Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
b6be55e342ad5c4b2d8102509f3def71_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b6be55e342ad5c4b2d8102509f3def71_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b6be55e342ad5c4b2d8102509f3def71_JaffaCakes118.html
-
Size
30KB
-
MD5
b6be55e342ad5c4b2d8102509f3def71
-
SHA1
48d355c2572d4a3cf6c4f2bf918b0feb4860a502
-
SHA256
0e6bff2d0b46358856452354e45cad7b7c4f974fa8f9b03f9c84ee798e00fa62
-
SHA512
59fe824784727f51e86a41dad6a3d70d92b454cbe46bae6732892c2ffd6ae5951a65b3a4ce634127d090a4289f2bdffe1ae05ca0640186451bd30ade475901e3
-
SSDEEP
384:xc938FWb52rVs172HqtRlFURN9OfFTeJn+zEI:g3IWVp72b2fFTesEI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000072921e414c31f7f312f0d26be6552a283d9f918162813e0ed925e9dc03be9d54000000000e8000000002000020000000e52a4f0926232b0c97005d52bcfe0b6a2d7bde61682b67c819b2558b1ce1065520000000f10c76abbbb695100fdc6668cdcf0382c1332e1254894c34b7abb5931ea9a2bd400000000672ce999467d317dfd6f232a1a06744d1ce2c4598b4999910584b36af9c519ad199c54d48218e79276a5702f485b48b1529c1ff433ea20268c44584b4d1b63f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC67C221-2C61-11EF-8F67-D62A3499FE36} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424760296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802ae4c96ec0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2572 2768 iexplore.exe 28 PID 2768 wrote to memory of 2572 2768 iexplore.exe 28 PID 2768 wrote to memory of 2572 2768 iexplore.exe 28 PID 2768 wrote to memory of 2572 2768 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6be55e342ad5c4b2d8102509f3def71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b8244dbaf6db7f65f7e9724c7b681a
SHA17c43f5ac1ad74042ff9e5cc6ecfb964a49412ebb
SHA25660bc6ad37f49c748dfe28eafc841bc455521ef435307e051c8dec238a17de6d4
SHA512935713f6c1ef71b9061ec04a13abc7ccb77b2498a78a5c940be915a6a2c40b08f303c76af4c096c592e945687de6887d9993bb1adbd98cf872d5313faa56830a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52d6f02e9770bb3fef10afaaa17fe2a
SHA14c93e37428bf3b87e7821f2e196cfbc51272042f
SHA256c1640e556121f2b3d9fea85bd80a2fa52a6fda99ff5166e05d565553facdd94e
SHA512929801f03789f749575aec55f01862a81fac43592a5fa2329f680330432720862b34595f7eb3fad06c9fdd736953d0a21db6d6d413a3f39e7c8f1db59209325d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb388a08ce802d7120144cd142e4ae7
SHA17760df3536a823241864d52b327bd5dc6e815963
SHA256126b599713c68c55ed95418a434b02700b3ad7212f66aba372ebf2c353a25435
SHA512398bfa1190be176c3943fd23d266537eba6ae8112eb3527b90acbf9fdec6c24db4c3151823d1930e5c6816e368f3f218bec2ca16549f443ab0bfbfd99287a087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33f0c4fba7a2e33b064352f5aad967a
SHA1e80e028f62a79ab20e1a7168a2f04f8ce4c02076
SHA256f95a4b8705b6f7c990c154adb9fa21db0f6d4511428e377d54538892e1ec043d
SHA512adbd5b83a943cd4931d3ea8f1c1afb463506cb7a2faf3530b765a0000e1201b6b20ff11178a397cd9363dae1e3efb075776ec49a45d6ed6197b6252a6d8cf74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58699343eeeed7513cfa83e0e7efaac76
SHA1fa44cfe498ef26c1f7c07f929a67a137f3fa645e
SHA25643b8f21de9f56a863dfe9429fe887aaaf0845e4d4112d743b39e2a2f77f46d9e
SHA512df6efa6219f89e247ee540b09b4b1cd3d8d1933d8e5e685c8d3ca8278dfc084f28c04bd4361430fd7d55c362eab95f9e144d7f89aa14c456e0f44b311ffc8b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beed599c825abd954c50a96b8f6c5f56
SHA170b4073ba46e99a2c6d22e9ad3532edce1dac288
SHA2564ad221e2e7d50f2fe04c0636b9b4b1f581b957ec50f9bbb7f8490d1eb61b77b2
SHA5129910d6a975ceee7465d6480b317c51b61b4bbfa9e12df697cd63ab34ffeafe35c32737736080ed0fa8b4dc385c7fdd3c7836d67e2937627138bb502f438b9926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8a072b6892796487d5937414ee6942
SHA1b378ac22af11ddc6bb8becbf47d9f935cc0611b4
SHA25618518b1109f984996a8fa7235a89b9069a3a3970acb01ed3164534a4b55e9e8c
SHA512f08a6a27437c0825069fd34c4711b3edca5f382378a82fb61440926e650a68bd0f061c7c63a0efc49f8361c43bafe227e7b0a005bc4e263816d9b4157feee2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3eac11d77ac82012fbacfdec11735d6
