ab1edbf01b48882754c1e2eaff46f5ae35649a14571380d1605748a881f90f0c3af77e7e80c6fbe63feff0e72ee5150992d69eea3b5b0132778b90e6becdcc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a4e236748152e1f58dab915c2f6191
SHA125d87f9b7ec3b01a2e9e1f0a72ed20ed9f2e087b
SHA2562ebff7e25a1682398912f1eb3f7204696449069b5f51edcde24f94fef69aaac6
SHA512cd4f440d0b8ca898df2084b4804a0268fd778abc41c3a8ed1e064ce8a187f3738b5f7e35dd3a48759a3ee863345d9713b4434eb9988ff9ddfedbadb07bdda818
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b