Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
bd650d56377cdbd3958648d19d73de0f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bd650d56377cdbd3958648d19d73de0f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
bd650d56377cdbd3958648d19d73de0f_JaffaCakes118.html
-
Size
39KB
-
MD5
bd650d56377cdbd3958648d19d73de0f
-
SHA1
22b2a207607309c734d92d5c51a6a9e4f1944be1
-
SHA256
fc070c94ad74b2556b76e92512c93adf37709d191fae27aa90608efe6eab2cc1
-
SHA512
3b0c171b4c511036299ad235106888eb185348ca95478cd36660e243a5a591b24769308b153b79ef8911f459c4459ac9bc868167038d85e6e218ae9e0644fb49
-
SSDEEP
384:SI9Ymw5IWJT/kqSkwv43bMsdu653kGyHLB6:SIKHOKJ3KHA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104065646ac2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424978347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a7fb7073b768ed357bdb14bbadd0ccbba2e04ec1fb342a8dd3ec4254ce1e3098000000000e8000000002000020000000c8ba07cb33d6ab71a03c70bf189a896c78426129539590ad238a05b2926fed6d20000000f032e55f434d30bb022d4a1db63708e1c299c672e79dc0612a35f20414286b6c400000001226221bf93eae16f73b6c64a77cfecc46ff0c1108ab9806b8099e430c92f892f4f9e8e0cf5bf6b1be978fe351927dd87273fb79fbabd8c204a622824a6c3723 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CE87ED1-2E5D-11EF-A05A-CE80800B5EC6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2284 2360 iexplore.exe 28 PID 2360 wrote to memory of 2284 2360 iexplore.exe 28 PID 2360 wrote to memory of 2284 2360 iexplore.exe 28 PID 2360 wrote to memory of 2284 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd650d56377cdbd3958648d19d73de0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586169778896e21bada9d8e07b83c4b9e
SHA12bd494f50ad68ebef8ba8c1e5ae0dfe31b4b4356
SHA25663b9653cb6e1f300b9a001e1a714d76beb47a3b8e2ec662875c48a56d4e6880c
SHA5125c2b23bbdfd8f80e7a3004c84ea8867259c8807ee0dfc835199b295706b59f68c49d45fbf2a9f75b902ed76ba2026ca7888a91254aa3df459026530a8d4055cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6cb7da758cc2777c665a53f85f0f57
SHA168df534b2a05e33cfa678a41b50f7ca2bcda05ea
SHA256eb7213548180719d0d0d42f898a449c00b741f2a14faecf0f18a5ebd64ef9641
SHA512dd23ec08cc46a861cce923a527224a50d179072701934047d776038a83f9b7941d74dd8239c1ea7ecb4282a09559008db1d5551e2c89a2bd48960e9afb25fe5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b970eee0f3b5b5bbaf2650e790f008ad
SHA1b6f6f0e32661bc47c6e89c6bbceedaf15558bc35
SHA256d908809dca0a96cbada7dd91ff6cbf4ca6c303c1505bc9d4ba4f17956ceafb14
SHA512a03b615dd239bbbefb01fc5dd78393eb116c7992733f62655232bc49895efbd83e47dde5c436395bc7cf4632858ea84b36c7e0937168ba7c894b64cb0950f4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45044415f412fac4d835ffc1c75ab3e
SHA12846eadd2e9490d92b5386d4475550a94c98261e
SHA256b9fb8208e7b3575f5af70ea43b877df0e7c751716f3db6f1c83ec584b3d10d17
SHA512f6582bd2d8500aceb5b4661f503ea787176e8ab8e81bad14ecccb250b4f089da7a421e019eff480f804ba4a6cffed80d542a2096bb99a120e150bc5def4a3750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660d7778967f98877e4436d21a9c8748
SHA1287cfa5c9cafad0d3b2eb75c25b5d4ef324b8800
SHA256fa9d059cd6b69b6f7a60a81e186258fffae621fb586d6cdbdfd629805a4685fd
SHA51218836b8e0a16dce4c7694a571ed632ae6f2c5de49f849d5557792bd63949d6aff8f866e7f49eea35035618753d6540d573c99d4499810e253dc79ca7d683b52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbe44b50e485d2bd8b5b3ae1182d028
SHA15702d6945694a5462eb264b7be05370a2e14fb9d
SHA256f3cba5b4ade420040ee42733edd9ba9689d62276b5738178c8570b07f61b968e
SHA51240811ba11b799ae1bd43f7a29e8c5a15e7fa485714184d2c9abfff60c8ddb1b395e4a4106933669b8e926abe732bb4aa8202f8109d964b176f51ea629d573b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cefc178d531354b9d3ffedfcf6c1e6
SHA1eb7de74070a08181f14d65f347a68a97726bf6b7
SHA256e42c988fbe6d991a654903cc2bd790c5e819ca3fd57306cc7b31339c62a94afb
