Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
b619d66c80917b530fa78dee025f53cf_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b619d66c80917b530fa78dee025f53cf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b619d66c80917b530fa78dee025f53cf_JaffaCakes118.html
-
Size
20KB
-
MD5
b619d66c80917b530fa78dee025f53cf
-
SHA1
97816243e0755054d17e515d8a13adf5dba488e2
-
SHA256
1ca67c405084cd7becbca409fd427faffb71138fa28791244cad4161d36709fd
-
SHA512
8796904daca6d0e796864d512839d2005bbc5c550ac429eaaad15da006fc16483c0d5b81d893592705e2dbbb075a2295154a728b67591ae4955feda76e712d5c
-
SSDEEP
384:K42G+0/ezHFgTs8lDCwjqK5VyO21O4tkE3zla0p:K47+02gs8lDCwX8hl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424748318" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f6eacd52c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000053ae104e50f7529b8894eef422fa4c4be2826a0267d44d30e3bcaf3f9e512845000000000e80000000020000200000002cf8f90be16dfda7fa82187b70223072d8d1bcdfef49199b3590578f898e36e92000000037d63b5039ad77f9f38a5be930e026987e41624d9b97f8ff00938b7768ad7f5c400000000a0155137f93a833883ef5d60143be13e0d2175bf8fc846dc9e13e3a71d82b4193b1fd4d7b0aac334502eb7efd6045253b3efbf1c697c72c3baafec3e40197e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F85DC861-2C45-11EF-B489-E681C831DA43} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28 PID 2264 wrote to memory of 2040 2264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b619d66c80917b530fa78dee025f53cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2d973696c0965d209702ca2ffe9489
SHA15610cad3546967be58fe97c6510704f1f59631c6
SHA2563c6254055a3b88bfa352397886a700272af72367231061f702b10f30cb8edec7
SHA512639717823d858102abd88dcf523453edabfcbfa352bc61c00cb36a20e9b658b129c3e708bbba866360197a336d1c43f7cfd2733f98c1eb33b26bc0c951b2a865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e569d8a5e98ed7605c45c4f63e3dfd
SHA138e8dd7b024184eb043353b76d9d3532bfa2416f
SHA256720696f8dc073a339fd04b3c2cc42fd5e189530d53337934c7a103f6d65704e2
SHA5121bf60e9b4d7f8d80a08fed7c7676bceae6838219780e8e43dcee4f965f5ac2dd7f6db3c15289af6676c3a142656bb93fe3e27acbbdb9375029ba314e936f9aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b2dbd551831c3b9cb3432193726846
SHA1524a79a2dba129186aa065672af28671db2bec5f
SHA2562ba23353e557c877339933123cfa4d5db9993013d4bdc32663fa87852f3eb242
SHA51257c1da9aed8972af5eef872b952172e996b5b1143c2c84904400370f6b89fe15c39d30a8d2803e65f1fa25ddc7e3d660a094a2a1212800f09254850540012263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a806d79ea5dd2520f209ec0e8448922
SHA185cb446d75e90a7928acc50b4317146a7c85ea8d
SHA256b05a89da59b029819c361ee50d03f6ecef55cb2e8ef2b09eabffb0b555aebb2b
SHA51237f4f6c2a39e086836329a45ba2383ac6ce9c5b76939083934638664c811d091f8bfdeb71a04129dd77b16989545a7a40fcd0735d305efc26f3d30e77d73f513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c82a92e82c74e71316600bfdf81d87
SHA1e1b4602f32808d601f38c3ce3affef265e3a7ba4
SHA256ae253e950e17c8759e47bd0d6e794312b9aa1217c348827748d3ef6d21dc10dd
SHA5122b220d5a8c3692f4d330aad1dcfb3481a62f41a7bd9f8b2fba39a3b455f33571a9d99cfe910a512dbe2636822f21caedcb0017c548f88b9eec02c05a07e7f3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581689bbbd20cad779aef65fed7e90967
SHA144128c13cfb74e1282d0e72ba6a226e6bade2f0d
SHA25649e8fccb0c60929832d6c7978b33d1e17a80b0af439672cf72068854876c11af
SHA5124563527b7dfba93e9e4db5cf75fb7190fb7262b2048ed2bde2dc338dcd69f29a62747082e1807bda59a6b05721c16f1e3b4d2aeea6b471da64dd4cb9b5d22ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594328e8f2268adba4717be53a0d1f7f4
SHA1fa1a0d89b70f3048eb3c977bfa31457581a4356b
SHA2564030e95d148e6ec276999de1f81fd91358e757b110613b3529e1190f04493adf
SHA512f4afbdc71709cd67b8cd382afbec78e382b551539ead361253c158261432c1213d470594902972f9db706c3247ed1c1f11cf57b8f969ff07b69ce1bf0e08bcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca010a589ed67243ad8d955abf69547
SHA1a56c50443961a3871ae65768a1e35f0c1e72c448
SHA25639614421cffac09e9fb8ed7daba93fc2071b4db6d34da12bfe631e8ff685dd47