SHA11f5bbc8ee0045ad32053068d1f9b969ee95bcc8d
SHA256bb59f567f1742aa87e4d9789ce50aa8cac56c3c12aa6ef06af412e0dfe2d0ebe
SHA512a915d1e340687874a3bd895ed93f75be70f0db0fe9a29bc07e9da0f1121913aef671de227b2ca13eb3aa421085006a91d61c8d063ba2e430fea42f8f790be68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563823540d181e70152f63c6ee687bc6a
SHA1ebfd13245ed7fbcb9c6b2da76b78a63f715f1cea
SHA2568d2039f318027a413653ef38143d3f31a6f9b79dc47b4b1d82a6da461131302f
SHA512c2bfe41070dd8eb78e2ece46f87339e8325ad8015708aa2de69ebe568776d4c57c4b5d0a79052dd617d4c77299288e59b10637ec33ca9d85ee541e03157c2ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa8bad1c2ace505f6a39167af7bfa1b
SHA1b2eeae5b69b7d6e49aaa9af90264c29241fe4cb9
SHA2560e8fa8b806482fef6551eedca83dcb4a24902222e18106ff458ea32cb13f346d
SHA512f4a638ffa2145973fe6b141eebb3a7e7ae9c4eed2d01603ff1ffb1568e446809cf50f529b7141b22b1749bad0821d6cc8ae4cb8612b14e342f02e09b5b7752b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f0b22bd76cf30143a50c966a21d741
SHA16aa746b2a57bda8146a822d0dfcb28b8b146894b
SHA25622abf4fa38375ba0d7cb9bee9c6033e3254d3e394ec25599974d1485696917b4
SHA512f55df998d7961de23c1fd6885c2a7921f7da86da8f0d0efac9529dc07f8ddc69279769358b6384621d7aef00e60bab3f661e37736265e5427d87c1c404bd6f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546517ac771bf6d97b4c2bfad48a430a6
SHA178c9dae16681685415405dc05047239b5f90fa40
SHA256b50d0655d297f9fbb1dfa76fe0e97289540c2214f0cc987ebb1e1811ef6afbea
SHA512d3a8c6357d1b3f9d0179a0cd2a682e43f075cff92b26e6d1b4dca1c010c4a19351a1e5783fced63079377dee587dae4ae5fad430a9ec47b34b71432017d825fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfd552d12efc6486b914ee71f9778cf
SHA1d9e17f408ea5bf737033c1aa9a25e8a160766222
SHA2566d2010f017a89909647f7afe9d9e736b4b2f8c785b8de7291f6e46bc668f54ff
SHA512b5184fc5f8c6756f815f318dba2c5141b83903ad2179ddab5e90eb008f1cd3ca1b1a95fc1250ea91cf600a938f3da7f89b657b1370eaa21e53334c0bb2d18308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f09b56ecc654f01e6ae7ac0b934b0d4
SHA140b7bf719df3e290e0dfadd280fdf3aa1d9a09cc
SHA2567e4a8edef5ab76b5ff8648081f6f5c31f2b0f834bfd3258cbbdeeea5656f75fc
SHA512ce2dd26292cc20d0116e50f56a39573dca89e9a01f2ca3f876281e70fcf4365f3dc1ab37d15816cd0eb1b271338c50a29408c78d452f7fb8b8bdd534757928d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545458881cf37d53720a580deae5f7e17
SHA115b66eb026f4bc4a37d70118bbae5d06d50e014d
SHA25605a2c654554e36f4952aaa7d189fb6f31ca0d3d221ef0a39976b30776648749c
SHA512fdb0c1430cfce8568ebe7ca34530260e0f6aa9af19d0d41a4211787d3e29421a1d91ceb53278c07f0439c3b8a4c1ef7cb17fed98c1ad5f450c575535a379d1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467129c280b4bee5ec629c42124cfc9e
SHA1fdc7202816d8bd6f99aaf482ea72646dfcb76482
SHA25641ae12f2af55c07a1e8b0aaca10cc05c7335077783b6439929fe1146d166be5c
SHA51268ef18e54f14f17578bc325e86bd63f53bb1b9d543242491b36dcefa6298cff6d62e85490b810a3ae60dfb836d79ae67cd1ad7bee054fcdb47dc0219fcb487e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436c56adad5397b93b54ca544c153171
SHA1611a683de2a370721b160e8f072be61b23ed9c5a
SHA2566c5c3aeaa4d18c572cf79a28df1376a9b1a431242d1d046eb1061deb041fd67c
SHA5123fed58feacbb8404ebd04117dc2913256bccc69504deca02c794ca521dda278f81db2d4fe19c267b67bea1125de37ed1c2a4318d7d1baa625b69bda39445bd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c15629ab344fc87fc9ca4c1112a28f7
SHA1546eaa04e27e4287a7f07e9278e15a7c516f3a82
SHA256ad1dda2cf6d77d30fa56f17c3937926aefbeb64e6281cdaea481ffa264de6265
SHA5125ccb365713213e0e03daba049f0b1308c8954d556deef745c51b0d02a5c5cfb4c8ecae080781bb014c6572c10388254dc6fdf27a0f9b92bd460c6b7c49724db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499fdea712e0cee0923c7e6a122b7ac5
SHA1a5ad6a2b96e84c37dd52c660a22fd23b2be3449d
SHA256d7d304d91c42d72fe3a58379ac83420d2f0ba8b8dc95a48f7003d3578d2ed6bc
SHA5126f4716c85c13263211c067221faf9d39890317fd385aeba75a2c782bc050f3f08b2fca26b2c1c28c053bb47a682b1fccdc5d6223e30092cd1482252ae916d992
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b