Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
07ed8a73bb1ff8669e7782295846ffd6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07ed8a73bb1ff8669e7782295846ffd6_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
07ed8a73bb1ff8669e7782295846ffd6_JaffaCakes118.html
-
Size
53KB
-
MD5
07ed8a73bb1ff8669e7782295846ffd6
-
SHA1
8976e3cec02a4952bb3cc2a26c6cb50c6153e10d
-
SHA256
42eb7f93b9ca4617aa3095cba5a140ecf56c84ef612aa296bb7b9c337b8491c1
-
SHA512
cba88c281968ac01537d40a22fefd4fe59f59f0e009eabd75c568cfac4ca9e93ee2bee359933ebba874067defd3e86d31b3d46e39ed55985add57fd6e69d61e8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYJ63Nj+q5VyvR0w2AzTICbbvoy/t9M/dNwIUEDmDe:CkgUiIakTqGivi+PyUfrunlYJ63Nj+qL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425386213" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006b4e040cdc3723fba7c0aa54e964b6c6aa972b8d934540ad1a178422697f8750000000000e80000000020000200000008aefb37f56a66424aba8e9ac0efadfe9f1a54974477d3358c8190d5f4fc07454200000009d520acf3164768609b2493129eb902d83f01c334fc82c4b3ab4a7e1c18ee9fe40000000b485f43b0c4abba0132b7aef919008cc81452a47e75018f12211082173738f0a5ae0f2a49725f47aa1f0ac61bbddc93de15d24d37e49982367588edcc393ca15 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7032b90420c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F6B20A1-3213-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2108 1520 iexplore.exe 28 PID 1520 wrote to memory of 2108 1520 iexplore.exe 28 PID 1520 wrote to memory of 2108 1520 iexplore.exe 28 PID 1520 wrote to memory of 2108 1520 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07ed8a73bb1ff8669e7782295846ffd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7a55035640a51720b30578516e7ccf
SHA1631c6f13a632448fe6e8c5a702c20e3bdffa39b0
SHA256d6163f373df326f2f4caf06e3cb8fb4b135829419174f62962d02a3de8b0deb7
SHA51285905b146c1184981f47e4ac50a0f3bd98b612715d2c8d9b80518f0da4c08b69912086fad0c15601dc510a2c70978f6e7b730c64271703c2c324fce3e38a88b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab7eac73faceb858e789abed6b5be8f
SHA1a97ff88d9bcd103fd3ab9efca872c6b50470ddd4
SHA256f7fc3b592eb250f446aa7502d4a0e7d95d8e3652c122b139a735962b3fad2dd5
SHA512e1d9ca03d4c8d47a21512adbd82e8e83a7fe9a65cf1a6dfcfa668786d06b41ff44c22cee3d7bfe12a5464243e281e5f3bd02b3a1da54ac9b03af0263851ac919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86e7cb813bb0544fd2f90d2084c3743
SHA1e9cdb343f263c49ec8f43654c63560a6792a550a
SHA256e8feb4495e2e7f6ca9ed3fad4a16cbbb05aedc8fb7936dcd65a09219fd35aa93
SHA512ad7d34a162a5bcdeeb08f0f13e94b91dd3bdd235b774329b967fe1f73376524b5d3dfa3d85696b71cb439f152852c760cf5e8b8a37a96155056f45aacff9e3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5cd711efb3b84038524f51fafe50c3
SHA1dd447c3084afbe9d0c13318df9658e3a237151ce
SHA256f7a5d5718c69f69e198c046b63025686cd99678da113f660119f219a5a4bc545
SHA512adc0d1156b89eab571208ba3f3cdca2e453dc9d94d5df0a333f4a6099a67c0354101d6e0e6efc9a7c4a8c11cf510fba29c3ae226dae0a7c49e8a30d8a9b5fe55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bfdeee033e53828cb513a3964d4e422
SHA1ef3f1cccd4297d22b159d97f9e4227f0b70eaffe
SHA256180e92f5113b28812a805c3c9df6c290f8ef97f726968d8171ee398bb1618be4
SHA5126cd002de14aad8ed3a0cdf82f1063846e949aca10dbc25cfcd8028836df357b0a18b3d23e3027546c51c09812c11c9be4231a60da62892d6ca33d5892a5dae3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad9829973ecd0d00d6ac8f1b9e10f0a
SHA1d0ba5b817cc7a6f09b48fc0cf2593a67079fd872
SHA256aec838cce090e89e8c61185148534d1eaa7c333fd1f03dc8c6d6b4a27c5a1709
