Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
0787f57deb53d2ac7bfcc06bbbea1184_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0787f57deb53d2ac7bfcc06bbbea1184_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0787f57deb53d2ac7bfcc06bbbea1184_JaffaCakes118.html
-
Size
11KB
-
MD5
0787f57deb53d2ac7bfcc06bbbea1184
-
SHA1
df8afd4ed3eb61c338b97657eff81178af5cbd4f
-
SHA256
d29593df0d85e231ae6c75f434fd43b2b18271fc6867fe351c16c5ce3812f8bb
-
SHA512
3c7cf9da8c92817801d350a48e9ebbeaa758b5c99a1ebe4b0ab0d4e58bd5efadf78f96c144fae07fad1438994797f1e720ddfd0253d9f1fe9fad21ef81d4bdaa
-
SSDEEP
192:2ValIsr0r57M4dMxadpT8IdM/w1wvqa18LOXuBuLbdU8d:salIcIQ4dMxadBdM/gg8LOXguLZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{625A3BC1-3206-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00d376013c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425380715" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000488175a3e910c14d904dc6a81def557400000000020000000000106600000001000020000000d50a75abf87b9affdc1a5b9163aae2a1d6dded5d6755a0e59755dba30c29987b000000000e8000000002000020000000fc9682484b7f27e5652e96054b7dae5b7e92916a7cb895d79ecdd663e9fe3e732000000037b719e9a38f46331ab90ae20b227390124d0656f1f40fbbb40f3cccfd9d48244000000027c2faf3b67e99ed04cd9905bc454d218f4b9e82b4f0fe94d40663afcb7ab871da61f88cb9d6bb9a70d69c845a42433180992de99047836d80ad5558474806cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28 PID 2192 wrote to memory of 2656 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0787f57deb53d2ac7bfcc06bbbea1184_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af4adba4a0bffb8bb1daff57c9ed4f6
SHA1397c3fe7b35558a56de13b7e6cb7ffb6e002f29f
SHA256c2907d6dd78b6dc2dbfa82ab801152c4cfe0f376b949a5e445622bf505f9e86e
SHA5127c357868208b9fff87f6dfeb3b5c17e0e8ddcb26a58f6c565fe537f03ac53ab06bb92967160b732a06e2075712511e9f8c2d94ea7f31fca651b1b3be2911eed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54859dd17523dea854ce59b18d2fa2f27
SHA12bf41f20458a338df35f53fbddd2f0cd58d847db
SHA25621c20aea2e7cbb0d9276a39cb600f20b1cbcb6f20d9a1e4b7781cf737cc8d3f0
SHA51258a078467edbfb216bad8061d33d92201db86d1040c71aefd9de6957ca743e26cad04c932178c1cd2a3f9e8a300988d27176293221564786f10be2f84088fc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a363518e68025c08905a22326a60d7b
SHA162f012ab49437a41ba05aa03cc53969223adc957
SHA2561afd178327ce5001e3cb012c64d933abe8571e3b3e5e56f75e6336784107ba0c
SHA512180be9a6cc7fb10f5837a1bf2f587863d51c98bb723816e117113c52e8ee8ec849c1854fce0c9eac7558cfce427d4da16ebc5d79db04ab0fbdc6b0ed9307ba2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524398ab12c56575b42805e9ae71992f
SHA16ce8d8515325e7354f66de9ee6d0b3b40234acc9
SHA256d53229ac6dd43c286ca61f999cf570e75ff091585761c7a5b06471d179ca6bdc
SHA5127845d39067f728626c5e472390f78fa951370fbaa6a5f7db639b2c513a637381b66de0ea54465881c1cc98f063a7d6bf2dad14c04f8272e21e6b8b1ed2d4de34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f813e2778ddb5a553379e5f38fa37a
SHA17910eef6d55dc753f92d6217fb066e986e448aee
SHA256542559ac4d9b929e66b23f4eb49e714345df4da735844f74dc8b0f84fc6db998
SHA512504f9e6ee9afb59e7324b2871f2aa1bada042ae34c53539adcce02ff0b9f6b1aa71064a142e7329df1c5d9bd6cd9b6bc15ddd04514f992a959ab8acd96442305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862cc01be71ab18f6ec67c8a4515e921
SHA182227516ea61461e2499dd838d846b1f53206c65
SHA2561c5aa00154ba89ac801cb70e6e692e25dacf06d1ee4d408a524878e38b65ee3c
SHA5121ecd3ff639c67f27f78a96091993117c1ed4832c0fb25502a453100a84645b3b25333b9d3dc73f071e6f265a0a6b36e6ae8eb1e660332a611e319d0bafe97757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3de34e205fe8bca4f66609e461be96
SHA18415092f644a6932f3b6a3f2f434faaadb012803
SHA25619672df138659a9aaff7a6d1ac45f32a3903f4846542908762ff2a2858d19b4c
SHA512c94c054f7dc7775f4730d2e04963c63943f5cf4a6d53a555902db170a862b84418e0627b7049df6a562af15816fc40dc21014acd2552a8505efc2a5385dbc1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43cc0fe5477e1cbae211e292720b5dd
