Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
08bc20b07426831e201788aa83457bf9_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08bc20b07426831e201788aa83457bf9_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
08bc20b07426831e201788aa83457bf9_JaffaCakes118.html
-
Size
10KB
-
MD5
08bc20b07426831e201788aa83457bf9
-
SHA1
8bd576c68c316ae350ee932c24fb1e8a19b0a3ec
-
SHA256
170230253dcb856d558330a58524eb19fe348215e4441e6517a4395b6bbf4aab
-
SHA512
2008377198e4c76fe5a9c68927ef32c6a6f712e6e119cecf58aa55bec39b7fdb6cbe447f1409618396036edcc4b4eef8aa187ab8119ba10a77d188f6fbd1992b
-
SSDEEP
96:uzVs+ux7VPLLY1k9o84d12ef7CSTUHGT/kjyp+AYjK8wlVHcEZ7ru7f:csz7VPAYS/W0PPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bfb4d238c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDB1FED1-322B-11EF-A326-424EC277AA72} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425396866" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000009007a680a45908a8682bb1e56ca831854f6a4488cb38902bb70011a813efcedc000000000e80000000020000200000008df0b084122d37fdc288c5af9e38861b096a3353017ce9d4fbf4194114286a1d20000000b0b58b8a7d5096004ff1d414b1591f6d61887f5ebe0c5984014374ef391c0e774000000010c856c80af6f42b998a6d697247a47495c65683fb4f1b82303810a52618495508f86b1e222886f3eb1dd9c2dc82f3c2c5a862f1ebae808a287c853d46768edf iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2288 2132 iexplore.exe 28 PID 2132 wrote to memory of 2288 2132 iexplore.exe 28 PID 2132 wrote to memory of 2288 2132 iexplore.exe 28 PID 2132 wrote to memory of 2288 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08bc20b07426831e201788aa83457bf9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e336bc969515de08abcee4d86f7c5e96
SHA12e0e23ade6e02b7e75055e054393288cd518562e
SHA256e7eed24ab81b60dae517b8c52b5f1975a9af15215c81c3a06783355827178cd5
SHA51265da5eadc3af5418e67a4ec2fda37fc8e4551b8d13080549f99328450b4e13a11fffd2524f4fb1cb75b16e8b3c9b2072efc32fa12d79cc775aca28be705f8f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9bf0bb6b9912f9fe30aa9dbc34118c
SHA1ea5411e2558fb009fa895198bc5b459457b97b37
SHA2564ed257aafc6b5c7cd013c29aec6246076c7a81852827e323830873e40251e9e3
SHA512334bb0f5fcd317fba5d7134c38a78d78b3bd96c376c1000d0f6b4b37a6ee4e224559f745b008ae68c8169db1a3cb43ef35255eb7a1d494b4ab62ca707d27cf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6686b06598e04df9fd05cf6074e1b7
SHA121baa93f98d239bcf8157fef0ad2f1076506fb98
SHA256bed9bc59cb356c952038646db7fd879821ee820375067df8da3a080cabfda575
SHA512d033ddc7b8ac615c7004fb8e3d48adb2721e7baae912bf72606b9b2d087fdb54addd4be314b2559d09bf6e7e8390ea25c30eaf00ed51b653c37a96cf3008d119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790a07322fb0f95df89e26712f29a2c4
SHA1ee890ed8bfe02ea9fd04d9cbeeec82b8666122d8
SHA256eb606a01c28d9f1f6ddd0bc49d37af5f33d11e03ebe28f83e98deb04f9b19110
SHA512ac7bbf88ce3f94524b5d68d54f47d545ebbf06f712d7231a98ef85e1c9aeebf75ff3262f2f06ef34c5f18e293e1d931a643e810fddfcdaaf34d9f248891bb6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbf17bab1e4c8985b6b58960c0ddbc3
SHA1466f1cbdcc88051835eeac6e2b0af3c75275c773
SHA2564d649108ffb1933d7e0a74d444428280efd29db631b7281466b9065f73ba81e5
SHA512d4c16129eab4e00d07f03e09dbadbdf939645d57881563b5cc7fbe527860235607f047c91d33e15ae7b2896badd9de4950f4a7efc3b9465abd3d9d1277e595dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbf0721465f633ce9e7a448bfba5c15
SHA14a0fe0379e32f2d0c4b0eab90f26761f0ef0e5dc
SHA2564c6e70049a4c797edccbbf3693d4037f80c9cea837c5de145e033ee3ee1f9a03
SHA51250a050b432147c6b277901f962d44d8f5b75452ac7f798e6d53550d816203e57a347da063d453d942efbaa90c198a1e5bcae041d592283410db2123e215b1c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd690ee10335b7012f94a403be2f4462
SHA121cc5c7dcb85f5c2b2612a2dfbb4596521dc450b
SHA2569dd389c2916aeaa5201396fdcb585268403f1ccce1ac61d6fb52a6a6eb62f958
SHA5127e1a2e9f6d49ba924fb91f5ba7a4bb27ced5b3b8008f6a03f854032cb524541093091bdf1b4a3d91909b9ade2b5e76015c1200ac2eb00a7897f326272a385537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871e3b7553805e753d5254c9c893bbd7