SHA5129c9c22fa0398638b42670411277948326dff4f06287803d1f808ac63c9ca0771b4ce79b49e73158b394482e99a8f7456103c3c7bf78a4206d744289e6fa77926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9a5169e3c8f1bb4ea1a01385d43362
SHA1f97a48094aa2d32b09d9cc12921b4f44b216f41c
SHA256662fb7f505098860420857e211f57c235e409be0b807e70e477ec73475db23ff
SHA5121555b644219507d25284d89d883a38f364999afe8f353e02ca376e549fd52739d13eae36f557bb1cb9945ed234444b5dbff955263a83e4cc41e2840f9ce74957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b8df4f0c5e9f342a6183b5babf7fa8
SHA186c954f0115c7cfc31ffb963cfc1053b40f418d8
SHA2566e697df846c950fc7abd0e543d417d8c453f5619248aa037cce364b0127a6237
SHA512eab6bf37d201241068d5efdcb371ae105481240c621e820d527ade7888cc0b0a5eeb47ee69eaed97aef4673b37e5798497555c46d31bb230e69cbb0034ade674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c558af52aedc6d812e07696e9843426
SHA1159d9b0b105cfca0273fb31fb1fd9d77b77e0cfa
SHA256919a0f4fe2f83419234ef10df43c250d10a831ed965dc48da432e216805c1a9e
SHA5128169fefee3a3275c648c1767f13234b6060301be91982a4e5bf314c76146653dd37de96101220250dd00f839ca9ae31b18fc6135457d73e5f24b143644dc9499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f96573458994fbd95aa770b216431a
SHA16d4640cbcadfd5b70a0290848e5813f35d3b97ce
SHA2564113b12b2432605ab880430357081ca4391416a5d42d9b404ae7d18d3f56ee41
SHA5126d7259eb9a3ccc87a44e975bf66c4a2128be7872275ba59cc08453f3d84f7a7f688c122fe04328f48f00ecc72210cffb9184f49f74257bddfcf8d51d4745fde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099387614132904a492c797a83d733f3
SHA1e7807c5a8427b8add556908e8bbafe0b1179f180
SHA2567c0d98faae152efc3039578e62cb580b0fa28e7b5e8a8645cb397602b25c3dad
SHA512910cf3bac3bed042bd4cff3d0b89e5d39b1772e72b8ee1f78617c552706837083f6993ba4294bf5505a95d7d0962f805d9396d7a6691f98354e4223e253a28b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8341aa11cb728f9bc5c80f855e92f5
SHA1765d09cf6250d31294555f4df284f1db1e3866ad
SHA256221811220fb2e19bd982172b4c7359d2f27448ced677089652b103bdfc5b4f76
SHA51225d6be0171b8245b8914d39864161902d4bb398f115bd9064bb727268b36ddddd8c899e9209cc5d6b666b946de3365150bb409b6e937a7802393760fcd5306eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b41c5bb0489b959abc366025e2e02d
SHA100644ad9e5f8dde28063e290449a111a81f542c1
SHA25660d320b542c0c5f10a34ae4544c07151c7d5f93fc5799ee83ed8f3f5d21d0e2d
SHA512eb018419668f96a51ed43ee03f7bf5cbb70dbc3132897c0fea19244a29666ed79d860d6c599285082df47f2f602970694fcfd41c107cf64335fedf0b1f0b7b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b917a9a2a3dd12a3174bc426ddbc5d
SHA10d5f31e25e56606f86fa9c765a2a013e06b60b70
SHA256510bb60c437df7f0eba5b7a12da83c056592ecb33fd22d2b7ebb78aafce4d81c
SHA51234913bec9582606be1d74ddf6498c0cab8f0da6cf56dec4de68c1f0abc9169a8142c286751f919f97d271200f969d433f94da306b47cb9aa8632bdf2fc57ef24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3827c6ee328c3e3d272c40286c69e4
SHA1bcdbcaccab622f0b747b781c33c28ea8e4b9da7d
SHA256b74c252318259eff374f44ad4507c6e8b24dbd7b6ab9d850cb1717a3404599a1
SHA5122542e44d6848db7eb9eb26e081b3686890ac7404e818d6f4923fdba4af405479d44275cb8fe2953894efe7a93c5719fc667e3cb14a97e58181c9cf804a30aa21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5aabb3af72cc259dfdde1f77976b3bb
SHA1e25351ab88f07ffc1f47a638b2000427e599d33d
SHA256eb0015f50e841ee8b6ef27ea9769bd44c9a8259ddbdaeec010846a1227223e81
SHA512fc4b05043e96954ad791d53f6cc27e58940f9e6100ebaf29e44ad0727cb9bb85d475ab710999b08e9380b302d07d527e3eb1e5cf44f652b7ccde370848388c76
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b