SHA1e9b7e7d80d1642927995a74ba0c59901bd6729bc
SHA2563f2bac364ae4aa2c6c45ad7062e749104945ce6f5c211b38b20d9b0a5d240df1
SHA5126e681e770a866be02579ea904e18605f3ada70fe4f94ff190926ef8ffefa497941f30b3c9756e1fbd2553ff48ae1b42e2487096d11f53e9a664ae70f6976e107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82149b2f4268a9caa67019c715c2ec2
SHA1a043689d2574bf43b2c266e6738a6247afd7e3da
SHA25670b3dde16b55de0c03967257bd23ca90d1eb66bdb34f1f4ae040a12af44c4509
SHA51228190564c7e9a279fc64b3f1499ea861b73048fd9b5c403d3b68c3c57842149364d1ccd0b7da829e5827b160ac4d18ff56e63e090e360d850502625bb0ef3712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e98781aa08a77e6fce69c7dbfb1f60
SHA144d54a1fd32ae5602c74fc0c8ff44508aaed55d4
SHA2560f2faa4d2d6ff5539794135d2afa64957badace2d9579d4359af793a8bf9e329
SHA5126a07e450655d6da977d7adc8a189b59b6b799a0bc562fd2811a33eaa874acba34b34ca6645dde79ce3f9da01167bfa5294dffce57b8ec3e9a99ffe344ffe85ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7689496145720d1d32322f630d549d
SHA1155f9d57b3dbabdfb420d3701107563ad6b4b6b9
SHA2567e6710b3f3adb79a11338a7142479d3709cd8736d81e7b6120ff99ac8fc3ad55
SHA512a4b22abe892bd7f26eb31ddde04b58cd77c3ad6f47c63e31c571a974160eba5ddc028913e28557860ea8fb0f022780fae82b61170c9a88898c8d86944074d2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c4888ab6649fed94d4f7f976d867e3
SHA1a652b33dd78838e51b2a39d5b31b3552e0d07657
SHA256996e9e3379dea01dbcefc9ae26a283f248b118865d1e9ceb9671392401f780ea
SHA51230bc0dc34664dd4345352cd74ff236cc2822290d4f92f6e9b3d5c4048c521a1e92c6019e155c877e9c878d3d464f3ae23358a5490a321dfc238cbd50c2cca01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a45d502396de9de7c8fc8de89516533
SHA1fe6a96f1730c367d7b35e3cdba319ebf6d58ce7f
SHA2563cb0489da64b3d8bd72a96663809c90c40686efd3db896dbbd73f2f2f2034904
SHA512c10878b15cdb3687180ca57cfa21706af978a04e1b570a41b50fb6ea97450446b9e5b2674d2b17b5ebf7013e02732b0dbe4006646698d14aab5e814d92622fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593380f5b273819c4367800ea9f758d8a
SHA17fe1b72dc8c61513e190d0bd47958afdd71bbd9a
SHA256e2ea9821e46bb8f56d4757562b7a5674d5b0c4ad8afdef5fdcc96c71d1b80064
SHA5122a15cfbdb11b4bffc3e7b63ae3c5beecf6f06ceab0f750c6df2591f858345a72a10e7afeff7e11c6c0919cd5b55b1e967d19962c1c89a9181e0a5592c23ff11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55517af67166753c465002f89de60f431
SHA1aa07cea0076284ac22c7efee62d56cd4f0607a7d
SHA25663c559fecc45fc931c7e94ac278dd36080e80984427368ac7fbb3d2a6680a3b3
SHA512a6783cf3a44a9d8cd09ba733dd941a7c8bb87084bb1081767e55cb42012de358cd3656be5ec780c2aee0c017e8e41683daea4dcfa29d88f2782c69dcb4178356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ab7411dcccbfb650ef975d7f875193
SHA110fc436844a013c4753f002c021f88e1e5cbaf7e
SHA256a80da81133d27547b2d19693f872bd3cc65395273510e215dcdf9bc591dff78a
SHA51269565a0122357f28b37813d2e996e2e6fc4eabdbcc5ac04311a18b9d80bb728579fb1b0493f04b75397a4da8239e5a39189c3a6c3ec7a6f49050447cdba084de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255699f7f978f9f19fe5767e10b09914
SHA11b724e112472d72a71b68381773cf8a060a01720
SHA25602386f6966219c4dce12717b7a03667628a132900a686820ffc87a04e3f1d4de
SHA5129d40c635461fc89e65e4fc4c5feedef9bca14c961150393df7a98141ec8d1f38d14c29ac185466a500544586a59e947e6a7936b478bc5b4f49a468079388fe8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fe5a3998e16a8888e9b19b7fd40796
SHA1fc2e546cd51acf1c0c05b8b0b66a23943417f135
SHA2561caad038a4d3339890e21882ebcee289f19e5f94d18efa65c417907cc03861a9
SHA5120f536cc58b9aa3513feb9c9dd90cf8f7ddf7b22d125baa6329f795225eb487130051defb20400ab9dee8c13896e62e86313aefb7bec8d1d72fae47239d38a202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2ccca5d0b50b1fcb19579776f35ba0
SHA11ede24e3309b72695926394a75e606be073f4a49
SHA25641d5934f158e9e4e02b5d757c9f9470482f1fb9ba113ffd8bd62c218507befab
SHA512a511de6534cab535abd7e1050f57fa3414a8ba14017b1c5eb8c433dc07e4de61926bf5aeaef4290b07387e822d3824f108c6c540af85c5a1dc86e4f18f0e5447
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b