SHA5120727a2bf71b534e361a08f740a9f2efef03c3c424f43a052310fc97ebc19bce7c0d936f1c1af067b7576e8a9496b08d85f68814d1eddb1325b77d930318fff86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea204ef3d7be083d6bbb1eca90d343f4
SHA1aeb6fe9efe4eadc335ea160f153fe9479d654397
SHA25609695a396b277497445136ab95d0844b4353f2ea674634bcbd411470d58131b5
SHA51249043ee444d2480a076ea1b010912dba60c6fbd7e75d6431cd5dcd494095013e054e9e527ff126337ef2ba963d1c1c00cd61415e633984fa871ead49fed8c39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3690a42594765726e5571bd61664dd9
SHA199fd9d5f657a70319b5ba1ae619420b04a664a4c
SHA256bb78fb18d94a3e66a70a7537b75787a44da937dc88b9051429aa058ac3d39a0d
SHA512dcf1eadbc30a5bb2701371f5378e80d115579186852937789a6c7dda00f9998b7e531522b0f58f8ae4b7d48251560b1dfd3181cfde7af596f6ecd3bd9193a3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e44edfe084cd72df09951824b71acec
SHA17ad6a4e339f970a7eaa95df3e8c03c56153c6838
SHA256cf084108fc905b0e464c3fad406a4f094d1336eed45dd181c15465f34adf294c
SHA5126850f1381a5607de95d96f33320be8ab6b50655b40f694036e5f91b92c0b6e409debdc60c6200b79af991e465f41b761d2cd1331779319716c5210ad7f4c690b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291c63b870b7c1df61a98da693fb47ce
SHA182a5b26d9644691ade258a770a2c59acf9058e47
SHA256b6aa3dbc138d0e04f8d81071cc5e6a26cca2c903b58391aa5bc0bdf14e30e117
SHA512eac6ccf75921f9fe1640b116e90324cbf6ffaa90debb985a9f7cc83008dcc1c9ef1b316cce6e70489b02920dc23d3580b797b68c5f8107097d603865df2b65b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd43cf1891b171ab79e1f3b52fdcccf0
SHA1f99817fd92eaef5f4deb702f174034ad432f2a05
SHA2565d8419dfa23b859b9df6200a069b598401cf37a2323e9dc82bd75422002d0040
SHA512616f8dd5ac1459c18e0d154edbcc0958a00fa00a21ca85cea9810462f6e837f0cdcdb063d7c84178ddb86b5561be9c098dc7c3b7cbe289710bdfe4901ea3c22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dc7171acdc197b61204ea3f8af82c3
SHA1781b3fa8256d1fd1924df4a5a9e4e8bae485caa8
SHA256fb671a407aa7f944d08f6991d40d7348e3fedfd2f8cc2dc2037b9238f3e3b67b
SHA512daf3d0f45dfbbc30f3979a84faa6d956c033a628c19539788896fb14623750fe79a7aa83990bd6b2a6032a6c9301adb15cad0a012b02affb7fe60cbd96b69598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4246a2899810105c14058abb9a0fa7
SHA16406c68948710231f48e9431992ce66bcd9f23ae
SHA2561220f2df0c56892481e93f063837fb2473f79b3e5fea5b506b36e5afa6c32808
SHA512fc01a9faa57a355941432b4a77de7b54b9485d6059581a93c3f80d84ff074f0095c1f6a4876acf66c6e2f9a0bb6d3ecb8e54c0203bd2929ce8aaa14cb0ff1bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32f32a134a1ecb1b43aa6ecbb1898cb
SHA1eeb1f3498769f0420236c3a5c0c03b00f06d3bd2
SHA256c2f518189fa9d1ffebe2b65517276124917fe4ab287bb0eba137841ac32c44ec
SHA512e0f91ad33e038b1125cace47bb7ab5515deb8b0c2ff04af1d94e2b67f8272ded09df17c6dc8fbda174d5aae94d8771ca953e7d81a74952e62fd5496e2f90826d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ea26099b07a47bd62538e699e51e6d
SHA161c9906e85902c86d60b52e4a5f4d9165daa4fe5
SHA2565d840e4a7e1ab64f6525b515130f0d7ce79adc397b46098c79d8ae822917e0e1
SHA5124f01cc6b5dd7a683f1afcc7be77004cad03cd41c9391c203e7bfd5cd6eee05a7400cd825c9bdea880848a7fb7c8843e8dd08c02476d8973dd0678b6cb721d646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a823fc7aba573f30f3897853bb16b4fa
SHA19bbc690457e6e22fc316cc1ef9db80d185dab5f7
SHA2563305cab19c81477e4ece96e8da6cc11e00fd058d5489c7cc1aeebec52fe20742
SHA5126a535f91e27d982c04107703eaf02e28ba6039d54dc0fd8f88bc0767c7f06bfcaa4dbfc334190154f452aa1c1d5bef243a1173781dd86eb8c5adb37743e7b7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea69c3060ee919c000feb597affb574
SHA165f93c8b44d5cc92c5ca6a507c0ba3f1a716384b
SHA25610297f13c66c936f9033516a0bf800d06b01539c2c1cb91128a65773f31a755b
SHA512e225966c98f38423526e7d038913c626e7239c31dbdf3d1302735c418c546ca57b31c389e44bb60b9904bd6e858c942a6a992b02d7f8fbfb325d4edfae23ed11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b