Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
b8567d02711736c9efd7768010011e05_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b8567d02711736c9efd7768010011e05_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b8567d02711736c9efd7768010011e05_JaffaCakes118.html
-
Size
13KB
-
MD5
b8567d02711736c9efd7768010011e05
-
SHA1
4395883312ee480cccf30638ca17fdd108bdcb2e
-
SHA256
96d98e1965d109d45658dcae6f9243e4bfd506997c5e8f05065e7c2e533c4ea8
-
SHA512
015e1489c97df59513f2de24b5382d065d6e0abbab7a1a9fe341cd37a611eb6d26691f29846b7e9a53312e553e6b26286fce282f5284c3f0f1153235d99c56a7
-
SSDEEP
384:Slt3gy5eLFCleqw1tFQvmnC4151Zc/CySaIIMTUfhRRLJDi:Snleqzmtc/CySaIIMYG
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B8FC3D1-2C9B-11EF-9BF3-52E878ACFAD8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f45472a8c0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424785098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000014900961e42c6d49708a30cf940f4aa95d3dc34938a5b213b67d494e465dac12000000000e800000000200002000000022322d8a936b20d277e576ff9aabb35e9286eee46d31edc8f6d4c13ce5332f3820000000e30351f97d10dca4d4bd0e980fef92920cc934552618859b9bdbc114ad1b9ace40000000905f34d747ecd6a39fe60ea37fb8c13f5be79d90a57dfa4201e1ec343bfccd9a26f33a2d6aae83199cccd84be57b5f20c7728bb44dbfe9a652b86e04d9347e71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2120 2320 iexplore.exe 28 PID 2320 wrote to memory of 2120 2320 iexplore.exe 28 PID 2320 wrote to memory of 2120 2320 iexplore.exe 28 PID 2320 wrote to memory of 2120 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b8567d02711736c9efd7768010011e05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0dffce4c1f9f45d994eb2810f38469
SHA1e8bcc12e734c9f408f9130d9fbc44fcf8b6e80a8
SHA2563791c4e92e678b9dd0e5946cc391252f6923f9c7b507dda395a9e7d48b35f8f9
SHA51289036b772346448544e2207cc2ac570d1061b024d51f70cf378cb98b911ef5b97e8f23ea54cbe7436f231bf3a935c5f7ef86f601364c6232e7871a348062a780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b647fc32ce2cdd0614d84b9942defdac
SHA14d5e144c15762406d4960fbf1af6f6d973e80a64
SHA2561c1254d572bdfb6744a51952283fedc9dbb95e958d618a281c6511501bf35b56
SHA512c8d3b25466c48ee32994dd95a04f70277d89917e178390ff43c2920f5ea98ab916ef70992e370eea35bcbe4cf2c5438edaee32296769ae606db96219a481c106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae00b5f578c610bc94dd53c7846b128f
SHA18a6d91b9c70cecf32d5b3ce2d6b187c170a85b5c
SHA256337c87843e4c59ccb7c3ab2906b226f92bd1805011d29f13bfed057365994a29
SHA5129ca7196568ddf59e93ffab299b8de4028d4bef49890ff875be4a30d7b197d9a8bf906b0b6e8852276b3b2eb7a17c7ea316f7b0fdccbcfa4ea73f1044279c5d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f264b8953c031afd49d75ab17c1e1c
SHA1dcb23148eb8f932e9b1e44ee71bd1dc300e8dc3a
SHA2568c8c1e94121687e9065010e3fe65e90e4b52183b4ae4d33ab494ede648c6101f
SHA5129a444eda1463cbe3ff10dae8e98851c3e7ce4fc9aace2278b2606edc187f45f318284ba29c3c60a2d6c3a9089873214d1712f49bdb02bab6becb292bd6a3ecc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337dabad817f292068d8ef3cf21306ce
SHA1962400858c46e30ad0b6f1cb33eecae0b4838997
SHA2562e32189a4b940506cbd4096107bab0a9ec22812665e9df5aa00e76c77947212f
SHA5123b3e3130136930b77380421a5a831d2c121d4b8a74d2a4eea8c5c68c7bda14c6be62c325e500b1d056fb6ee49fba03dac161fc80dc228d418144d5cc59e48eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef54e5fe1d3066199d77930f9ae027a
SHA173fa333c708a857b169a09df1e45ca02266499cf
SHA25601f7ab9d6f5a4af73ab19f829ab461281675989c417ef101cfe2005c4df5835c
SHA512c1c44d98bbd428215c13db455806a5278996d288ae128d0533f77f98c496f5f47cf6bb4b62d14d01b670a232a638f2886f4cf84bfad51c6f5567d1e1664bea8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0685d7a7e27f57b39e7f2db319b928
SHA1f7d2cd4d84cb39a2a8a958303d6238ef4c1c3bce
SHA25689bb75d731054bebfe9db0673a6b176a911664fec2a1079565c768ed9ee20769
SHA512bb5a3b427e3a32f63618c85b58c85c17703c478fbc77c73ddc326ab9c4ee3d6e73eeb4e0c9f310f9a87080c83d490864b0b3b1a078146e2a6fef272c88c86041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2a43a0fd3c893394b842004bf05d1b