SHA5125ca1b2bb65f95eb9b208945bdf09bf7e294bc4de2bd0aad3bcac16e0fe412b1a681367cdb5acbbb4163fa0db93c7ca443cd0859921f2b518ae40df06a4adfd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c859c820f6ae7023af2536e8f2b505c4
SHA19e4980b3d32e4944841c5b14ab39f33276a09f86
SHA2560bf781ef044d053c1f639ab9b054ba2b0af5c9104ea65e599c4e122dfbae9acd
SHA512fe06aba458c0ed336645023277f7440b341f7d8287b2417c927a87c4605c2507c2013ae893856be5145a3777dd92fbfe264d13f8728d2f7d53fb33d07decc15b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a78f3a0ebcbb95530c44256264cf58
SHA123a9b833c8446beda677820e41dc906303a74812
SHA256f150dead66388bf8dd651248354639de678648d2307c38c13d5e1108509382b8
SHA51259bdf3582f7294a45d2771555be00d2cd47b65075ba880bedc6177c36ee240a1c4900a84fbfa593cf5b90e4bff295cb0bbb2d139597153f983ba8ebf26b09d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9094b6aaa2857eafae074267e5a7d40
SHA12c41b7e081a9df52ea0fbdc531ef654d5ed49a95
SHA2561470e90766e8aeb01d2e25309a869e802d6303ca541dad0be60284f6d63180f0
SHA51275c59b225f84c502b62f632e710f432162d5eac70e45262376111b31ed5dda457acc9893d57bbc0b124b46309019fdfbcc70e2089ea03e7f77f44e5f7207b5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab479f0e71666b100f77595e20bd2db9
SHA11ca569c14d5f26d5caa06976f81d6524c0064b80
SHA2561cad1fbc550f7a5ed57b843660e6be1dcd508082f096c4fc95d872fe492fcddf
SHA5125d73afc7182a0cf2e034cf1d9df11fa3135856328dd821135f004b1fa1a260b2bdb31a38af8ff3de8aeeef34348a939eda6afae59be8e5eac291cf245495f500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca23a34a5ea3f24db293891935115e7
SHA180557835e0e646325c46165ce1538028c7ad6709
SHA256a6e6060094693f5aa28ca8b1b4c15b82a274a06b957a24ace99e7b5ffd0828e8
SHA51258489d22a0a05339452a3402349a675c8f6e038db687f5151914f5eecabc2b517df19535666e49a1edc587e1cb8b84630cba62ed48f732f9a9a719351fac1982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591487f324696d236eb72c62a1230db92
SHA19f0c4215ad20499c5d5faed7f490bcc72633a7ab
SHA25671f67b726a90fe00f54c2275797748343846ecde6ddc21e6f2080f8e2a3c11a2
SHA512a8104d77a5c25a91e25e7a17799d0612ce0ee8ef6f05295ea892453dd5f5bdce9aa6f42ef255b89d3975e250764abd7b1ca3019744192589cbf7370d522be3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9de9759ea0cdf59bedbc70745711db2
SHA1157af64388d1cd35f9521ac07e589b9816d91ce8
SHA256db86b1ab153b8703cf7a69e68c6a113cc959afc5e158a4461c4350cb55cb4c29
SHA51267686d4a6b5d0452df61815ed0ee94569a65b5fc586637192b94dee1cd53f42af05236d48493e612fe5e3ff180356e614761cbf5cf4725becd96a6f78801cae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa68489eb66c1989de019e50c855b615
SHA1913a40fc268af07fd5ff614cf1a252d353b1bfa1
SHA25601632f24187da12be78786d47d7bc1a750ecb689c02d1758c6790de006ab8be1
SHA5126aa2f2bf5b867102538cc69df2e6f5a15c6215ef48b2c6ad6910c9d9d3643324d8a6a6f4b93114a70ada37ab58e161470a6db452e7e935aabf5f4fc4cfa7fb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7a2b81aaa221893359acdbdfbc4877
SHA1d578148029c0b1e44864064602f3de425fde48a4
SHA256cd88ab233030b4431cb72fdc93a3f622c74ab558b14219fbb7781b928071b76e
SHA5129b754b38e135f04f61e0dd06d41650431bbef51e0293cee50364ba3ed7bebd2969415b2a835d45c4f38ece64e53b483249e20fcac034f3bfac8aa3022830e759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa8febd994552d24704db98b2f423ba
SHA103bb16b98b35717d081070777a3b0c67a1786555
SHA256479b012a3a956b45ee128a516b7beefd4eeeec6b3fdd4e1816d849946779a17d
SHA512cd04747e1125b9b6bbe7deac7b8c8d3811a9ce61f92a6dfac48e38859b94f5ccdb0b310d760246b05b5ab02daed4b16600b755a746c51dabb240affb621bcefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f5b3d71593082c6b151dcbcc7d4c0e
SHA1077c163c8643649139dd75070d536da19a542558
SHA2563522eede4223b702b809ed25149711b6025ad86971ad44106e945fb44b2a4529
SHA512ec1fe84bfe13bfb526b9e075de86abe13433bd91b3ae3753ddc540bd1a6894a4b83a96133411606fd6cee5b4299d445a24a46441c12f4d55b487da1456bbd17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51984094d33979f552919325d55626f44
SHA11b60d36b1e9aad3c64b56ea7f94454508bdca2a4
SHA256892a9a42e7dfec925c6efa321e8d29bad5b1f78a0d241a31cd079f885b532af1
SHA5129630fcf1162fcd7021c8b96cded289c7ff5d13c71e9074f913b27b052edb29ce68e18bcf0439f1529602a59308eda484c1f240fa9fa015b1cc457a7bd4d4c7bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b