Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
bd7e880a6d9e2c7ca23d04dbd285d63c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bd7e880a6d9e2c7ca23d04dbd285d63c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
bd7e880a6d9e2c7ca23d04dbd285d63c_JaffaCakes118.html
-
Size
52KB
-
MD5
bd7e880a6d9e2c7ca23d04dbd285d63c
-
SHA1
8d5a799361e6b9c98fcb4fb5a262ca2c263969c6
-
SHA256
bc57d1f35a29763dd33a655715e9a383d3f7c232f536740808e1fb4a9a634cd8
-
SHA512
5c969f7cfce09228699f764aedbb0e7ffaab60d5b80ed08050b44250be81b91b7ed16411e6043efc3593b5cc694f77334af161fa79a8cbe4930ab5e6f83f4874
-
SSDEEP
768:NZFYqgKMikHj0x8s4OBQkBKuUpXxfy11vIGpuUwjG:9YqgKMikgx8Pxfy1ZIGpVw6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000846ba7c8d41c7e912ee75578c4971be1c8dca1a0fd16e72e87abfd42fab2fa78000000000e800000000200002000000083aff77bccb1558a97f799aad0dfcd9836c51c310792f5093aff31fe7aa582c6200000004ebe705307dfe1a071875dbf8e11a0a2080ddcc389156a1b4bb9c08ed3b4f05440000000fff44d9e1b481142ded9e6e9a8abe32c0c9303721846334765538169d1e3db5bbfdab35e075b023095596d1e6c3a234598453fcd5ca2edb7f6c8fa4f6b5d93b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D556AC21-2E60-11EF-B0BD-CE03E2754020} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424979757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f039b4ab6dc2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3024 2116 iexplore.exe 28 PID 2116 wrote to memory of 3024 2116 iexplore.exe 28 PID 2116 wrote to memory of 3024 2116 iexplore.exe 28 PID 2116 wrote to memory of 3024 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd7e880a6d9e2c7ca23d04dbd285d63c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b407a28eaa6a52a0de58a05115a3491f
SHA1d7ae18e31b1aae84426a3eb24b56ba660d352ed7
SHA2564cfda634221d4ce94343486b44777c052496b3bef0bc19487bf062cd459d9ea2
SHA512cbc15a12b57f6f8e0458b34fe7f0b3ffb3019d4b55ed13fda15ff3a93c5a1e2aceb9d59975f000e8de1fc83d9b3403491f31d6841ff86fba267d3d15ef018eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feee40210fd34bfb606f6495985ef46e
SHA11f013a7daaf8f67332e209aba648791d5257b014
SHA2564db0720fc034696909c36650866a0b8b153467e624fc119ab349fb2d87cfba1a
SHA512711fbc5df2e6b053a2357291071f30977db0b7aa9861971e82d45b2c03305dd58f3c9a582aab875abc95a16a024bec858672094c257b5484c6d45cac6ee4f7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fa3aa95d4643587d7929df294245f6
SHA12420d67b7346548ebd437b0b4b67fc636a3e51df
SHA25675ea5de7f33f8bc18cafc8d5c6e731590f7f4940214aad7631b4165eb44f3f17
SHA5120918764c728034bb3a8aaab2155daa209598cb9e08d67ee64e346ba5711628461ed58e17bdd0ae18a4b65a4825f6e1aee359701f4b2007511cab201b69912e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb0430dfed8ad70a3a13e9f45e3c5a9
SHA16d3e103e250bc8ef59642660a3d01c7fe85170db
SHA2569dd28df75604c0c469a81cb74fcb2f31b3c0e5918c2fadb094b14d0c79475208
SHA51221f2b56cf9aa615e6b333675af9d6f0035434f7daeeb03e57e8e24b4ac0fd2f08cb3776a965484ccd3372e33892c2b802767156ce3e5dac30aeed916ac79f816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3332d2b880e30ba6d64a042cbc846f
SHA1f3372f40eb0cee39cd12e52195acdd32b9a61b08
SHA25659bf656c8498b1b5046a55869a1942fa7e553209a9164589fd875cd391289754
SHA51243245f94117de69dfe7b86769ff9b4cfd2fb54e105eb5e5eaa445a721cd68f06a20ce2f0470f9cd8f5662bbfda0768154b2d38194511c393bf0794fcc9e92344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553079caf70e7bdfc4a39553b1b1639c6
SHA1df17cf306c2e9bc844ec82423343df33721f65a4
SHA25687a83572bdd43a40ff280384cc12ae8036d5cb6b9651d2e309ebe9e719d048a3
SHA512e100d18ff7568d3f118fd636b2f2472d79b391372d88453dfbadd1e12e812f6a99c537e98cba5bdbacebdc731a08aafbc61378254a596de2fd0e01413314e929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4ebf23c75cf84da1dab896c439b029
SHA12c5e3c118ae9ebdf3eeca3417d53f6deaf87a588
SHA256a94a5c49b15d527c52c42727d8b8819bfcdefb68f597d2f8d9df8d9ea3ffec50
SHA512fed8b5432acce680b5a5860a1097a8b1068498868ae0f7180f87b6892d8e890670607a2c13137c0361666fc3c538f3a165116ed49ded85bc8b1cb54fa9468136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585df3961ecfa65a3f5975d98b44d8a80