SHA18d6d8ddc5375d843e6019adc859f9b1ecf679ed7
SHA2561d526093899baec37cd155792b10ecbc4d2d9b17539aff8a83e88533f01cffbc
SHA512e77bbc4d09d1308bd23b735fcf24cb2a92e61e8e1133342154cd0c335a984e26671252c8f43e33560e03dc729893d07af67879578a055c10239f15dfe3765467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1302c287c8989ea91d2c269b2484c0
SHA146f218812cf1d23a2e8e291b5aa51ebc6230fcd7
SHA2560e0937cae5bb48708a8630ec9509267f99385364af10610406dd91a082554034
SHA5123f7e5f3b4f8a30eca50f48b6976c4fa8d9a1a131c6e660ea159f864082dd8102fb236c5399202f1405eb9d1c6052fdce8f9955347e6ce45b9af8759e20f0628b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a2b0e5b095d67a95616d0fb8565775
SHA1d6233c918732b427289fb9d4cf4aa97439db4271
SHA256be97ced208157d8327a0cc8c5251deab91dde19da54dc12d4cd3ba51a3f45112
SHA512884007626c69491191358ceb8ba37536547e329767d881f2ebc2f4159b815b4b802dc7860cf6c4f571d289dcb0770bae43eabdc524dec0e498893c400d34677e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dca3a4153a9c623ee9a93421b71e8b4
SHA1418498dacc88ee888f3ee0fbb35d111247c56e65
SHA2562c8f15d11f0b1b67b8c690c1038a6aa98354a881571f078ec9217921198e784a
SHA512d32dfaf349343fe4693e6f515b5b1702a3c061ee114aad46e487ef2af188126afd5eb1a46af68c8f2a9ad0cc45f17046c2d49a4c124f9aefd87105cba8840393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b106dd58b414406e3d47db75a850c1
SHA169f5ef0c4ba32c1fe47ab7d88032d17cb867c501
SHA256d796910e1185a424486bda8730d32cda7672b9c67506224864769970c168954d
SHA5128263f4547bbd6744fc3e42a64a9592e563534b13c17193d6869115d747a4101b05e1809c42d74f8de72093d71ee201e4892cd255d80097cfdb5c958db29dc00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f9ed11a47407189e15b86369b2fc94
SHA14ef280c7223ba11390238ad910486be99760b7a9
SHA256da5488dd43b15ba6e7719bd08a26fd6285ba143b208674a107ca4f3391474cf8
SHA5125827cfdad234cb942032c53b2939e43782c903503299cbf1f8e360fd5a502840591f888cb6133df6ee8879febac6f059f7ec610e8809b2770f9f93f795b3e50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff99ec8f88df7945c75a9c95edb18ac
SHA14f9f02df25fd3f43ba01becf1ae91dd43a0231d0
SHA256cd64e6598bd517707fb1f892abd31cec2cbca299a125826c22fe6d2524a17c46
SHA512b1c9cf7720787376109aaae8b42da1dff36abf88867ebc97977339bdfc65eaf2b9a419e9f505fdd63bd733f4b936acbcc67b47c3e4ae1f3a71ba7af0c08bb525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2f35b1549bd52b09f3dab456de181c
SHA18a273e8baa1129168b60b072e11c1bce80ac1713
SHA2561c835764d1a27530949b1015c44de016882808188de7250d5a531f6d34af8110
SHA512c5bea28d45b77ef47f85ad9565d18620355e41a708dc7a196323f0e1d6143b49ef87d39e7bde7cd8ad5a3aabc12522684767a39029b91069dac36ccd7a0b79a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c0fa18548b64cb4d28da94204f7787
SHA10b4e93565c99fd437ebb709398e954e7ce661f15
SHA25673768283a5fddefec04fa9fb32a3d623d1ab680988b2b49dcfed83d8286f3c27
SHA5129dab23ee9ce490cd28470e67b05b3c7d69634c911e0f1f07a730036282fadb5af610962008b066bd4681f7e873e377bd62af0560e8c97e76da746ebe3e9f50f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b52d046854e7386d453a4057deb2a4
SHA1396d914692fc907ec9daff163d964e77e30c0b5f
SHA2565fd1dd522f11291481da669877ad38f888ff026cd0df06720860d8788fb490b6
SHA5120f14c3113e6a7931f11034a51a85a5b0bc0d5f7a348d43bbb19bd0c80a6a6f2f63029ec7e93b744730539e23880958dabd7224aa145f0cb8f1cc89467ebd5246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbc67dfeec566a3f01a8e46c0f70d50
SHA129abee8018694c9a4cbc4df2d691dc5d130fe48b
SHA25639b08d75ba0f711c0a4236c22c3d12182dd28ceda6aad0c06f0a9fd219b0cfa6
SHA512fff26a8328bafcdd9785f1ecb0343bdf8aaf7ef06834342b81450ac46aac04af6189875ef556c01668b38d4ba43e7a8dd7140d0a322b66bcd9974320fa8a0939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bce7a09816558d736131fc64df707c8
SHA13663fd4fae774143fd346a7fd2845c85951042d0
SHA256300419daabc913c4d598e514048a5abe2bd2d9783328d5204f2688526e29ef84
SHA512c657c33e54bc7493d000ed49135687ad02dbf50cefae1af307b96f335e79068d7c1836ff98aa736ee45ef5c4e89e50dd87a1c7d5dea68a46a1866be36eb4d5a4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b