Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
07ddc08f697baf39c0f8d29b4a1a12ca_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07ddc08f697baf39c0f8d29b4a1a12ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
07ddc08f697baf39c0f8d29b4a1a12ca_JaffaCakes118.html
-
Size
36KB
-
MD5
07ddc08f697baf39c0f8d29b4a1a12ca
-
SHA1
ec9b39c3999f93b17c6efa9986be10ab6966f7f8
-
SHA256
f22f24077882aa0b6c8bb89f28535ae955110a078c277da6088c3bd1504abf5b
-
SHA512
ff5dfbf22ff74f2fa00d128b06ab50542a996b776e34b6399e5d5e0227f22e2cf0321fa02bb992615cca604eb936c6cf49d890f3452e5d564d296bded2b4157d
-
SSDEEP
768:e1adV5mSCI895gr3kdlLwy5Lb5DiDB38k8fla8gTCuB:e105mv9sU3LLLGFWgmuB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000364bb08c95cab3b1fbd57266963c9bce827e43d87a9253d08314d5d1e7890b38000000000e8000000002000020000000f20a834466f06fb6b7eb327dabaa4a596a92797aa2299f6017aad667376e4e44200000001b2a84c430d24640c0dca7edae35558a3e1596ec4f8a786d6e788672e76c8e6040000000ebb9069a5e26f22276f9a07e0fab94ed51f291b2f9cb51eda96fd45376b318662b81526d83ab28e053a24240d8d9e9052cdfd8947cf5ad06d6cea760bf1db398 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425385427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b129331ec6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B857B11-3211-11EF-8875-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2984 1844 iexplore.exe 28 PID 1844 wrote to memory of 2984 1844 iexplore.exe 28 PID 1844 wrote to memory of 2984 1844 iexplore.exe 28 PID 1844 wrote to memory of 2984 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07ddc08f697baf39c0f8d29b4a1a12ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a704881e90a666b31e5fc8a1100a6cc
SHA195e92a570dea95eef3c18f6c759a9394fa2c4211
SHA2567b57fa669ac87218e3071e015848544763985737e3d8c5f58961e7b2ce1e5ba8
SHA512abd190b639d700e32edef531cbb5c9b2dc58fd2dfbeaf2d9ff6c8e28181d68ac70bc9dfedf750769078b82e54680af801ae586aaf87a21a55c3fb30f59a147aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ccd6bac0b85638b4146104fd1b5d7f2
SHA1148d66a4b3760bcf605b2adae5f38a908d5802fc
SHA2560ba5b35dc8b40282a71c2378982030e5ef01dde785b40bfb01c3d7f9e5cf2f7c
SHA512ca7a8d47d63888cb805f9ec6fce2b5d80b49d7c7f832cb8f8f3e0689010c9bc04328ce8d8e63d5eb3921e3fb849212bd0a07343a3e4f64960cfae3bc5b949520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dd1e322ff459228f889b7e453fc02d
SHA163ef6c40d18ae19f4a7c688390739c825ba9e6b5
SHA25605ea9ab187cf3540c12a58a4184d98f35b1b9ae0119b5af7f2446152a3a0603e
SHA5124138be56bcfe0c53e0bc37d4ea63b51156b8155a646d1bc8795c161e5fc9a37bda014e6f2132868ba9ca978dbaa52bdd4ad14ba9d23d41fbddf793061a9992a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a075d5dfeb00155c928c79b5d86dcddc
SHA1f6b5173d6f9b7c0da121c2b220452a2858d181d7
SHA2569bbafba3e5cf1fd5137158e4b6c9644fa9537f3e03e9565709259243515bcd82
SHA512e0bcfbf23cbc6ac26545ebd98389b6d6693b2164a81a26e069ec44a97d01ab3e493f138b66f13bfb88914001a42062f6221d7947b0dcf17dd4ec0d9a95a24fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4782bfb114c73841f1c1bbb994d14a
SHA17e4b0f6f3c44d189cb2b7eab1839a6776630ce14
SHA256915822ce09564cd4d05770fd10758837287ffe4b905f93db1ccb241d11ed2489
SHA5125b7092cde2ff7defb690e1f7391f0c0b44f5a4104224a17aadad8bfbbc39d313c251a7b85f436704bae754c18fedcc982cb0db2e43f15e925312cd08655c1f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf63d585fb15e969f0c9baef479c624
SHA156ccb54502c8a1d28a73df75858624f27a47eb2d
SHA2560eb50fb833c8f5b275a7e013ead9ca9aef3c3a75c163a83e368cf3351b692349
SHA512e8e173df830860158e8692abe7db777bab5c66de679e53b77e756da3ceb84784c94c1de8559d62304f3392748daebc1716307fb36b53730ce0210c2f871b6076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e07f0d9d1ebc03a1fac1da68ecef137
SHA1c0cb8d4e8cf4cdb280aa186c5b0faa8de725ee9e
SHA2564750ca3fad342a116dab944739bf6be492c469be6f26d9cb617c8c387c0bdfde
SHA51274db614a967a2c47f0a3ae195523e04caab726912a48594e42d0998bf14a9b19677e0b91a307173cd6307d743acba642d184ff791650616accdb247af139af10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6208522e8f1c1d515de7702eda6094