SHA1108b9084c1c37b36d6eb59f7d3cbd9161a10562b
SHA2565964a5bcb50d7f69308f3a2fda1f0cf4683c1d0ee0f82b668c1e51f10aa735e0
SHA512eb47a5978c8776f61da0da1ad31c4f2e26c3ef2762c450d6ba69a0a16216ea965f2fb3b7540497982214fbfe3f64715aaf23add75b7096e9fc809bbad93376e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c045dc456e8956e8a054dab7361da6
SHA10cf4685b81808a6e5ad7613ef6b03637a590c81e
SHA256fa9485058686bbb1b66a92f098ff3b50ada275b4753dcf28c6f63978d93a5959
SHA5123add2ee64fd5114cc9073c778fa0d7b1ccfcd2d2769789fa2026bb725c98969a3bb3261c3feba2766ddf447578294f4daca6a3f1cd8e74667bcdbdc9229d5e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31339a1d3a58c29962b58e78e9537b0
SHA125a2d2ed348500fb986ca89791a34a3cff114a45
SHA2560b6ecb0b3837bd6e561e1148326a3063c09c69049f866e4089c00b6c45123fe0
SHA51238f973ce20936dc4caf9f441dac58439f60f2317d5d75fdd1c19cfc2ff26bb552a7abe3e417a60abec93b448a4a08b90b4cc81b25ae879f1d89d8b55a476ad0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f07c1a38b27f55d354a327e4f2a35e1
SHA1835c5aef819fe4d9003d664c3e6c8e9ca855933c
SHA256141d70507f006c6ed88eabf23638883c13b4424104be9c8eddc4dba40f6f8dfe
SHA51238ff5edb9ecc6af3441d7e3e80bf817244d80fe048689c04cb297b7b02a3da51f6d1026f931a4e14c2cec03f76d5ea0bb9130fa4cca2440a1742ba0e99856ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562217d28adcd54f0c920ac9c1d930a40
SHA13fa40dd9c6d3e3ada7f218662cbbba3e6f8c51bd
SHA2569a81315011c1913e26463cbed408920e8a4bb32db666437a64349afeef07f9ac
SHA51281e91c61dbeb655f165f23e96d3d28c0e2f81d613870fa2dc2389c993c185a409670cb81f0c84cad3c916af9b3171601844cc67c76044f10173709090d82ef08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fb317bb143f7837505a58a9761e2c9
SHA102917c8c60755964e1e5ab80efd42b247665873e
SHA2564c98d5e6f951d50f0f4172766f2554cb95ef3e0e84fee4d4035713c32e24a33b
SHA51291a2672bf1868df1fbb41946155060d0c9de480f1e6bcaab1973ba020869c0b68fd300601605320acf648dc523bf96202c48c642ab3863987faff74145b51af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e123ac457d50d489de0f06f41f02a3
SHA1e5fdd2e3de8b91a46b499bcbc012953b2b95667c
SHA25672e7fdbd715c0415a54661d14a34fe855d5451f6f5f78c76303242e41896bd12
SHA512257cacd1fb455b80bc68d04d30e65060ff21add91731056943df5f03f9bf6dd3750d446ea934e5ab723e8ba0f277e7917daca72b9a99402b573e67d35258e8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed8476548803cf566c16a7b4a78d642
SHA11f109925f4cafce237bcd0260358e4d6457da6d5
SHA256607cc68da305ea2a1b7ada2b9d06e1999c35003a0fa39b5b58effbec329748a5
SHA5126779fe14a4d2800db26f56213babbe1e98ca7117a1c01441719ecc9bc57024072a26216ffd4063072b1d89751c3f437c0e64c01c96daffba0360259a31bdce24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cade76ef501e6199f06644b233b165d
SHA1898392b8821581de5c3f71a4653f3944b46a784d
SHA25611d122749856a9cc7ecbff73a597883fdd8b26d5cc42cda1ee11897e2aafc088
SHA51224099f73766021010f1db4ad5b5bc4918d50faf6031b6cdea620712f8cc8f4001a44509569b8a4547982e4e462dd2c288ba25ab88f15dbceb98439266972853a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac9767726189ba790b98fd394fa7f35
SHA1fe6ebb5adc9f4e4334f72fa966fa7bf46ab08f40
SHA256751e93e01377b6d196f2184f92da110314c43424ef60517822c96e2b1f16feaa
SHA51225bee5169f021599a2e6d3bd78240379e7746f7b32d3bf7af9214218a1787dd87b2f09dd802dbb5ed34d319abd5fea020a63e4e77e66e02e5dc2a0c361077792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c43c7c1527eabd2b2074902dcff225
SHA142170dfb0df47e9e0e3bad7b3e367abb39b3c31f
SHA256ec884bb85d171e3a000144d179a511e81ed5d6186fbdea6f0582c019b911d329
SHA512d05dd27bb020f03e4ccb14eecc270c9325acecf347bf890f2e25df3867a4614977c524aeb28769342fdcc4e2e0a655ae6eda42413b5e842faa53ef9d7d8f34e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54873a0ac79fb42ad7a3f3192171ff513
SHA1860d449e1d93e09b19afc3f32029b85f42ef2c37
SHA256204154e691a75cd670af81bfc6cbdc459ec5b134c00d088192dd9556ca1b4df0
SHA512838af2ef514c61ccd8d1d0bac2b575195c0f655ce0478a406c55cb9c9b05b6579dcd3457e1f091201e9e0b7a73d23edfd20a051140bb9f457ddd0b8aa4752672
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b