SHA10158f868d76dfc76dd4c9b60ea14e8a6a2e906b1
SHA256279cdeb0097bf410e6fbc49edc30615725585cc7633cfbd16e77414a6f2ffb3e
SHA5129e781a7eeb507cd0149a183f57ca4839c97045e9bbd651e81d93044a1cb6cd796f6261b64209f164c04fb34f3be120568f3748aa8139f719a07a57d1b0ed58ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51250538d73e410213d49e6e40b9a796e
SHA19e29a60dfb1b16b3b8c24e9b82d973e6933e21bf
SHA256dc93fd4f2d2bfc0b9b1fa1436e4c50b620fc7810435087e304e479da52670b93
SHA512981381ed21558c7dd486f8d2eb796dc5b6e33796074c8af23295df3ee490bc5923c8f6349adc2c8946415fc18744dba51f2ff1896ce419413645339caf1c4ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac74ce14e84709cd6d7f4cdb066b4b53
SHA1cbcc84681176f28f56ae644c570e7d63df3d68a1
SHA2561e457c3d47a592664658dce1231bff6bdfa922cb006dd2af34b96f31d89c1eaa
SHA5129760d5f016259cf798914c261120085b680bf883b62eb62140118d1f4cabde8f6ad74625b21468738c78c72eb5a350e6c9d0d67c8bea579010af563cab4b91cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ed9dfe747983e136cde35d0ca2f1b7
SHA1d8e1d52094ab319caccdc8da55ba402a18640ff1
SHA2568b70218f3cab1e65c5de80e322849b264f6aa008d694b6b0418b2c4431525ae5
SHA512551ca7602e59174d982d400034ceacc9b98f17ec498aafd874b4e4866306c1a54e02845a0a4563fb3afe7655bbf4edf1c70bdc0ecfe5c3b8ea72739bca7340b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a594ab91c5124988c849d66dd67833
SHA1ec2597125c2333958f46775d8a54a3b5373f9494
SHA256b9207a87d2b5638e4e79216b06678e3654672b7156e5cb385a0777309f1e60dc
SHA5126dce31b93fa71a22e7fe103a4d1b029b035fe0c5b8ae6f3c38f889f24aa7ea4ef6eac1f24007ba1dd463c64cb0afcb1acb86d0a0dd4abed415c2b32b69890de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183d8774e448137e81104c904a7eb8b2
SHA1d9ae64fed517b25d11fd47025f5bf1b33a4188b2
SHA256663f65e9bc78354c14fedc149d08859aefde02c6716c20d3cfab31f679eda2cd
SHA512076cb37e033f95a996aacb43611976b15f5f6e9195b39f0f8823c8f06f32f6aac6d44e6baba3f9801916675a29e8ec9f1e71b8cd4df7e8bdb51b4bac902fb217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233dc73bc022216751fd233c35e54f7c
SHA15ce1d3d10a8c8986c6baffce3b2ea03e72aeefff
SHA25678624bdfdaf9aca05034b74de501d311c311f261e332f7def105fb96a6316de2
SHA5124f41a4fe62fa6279d17cb1cf95e0aa9f041466cc334b0f4559435dd8bc7edb9da3702c413bd3597e498ae27ff0d567a2a20d327bd9aef3ebe3f349c77b272000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230bda4a5ea2a0f256b4c68a113b92d7
SHA14bd46ea0e215b17325caf068ea69b7c31b542c1c
SHA256343b1e5abf93c0d3cae209ad9dae68c94b7ebf226cb524d882fe8dfe1e6ebc0b
SHA512b251f0ebee35ebbc4afc82c01a5f2fff0af10d7ea7cbceaf53e4d503c99dcb1689420c2a9559ce4322852d02bb86e33ffa24734496b893fac6ed3fb8b8d554dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864558b3e8b739b7c020582fc01635d6
SHA1ce93974372576b2defc17917950d13874955b07a
SHA2568a9de7776ce901b1bb2c802eb0a370a2cd6bd575cd7cc557d58fae642b97860e
SHA5129a643339081d0d2aa4055f072adb9b35fcf281e113c80cb4939c370632aa04044d82dacd482c78b03342baea0f8f25735db3e96f4f9a9f2f39ad60b9892c673a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0affb3dfa7a387154856368155414f
SHA1763d152b1f9e8005b7c3c221a000b1720ac6997c
SHA256a6d4e17ec87755bb8aa881d1d02bb846f5f51fbf65bd1015e99d6b2fcbb76127
SHA512b3b3a446fe2245c0b54050126009a289484ea9e0b9beb4e01a3494a39eac4c4e6ebae4cc27559f1ecdd6cd31c5c00b4001b00ac890fa37ebbe5cc597f70f7f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12c906644e2e249a83b6a49d97a1dc6
SHA1e725bfd6309a196317f27534269b12bdfd67af44
SHA25663d7ae376051b971b4cc0078e65945adad98ca7f6d375290998c18d4513b466f
SHA51260c3a646610e4f7de05b4851eddd1f717c17d70bf5d36d90ea5ecccea8c6af055d0d984b68ae95c08d0f3d96a348498ae583fb288a23c26207ff4b24416af98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f9f62a4d06d836e26b87943cbe1995
SHA1a75e246a83aaed2a407ea1fec300e4295442c87e
SHA2564d1435b9f4d3c505d30eb4547eaeca00b6fcfb30f147778078f5f12eb0591131
SHA512e5e13515f39c7ecf7cbddc391e9f698d27ebef1ae8ee6314c229fbdc16859844f75eab18a1644b686937b013b2f4be89ec835e594ca03e61d6678987fa42760b
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b