SHA128f2a16a6765e77bfaaf375ee66663b18b7610a5
SHA2568e63b98f2773c2a18e7f1cb6328374db13e9a061ba1d3af0e7f810e497ba2d4a
SHA512a02bab63412b75051bbbbd30f42f24b584a26d8ea4c933a5bbb4793a7d6f097cc3fb07da4b002866372cab00e9ea37a2fb3e08923b7524fc0061625350a140a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c91e3626119ba26120db07ae7bc91e5
SHA1856c5b01267543be9fa035714153e24ea6b0f29c
SHA2566ccc14ce29f6d6ca8d10705c3b632ab140eba2fe9835aad09fc321c384b93359
SHA51248492323a78e6b7e446fd90c35333b61f1595cab9aeaacf595ad6e450d6065ecc51e6f98aa565305b6f86275180867651e06c398a22afe1c8f2236bfdaec4dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ffd5a2013c28155a85e31b4323f06c
SHA13a6846043da81b3ef41b9f307ee5d085bcf87713
SHA256e187295e8f96ea22ddf34f6a4ea7fb76210f82d8c2f440dadd1b0103d36f24c2
SHA512df86ddf68bbc0107cf37c4d0537d561d8b42955aa0b07208d39a5194887b8824784c85fc8428ddc8ce9a1af3232c0761dd676abbbeb4b450ef13e08057fee8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57145e42ba5aa9107deef092f3f96f033
SHA1f2c0b0bf8c3b1fbcd8bb8590c0bd447482e67b09
SHA25638a2e1a25b96c2add95e6f0690100e1fa9da3d82e5c8c2f75f8e5e4a741795b8
SHA512a4d0524f6dba39ff8e8dfb942ff5fda71202d61ea21783626d5c3aa3d495a74170cf18d9a58058cf29531d01ebd1e561d65cf309cfa82adf2da84e2b8bc17eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c8e911e85846ae5280b945e0e0e6ca
SHA1e7b8c233a7bcdc8084d0ee32137133730d4e04d8
SHA25679891aafd2921a1af2270627cb4aee6b6eb3e47918ab7f75033ae3140185084d
SHA51236959f93cde932f9c517054900e6b69d740e6576de415970fbc64df660b026a8149798630e0b949301d923b1b42b9080ce1f1f4dafa5f45818394498ee40b71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d0e27318ab01943999a9b82483f120
SHA14ce57c0a332255ab1678733789ff8ce895fe32f8
SHA256dcf3784355872f66341f859447daee91d9fca50a32ed7121d9fd1072f3a395f1
SHA51240a032c0a25d3868907ff441263d87e1d65c61dc08259c77529c110318ef0ed476fa6ccf8c0b378e1a9d85cd3daef69d1a79a68b5892a2523bbe528410482fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c34b0d5cda016c8e292ed9607e40844
SHA14b1132f1011a63cc94f2d3237da6074a88034286
SHA2569acf60767540d3202f8b01c66da0d151c8019e00d42d1265eb321accf6433d15
SHA51282f849bc27e04852057dc0228ab453a0415244c084c697ecbe784b7f51e42b9dc388e0a189066bf935ae91bb48387ecc6e2244a560937d0fd868d52a4b15d0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471c74fe996f24fb5c405cb65b6840c7
SHA115080737f6ebad92468d8a1c6aa09e6f4278139a
SHA2561e9c6b198f1a8d8cf51fcd1ad73aedf625716c71ace18ab95dedabe00fd61918
SHA512460d438ac90cf7d2aacdae774c314156f18efda0f4414dfef2a05e002e8afdb99a8ab6cc2ad1f42e2a2afa2df2a0eb13bafd6989c838b3d019b8022ae7d1fb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef952033ab14678f8141d8e310b53ca1
SHA1406d430109537b61087c4c5e56a0b0174aaca3d2
SHA256d8973fe6e16280e2edc06c10541c6dbbde2dd10d41de80f6dab02aa5b993ac09
SHA5123b5700fc6dd7f1b939abf694c54d47f490d118c82371626a8a03c28751595691349300315cdf4011f8302766c04f09793e821e09191a31eee44d98f1eb5c9826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bedd96f7faf7fabd03fdc48314ce6c9
SHA176a9e165590f868ecccb9eb50733a73fb5b5930f
SHA25634741ad1befc75692b10002f2300df7249f07e0b51365f428fa4a39389a25527
SHA512e83034f57e5f20c11e2ee6228a00b2c097f64c2cf86bc150dc85d7b452c8cce240a0ecb44a328ba075b0ee4525623005febcf135ce917d9ea7a9425c08949ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56875bc1c566c68ddada0ecdcd962f447
SHA10baa750aaa162f40ff6bc7eb01f46b230715c8cd
SHA2560c9bbd7ad91245fb791968e729ec27bd48dab625d6f8c171ecfd16c7b9b2f877
SHA512618ec6938da4c3e7baced742b52cd9d9e551699bea1ec13e28f627bce488d3b9f208b6fd9cf05c150cdc7bdabb992b8108ed4f045b10d388aa54950808c0c8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd794f5ce9dc6261e5c19ff5f8605da4
SHA1381f4ff091a74f73eca0f91a9e536f3c9e245943
SHA256d21b624099d53956154402a912f0e5d68109c72dd4df74dff8607b31d9c457db
SHA5125b9f7d63d9287e1a81320dab13522e5919f991c679419b9c9e4dcfa95e815d48c8d3e06099eaaf60098151360b4cd59f1e5ea86598aa02331d4bf9736fe346ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b